The smart home market has seen significant growth since 2010. Specifically, less than 0.5% of homes in the American region had connected home devices such as thermostats, lighting, security and entertainment in 2010; by the end of 2017, nearly 12% of households in the region will have connected home devices, an average of six devices per home.

The success of smart homes started with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically.

Smart home technology partnerships

A few recent examples include the relationship with Vivint and Best Buy and Vivint with Sprint. In most cases, Best Buy is a competitor to Vivint because a consumer can buy point devices and ecosystem and install it themselves or enlist the help of the Geek Squad. Even more recently, Nest announced optional professional monitoring with its Nest Secure products in partnership with MONI.

Although this approach isn’t new, Scout Alarm, LiveWatch and SimpliSafe already have similar approaches, it continues to stress the need to combine multiple channels and approaches to the smart home market. Moreover, these are examples of symbiotic partnerships that will help the total market.

In 2017, there were about 122 million smart home devices shipped globally. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the do-it-for me approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer or when a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail.

There is a growing need
to combine multiple
channels and approaches
to the smart home market

Furthermore, the multiple-system operator (MSO) and professional security provider channels will be evenly split in 2017; however, by 2021, the MSO channel is expected to be double the market size of the security provider channel.

The primary reason for this rapid change over five years is the lack of professional security providers in EMEA and APAC; as a result, MSOs will dominate the professional channels in these regions, while across North America, security providers will maintain a strong market presence.

Top trends in smart homes

A few of the top trends in smart homes to watch out for over the next 12-24 months include user interface, flexible services, cyber security and adjacent markets. The user interface trend continues to evolve for the smart home. Although voice commands are trending towards becoming the new user interface beyond 2017, the voice will not be the only means to control and interact with the smart home. Mobile phones or tablets will still be required to configure most devices.

This means that although the Amazon Echo can control a WeMo plug, the consumer will still be required to download the WeMo app and configure the device. However, after the device is added to the same network as the Echo, the app is no longer needed on a day-to-day basis. Displays will also become increasingly popular throughout homes because the smart home is becoming increasingly isolating.

DIY ecosystems such as Wink or SmartThings or Philips Hue lighting are often limited to one person with one mobile device
Mobile phones or tablets will still be required to configure most devices in future smart homes

DIY ecosystems such as Wink or SmartThings or Philips Hue lighting are often limited to one person with one mobile device. As a result, other members of the household would need access to that mobile device or would need access on their own device after being authorised by the primary user (all assuming a smart speaker is not being used).

This is very limiting and the user experience is negatively affected. (Voice assistants like Google Home have added a feature to allow multiple accounts using voice recognition, which will help personalise smart homes.) However, displays in the home are a way to access all devices for anyone in the home.

Smart home equipment cost

Flexible service offerings and pricing is already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing and providers such as Comcast are looking to pilot programs for just video monitoring bundled with Internet for a low monthly fee.

Options for financing are also going to become commonplace. Smart home equipment is expensive, especially when attempting out outfit a modest size home (2,500 square feet +). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices but there is a threshold.

Since many smart home devices today do not have a recurring monthly fee, the cost of maintaining mobile apps, platforms and support services must be propped up by higher device prices. However, companies can look to offset some cost by sourcing different material. According to the IHS Markit Teardowns Team, the cost of the metal ring on the Nest 3rd Generation thermostat is $10, which is more expensive than the LCD display which comes in at $9. In comparison, the Ecobee3’s most expensive part is the LCD screen at about $4.00. As a result, the Ecobee3 costs nearly $20 less to manufacture compared with the Nest 3rd Generation thermostat.

Smart home security

Securing the smart home will be a hot topic over the next 12 months. One method of change will be manufacturers requiring consumers to change default passwords. Manufacturers need to start requiring consumers to change passwords before a product can be used. Home routers, for example, often use ‘admin’ as the username and ‘password’ as the password and most users never change these.

New smart home technology will improve care for the elderly
For elder care, door/window sensors and motion sensors could be used in combination with software to monitor routine

The challenge that many consumers and suppliers face today is that many passwords are built directly into the firmware and the consumer has no way of making changes. As a result, the integrity of the device comes down to the supplier. As threats become more severe with ransomware and other botnet attacks, manufacturers will need to implement additional thresholds of threat assessments to keep consumers safe.

