Huang, Yuxiang, Brierley, Calvin, Pope, James, Ma, Jiteng, Di Buono, Antonio, Arief, Budi, Oikonomou, George (2025) Micro-Auditing for Ransomware Detection in Resource-Constrained Industrial IoT Networks. In: 4th Workshop on Security and Privacy in Connected Embedded Systems (SPICES 2025), 22 September 2025. (KAR id:113337)
|
PDF
Author's Accepted Manuscript
Language: English |
|
|
Download this file (PDF/722kB) |
Preview |
| Request a format suitable for use with assistive technology e.g. a screenreader | |
| Official URL: https://files-prod.tii.ae/static/spices25-final61.... |
|
Abstract
The threat of ransomware on severely constrained industrial Internet of Things (IoT) deployments is real and difficult to defend against, especially because resource-constrained devices can be compromised and used to propagate malicious payloads with minimal observability. To support the development of ransomware detection and prevention countermeasures, this paper proposes a lightweight micro-auditing mechanism that captures diagnostic metrics derived from process scheduling, as well as from resource and network utilization patterns. The proposed mechanism minimizes computational, memory, and energy overhead through adaptive metric sampling, ensuring resource-efficient operation. We have developed this micro-auditing mechanism using the Contiki-NG operating system for IoT devices, and we use our implementation to derive memory and code footprint statistics as evidence of its lightweight nature. Using the Cooja simulator and an existing ransomware prototype, we examine the feasibility of our micro-auditing mechanism through a host of experiments on topologies of different densities, to quantify the speed and subtle nature of ransomware propagation. Our results highlight the fact that, due to its subtlety, this threat can elude traditional traffic- and power-based anomaly detectors. The micro-auditing mechanism not only enables device-level security auditing but also underpins our ongoing work on the development of countermeasures using a scalable framework for integrating machine learning classifiers, which could further refine threat discrimination and reduce false positives.
| Item Type: | Conference or workshop item (Paper) |
|---|---|
| Uncontrolled keywords: | Industrial IoT, ransomware, auditing, constrained devices |
| Subjects: | Q Science > QA Mathematics (inc Computing science) |
| Institutional Unit: | Institutes > Institute of Cyber Security for Society |
| Former Institutional Unit: |
There are no former institutional units.
|
| Funders: | Engineering and Physical Sciences Research Council (https://ror.org/0439y7842) |
| Depositing User: | Budi Arief |
| Date Deposited: | 06 Mar 2026 15:31 UTC |
| Last Modified: | 06 Mar 2026 15:32 UTC |
| Resource URI: | https://kar.kent.ac.uk/id/eprint/113337 (The current URI for this page, for reference purposes) |
- Link to SensusAccess
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):

https://orcid.org/0000-0001-8766-822X
Total Views
Total Views