Huang, Yuxiang, Brierley, Calvin, ElZemity, Adel, Pope, James, Ma, Jiteng, Di Buono, Antonio, Arief, Budi, Oikonomou, George (2025) Ransomware in Resource-Constrained Industrial IoT Networks: There Actually is a Threat. In: 21st International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). . pp. 763-770. IEEE ISBN 979-8-3315-4373-0. E-ISBN 979-8-3315-4372-3. (doi:10.1109/DCOSS-IoT65416.2025.00116) (KAR id:111043)
|
PDF
Author's Accepted Manuscript
Language: English DOI for this version: 10.22024/UniKent/01.02.111043.3466640
This work is licensed under a Creative Commons Attribution 4.0 International License.
|
|
|
Download this file (PDF/7MB) |
Preview |
| Request a format suitable for use with assistive technology e.g. a screenreader | |
| Official URL: https://doi.org/10.1109/DCOSS-IoT65416.2025.00116 |
|
Abstract
The threat of ransomware attacks against Industrial Internet of Things (IIoT) networks, particularly networks of resource-constrained devices, is starting to become a reality. In this paper, we contend that the threat of ransomware infection of an IIoT environment is not only plausible, but that it also exhibits different properties compared to ransomware attacks against traditional desktop systems, necessitating a new and more appropriate approach to deal with this threat. In particular, we articulate the unique characteristics of ransomware behaviour in IIoT networks considering the distinctive characteristics, such as computationally-constrained devices and low-power wireless communication protocols. Furthermore, we outline the necessary attributes for ransomware to effectively compromise and propagate within IIoT networks. To back our argument, we present a proof-of-concept (PoC) IIoT ransomware prototype. To highlight the generality of our work, we have developed the prototype for two different hardware platforms, powered by two different open source embedded operating systems: Contiki-NG and Zephyr. The results underscore the feasibility of ransomware attacks against networks of resource-constrained IIoT devices, providing evidence of the real threat posed by such attacks in these environments. Finally, our PoC prototype can serve as a foundation for future research focused on securing these potentially vulnerable networks.
| Item Type: | Conference or workshop item (Proceeding) |
|---|---|
| DOI/Identification number: | 10.1109/DCOSS-IoT65416.2025.00116 |
| Projects: | Countering HArms caused by Ransomware in the Internet Of Things (CHARIOT) |
| Additional information: | For the purpose of open access, the author has applied a CC BY public copyright licence to any Author Accepted Manuscript version arising from this submission. |
| Uncontrolled keywords: | Industrial Internet of Things, security, ransomware, prototype, test bed, constrained device |
| Subjects: | Q Science > QA Mathematics (inc Computing science) |
| Institutional Unit: | Schools > School of Computing |
| Former Institutional Unit: |
There are no former institutional units.
|
| Funders: | Engineering and Physical Sciences Research Council (https://ror.org/0439y7842) |
| Depositing User: | Budi Arief |
| Date Deposited: | 22 Aug 2025 15:42 UTC |
| Last Modified: | 30 Aug 2025 03:00 UTC |
| Resource URI: | https://kar.kent.ac.uk/id/eprint/111043 (The current URI for this page, for reference purposes) |
- Link to SensusAccess
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):

https://orcid.org/0000-0001-8766-822X
Altmetric
Altmetric