Projects per year
Abstract
The threat of ransomware attacks against Industrial Internet of Things (IIoT) networks, particularly networks of resource-constrained devices, is starting to become a reality. In this paper, we contend that the threat of ransomware infection of an IIoT environment is not only plausible, but that it also exhibits different properties compared to ransomware attacks against traditional desktop systems, necessitating a new and more appropriate approach to deal with this threat. In particular, we articulate the unique characteristics of ransomware behaviour in IIoT networks considering the distinctive characteristics, such as computationally-constrained devices and low-power wireless communication protocols. Furthermore, we outline the necessary attributes for ransomware to effectively compromise and propagate within IIoT networks. To back our argument, we present a proof-of-concept (PoC) IIoT ransomware prototype. To highlight the generality of our work, we have developed the prototype for two different hardware platforms, powered by two different open source embedded operating systems: Contiki-NG and Zephyr.
Original language | English |
---|---|
Title of host publication | 2025 21st International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Publication status | Accepted/In press - 30 Apr 2025 |
Event | 21st Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2025) - Lucca, Italy Duration: 9 Jun 2025 → 11 Jun 2025 https://dcoss.org/ |
Publication series
Name | International Conference on Distributed Computing in Sensor Systems (DCOSS) |
---|---|
Publisher | IEEE |
ISSN (Print) | 2325-2936 |
ISSN (Electronic) | 2325-2944 |
Conference
Conference | 21st Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2025) |
---|---|
Abbreviated title | DCOSS-IOT |
Country/Territory | Italy |
City | Lucca |
Period | 9/06/25 → 11/06/25 |
Internet address |
Fingerprint
Dive into the research topics of 'Ransomware in Resource-Constrained Industrial IoT Networks: There Actually is a Threat'. Together they form a unique fingerprint.Projects
- 1 Active
-
CHARIOT: Countering HArms caused by Ransomware in the Internet Of Things
Oikonomou, G. (Principal Investigator), Pope, J. (Co-Investigator) & Huang, Y. (Researcher)
1/09/23 → 31/08/26
Project: Research
Activities
- 1 Participation in conference
-
6th International Workshop on Security and Reliability of IoT Systems
Pope, J. (Speaker)
9 Jun 2025Activity: Participating in or organising an event types › Participation in conference