THE CONNECTED HOME SERIES



Similar documents
Sizer and Offline-to-online migration

Catalyst offers a broad product line of RFID systems for inventory management, omni- channel operations, customer experience and loss prevention.

THE CHANGING FACE OF MOBILE PAYMENTS

2015 US Holiday Hiring Outlook

THE CONNECTED HOME SERIES

The Hong Kong Startup Scene And The Importance Of Accelerators And Incubators

EUROPE ERICSSON MOBILITY REPORT

Connected Home Technologies. Part 1

BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME. Executive Summary

TAP & PAY. Has Apple Pay Already Sealed the Lead in Mobile Payment? February 12, 2015

GfK 2016 Tech Trends 2016

Module 1: Facilitated e-learning

How To Understand The Power Of The Internet Of Things

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

G DATA Mobile Malware Report

UPnP: The Discovery & Service Layer For The Internet of Things April 2015

Consumer Electronics Market: Global

Smart Home. Connected Objects. A promising market, taking off slowly. M15187MRA November 2015

Tronico Technology Company Limited. First step of IOT - DIY smart home

Wi-Fi, Bluetooth, and the Internet of Things

DAY 1 MONDAY, SEPT

Streaming and content sharing on Philips TVs

Beacon TRENDS in the Retail Space 2015

FLASH INSIGHT. Attack of the Future Smart Home Giants The fight of Apple, Google, Amazon, and others for the most customer centric ecosystem

The Internet of Things in Smart Buildings 2014 to 2020

Evolution of Smartphones And Android Operating System

One billion. Mobile Broadband subscriptions An Ericsson Consumer Insight Study on consumers connectivity needs

The China & India Story

The Australian ONLINE CONSUMER LANDSCAPE

CONSUMERLAB CONNECTED LIFESTYLES. An analysis of evolving consumer needs

The Internet of Things: Risks in the Connected Home. Research Paper

Hadoop Market - Global Industry Analysis, Size, Share, Growth, Trends, and Forecast,

NRF RETAIL S BIG SHOW day 3 HIGHLIGHTS

HP Cloud Printing. Rachel Tang, Market Development Manager 3 Dec, 2013

Mobile Broadband, DSL, & International Bandwidth Prices

Developing the edge or scaling the core through corporate venturing Internet of Things. Daan Witteveen

Mobile Marketing: Key Trends

Applying Home Automation Technology Presented by: Greg Rhoades Director of Marketing, Leviton Security & Automation. June 12, 2013

THE INTERNET OF THINGS. HARMONIZING IoT FOR RETAIL. Kuru Subramaniam

CONSUMERLAB. connected homes

How Network Operators Do Prepare for the Rise of the Machines

Mobility in investment management

Personna PC web-based software. Q-AdminTM client. Lighting management hub (floor 2) Lighting management hub (floor 1)

Chapter 1 Basic Introduction to Computers. Discovering Computers Your Interactive Guide to the Digital World

The Ford Developer Program provides a software development kit, technical support from Ford engineers and a developer community

The Smart Meter Revolution_

Agenda. Introduction & Positioning within Butler. Why entering the IoT business? Where are we standing? What is our offer?

growth in digital segments while traditional media remain resilient

SOUTH EAST ASIA AND OCEANIA ERICSSON MOBILITY REPORT JUNE

Personna PC web-based software. Q-AdminTM client. Lighting management hub (floor 1)

LEAF INC. Business Plan. Leaf Inc. Ann Richards School for Young Women Leaders 2206 Prather Ln. Austin, TX (512)

DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES

The Physical Security Business 2015 to 2020

Welcome to JT Fibre. All you need to know about your new next generation Broadband

YOUR WORLD MADE SIMPLE

Digital Segmentation. Basic principles of effective customer segmentation

Connected Homes: Enabling a Digital Lifestyle

CHAPTER ONE Home video monitoring

NOKIA Company Synopsis GROUP B:

Standardizing the Internet of Things; Boiling the Ocean

WHITE PAPER SMB Business Telephone Systems Options to Ensure Your Organization is Future Ready. By Peter Bernstein, Senior Editor TMCnet.

