Securing IoT for Sustainable Computing: A Vulnerability and Solution Taxonomy

Category: Sustainability · Effect: Strong effect · Year: 2020

Addressing the inherent vulnerabilities in Internet of Things (IoT) devices is crucial for enabling sustainable computing practices.

Design Takeaway

Prioritize robust security measures and energy-efficient designs from the outset of any IoT project to ensure its long-term sustainability and minimize potential risks.

Why It Matters

As IoT systems become more integrated into our lives, their security directly impacts their long-term viability and resource efficiency. Understanding and mitigating these vulnerabilities is essential for designing systems that are not only functional but also environmentally and economically sustainable.

Key Finding

IoT devices are prone to various attacks, and a structured approach to identifying and mitigating these vulnerabilities is necessary to ensure the long-term sustainability of computing systems that rely on them.

Key Findings

Research Evidence

Aim: To explore evolving vulnerabilities in IoT systems and provide a comprehensive overview of current solutions and open challenges for sustainable IoT computing.

Method: Literature Review and Taxonomy Development

Procedure: The research involved a state-of-the-art survey of IoT vulnerabilities, sustainable IoT concepts, architectures, and relevant protocols. It also included an exploration of open-source tools, datasets, a detailed taxonomy of attacks, and a case study on smart agriculture sustainability.

Context: Internet of Things (IoT) systems, Sustainable Computing, Smart Agriculture

Design Principle

Integrate security and sustainability as core design requirements for all IoT implementations.

How to Apply

When designing or selecting IoT components, conduct a thorough risk assessment focusing on potential attack vectors and their impact on system longevity and resource consumption. Consider the energy footprint of security measures themselves.

Limitations

The rapid evolution of IoT technology means that identified vulnerabilities and solutions may become outdated quickly. The paper focuses on existing research and may not cover novel, emerging threats.

Student Guide (IB Design Technology)

Simple Explanation: IoT devices can be easily attacked because they often use open internet connections and have limited power. To make computing sustainable, we need to protect these devices from attacks and make them more energy-efficient.

Why This Matters: Understanding IoT vulnerabilities is key to creating secure and long-lasting technology, which is essential for sustainable design projects that aim to reduce waste and conserve resources.

Critical Thinking: How do the security requirements of IoT devices conflict with the goal of minimizing energy consumption for sustainable computing, and what design strategies can effectively balance these competing demands?

IA-Ready Paragraph: The integration of Internet of Things (IoT) devices into various applications presents significant challenges for sustainable computing, primarily due to inherent security vulnerabilities. As highlighted by Anand et al. (2020), the power-constrained nature and reliance on open communication channels for IoT nodes create fertile ground for diverse attacks. Addressing these vulnerabilities is not merely a matter of data protection but is intrinsically linked to the long-term viability and resource efficiency of computing systems, thereby forming a critical component of sustainable design practice.

Project Tips

How to Use in IA

Examiner Tips

Independent Variable: ["Types of IoT vulnerabilities","Attack vectors"]

Dependent Variable: ["Security of IoT systems","Sustainability of computing"]

Controlled Variables: ["IoT device architecture","Communication protocols","Energy constraints"]

Strengths

Critical Questions

Extended Essay Application

Source

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges · IEEE Access · 2020 · 10.1109/access.2020.3022842