Skip to content
Computing · Year 11

Active learning ideas

The Internet of Things (IoT)

Active learning works well for IoT because students need to see how data moves across networks. Simulations and design tasks make abstract concepts like firmware vulnerabilities and data aggregation tangible, helping students grasp real-world stakes.

National Curriculum Attainment TargetsGCSE: Computing - Ethical, Legal and Cultural Impacts
25–50 minPairs → Whole Class4 activities

Activity 01

Project-Based Learning50 min · Small Groups

Small Groups: Smart Home Design Challenge

Provide templates for students to design an IoT smart home, selecting devices, mapping data paths, and adding security layers like two-factor authentication. Groups justify choices in 5-minute pitches. Peers vote on most secure yet convenient designs.

Evaluate the security challenges posed by the proliferation of IoT devices.

Facilitation TipFor the Smart Home Design Challenge, provide sample IoT devices or diagrams so students focus on data pathways rather than product details.

What to look forPresent students with three scenarios involving IoT devices (e.g., a smart doorbell, a fitness tracker, a smart speaker). Ask them to identify one potential security risk and one potential privacy concern for each device, listing their answers on a mini-whiteboard.

ApplyAnalyzeEvaluateCreateSelf-ManagementRelationship SkillsDecision-Making
Generate Complete Lesson

Activity 02

Project-Based Learning30 min · Pairs

Pairs: IoT Security Simulation

Pairs role-play one as hacker and one as defender using prop devices; attackers identify weak points like default passwords, defenders propose fixes such as VLANs. Switch roles and debrief vulnerabilities.

Explain how interconnected devices can collect and share data.

Facilitation TipDuring the IoT Security Simulation, assign each pair a unique exploit to prevent copying and ensure varied problem-solving.

What to look forFacilitate a class debate using the prompt: 'The convenience offered by IoT devices outweighs the risks to personal privacy.' Ask students to prepare arguments supporting or opposing this statement, citing specific examples of IoT applications and relevant UK legislation.

ApplyAnalyzeEvaluateCreateSelf-ManagementRelationship SkillsDecision-Making
Generate Complete Lesson

Activity 03

Project-Based Learning40 min · Whole Class

Whole Class: Data Flow Debate

Project a scenario of a smart fridge sharing data; class traces flow from sensor to app to cloud, then debates privacy fixes in real-time vote. Record insights on shared board.

Design a smart home system, considering both convenience and security aspects.

Facilitation TipIn the Data Flow Debate, assign roles like 'ethicist' or 'technologist' to push students beyond surface-level arguments.

What to look forOn an index card, have students write a brief explanation of how a smart home device, like a smart light bulb, collects and shares data. They should also name one specific security measure that could protect this data flow.

ApplyAnalyzeEvaluateCreateSelf-ManagementRelationship SkillsDecision-Making
Generate Complete Lesson

Activity 04

Project-Based Learning25 min · Individual

Individual: Personal IoT Audit

Students list 5 personal IoT devices, research data collected via manufacturer sites, and note privacy settings. Share anonymised findings to class for collective risk patterns.

Evaluate the security challenges posed by the proliferation of IoT devices.

What to look forPresent students with three scenarios involving IoT devices (e.g., a smart doorbell, a fitness tracker, a smart speaker). Ask them to identify one potential security risk and one potential privacy concern for each device, listing their answers on a mini-whiteboard.

ApplyAnalyzeEvaluateCreateSelf-ManagementRelationship SkillsDecision-Making
Generate Complete Lesson

A few notes on teaching this unit

Start with a simple IoT device students know, like a smart plug, to ground abstract concepts in familiar examples. Use analogies to explain data flows and security layers, but avoid oversimplifying risks. Research shows students retain more when they experience both the convenience and the vulnerabilities firsthand.

Students will explain how IoT devices collect and share data, assess security risks, and connect personal privacy concerns to broader implications. Clear evidence includes identifying data flows, proposing security solutions, and debating trade-offs with specific examples.


Watch Out for These Misconceptions

  • During the IoT Security Simulation, watch for students assuming IoT devices are secure because they are new or expensive.

    Use the simulation to require students to test devices with default credentials and outdated firmware, then document how these vulnerabilities enable attacks like Mirai.

  • During the Smart Home Design Challenge, watch for students treating IoT as isolated home gadgets rather than part of larger networks.

    Ask groups to map how their design connects to other systems like cloud services or municipal infrastructure, highlighting interdependencies.

  • During the Personal IoT Audit, watch for students dismissing risks of anonymised data because it feels abstract.

    Have students aggregate their anonymised data in class and demonstrate how patterns can reveal identities, connecting this to real-world re-identification cases.


Methods used in this brief