A Peek into the Future-''Internet of Things''

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts

The Internet of Things (IoT) Opportunities and Risks

120 million. $17 billion. $140 average. Used smartphones: the $17 billion market you may never have heard of. Why would you sell a smartphone?

The Internet of Things Risks and Challenges

The Ipsos Canadian Reid Report 2012 Fact Guide The Definitive Resource on Canadians and the Internet

Security and the Internet of Things

Pace Equity Limited Advising on Company Sales, Acquisitions, Fundraising & Growth since Cyber Security Market Trends 2015

Schneider Electric and Energy Efficiency

Reducing Configuration Complexity with Next Gen IoT Networks

In the pursuit of becoming smart

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet

Smartphones and ipads: mobility blessing or technology support curse?

The OMVC Mobile TV Study: Live, Local Programming Will Drive Demand For Mobile TV

FAQs. Conserve package. Gateway... 2 Range Extender... 3 Smart Plug... 3 Thermostat... 4 Website... 7 App and Mobile Devices... 7

Video Games. Video Games Market. Video Games Market Growth. by Component (CHF millions) CHF millions

Solutions for the Connected Home

Internet of Things markets

media kit 2014 Advertise Global Mobile Ad Network

The Facility Manager s Guide to IoT in Meeting Spaces. An AVI-SPL White Paper. (+01)

The Goods, the Payment and the Mobile!

How To Protect Your Employees From Being Hacked By A Corporate Firewall

Assessing enterprise readiness for the IoT Executive summary

NO 1 IN SMART HOUSE AND HIGH TECH BUILDING TECHNOLOGIES

Realising the LTE vision

HOW INTELLIGENT BUILDING TECHNOLOGY CAN IMPACT YOUR BUSINESS BY REDUCING OPERATING COSTS

Smartphone Overview for the Blind and Visually Impaired

Marketing smart home products successfully

CONNECTED HOMES Enabling Anytime, Anywhere Media Alan Young Manoj Barara

The little elephant driving Big Data

Telemedicine Technology Low Cost Solutions

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

MAXPRO. Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS. Video Anytime, Anywhere

RingCentral for Desktop. UK User Guide

Mobile Games in the App World. Mobile Apps in the Game World

Best Practices of Mobile Marketing

Transcription:

S THE CONNECTED HOME SERIES IT S A WRAP: Has the Smart Home Come of Age? The global smart home market is estimated to reach $43.0 billion in 2020, according to Statista. The most important drivers for smart home adoption are household Internet connectivity and smartphone ownership. By 2020, the percentage of global households with Internet access is expected to touch 69%, and global smartphone penetration is expected to reach 75%. Two key barriers to smart home adoption are interoperability of devices and vulnerability to cyber attacks. Internet of Things (IoT) companies are making an effort to include more devices under a popular protocol s umbrella of compatible products, and IoT security companies are providing customers with tools to help them secure their connected homes. DEBORAH WEINSWIG Executive Director FBIC Global Retail & Technology Fung Business Intelligence Centre deborahweinswig@fung1937.com US: 646.839.7017 HK: 852.6119.1779 CHN: 86.186.1420.3016 1

