Secure firmware update in embedded systems

被引:0
作者
Keleman, Levon [1 ]
Matic, Danijel [1 ]
Popovic, Miroslav [2 ]
Kastelan, Ivan [2 ]
机构
[1] RTRK Inst Comp Based Syst, Novi Sad, Serbia
[2] Univ Novi Sad, Fac Tech Sci, Novi Sad, Serbia
来源
2019 IEEE 9TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE-BERLIN) | 2019年
关键词
cryptography; update; embedded system; symmetric encryption; asymmetric encryption; man-in-the-middle; security;
D O I
10.1109/icce-berlin47944.2019.8966174
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Great numbers of embedded devices are performing safety critical operations, which means it is very important to keep them operating without interference. Update is the weak point that could be exploited by potential attackers to gain access to the system, sabotage it or to simply steal someone else's intellectual property. This paper presents an implementation of secure update process for embedded systems which prevents man-in-the-middle attacks. By using a combination of hash functions, symmetric and asymmetric encryption algorithms it demonstrates how to achieve integrity, authenticity and confidentiality of the update package that is sent to the target hardware. It covers implementation starting from key exchange, next explaining update package encryption process and then decryption on the target hardware. It does not go into a detail about specific encryption algorithms that could be used. It presents a generalized model for secure update that could be adjusted to specific needs.
引用
收藏
页码:16 / 19
页数:4
相关论文
共 7 条
[1]  
Bucklin Brown B., 2018, ANALOG DIALOGUE, V52, P52
[2]  
Ferguson N., 2010, Cryptography engineering: Design principles and practical applications
[3]  
Guillen O., 2015, CRYPTOBOOTLOADER SEC
[4]  
Kvadra L., 2016, INFORM COMMUNICATION, V14
[5]  
Malladi S., 2002, P INT C SEC MAN, P1
[6]  
Mallik A., 2019, CYBERSPACE JURNAL PE, V2, P109, DOI [10.22373/cj.v2i2.3453, DOI 10.22373/CJ.V2I2.3453, DOI 10.5267/J.IJDNS.2019.1.001]
[7]  
Moallem A., 2019, Human-computer interaction and cybersecurity handbook