Skip to main content
Kent Academic Repository

Ransomware in Resource-Constrained Industrial IoT Networks: There Actually is a Threat

Huang, Yuxiang, Brierley, Calvin, ElZemity, Adel, Pope, James, Ma, Jiteng, Di Buono, Antonio, Arief, Budi, Oikonomou, George (2025) Ransomware in Resource-Constrained Industrial IoT Networks: There Actually is a Threat. In: 21st International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). . pp. 763-770. IEEE ISBN 979-8-3315-4373-0. E-ISBN 979-8-3315-4372-3. (doi:10.1109/DCOSS-IoT65416.2025.00116) (KAR id:111043)

Abstract

The threat of ransomware attacks against Industrial Internet of Things (IIoT) networks, particularly networks of resource-constrained devices, is starting to become a reality. In this paper, we contend that the threat of ransomware infection of an IIoT environment is not only plausible, but that it also exhibits different properties compared to ransomware attacks against traditional desktop systems, necessitating a new and more appropriate approach to deal with this threat. In particular, we articulate the unique characteristics of ransomware behaviour in IIoT networks considering the distinctive characteristics, such as computationally-constrained devices and low-power wireless communication protocols. Furthermore, we outline the necessary attributes for ransomware to effectively compromise and propagate within IIoT networks. To back our argument, we present a proof-of-concept (PoC) IIoT ransomware prototype. To highlight the generality of our work, we have developed the prototype for two different hardware platforms, powered by two different open source embedded operating systems: Contiki-NG and Zephyr. The results underscore the feasibility of ransomware attacks against networks of resource-constrained IIoT devices, providing evidence of the real threat posed by such attacks in these environments. Finally, our PoC prototype can serve as a foundation for future research focused on securing these potentially vulnerable networks.

Item Type: Conference or workshop item (Proceeding)
DOI/Identification number: 10.1109/DCOSS-IoT65416.2025.00116
Projects: Countering HArms caused by Ransomware in the Internet Of Things (CHARIOT)
Additional information: For the purpose of open access, the author has applied a CC BY public copyright licence to any Author Accepted Manuscript version arising from this submission.
Uncontrolled keywords: Industrial Internet of Things, security, ransomware, prototype, test bed, constrained device
Subjects: Q Science > QA Mathematics (inc Computing science)
Institutional Unit: Schools > School of Computing
Former Institutional Unit:
There are no former institutional units.
Funders: Engineering and Physical Sciences Research Council (https://ror.org/0439y7842)
Depositing User: Budi Arief
Date Deposited: 22 Aug 2025 15:42 UTC
Last Modified: 30 Aug 2025 03:00 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/111043 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views of this page since July 2020. For more details click on the image.