The preceding reports in this series are: 1. What Happens When Your Home Is Smarter Than You? 2. Smart Home Security 3. Smart Home Appliances & Entertainment 4. Smart Energy Management February 2016 Connected Home Series Wrap-Up EXECUTIVE SUMMARY In the previous reports in this series, we examined the various segments of the connected- home market. We looked at different gadgets and the features that distinguish them as smart products. In this concluding report, we recap some of the smart home market drivers, explore the barriers to adoption and offer some thoughts on the future of the connected home. The global smart home market was valued at $9.8 billion in 2015, according to Statista, and it is estimated to reach $43.0 billion in 2020. Household Internet connectivity and smartphones are two technologies that drive smart home adoption. The global smart home market was valued at $9.8 billion in 2015, according to Statista, and it is estimated to reach $43.0 billion in 2020. Based on data from the UN s ITU agency, we predict that the worldwide percentage of households with Internet will touch 69% by 2020. We further estimate that global smartphone penetration will reach 75% in 2020, although the proportion of households with Internet connectivity and smartphones will be lower in developing countries. We examined some key barriers to smart home adoption and the two that stand out the most are interoperability of devices and vulnerability to cyber attacks. Currently, it seems like devices that run on the ZigBee and Z- Wave protocols have higher levels of interoperability and can work across a wider area. Devices that run on these protocols also consume less energy, and can be arranged flexibly in a home. Devices that connect to other devices or the Internet, and those that can be controlled by another person, are prone to cyber attacks. The susceptibility of smart devices to hackers seems to be just a fraction of a larger issue. Recent events suggest that companies could be collecting and storing sensitive customer information, possibly without customers authorization or knowledge. While barriers to adoption exist, there are several measures that IoT companies and device manufacturers are taking to increase the viability of connected- home products. Companies are making an effort to include more devices under a popular protocol s umbrella of compatible products, and IoT security companies can make consumers less apprehensive by providing them with tools to help them secure their connected homes. 2

Has the Smart Home Come of Age? When you think of a futuristic, fully automated home, you might picture several household gadgets working in harmony, like in The Jetsons or Back to the Future. But what if one machine cannot understand the others, and the devices clash when they try to communicate with you? To help consumers avoid that scenario, most makers of smart home products specifically state that their devices work with a specific platform, so consumers will know that they work well with other products in that family. The IoT, smart homes and connected living were some of the key themes at the Consumer Electronics Show (CES 2016) this year. Home appliance companies are continually refining their products and incorporating the latest advances in connected technology, but what makes a product or brand successful, and what drives customers to make the switch to a smart home? In the previous reports in this series, we examined the various segments of the connected- home market. We looked at different gadgets and the features that distinguish them as smart products. In this concluding report, we recap some of the smart home market drivers, explore the barriers to adoption and offer some thoughts on the future of the connected home. SMART HOME MARKET SET TO QUADRUPLE BY 2020 The global smart home market was valued at $9.8 billion in 2015, according to a study by Statista on the outlook for global digital markets, and it is estimated to reach $43.0 billion in 2020. In the race to dominate the IoT, companies are doing everything they can to stay ahead of the game. For example, Samsung announced at last year s CES that 90% of the products it manufactures will be able to connect to the Internet by 2017. The global smart home market was valued at $9.8 billion in 2015. Figure 1. Estimated Value of the Global Smart Home Market, 2014 20E (USD Bil.) 37.9 43.0 30.9 23.0 15.6 6.1 9.8 2014 2015 2016E 2017E 2018E 2019E 2020E Source: Statista Household Internet connectivity and smartphones are two technologies that drive smart home adoption. In order for users to remotely monitor and control their smart home devices, and for vendors and manufacturers to provide over- the- air maintenance updates, these technologies are essential. 3

Based on data from the UN s ITU agency, we predict that the worldwide percentage of households with Internet will average 69% by 2020. This is a basic forecast that does not consider the evolution of other technologies and economic trends, but there is no doubt that there is increasing demand for Internet connectivity globally. The growth rate is higher in developing economies because fewer houses in those areas currently have Internet connectivity. The growth rate will slow, and eventually flatten, in developed countries, as a larger percentage of houses will already have Internet connectivity. Figure 2. Percentage of Global Households with Internet Connectivity, 2014 20E 100 2014 2015 2016E 2017E 2018E 2019E 2020E 80 60 % 40 20 0 Africa Arab States Asia & Pacific Europe The Americas Russian Commonwealth Source: ITU/FBIC Global Retail & Technology The mobile phone market has also has been growing steadily. Based on mobile broadband subscription data from the ITU, we think global smartphone penetration will reach an average of 75% in 2020. As with household Internet connectivity, we believe growth will be faster in developing countries, where the market is less saturated, than in developed countries, where there is already widespread use of smartphones. 4