One method involves two-factor authentication. IHS Markit expects the monetisation of cyber-security for residential customers to start appearing in 2018. This means that security service providers would monitor network traffic for the consumer. The software would not be monitored or implemented directly by the consumer; instead, the service provider will take care of all the monitoring of network traffic. What this means is that the software or router would monitor network traffic for patterns and manage which servers are pinged by IoT devices such as consumer video cameras.

Care homes and insurance companies

Although the compound annual growth rate (CAGR) for smart home device revenue is set to exceed 50% through 2021, the growth could be much higher with support from adjacent markets such as elder care, construction/developers and insurance companies.

For elder care, door/window sensors and motion sensors could be used in combination with the software to monitor routine. If an elderly person suddenly changes their routine, this would alert caregivers. This same premise can be used in professional elderly care settings to help staff prioritise patient needs.

IHS Markit expects the monetisation of cyber-security for residential customers to start
appearing in 2018

Working with insurance companies is another method of reaching the customer with smart home devices; however, the use of insurance is highly fragmented across regions. As a result, North America is the best opportunity as of 2017 to partner with insurance companies. Furthermore, insurance companies are mostly interested in managing the entire ecosystem.

Blending professional and DIY smart homes

While offering subsidised equipment (smoke detectors and water leak detection) can reduce claims, insurance companies need to have full access to the data – as a result, they are more interested in creating their own platform from scratch or working with a provider to support data analysis. Working closely with builders will also continue to gain traction, especially across EMEA and APAC. By working closely with builders, this reduces the challenges associated with B2C channels and the overall cost of the system can be masked by the mortgage payment, resulting in more system installations with less distribution expense.

Overall, the line between professional and DIY smart home is blending. CEDIA and Amazon recently announced a collaboration and Netgear Arlo announced the first wire-free and battery-operated ONVIF compliant camera.

With the combination of voice-control, consultations from Amazon and Best Buy, the reduction in the pile of smart home hubs in the basement as more protocols are embedded in gateways/routers, and no further need for the special Apple chip for HomeKit compliance after iOS 11, smart homes are becoming easier to achieve both for consumers and professionals.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Blake Kozak Principal Analyst, IHS Inc

In case you missed it

New markets for AI-powered smart cameras in 2021
New markets for AI-powered smart cameras in 2021

