Powering Tomorrow Safely: Handling IoT Cybersecurity Issues and Ethical Energy Systems Environments

Authors

DOI:

https://doi.org/10.21015/vtse.v13i3.2198

Abstract

IoT integration is transforming global energy networks, leading to previously unheard-of sustainability and efficiency. Nevertheless, there are significant cybersecurity risks and moral dilemmas that are closely linked to this potential. IoT devices with limited resources are widely deployed, creating a huge attack surface for sophisticated attacks, including those by nation-state actors. At the same time, gathering energy data in real time presents serious ethical issues with algorithmic bias, data ownership, and privacy. Resolving these intricate issues calls for a multifaceted approach that combines robust security frameworks, moral governance, and proactive policy development in order to create a safe and equitable energy future.

 

References

International Energy Agency (IEA), Smart Grids. [Online]. Available: https://www.iea.org/energysystem/electricity/smart-grids. Accessed: Jun. 24, 2025.

ELEKS, The Essential Guide to Smart Grids: Benefits and Challenges. [Online]. Available: https://eleks.com/blog/guide-smart-grids-benefitschallenges/. Accessed: Jun. 24, 2025.

Cyient, Cybersecurity Challenges for Smart Grids: Protecting Critical Infrastructure. [Online]. Available: https://www.cyient.com/blog/cybersecurity-challengesfor-smart-grids-protecting-critical-infrastructure. Accessed: Jun. 24, 2025.

Equans Group, Grid Technologies: Smart Grids & Micro Grids. [Online]. Available: https://www.equans.com/glossary/grid-technologiessmart-grids-micro-grids. Accessed: Jun. 24, 2025.

Bimergen Energy, Smart Power Grid vs Traditional Power Grid – Part 2. [Online]. Available: https://bitech.tech/knowledge-hub/120231228/smartpower-grid-vs-traditional-power-grid-part-2. Accessed: Jun. 24, 2025.

Number Analytics, Cybersecurity in Smart Grids: Protecting the Future. [Online]. Available: https://www.numberanalytics.com/blog/cybersecurityin-smart-grids-protecting-the-future. Accessed: Jun. 24, 2025.

Energy Sustainability Directory, What Are the Ethical Implications of Smart Grids? [Online]. Available: https://energy.sustainabilitydirectory.com/question/what-are-the-ethicalimplications-of-smart-grids/. Accessed: Jun. 24, 2025.

Avigna.AI, Ethical Considerations in IoT Development. [Online]. Available: https://avigna.ai/ethicalconsiderations-in-iot/ . Accessed: Jun. 24, 2025.

V. G. Cerf, “On the evolution of Internet technologies,” Proc. IEEE, vol. 92, no. 9, pp. 1360–1370, 2004.

J. Govil, N. Kaur, and H. Kaur, “An examination of IPv4 and IPv6 networks: Constraints and various transition mechanisms,” in Proc. IEEE SoutheastCon, Huntsville, AL, USA, 2008, pp. 178–185.

S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of Things (IoT): A literature review,” J. Comput. Commun., vol. 3, no. 5, pp. 164–173, 2015.

Y. Perwej et al., “The Internet of Things (IoT) and its application domains,” Int. J. Comput. Appl., vol. 975, no. 8887, p. 182, 2019.

R. Hassan et al., “Internet of Things and its applications: A comprehensive survey,” Symmetry, vol. 12, no. 10, p. 1674, 2020.

M. Nassereddine and A. Khang, “Applications of Internet of Things (IoT) in smart cities,” in Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy. Boca Raton, FL, USA: CRC Press, 2024, pp. 109–136.

P. Tang et al., “Application of Internet-of-Things wireless communication technology in agricultural irrigation management: A review,” Sustainability, vol. 16, no. 9, p. 3575, 2024.

A. Salam, Internet of Things for Sustainable Community Development: Wireless Communications, Sensing, and Systems. Cham, Switzerland: Springer Nature, 2024.

X. Mu and M. F. Antwi-Afari, “The applications of Internet of Things (IoT) in industrial management: A science mapping review,” Int. J. Prod. Res., vol. 62, no. 5, pp. 1928–1952, 2024.