Figure 3. Smartphone Penetration as a Percentage of Total Population by Region, 2014 20E 100 2014 2015 2016E 2017E 2018E 2019E 2020E 80 60 % 40 20 0 Africa Arab States Asia & Pacific Europe The Americas Russian Commonwealth Source:ITU/FBIC Global Retail & Technology We think the global tablet penetration will be 72% and the PC penetration will be 63% by 2020. Since 2015, tablet sales and shipments have overtaken those of PCs. Computer sales have slowed down considerably since the advent of portable, handheld devices, with consumers often preferring the latter for their convenience and affordability. Figure 4. Global Mobile, Tablet and PC Penetration as a Percentage of Total Population, 2014 20E % 80 70 60 50 40 30 20 10 Mobile Tablet PC 75 72 63 0 2014 2015 2016E 2017E 2018E 2019E 2020E Source: Credit Suisse/Gartner/eMarketer/ITU/FBIC Global Retail & Technology 5

In order to communicate with each other effectively, the devices need to run on either the same protocol or a protocol that can work with others. WHAT IS HOLDING BACK SMART HOME ADOPTION? We examined some key barriers to smart home adoption in our first report, and the two that stand out the most are interoperability and vulnerability to cyber attacks. In this section, we explore these two constraints in detail. Barrier 1: Interoperability Interoperability in its basic sense means that different devices are able to interact and communicate with each other without special effort from the user. For example, if a home has a Nest thermostat, a Samsung washing machine and an Apple iphone that can connect with each other easily, as if they were made by the same company, they are interoperable. In order to communicate with each other effectively, the devices need to run on either the same protocol (or standard) or a protocol that can work with others. A protocol is a set of rules and conventions that allow two or more devices to exchange information. In a sense, a protocol is the language by which devices communicate. Closed Versus Open Protocols If a device made by one manufacturer is unable to interact with a device made by another, it is said to have a closed protocol. Devices that have an open protocol are able to communicate with each other, without any hindrance, irrespective of their manufacturers. Open protocols allow third- party developers free access, so they can create new products and applications that can be sold or licensed. A closed protocol will allow only the manufacturer of the product to develop more products and applications using that particular protocol. Understandably, devices that run on open protocols will be more widely accepted in the market, as they do not require consumers to download multiple apps or install several hubs for all their devices to run smoothly. Protocol developers usually certify devices made by other manufacturers, so consumers can easily see whether a product will work with their existing setup or not. 6

Below, we highlight some of the most popular protocols used for home automation. Figure 5. Popular Protocols Used in Home Automation Protocol Number of Devices Certified by Protocol Range (Meters) Areas of Application Bluetooth low energy (BLE) Millions 10 Wireless connectivity between personal devices; not suitable for larger devices such as security and kitchen appliances Wi- fi 25,000+ 10 100 LAN connectivity and broadband Internet; consumes high power, so more devices can slow Internet speed; products are certified by the Wi- Fi Alliance if they are interoperable with this protocol ZigBee 900+ 10 300 Home automation and remote control; uses low power and is very flexible Z- Wave 1,300+ 30 Home automation and remote control; flexible network arrangement; uses low power; quickly becoming the most preferred in home automation Insteon 400+ 45 Energy measurement, energy savings, irrigation control, occupancy sensing, remote control heating and air conditioning; works well with X10 products X10 N/A N/A Has been around since the 1970s; low speed and poor communication between devices Thread 220 member companies; has submitted more than 30 products for certification (as of Nov. 11, 2015) Whole house Developed jointly by Nest, Samsung, Silicon Labs, Big Ass Fans and others; uses low power; secure and can connect hundreds of devices: appliances, access control, climate control, energy management, lighting, safety and security HomeKit Accessory Protocol (HAP) About 30 Whole house Developed by Apple; allows a select group of smart products to interact and work with each other; can be used through a homeowner s Apple device and through the ios voice control assistant Siri Source: Top Ten Reviews/Digital Trends/ Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources by Tiago D. P. Mendes, Radu Godina, Eduardo M. G. Rodrigues, João C. O. Matias and João P. S. Catalão, published July 20, 2015, on www.mdpi.com/journal/energies/threadgroup.org/z- wavealliance.org/bluetooth.com/zigbee.com/ Apple.com/Insteon.com/FBIC Global Retail & Technology Successful products will not only be compatible with several devices, but also able to work over a larger area, and they will consume less energy. Below, we examine what makes some of these protocols more popular than others. 7