Organisations faced a number of unforeseen challenges in nearly every business sector throughout 2020 – and continuing into 2021. Until now, businesses have been on the defensive, reacting to the shifting workforce and economic conditions, however, COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalisation plans. This is now giving decision-makers the chance to take a proactive approach to mitigate current and post-pandemic risks. These long-term technology solutions can be used for today’s new world of social distancing and face mask policies and flexibly repurposed for tomorrow’s renewed focus on efficiency and business optimisation. For many, this emphasis on optimisation will likely be precipitated by not only the resulting economic impacts of the pandemic but also the growing sophistication and maturity of technologies such as Artificial Intelligence (AI) and Machine Learning (ML), technologies that are coming of age just when they seem to be needed the most.COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalisation plans Combined with today’s cutting-edge computer vision capabilities, AI and ML have produced smart cameras that have enabled organisations to more easily implement and comply with new health and safety requirements. Smart cameras equipped with AI-enabled intelligent video analytic applications can also be used in a variety of use cases that take into account traditional security applications, as well as business or operational optimisation, uses – all on a single camera. As the applications for video analytics become more and more mainstream - providing valuable insights to a variety of industries - 2021 will be a year to explore new areas of use for AI-powered cameras. Optimising production workflows and product quality in agriculture Surveillance and monitoring technologies are offering value to industries such as agriculture by providing a cost-effective solution for monitoring of crops, business assets and optimising production processes. As many in the agriculture sector seek to find new technologies to assist in reducing energy usage, as well as reduce the environmental strain of modern farming, they can find an unusual ally in smart surveillance. Some niche farming organisations are already implementing AI solutions to monitor crops for peak production freshness in order to reduce waste and increase product quality.  For users who face environment threats, such as mold, parasites, or other insects, smart surveillance monitoring can assist in the early identification of these pests and notify proper personnel before damage has occurred. They can also monitor vast amounts of livestock in fields to ensure safety from predators or to identify if an animal is injured. Using video monitoring in the growing environment as well as along the supply chain can also prove valuable to large-scale agriculture production. Applications can track and manage inventory in real-time, improving knowledge of high-demand items and allowing for better supply chain planning, further reducing potential spoilage. Efficient monitoring in manufacturing and logistics New challenges have arisen in the transportation and logistics sector, with the industry experiencing global growth. While security and operational requirements are changing, smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye, but have a significant impact on the overall customer experience. Smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye. Video analytics can assist logistic service providers in successfully delivering the correct product to the right location and customer in its original condition, which normally requires the supply chain to be both secure and ultra-efficient. The latest camera technology and intelligent software algorithms can analyse footage directly on the camera – detecting a damaged package at the loading dock before it is loaded onto a truck for delivery. When shipments come in, smart cameras can also alert drivers of empty loading bays available for offloading or alert facility staff of potential blockages or hazards for incoming and outgoing vehicles that could delay delivery schedules planned down to the minute. For monitoring and detecting specific vehicles, computer vision in combination with video analysis enables security cameras to streamline access control measures with license plate recognition. Smart cameras equipped with this technology can identify incoming and outgoing trucks - ensuring that only authorised vehicles gain access to transfer points or warehouses. Enhance regulatory safety measures in industrial settings  Smart surveillance and AI-enabled applications can be used to ensure compliance with organisational or regulatory safety measures in industrial environments. Object detection apps can identify if employees are wearing proper safety gear, such as facial coverings, hard hats, or lifting belts. Similar to the prevention of break-ins and theft, cameras equipped with behaviour detection can help to automatically recognise accidents at an early stage. For example, if a worker falls to the ground or is hit by a falling object, the system recognises this as unusual behaviour and reports it immediately. Going beyond employee safety is the ability to use this technology for vital preventative maintenance on machinery and structures. A camera can identify potential safety hazards, such as a loose cable causing sparks, potential wiring hazards, or even detect defects in raw materials. Other more subtle changes, such as gradual structural shifts/crack or increases in vibrations – ones that would take the human eye months or years to discover – are detectable by smart cameras trained to detect the first signs of mechanical deterioration that could potentially pose a physical safety risk to people or assets. Early recognition of fire and smoke is another use case where industrial decision-makers can find value. Conventional fire alarms are often difficult to properly mount in buildings or outdoor spaces and they require a lot of maintenance. Smart security cameras can be deployed in difficult or hard-to-reach areas. When equipped with fire detection applications, they can trigger notification far earlier than a conventional fire alarm – as well as reduce false alarms by distinguishing between smoke, fog, or other objects that trigger false alarms. By digitising analogue environments, whether a smoke detector or an analogue pressure gauge, decision-makers will have access to a wealth of data for analysis that will enable them to optimise highly technical processes along different stages of manufacturing - as well as ensure employee safety and security of industrial assets and resources. Looking forward to the future of smart surveillance With the rise of automation in all three of these markets, from intelligent shelving systems in warehouses to autonomous-driving trucks, object detection for security threats, and the use of AI in monitoring agricultural crops and livestock, the overall demand for computer vision and video analytics will continue to grow. That is why now is the best time for decision-makers across a number of industries to examine their current infrastructure and determine if they are ready to make an investment in a sustainable, multi-use, and long-term security and business optimisation solution.

Finding the right approach – Identity management in the pandemic and beyond
Finding the right approach – Identity management in the pandemic and beyond