A. N. Upadhyaya et al., “Implementation of the Internet of Things (IoT) in remote healthcare,” in Analyzing Current Digital Healthcare Trends Using Social Networks. Hershey, PA, USA: IGI Global, 2024, pp. 104–124.

A. L. Duguma and X. Bai, “Contribution of Internet of Things (IoT) in improving agricultural systems,” Int. J. Environ. Sci. Technol., vol. 21, no. 2, pp. 2195–2208, 2024.

Y. Perwej et al., “A systematic literature review on the cybersecurity,” Int. J. Sci. Res. Manage., vol. 9, no. 12, pp. 669–710, 2021.

K. Angrishi, “Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT botnets,” arXiv preprint arXiv:1702.03681, 2017.

M. Saad, R. N. Enam, and R. Qureshi, “Optimizing multi-objective task scheduling in fog computing with GA-PSO algorithm for big data application,” Front. Big Data, vol. 7, p. 1358486, 2024.

M. S. Sheikh, R. N. Enam, and R. I. Qureshi, “Machine learning-driven task scheduling with dynamic K-means based clustering algorithm using fuzzy logic in fog environment,” Front. Comput. Sci., vol. 5, p. 1293209, 2023.

M. Saad, R. I. Qureshi, and A. U. Rehman, “Task scheduling in fog computing: Parameters, simulators and open challenges,” in Proc. IEEE GCWOT, 2023.

M. Saad, “Fog computing and its role in the Internet of Things: Concept, security and privacy issues,” Int. J. Comput. Appl., vol. 180, no. 32, pp. 7–9, 2018.

M. Mylrea, S. N. G. Gourisetti, and A. Nicholls, “An introduction to buildings cybersecurity framework,” in Proc. IEEE SSCI, 2017.

A. M. Shaaban, E. Kristen, and C. Schmittner, “Application of IEC 62443 for IoT components,” in Proc. SAFECOMP Workshops, Västerås, Sweden, Sep. 2018, pp. 37–49. Cham, Switzerland: Springer, 2018.

The OWASP Foundation, IoT Security Verification Standard, 2021. [Online]. Available: https://owasp-isvs.gitbook.io/owasp-isvs-pr/. Accessed: Jun. 24, 2025.

M. Malatji, “Management of enterprise cyber security: A review of ISO/IEC 27001:2022,” in Proc. IEEE Int. Conf. Cyber Management and Engineering (CyMaEn), 2023.

European Telecommunications Standards Institute (ETSI), ETSI EN 303 645 V2.1.0: Cyber Security for Consumer Internet of Things: Baseline Requirements, 2020.

U.K. Department for Digital, Culture, Media & Sport, Code of Practice for Consumer IoT Security, 2018. [Online]. Available: https://www.gov.uk/government/publications/code-ofpractice-for-consumer-iot-security. Accessed: Jun. 24, 2025.

GSM Association, IoT Security Assessment, Version 3.0, 2018. [Online]. Available: https://www.gsma.com/iot/iot-security-assessment/. Accessed: Jun. 24, 2025.

IoT Security Foundation, IoT Security Assurance Framework Release 3.0, 2021. [Online]. Available: https://www.iotsecurityfoundation.org/best-practiceguidelines/. Accessed: Jun. 24, 2025.

H. Zaki, M. Saad, and M. R. Rasheed, “A robust machine learning framework for fraudulent mobile app detection,” VFAST Trans. Softw. Eng., vol. 12, no. 4, pp. 27–36, 2024.

M. Saad and M. Shahid, “The Internet of Things architecture, feasible applications and fundamental challenges,” Int. J. Comput. Appl., vol. 975, no. 8887, pp. 7–9, 2018.

Downloads

Published

2025-09-30

How to Cite

Saad, M., Zaki, H., & Rasheed , M. R. (2025). Powering Tomorrow Safely: Handling IoT Cybersecurity Issues and Ethical Energy Systems Environments. VFAST Transactions on Software Engineering, 13(3), 211–227. https://doi.org/10.21015/vtse.v13i3.2198