Energy Consumption and Internet Speed Numerous devices have Bluetooth and wi- fi capabilities, but these protocols do have their limitations: Bluetooth is not suitable for larger electronic devices and appliances, and wi- fi consumes more energy. Also, more devices working through wi- fi can slow the Internet connectivity in a home. Devices need to be able to communicate effectively with each other if everything is to work in sync in a connected home. Effective Communication Devices need to be able to communicate effectively with each other if everything is to work in sync in a connected home, but some protocols have limitations on this front. The X10 protocol seems dated and will not work with newer, high- tech gadgets. And Insteon has difficulty processing data quickly, which is necessary for such things as streaming video from a security camera the video must stream in real time in order for the user to be able to take action instantly. In other words, Insteon has bandwidth limitations that make it unsuitable for home automation. So Who Is the Winner? Currently, it seems like devices that run on the ZigBee and Z- Wave protocols have higher levels of interoperability, and can work across a wider area. Devices that run on these protocols also consume less energy, and can be arranged flexibly in a home, meaning that the homeowner does not have to route all communications through a central hub in order for them to interact with each other. Smart devices from Samsung, sold under the SmartThings brand, are capable of working with several products from other manufacturers that run on the Z- Wave, ZigBee and wi- fi/lan protocols. Samsung is also collaborating with other companies to develop the Thread platform. One of the codevelopers of Thread is Nest, a Google company. We believe this collaboration, bolstered by Samsung s expertise in home and consumer electronics, will result in stiff competition for Apple s HomeKit platform. Barrier 2: Vulnerability to Cyber Attacks Devices that connect to other devices or the Internet, and those that can be controlled by another person, are prone to cyber attacks. Two recent cases highlight the vulnerability of smart devices. 8

Nest Thermostat Bug Turns Off Heating A December 2015 software update to the Nest Learning Thermostat caused it to turn off heat and left users feeling cold and understandably angry. The thermostat can adapt a house s heating (and cooling) according to the user s preferences and outside weather, without the user having to adjust it often. The pricey device s failure, which was covered by the media, could make some would- be adopters think twice about switching to smart home technologies. In early November 2015, it was reported that a hacker had managed to gain access to millions of photos and other personal data by hacking Hong Kong based VTech s smart toys. Hacker Obtains Children s Photos, Personal Data from Smart Toys In early November 2015, it was reported that a hacker had managed to gain access to millions of photos and other personal data by hacking Hong Kong based VTech s smart toys. The company s technology allows parents to use a smartphone app to chat with their children through a VTech tablet. By snooping around the company s servers, the hacker found nearly 190 GB worth of photos and messages that had been exchanged between parents and children. The susceptibility of smart devices to hackers seems to be just a fraction of a larger issue. Events such as these suggest that companies could be collecting and storing sensitive customer information, possibly without customers authorization or knowledge. Once a smart product s weakness to cyber attacks is exposed, the manufacturer usually releases a software updates or bug fix to remedy the problem. But is there a preventive measure that homeowners can take instead of waiting for a cure from a company that could prove too little too late? SecuriThings, an IoT Security Platform SecuriThings is an Israel- based firm that provides IoT security services. It was founded by security experts Roy Dagan and Raanan Lidji. Dagan spoke to us to shed some light on how homeowners can benefit from having an added layer of security. What Is It? SecuriThings is a security platform that is built into device manufacturers apps to provide an added security layer to a smart home s network. With fee- based services, SecuriThings provides insight and analytics on the usage patterns of a home s connected devices. Seasoned hackers can easily gain access to user names and passwords by snooping around the homeowner s Internet history or through a brute- force attack that swiftly runs all the permutations and combinations of possible passwords. 9

