The problem is that we are forced to make a trade-off between "energy-excessive algorithms to encrypt and secure data" and the energy consumption for the devices in an IoT system. We have not a 100% security level, but the systems look good in general.
It depends on IoT device. whether it has energy sources or it uses energy harvesting techniques to fulfill its need regarding energy. the IoT device also processing other tasks. Input energy to device may be used for different tasks. if device depends on harvesting techniques for fulfilling its energy requirements then you have to implement very basic security algorithm which requires less processing. so it depends on your device energy source and type of security which you need for your device. More complex the security algorithm, the more energy is require to complete the task.
I guess that the evaluation of the IoT applications in terms of the implemented security can be measured by applying a survey or make questionary for the users in many different fields.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014, November). IoT security: ongoing challenges and research opportunities. In 2014 IEEE 7th international conference on service-oriented computing and applications (pp. 230-234). IEEE.
Of course not! None of the industrial software security products give you 100% security warranties. Just one product is somewhat better/worse than another one.
anyone who manages, administrates and configures a network in the professional field and may have already spent one or more sleepless nights trying to "save the network" knows the problem of network security. He knows:
there is no such thing as 100 percent network security!
This experience shows that 100% security of IoT applications cannot be guaranteed.
Looking through various discussions like this, related to IoT network security, I can say its a major issue. So our team would be looking in this area for the next version of our prototype.
Article IoT-Q-Band: A low cost internet of things based wearable ban...
I think, Security is not one dimensional, so we cannot measure it using a simple rule. But like all measurement methods that exist, methodologies, and metrics have been invented to measure security. So far, methodologies have been used to qualify the level of attack resistance of IT products including hardware and software in the perimeter.
The following Link helps to better understand about IoT Security: https://cyberstartupobservatory.com/iot-security-game-of-trust/