A decentralized approach towards secure firmware updates and testing over commercial IoT Devices

11/24/2020
by   Projjal Gupta, et al.
0

Internet technologies have made a paradigm shift in the fields of computing and data science and one such paradigm defining change is the Internet of Things or IoT. Nowadays, thousands of household appliances use integrated smart devices which allow remote monitoring and control and also allow intensive computational work such as high end AI-integrated smart security systems with sustained alerts for the user. The update process of these IoT devices usually lack the ability of checking the security of centralized servers, which may be compromised and host malicious firmware files as it is presumed that the servers are secure during deployment. The solution for this problem can be solved using a decentralized database to hold the hashes and the firmware. This paper discusses the possible implications of insecure servers used to host the firmwares of commercial IoT products, and aims to provide a blockchain based decentralized solution to host firmware files with the property of immutability, and controlled access to the firmware upload functions so as to stop unauthorized use. The paper sheds light over possible hardware implementations and the use of cryptographically secure components in such secure architecture models.

READ FULL TEXT

page 1

page 3

research
01/23/2019

Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies

Despite technological advances, most smart objects in the Internet of Th...
research
06/11/2020

Sovereign: User-Controlled Smart Homes

Smart homes made up of Internet of Things (IoT) devices have seen wide d...
research
06/05/2020

Securing IoT Applications using Blockchain: A Survey

The Internet of Things (IoT) has become a guiding technology behind auto...
research
06/20/2020

Securing Smart Home Edge Devices against Compromised Cloud Servers

Smart home IoT systems often rely on cloud-based servers for communicati...
research
08/07/2019

Cross-Router Covert Channels

Many organizations protect secure networked devices from non-secure netw...
research
01/26/2023

A Decentralized Policy for Minimization of Age of Incorrect Information in Slotted ALOHA Systems

The Age of Incorrect Information (AoII) is a metric that can combine the...

Please sign up or login with your details

Forgot password? Click here to reset