Skip to main content
Top
Published in: The Journal of Supercomputing 3/2017

13-09-2016

Blockchain-based secure firmware update for embedded devices in an Internet of Things environment

Authors: Boohyung Lee, Jong-Hyouk Lee

Published in: The Journal of Supercomputing | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Embedded devices are going to be used extremely in Internet of Things (IoT) environments. The small and tiny IoT devices will operate and communicate each other without involvement of users, while their operations must be correct and protected against various attacks. In this paper, we focus on a secure firmware update issue, which is a fundamental security challenge for the embedded devices in an IoT environment. A new firmware update scheme that utilizes a blockchain technology is proposed to securely check a firmware version, validate the correctness of firmware, and download the latest firmware for the embedded devices. In the proposed scheme, an embedded device requests its firmware update to nodes in a blockchain network and gets a response to determine whether its firmware is up-to-date or not. If not latest, the embedded device downloads the latest firmware from a peer-to-peer firmware sharing network of the nodes. Even in the case that the version of the firmware is up-to-date, its integrity, i.e., correctness of firmware, is checked. The proposed scheme guarantees that the embedded device’s firmware is up-to-date while not tampered. Attacks targeting known vulnerabilities on firmware of embedded devices are thus mitigated.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gartner (2014) Gartner says 4.9 billion connected things will be in use in 2015, Gartner Newsroom Gartner (2014) Gartner says 4.9 billion connected things will be in use in 2015, Gartner Newsroom
3.
go back to reference Choi B-C, Lee S-H, Na J-C, Lee J-H (2016) Secure firmware validation and update for consumer devices in home networking. IEEE Trans Consum Electron 62(1):39–44CrossRef Choi B-C, Lee S-H, Na J-C, Lee J-H (2016) Secure firmware validation and update for consumer devices in home networking. IEEE Trans Consum Electron 62(1):39–44CrossRef
4.
go back to reference Lee B, Malik S, Wi S, Lee J-H (2016) Firmware verification of embedded devices based on a blockchain. In: Proceedings of the Qshine 2016 Lee B, Malik S, Wi S, Lee J-H (2016) Firmware verification of embedded devices based on a blockchain. In: Proceedings of the Qshine 2016
5.
go back to reference Jurkovi G, Sruk V (May 2014) Remote firmware update for constrained embedded systems. In: Proceedings of the MIPRO 2014 Jurkovi G, Sruk V (May 2014) Remote firmware update for constrained embedded systems. In: Proceedings of the MIPRO 2014
6.
go back to reference Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system
8.
go back to reference Hu Y, Perrig A, Johnson DB (2003) Efficient security mechanisms for routing protocols. In: Proc. NDSS03 Hu Y, Perrig A, Johnson DB (2003) Efficient security mechanisms for routing protocols. In: Proc. NDSS03
9.
go back to reference Badev A, Chen M (2013) Bitcoin: technical background and data analysis. Federal Reserve Board Badev A, Chen M (2013) Bitcoin: technical background and data analysis. Federal Reserve Board
10.
go back to reference Bider D, Baushke M (2012) SHA-2 data integrity for the secure shell (SSH) transport layer protocol. IETF RFC 6668 Bider D, Baushke M (2012) SHA-2 data integrity for the secure shell (SSH) transport layer protocol. IETF RFC 6668
11.
go back to reference Cohen B (2003) Incentives build robustness in bitorrent. In: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems Cohen B (2003) Incentives build robustness in bitorrent. In: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems
13.
go back to reference Antonopoulos, Andreas M (2014) Mastering Bitcoin: unlocking digital crypto-currencies. OReilly Media Antonopoulos, Andreas M (2014) Mastering Bitcoin: unlocking digital crypto-currencies. OReilly Media
14.
go back to reference Alouneh S, Bsoul H, Kharbutli M (2016) A software tool to protect executable files from buffer overflow attacks. Int J Internet Technol Secur Trans 6(2):133–166CrossRef Alouneh S, Bsoul H, Kharbutli M (2016) A software tool to protect executable files from buffer overflow attacks. Int J Internet Technol Secur Trans 6(2):133–166CrossRef
15.
go back to reference Ahamad S, Al-Shourbaji I, Al-Janabi S (2016) A secure NFC mobile payment protocol based on biometrics with formal verification. Int J Internet Technol Secur Trans 6(2):103–132CrossRef Ahamad S, Al-Shourbaji I, Al-Janabi S (2016) A secure NFC mobile payment protocol based on biometrics with formal verification. Int J Internet Technol Secur Trans 6(2):103–132CrossRef
Metadata
Title
Blockchain-based secure firmware update for embedded devices in an Internet of Things environment
Authors
Boohyung Lee
Jong-Hyouk Lee
Publication date
13-09-2016
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 3/2017
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1870-0

Other articles of this Issue 3/2017

The Journal of Supercomputing 3/2017 Go to the issue

Premium Partner