Powering Tomorrow Safely: Handling IoT Cybersecurity Issues and Ethical Energy Systems Environments
DOI:
https://doi.org/10.21015/vtse.v13i3.2198Abstract
IoT integration is transforming global energy networks, leading to previously unheard-of sustainability and efficiency. Nevertheless, there are significant cybersecurity risks and moral dilemmas that are closely linked to this potential. IoT devices with limited resources are widely deployed, creating a huge attack surface for sophisticated attacks, including those by nation-state actors. At the same time, gathering energy data in real time presents serious ethical issues with algorithmic bias, data ownership, and privacy. Resolving these intricate issues calls for a multifaceted approach that combines robust security frameworks, moral governance, and proactive policy development in order to create a safe and equitable energy future.
References
International Energy Agency (IEA), Smart Grids. [Online]. Available: https://www.iea.org/energysystem/electricity/smart-grids. Accessed: Jun. 24, 2025.
ELEKS, The Essential Guide to Smart Grids: Benefits and Challenges. [Online]. Available: https://eleks.com/blog/guide-smart-grids-benefitschallenges/. Accessed: Jun. 24, 2025.
Cyient, Cybersecurity Challenges for Smart Grids: Protecting Critical Infrastructure. [Online]. Available: https://www.cyient.com/blog/cybersecurity-challengesfor-smart-grids-protecting-critical-infrastructure. Accessed: Jun. 24, 2025.
Equans Group, Grid Technologies: Smart Grids & Micro Grids. [Online]. Available: https://www.equans.com/glossary/grid-technologiessmart-grids-micro-grids. Accessed: Jun. 24, 2025.
Bimergen Energy, Smart Power Grid vs Traditional Power Grid – Part 2. [Online]. Available: https://bitech.tech/knowledge-hub/120231228/smartpower-grid-vs-traditional-power-grid-part-2. Accessed: Jun. 24, 2025.
Number Analytics, Cybersecurity in Smart Grids: Protecting the Future. [Online]. Available: https://www.numberanalytics.com/blog/cybersecurityin-smart-grids-protecting-the-future. Accessed: Jun. 24, 2025.
Energy Sustainability Directory, What Are the Ethical Implications of Smart Grids? [Online]. Available: https://energy.sustainabilitydirectory.com/question/what-are-the-ethicalimplications-of-smart-grids/. Accessed: Jun. 24, 2025.
Avigna.AI, Ethical Considerations in IoT Development. [Online]. Available: https://avigna.ai/ethicalconsiderations-in-iot/ . Accessed: Jun. 24, 2025.
V. G. Cerf, “On the evolution of Internet technologies,” Proc. IEEE, vol. 92, no. 9, pp. 1360–1370, 2004.
J. Govil, N. Kaur, and H. Kaur, “An examination of IPv4 and IPv6 networks: Constraints and various transition mechanisms,” in Proc. IEEE SoutheastCon, Huntsville, AL, USA, 2008, pp. 178–185.
S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of Things (IoT): A literature review,” J. Comput. Commun., vol. 3, no. 5, pp. 164–173, 2015.
Y. Perwej et al., “The Internet of Things (IoT) and its application domains,” Int. J. Comput. Appl., vol. 975, no. 8887, p. 182, 2019.
R. Hassan et al., “Internet of Things and its applications: A comprehensive survey,” Symmetry, vol. 12, no. 10, p. 1674, 2020.
M. Nassereddine and A. Khang, “Applications of Internet of Things (IoT) in smart cities,” in Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy. Boca Raton, FL, USA: CRC Press, 2024, pp. 109–136.
P. Tang et al., “Application of Internet-of-Things wireless communication technology in agricultural irrigation management: A review,” Sustainability, vol. 16, no. 9, p. 3575, 2024.
A. Salam, Internet of Things for Sustainable Community Development: Wireless Communications, Sensing, and Systems. Cham, Switzerland: Springer Nature, 2024.