How Does It Work? The platform analyzes a homeowner s typical behavior in terms of app usage for the connected devices, and stores the information. If it identifies anomalies from the homeowner s usual pattern, it flags them, as they could mean the home s network has been threatened. For example, the security platform stores and analyzes the location where a homeowner uses each app and the usual times at which it is used. If the platform identifies a region that has not been in the usage history, it alerts the homeowner immediately. If the owner is traveling, he or she can turn off the notification or inform SecuriThings that there is no need for alarm. Why Is It Necessary to Have an Added Layer of Security? Dagan told us about how the smart home market has transformed over time. Previously, a vendor would install and hardwire all the devices/machines in a house, but these days, do- it- yourselfers reign. Dagan outlined how this has contributed to the vulnerability of a connected home s security: Because the customer buys products from various shops and manufacturers, and sets up the connected- device network him- or herself, it is likely that the devices do not all have the same level of built- in security. Once the customer connects all the devices and sets up the network, information is constantly being stored, either on the devices or in a cloud (a shared storage and applications system accessed via the Internet). Most devices come with a static or default user name and password, which the customer often leaves unchanged. Seasoned hackers can easily gain access to these user names and passwords by snooping around the homeowner s Internet history or through a brute- force attack that swiftly runs all the permutations and combinations of possible passwords. Given the increased pace of collaboration and product development across connected homes and cars, it may be only a matter of time before we all live the futuristic lifestyle that was once just a comic feature of TV and movies. Dagan added that when cyber attacks take place, device manufacturers often do not know or cannot detect the location of either the hacker or the breach. SecuriThings behavior- based security platform is able to identify when someone is attempting to access an app outside the user s usual pattern, and it mitigates the risk of an attack with its unique user- identity accreditation tools. THE FUTURE OF THE CONNECTED HOME While barriers to adoption, such as interoperability and vulnerability to cyber attacks, exist, there are several measures that IoT companies and device manufacturers are taking to increase the viability of connected- home products. As we have outlined, companies are making an effort to include more devices under a popular protocol s umbrella of compatible products. This will help customers operate their devices seamlessly. And IoT security companies, such as SecuriThings, can make consumers less apprehensive by providing them with tools to help them secure their connected homes. 10

Deborah Weinswig, CPA Executive Director Head of Global Retail & Technology Fung Business Intelligence Centre New York: 917.655.6790 Hong Kong: 852 6119 1779 China: 86 186 1420 3016 deborahweinswig@fung1937.com Filippo Battaini filippobattaini@fung1937.com Marie Driscoll, CFA mariedriscoll@fung1937.com John Harmon, CFA johnharmon@fung1937.com Aragorn Ho aragornho@fung1937.com John Mercer johnmercer@fung1937.com Shoshana Pollack shoshanapollack@fung1937.com Kiril Popov kirilpopov@fung1937.com Jing Wang jingwang@fung1937.com Steven Winnick stevenwinnick@fung1937.com HONG KONG: 10th Floor, LiFung Tower 888 Cheung Sha Wan Road, Kowloon Hong Kong Tel: 852 2300 2470 NEW YORK: 1359 Broadway, 9 th Floor New York, NY 10018 Tel: 646 839 7017 LONDON: 242 246 Marylebone Road London, NW1 6JQ United Kingdom Tel: 44 (0)20 7616 8988 FBICGROUP.COM 11