Over the past year, companies have had to deal with the COVID-19 pandemic and how it has affected their operations. From new digital services through to security, the response to more hybrid and remote working showed some of the assumptions that we have made over the years, and it required companies to innovate and fill those gaps. Physical and IT security was no exception to this. In the rush to support home working, many IT security teams realised how much they rely on physical security to help with their identity management approaches. To adapt to what is taking place now, identity management has to evolve too. Challenging our assumptions around identity management Identity management involves ensuring that authorised and authenticated individuals can get access to the tools and data they need to work, and restricting access from those that don’t.  Identification is establishing who a user is, and then authentication verifies someone is who they say they are through a combination of different methods or factors linked to who they are, what device they are using, what they know, and what they have. Physical security provides an identity perimeter by restricting device access to only those that are allowed to enter a location, whether this is through using technology like smart cards or biometrics through to people managing who can enter the building at reception. With this boundary in place, using a combination of username and password is enough to meet security requirements. A more ‘zero trust’ approach is needed where we trust nothing and verify everything  However, the pandemic took this away. For many IT security teams, this showed how much they had taken physical security for granted in their security planning. Alongside having to provide remote access that is secure, these teams had to think about how to manage identities securely as well. The default approach of username and password is not enough when everyone can be working on any device and from essentially any location. Instead, identity has become the new perimeter.  The new office is wherever a user and device are,  and authentication must change that we can prove people are who they say they are. A more ‘zero trust’ approach is needed where we trust nothing and verify everything. The mindset behind zero trust security is to regard all sources of network traffic, both external and internal, as potential routes for attacks. Therefore, all users and resources must be verified and authenticated wherever they come from, system data must be collected and analysed for risks, and network access and traffic must be limited and monitored. While it may seem a bit paranoid, zero-trust security is rooted in the realities of the cloud computing age. Multi-factor authentication or MFA can be used to add more types and factors for authentication. So, in addition to something you know like a password,  you can use something you have as well. This would typically be a one time password sent to the user’s phone or from a mobile authenticator app, which fills the role of something they have. Managing this at any scale requires work. For large companies with established processes and identity management strategies, this would be something they could add on as part of that remote working implementation. However, for many smaller businesses that don’t have established IT directories or that have a wide range of different and new applications in place to support, it is more challenging. Everything is different One reason for this is the sheer variety of IT assets, devices, and applications that now have to be supported. Rather than the IT-designed network of machines that is standardised and fully controlled, we today have a far wider range of devices, operating systems and locations in play. Alongside this, there is the issue of controlling access to cloud-based services and Software-as-a-Service (SaaS) applications, which have also grown in popularity. The traditional IT directory that is normally used as the starting point for identity management is not normally equipped to manage the modern identity landscape. Looking at cloud-based directories is therefore a worthwhile step, as these are built to manage Identities, SaaS applications and VPNs and also support both multiple operating systems and the wide range of different devices that today’s users have. From a physical security perspective, identity and access management can be an area to develop. While the need for building access is reduced at the moment, it will return when the pandemic ends. In these circumstances, new approaches may also be needed. For example, fingerprint biometric security processes are popular to fill the requirement around verifying that someone is who they say they are. However, traditional approaches like fingerprint scanners may be less popular as they require users to touch the readers. For high traffic locations with lots of people, that will be a risk. Instead, combining access and identity can be made easier through approaches that take advantage of the new flexibility that pandemic responses needed. For example, using the physical access control support in today’s smartphones can enable organisations to use biometric fingerprint readers or face recognition without having to enforce everyone using the same biometric reader. By linking to phone applications that employees have on their devices, fingerprints or other forms of biometric data can be used to grant access. Thinking about context Looking into the future, many of us are looking forward to things going back to the way that they were before the pandemic. However, there are a lot of things that we had to adapt and use to keep operations running and secure during lockdown that we should continue to make use of. Rather than simply going back, we should look ahead at a more hybrid approach to everything, including security. This includes looking at context for identity and access management. Rather than simple approaches that are either too insecure or overkill for employees, we can set out situations that match the most common working situations and then enforce some rules on when access is granted. For this, we can look at how to use authentication and access control more effectively alongside other security factors. As we move to a more hybrid way of working, this flexibility of approach will be necessary to cope with all the different scenarios that employees will be in The first element here is the devices that users have. Trusted devices can be their own factor for authentication, where a device trust can be set up with a specific user account and linked to a specific device like a PC, laptop or tablet. If the user is not using one of those devices, then they can have an additional factor for authentication used, such as entering a one-time password from their phone or a mobile push authentication. This approach does not restrict users that may need to work from other devices occasionally, but it does protect against theft of passwords or dictionary attacks on credentials. The second element is location. When users connect, they will use an IP address that connects them to a network either in the office, to their home provider, or to a public network. Depending on the circumstances, you can put rules in place on how you manage those connections. For a user that is in the office, they may get access automatically in the same way they used to.  With conditional access based on geolocation, user access can be allowed or blocked based on a user’s physical location or challenged with a step-up authentication. For example, your business may be based in the UK and with offices in Europe. Getting an access request from India or China may not be legitimate, so IP addresses from those countries can be automatically blocked. Alternatively, if you do have staff that will travel to those countries, then access can be dependent on using a known device and authentication step before signing in. The approach here is to use conditional access based on identity, location, and device and make access as simple as possible for the user and without causing excess risk to the organisation. By looking at specific circumstances and context, you can design your access management approach to fit the user. As we move to a more hybrid way of working, this flexibility of approach will be necessary to cope with all the different scenarios that employees will be in.

