Making Devices Trustworthy : Security and Trust Feedback in the Internet of Things

Mobile devices form an essential part of the Internet of Things, where mobile and pervasive devices interconnect to form communication and information systems that enable users to interact with intelligent “things” as part of their daily life. With the increasing potential of mobile phones and the further development of pervasive systems, the overview of information and personal data that is sent by connected things will be complicated to keep, or might even get lost. To counteract this tendency, we present an approach to provide users with underlying security information on a mobile system, in order to establish their trust in the Internet of Things.

[1]  Manfred Tscheligi,et al.  A Pattern Collection for Privacy Enhancing Technology , 2010 .

[2]  P. Dourish,et al.  Media as Material: Information Representations as Material Foundations for Organizational Practice , 2011 .

[3]  Kirstie Hawkey,et al.  It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls , 2010, SafeConfig '10.

[4]  Kori Inkpen Quinn,et al.  PrivateBits: managing visual privacy in web browsers , 2007, GI '07.

[5]  Henry H. Emurian,et al.  An overview of online trust: Concepts, elements, and implications , 2005, Comput. Hum. Behav..

[6]  E. Uslaner The Moral Foundations of Trust , 2002 .

[7]  Yang Zhong,et al.  Remote Neonatal Pain Assessment System Based on Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[8]  Adam Marx Using metaphor effectively in user interface design , 1994, CHI '94.

[9]  Lorrie Faith Cranor,et al.  Improving Computer Security Dialogs , 2011, INTERACT.

[10]  Ka-Ping Yee,et al.  Guidelines and Strategies for Secure Interaction Design , 2005 .

[11]  Geir M. Køien,et al.  Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context , 2011, Wirel. Pers. Commun..

[12]  Lorrie Faith Cranor,et al.  A "nutrition label" for privacy , 2009, SOUPS.

[13]  Serge Gutwirth,et al.  Legal safeguards for privacy and data protection in ambient intelligence , 2008, Personal and Ubiquitous Computing.

[14]  Mary Ellen Zurko User-centered security: stepping up to the grand challenge , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[15]  Yajin Zhou,et al.  Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.

[16]  Adrian David Cheok,et al.  A mobile pet wearable computer and mixed reality system for human–poultry interaction through the internet , 2006, Personal and Ubiquitous Computing.

[17]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[18]  Manfred Tscheligi,et al.  HCI for PrimeLife Prototypes , 2011, Privacy and Identity Management for Life.

[19]  Jens Riegelsberger,et al.  Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems , 2005, NSPW '05.

[20]  Ka-Ping Yee,et al.  User Interaction Design for Secure Systems , 2002, ICICS.

[21]  Steven Hsu,et al.  A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings , 2011, SOUPS.

[22]  Marit Hansen,et al.  Towards Displaying Privacy Information with Icons , 2010, PrimeLife.

[23]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[24]  A. W. Roscoe,et al.  Security and Usability: Analysis and Evaluation , 2010, 2010 International Conference on Availability, Reliability and Security.

[25]  Nahid Shahmehri,et al.  User help techniques for usable security , 2007, CHIMIT '07.

[26]  Alan Cooper,et al.  The Inmates are Running the Asylum , 1999, Software-Ergonomie.