ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

07/13/2018
by   N. Asokan, et al.
0

Secure firmware update is an important stage in the IoT device life-cycle. Prior techniques, designed for other computational settings, are not readily suitable for IoT devices, since they do not consider idiosyncrasies of a realistic large-scale IoT deployment. This motivates our design of ASSURED, a secure and scalable update framework for IoT. ASSURED includes all stakeholders in a typical IoT update ecosystem, while providing end-to-end security between manufacturers and devices. To demonstrate its feasibility and practicality, ASSURED is instantiated and experimentally evaluated on two commodity hardware platforms. Results show that ASSURED is considerably faster than current update mechanisms in realistic settings.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/12/2023

Automated and Secure Onboarding for System of Systems

The Internet of Things (IoT) is rapidly changing the number of connected...
research
06/14/2019

U2Fi: A Provisioning Scheme of IoT Devices with Universal Cryptographic Tokens

Provisioning is the starting point of the whole life-cycle of IoT device...
research
07/17/2020

A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems

Firmware refers to device read-only resident code which includes microco...
research
09/07/2023

Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full Version)

As many types of IoT devices worm their way into numerous settings and m...
research
03/11/2019

SECCS: SECure Context Saving for IoT Devices

Energy consumption of IoT devices is a very important issue. For this re...
research
09/13/2019

P^2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling (extended version)

Dynamic testing or fuzzing of embedded firmware is severely limited by h...
research
03/05/2020

SERENIoT: Collaborative Network Security Policy Management and Enforcement for Smart Homes

Network traffic whitelisting has emerged as a dominant approach for secu...

Please sign up or login with your details

Forgot password? Click here to reset