The smart home market has seen significant growth since 2010. Specifically, less than 0.5% of homes in the American region had connected home devices such as thermostats, lighting, security and entertainment in 2010; by the end of 2017, nearly 12% of households in the region will have connected home devices, an average of six devices per home.

The success of smart homes started with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically.

Smart home technology partnerships

A few recent examples include the relationship with Vivint and Best Buy and Vivint with Sprint. In most cases, Best Buy is a competitor to Vivint because a consumer can buy point devices and ecosystem and install it themselves or enlist the help of the Geek Squad. Even more recently, Nest announced optional professional monitoring with its Nest Secure products in partnership with MONI.

Although this approach isn’t new, Scout Alarm, LiveWatch and SimpliSafe already have similar approaches, it continues to stress the need to combine multiple channels and approaches to the smart home market. Moreover, these are examples of symbiotic partnerships that will help the total market.

In 2017, there were about 122 million smart home devices shipped globally. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the do-it-for me approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer or when a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail.

There is a growing need
to combine multiple
channels and approaches
to the smart home market

Furthermore, the multiple-system operator (MSO) and professional security provider channels will be evenly split in 2017; however, by 2021, the MSO channel is expected to be double the market size of the security provider channel.

The primary reason for this rapid change over five years is the lack of professional security providers in EMEA and APAC; as a result, MSOs will dominate the professional channels in these regions, while across North America, security providers will maintain a strong market presence.

Top trends in smart homes

A few of the top trends in smart homes to watch out for over the next 12-24 months include user interface, flexible services, cyber security and adjacent markets. The user interface trend continues to evolve for the smart home. Although voice commands are trending towards becoming the new user interface beyond 2017, the voice will not be the only means to control and interact with the smart home. Mobile phones or tablets will still be required to configure most devices.

This means that although the Amazon Echo can control a WeMo plug, the consumer will still be required to download the WeMo app and configure the device. However, after the device is added to the same network as the Echo, the app is no longer needed on a day-to-day basis. Displays will also become increasingly popular throughout homes because the smart home is becoming increasingly isolating.

DIY ecosystems such as Wink or SmartThings or Philips Hue lighting are often limited to one person with one mobile device
Mobile phones or tablets will still be required to configure most devices in future smart homes

DIY ecosystems such as Wink or SmartThings or Philips Hue lighting are often limited to one person with one mobile device. As a result, other members of the household would need access to that mobile device or would need access on their own device after being authorised by the primary user (all assuming a smart speaker is not being used).

This is very limiting and the user experience is negatively affected. (Voice assistants like Google Home have added a feature to allow multiple accounts using voice recognition, which will help personalise smart homes.) However, displays in the home are a way to access all devices for anyone in the home.

Smart home equipment cost

Flexible service offerings and pricing is already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing and providers such as Comcast are looking to pilot programs for just video monitoring bundled with Internet for a low monthly fee.

Options for financing are also going to become commonplace. Smart home equipment is expensive, especially when attempting out outfit a modest size home (2,500 square feet +). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices but there is a threshold.

Since many smart home devices today do not have a recurring monthly fee, the cost of maintaining mobile apps, platforms and support services must be propped up by higher device prices. However, companies can look to offset some cost by sourcing different material. According to the IHS Markit Teardowns Team, the cost of the metal ring on the Nest 3rd Generation thermostat is $10, which is more expensive than the LCD display which comes in at $9. In comparison, the Ecobee3’s most expensive part is the LCD screen at about $4.00. As a result, the Ecobee3 costs nearly $20 less to manufacture compared with the Nest 3rd Generation thermostat.

Smart home security

Securing the smart home will be a hot topic over the next 12 months. One method of change will be manufacturers requiring consumers to change default passwords. Manufacturers need to start requiring consumers to change passwords before a product can be used. Home routers, for example, often use ‘admin’ as the username and ‘password’ as the password and most users never change these.

New smart home technology will improve care for the elderly
For elder care, door/window sensors and motion sensors could be used in combination with software to monitor routine

The challenge that many consumers and suppliers face today is that many passwords are built directly into the firmware and the consumer has no way of making changes. As a result, the integrity of the device comes down to the supplier. As threats become more severe with ransomware and other botnet attacks, manufacturers will need to implement additional thresholds of threat assessments to keep consumers safe.

One method involves two-factor authentication. IHS Markit expects the monetisation of cyber-security for residential customers to start appearing in 2018. This means that security service providers would monitor network traffic for the consumer. The software would not be monitored or implemented directly by the consumer; instead, the service provider will take care of all the monitoring of network traffic. What this means is that the software or router would monitor network traffic for patterns and manage which servers are pinged by IoT devices such as consumer video cameras.

Care homes and insurance companies

Although the compound annual growth rate (CAGR) for smart home device revenue is set to exceed 50% through 2021, the growth could be much higher with support from adjacent markets such as elder care, construction/developers and insurance companies.

For elder care, door/window sensors and motion sensors could be used in combination with the software to monitor routine. If an elderly person suddenly changes their routine, this would alert caregivers. This same premise can be used in professional elderly care settings to help staff prioritise patient needs.

IHS Markit expects the monetisation of cyber-security for residential customers to start
appearing in 2018

Working with insurance companies is another method of reaching the customer with smart home devices; however, the use of insurance is highly fragmented across regions. As a result, North America is the best opportunity as of 2017 to partner with insurance companies. Furthermore, insurance companies are mostly interested in managing the entire ecosystem.

Blending professional and DIY smart homes

While offering subsidised equipment (smoke detectors and water leak detection) can reduce claims, insurance companies need to have full access to the data – as a result, they are more interested in creating their own platform from scratch or working with a provider to support data analysis. Working closely with builders will also continue to gain traction, especially across EMEA and APAC. By working closely with builders, this reduces the challenges associated with B2C channels and the overall cost of the system can be masked by the mortgage payment, resulting in more system installations with less distribution expense.

Overall, the line between professional and DIY smart home is blending. CEDIA and Amazon recently announced a collaboration and Netgear Arlo announced the first wire-free and battery-operated ONVIF compliant camera.

With the combination of voice-control, consultations from Amazon and Best Buy, the reduction in the pile of smart home hubs in the basement as more protocols are embedded in gateways/routers, and no further need for the special Apple chip for HomeKit compliance after iOS 11, smart homes are becoming easier to achieve both for consumers and professionals.

Download PDF version

Author profile

Blake Kozak Principal Analyst, IHS Inc

In case you missed it

What are the security challenges of the hospitality market?
What are the security challenges of the hospitality market?

Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?

Physical and cyber security precautions when travelling
Physical and cyber security precautions when travelling

Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those travelling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveller take to protect their calls, texts and data streams from being spied on? Duvall: When travelling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen  Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travellers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilised by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilise Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travellers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travellers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travellers’ hotel rooms.  When travelling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveller take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travellers? Companies should educate their employees on the importance of maintaining good internet hygiene while travelling abroad Duvall: When travelling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while travelling abroad. Some general tips to recommend to your employees when travelling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if travelling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveller benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customisable healthy travel packing list. The app can store travel documents, keep records of medications and immunisations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travellers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travellers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travellers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.

Mass transit security evolves with modern security solutions
Mass transit security evolves with modern security solutions

As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.