X. Mu and M. F. Antwi-Afari, “The applications of Internet of Things (IoT) in industrial management: A science mapping review,” Int. J. Prod. Res., vol. 62, no. 5, pp. 1928–1952, 2024.
A. N. Upadhyaya et al., “Implementation of the Internet of Things (IoT) in remote healthcare,” in Analyzing Current Digital Healthcare Trends Using Social Networks. Hershey, PA, USA: IGI Global, 2024, pp. 104–124.
A. L. Duguma and X. Bai, “Contribution of Internet of Things (IoT) in improving agricultural systems,” Int. J. Environ. Sci. Technol., vol. 21, no. 2, pp. 2195–2208, 2024.
Y. Perwej et al., “A systematic literature review on the cybersecurity,” Int. J. Sci. Res. Manage., vol. 9, no. 12, pp. 669–710, 2021.
K. Angrishi, “Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT botnets,” arXiv preprint arXiv:1702.03681, 2017.
M. Saad, R. N. Enam, and R. Qureshi, “Optimizing multi-objective task scheduling in fog computing with GA-PSO algorithm for big data application,” Front. Big Data, vol. 7, p. 1358486, 2024.
M. S. Sheikh, R. N. Enam, and R. I. Qureshi, “Machine learning-driven task scheduling with dynamic K-means based clustering algorithm using fuzzy logic in fog environment,” Front. Comput. Sci., vol. 5, p. 1293209, 2023.
M. Saad, R. I. Qureshi, and A. U. Rehman, “Task scheduling in fog computing: Parameters, simulators and open challenges,” in Proc. IEEE GCWOT, 2023.
M. Saad, “Fog computing and its role in the Internet of Things: Concept, security and privacy issues,” Int. J. Comput. Appl., vol. 180, no. 32, pp. 7–9, 2018.
M. Mylrea, S. N. G. Gourisetti, and A. Nicholls, “An introduction to buildings cybersecurity framework,” in Proc. IEEE SSCI, 2017.
A. M. Shaaban, E. Kristen, and C. Schmittner, “Application of IEC 62443 for IoT components,” in Proc. SAFECOMP Workshops, Västerås, Sweden, Sep. 2018, pp. 37–49. Cham, Switzerland: Springer, 2018.
The OWASP Foundation, IoT Security Verification Standard, 2021. [Online]. Available: https://owasp-isvs.gitbook.io/owasp-isvs-pr/. Accessed: Jun. 24, 2025.
M. Malatji, “Management of enterprise cyber security: A review of ISO/IEC 27001:2022,” in Proc. IEEE Int. Conf. Cyber Management and Engineering (CyMaEn), 2023.
European Telecommunications Standards Institute (ETSI), ETSI EN 303 645 V2.1.0: Cyber Security for Consumer Internet of Things: Baseline Requirements, 2020.
U.K. Department for Digital, Culture, Media & Sport, Code of Practice for Consumer IoT Security, 2018. [Online]. Available: https://www.gov.uk/government/publications/code-ofpractice-for-consumer-iot-security. Accessed: Jun. 24, 2025.
GSM Association, IoT Security Assessment, Version 3.0, 2018. [Online]. Available: https://www.gsma.com/iot/iot-security-assessment/. Accessed: Jun. 24, 2025.
IoT Security Foundation, IoT Security Assurance Framework Release 3.0, 2021. [Online]. Available: https://www.iotsecurityfoundation.org/best-practiceguidelines/. Accessed: Jun. 24, 2025.
H. Zaki, M. Saad, and M. R. Rasheed, “A robust machine learning framework for fraudulent mobile app detection,” VFAST Trans. Softw. Eng., vol. 12, no. 4, pp. 27–36, 2024.
M. Saad and M. Shahid, “The Internet of Things architecture, feasible applications and fundamental challenges,” Int. J. Comput. Appl., vol. 975, no. 8887, pp. 7–9, 2018.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY