The number of IoT-connected devices is expected to grow to 21 billion by 2020 , presenting a major market opportunity for established hardware and software vendors across the world, in addition to spawning new entrepreneurship opportunities. These companies are working on producing IoT devices, software, and services to develop an interconnected world.
But while numerous commercial and academic programs focus on building IoT systems, it’s clear that for any IoT stack to be widely adopted, it must be open—without a singular organization claiming ownership. We must involve the community with the IoT’s design, development, and deployment—that means truly open source development, as exemplified by Linux and Android. We also believe that an IoT stack must provide immediate value to anyone wanting to deploy and use it, without requiring substantial integration work upfront. Practically, this means that it must provide important first-class features such as robust machine learning, easy end-user programming, security, and privacy.
To that end, our research team developed the GIoTTO stack, an open source infrastructure intended to support the construction, maintenance, and use of IoT-enabled environments. We formed our team at CMU shortly after Google held an open call for proposals on the Open Web of Things. We responded and received the lead award on what is now known as the IoT Expedition, which includes partners at Cornell Tech, the University of Illinois, and Google. The IoT Expedition’s goals match those of GIoTTO, and the project has adopted GIoTTO as its software infrastructure. Each partner will contribute to and build on GIoTTO to demonstrate its value through a series of living laboratories at each site.
While the vision of an IoT-enabled future is enormously compelling, there are several key challenges must be addressed before it can become a reality. These challenges are related to three critical questions, which the our team hopes to answer:
- How can we build an IoT infrastructure that is safe, secure, and private from the ground up?
Safety implies that IoT devices won’t do anything unexpected or unintended. Security implies that IoT devices only allow authorized entities, whether computer programs or humans, to access their services. Privacy implies that IoT devices don’t access or leak private user data either directly or indirectly without a clearly defined, and verifiable, purpose being presented to and accepted by users.
- How can we leverage the huge amount of data being collected by sensors embedded in all objects?
This calls for machine learning and data analytics to be integrated at every level from sensors and actuators to end users.
- How can we enable end users of varying technical ability to manage, interact with, and even control and program IoT-enabled environments?
For the IoT to be truly pervasive, IoT systems must be accessible to end users, or they might be discarded along with the multitude of other technologies that showed much promise only to be ignored after deployment.
We are proud to be working with the following faculty from across Carnegie Mellon:
Anind Dey (CMU HCII)
Chris Harrison (CMU HCII)
Jason Hong (CMU HCII)
Anthony Rowe (CMU ECE)
Mahadey Satyanarayanan (CMU CSD)
B. Liu, M.Andersen, F. Schaub, H. Almuhimedi, S. Zhang, N. Sadeh, A. Acquisti, Y. Agarwal.
Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions
A.de Freitas, M. Nebeling, X. Chen, J. Yang, A. Ranithangam, A. Dey.
Snap-To-It: A User-Inspired Platform for Opportunistic Device Interactions
N. Davies, N. Taft, M. Satyanarayanan, S. Clinch, B. Amos.
Privacy Mediators: Helping IoT Cross the Chasm
T. Yu, V. Sekar, S. Seshan, Y. Agarwal, C. Xu.
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things
T. Weng, A. Nwokafor, Y. Agarwal.
BuildingDepot 2.0: An Integrated Management System for Building Analysis and Control
J. Lin, B. Liu, N. Sadeh, and J.I. Hong
Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings
B. Liu, J. Lin, N. Sadeh
Reconciling Mobile App Privacy and Usability on Smartphones: Could User Privacy Profiles Help?
H. Almuhimedi, F. Schaub, N. Sadeh, Y. Agarwal, A. Acquisti, I. Adjerid, J. Gluck, L. Cranor
Your Location Has Been Shared 5398 Times! A Field Study on Mobile Privacy Nudges