Tushar M. Jois (City College of New York), Susan Landau (Tufts University)

Mass adoption of home IoT devices has been slower than expected, and numerous user studies have looked at issues consumers have regarding the use of these devices. But despite multiple studies on user concerns around the world regarding characteristics sought in home IoT devices, two important aspects have largely been missing. The first is the wide variety of housing types. Almost all user studies studying desired characteristics of home IoT devices have focused on the single-family stand-alone home environment. Wide adoption of home IoT devices, however, will mean use in a variety of living situations: rental apartments, condominiums, retirement communities, dormitories, and others. This introduces new complexities, including the second largely ignored issue. In these other types of housing situations, multiple other players are involved in the deployment of home IoT devices, including builders, landlords, housing managers, government regulators, and more. Getting home IoT devices right includes factoring in the characteristics that these other players desire and expect. This will be particularly critical in standardization efforts for home IoT.

Previous work has shown that home IoT devices must satisfy obvious requirements of security, privacy, and interoperability – and less obvious ones of reliability, safety, data portability, usability, and controllability. Our work extends this list in in two important ways. First, by broadening the literature review to other previously ignored but highly relevant fields, including human-building interaction, we collect all previously studied characteristics relevant to home IoT. Second, we provide precise definitions of each; as a result of the analysis involved, we introduce new characteristics not previously considered by the computer science community. Our research in delineating required characteristics of home IoT provides a crucial building block for standardizing home IoT devices.

View More Papers

Poster: Challenges in Applying COTS Secure, Resilient Boot and...

Gabriel Torres (MIT Lincoln Laboratory, Secure Resilient Systems & Technology, Lexington, MA), Raymond Govotski (MIT Lincoln Laboratory, Secure Resilient Systems & Technology, Lexington, MA), Samuel Jero (MIT Lincoln Laboratory, Secure Resilient Systems & Technology, Lexington, MA), Gruia-Catalin Roman (University of New Mexico, Department of Computer Science), Joseph “Dan” Trujillo (Air Force Research Laboratory, Space Vehicles Directorate), Richard Skowyra (MIT Lincoln Laboratory, Secure Resilient Systems…

Read More

CoT-DPG: A Co-Training based Dynamic Password Guessing Method

Chenyang Wang (National University of Defense Technology), Fan Shi (National University of Defense Technology), Min Zhang (National University of Defense Technology), Chengxi Xu (National University of Defense Technology), Miao Hu (National University of Defense Technology), Pengfei Xue (National University of Defense Technology), Shasha Guo (National University of Defense Technology), jinghua zheng (National University of Defense…

Read More

On the Difficulty of Selecting Few-Shot Examples for Effective...

Md Abdul Hannan (Colorado State University), Ronghao Ni (Carnegie Mellon University), Chi Zhang (Carnegie Mellon University), Limin Jia (Carnegie Mellon University), Ravi Mangal (Colorado State University), Corina S. Pasareanu (Carnegie Mellon University)

Read More