Disruptive innovation providing new opportunities in smart cities
Disruptive innovation providing new opportunities in smart cities

Growth is accelerating in the smart cities market, which will quadruple in the next four years based on 2020 numbers. Top priorities are resilient energy and infrastructure projects, followed by data-driven public safety and intelligent transportation. Innovation in smart cities will come from the continual maturation of relevant technologies such as artificial intelligence (AI), the Internet of Things (IoT), fifth-generation telecommunications (5G) and edge-to-cloud networking. AI and computer vision (video analytics) are driving challenges in security and safety, in particular, with video management systems (VMSs) capturing video streams and exposing them to various AI analytics. Adoption of disruptive technologies “Cities are entering the critical part of the adoption curve,” said Kasia Hanson, Global Director, Partner Sales, IOT Video, Safe Cities, Intel Corp. “They are beginning to cross the chasm to realise their smart city vision. Cities are taking notice and have new incentives to push harder than before. They are in a better position to innovate.” “Safety and security were already important market drivers responsible for adoption of AI, computer vision and edge computing scenarios,” commented Hanson, in a presentation at the Milestone Integration Platform Symposium (MIPS) 2021. She added: “2020 was an inflection point when technology and the market were ripe for disruption. COVID has accelerated the adoption of disruptive technologies in ways we could not have predicted last year.” Challenges faced by cities Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018 Providing wide-ranging services is an expanding need in cities of all sizes. There are currently 33 megacities globally with populations over 10 million. There are also another 4,000 cities with populations over 100,000 inhabitants. Challenges for all cities include improving public health and safety, addressing environmental pressures, enabling mobility, improving quality of life, promoting economic competitiveness and reducing costs. Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018. Other challenges include air quality – 80% of those living in urban areas are exposed to air quality levels that exceed World Health Organization (WHO) limits. Highlighting mobility concerns is an eye-opening statistic from Los Angeles in 2017: Residents spent an average of 102 hours sitting in traffic. Smart technology “The Smart City of Today can enable rich and diverse use cases,” says Hanson. Examples include AI-enabled traffic signals to help reduce air pollution, and machine learning for public safety such as real-time visualisation and emergency response. Public safety use cases include smart and connected outdoor lighting, smart buildings, crime prevention, video wearables for field agents, smart kiosks and detection of noise level, glass breaks and gunshots. Smart technology will make indoor spaces safer by controlling access to a building with keyless and touchless entry. In the age of COVID, systems can also detect face mask compliance, screen for fever and ensure physical distancing. 2020 was an inflection point when technology and the smart cities market were ripe for disruption, Kasia Hanson told the MIPS 2021 audience. Video solutions Video workloads will provide core capabilities as entertainment venues reopen after the pandemic. When audiences attend an event at a city stadium, deep learning and AI capabilities analyse customer behaviours to create new routes, pathways, signage and to optimise cleaning operations. Personalised digital experiences will add to the overall entertainment value. In the public safety arena, video enables core capabilities such as protection of people, assets and property, emergency response, and real-time visualisation and increased situational awareness. Video also provides intelligent incident management, better operational efficiency and faster information sharing and collaboration. Smart video strategy Intel and Milestone provide video solutions across many use cases, including safety and security Video at the edge is a key element in end-to-end solutions. Transforming data from various point solutions into insights is complicated, time-consuming and costly. Cities and public venues are looking for hardware, software and industry expertise to provide the right mix of performance, capabilities and cost-effectiveness. Intel’s smart video strategy focuses around its OpenVINO toolkit. OpenVINO, which is short for Open Visual Inference and Neural network Optimisation, enables customers to build and deploy high-performing computer vision and deep learning inference applications. Intel and Milestone partnership – Video solutions “Our customers are asking for choice and flexibility at the edge, on-premises and in the cloud,” said Hansen in her presentation at the virtual conference. “They want the choice to integrate with large-scale software packages to speed deployment and ensure consistency over time. They need to be able to scale computer vision. Resolutions are increasing alongside growth in sensor installations themselves. They have to be able to accommodate that volume, no matter what causes it to grow.” As partners, Intel and Milestone provide video solutions across many use cases, including safety and security. In effect, the partnership combines Intel’s portfolio of video, computer vision, inferencing and AI capabilities with Milestone’s video management software and community of analytics partners. Given its complex needs, the smart cities market is particularly inviting for these technologies.