Blockchain-Based Security Model for LoRaWAN Firmware Updates

被引:5
作者
Mtetwa, Njabulo Sakhile [1 ]
Tarwireyi, Paul [1 ]
Sibeko, Cecilia Nombuso [1 ]
Abu-Mahfouz, Adnan [2 ]
Adigun, Matthew [1 ]
机构
[1] Univ Zululand, Comp Sci Dept, ZA-3887 Kwa Dlangezwa, South Africa
[2] Council Sci & Ind Res CSIR, ZA-0001 Pretoria, South Africa
关键词
IoT; Blockchain; firmware; LoRaWAN; DEVICES;
D O I
10.3390/jsan11010005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.
引用
收藏
页数:39
相关论文
共 28 条
  • [1] How to make Firmware Updates over LoRaWAN Possible
    Abdelfadeel, Khaled
    Farrell, Tom
    McDonald, David
    Pesch, Dirk
    [J]. 2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020), 2020, : 16 - 25
  • [2] IoT Device Firmware Update over LoRa: The Blockchain Solution
    Anastasiou, A.
    Christodoulou, P.
    Christodoulou, K.
    Vassiliou, V.
    Zinonos, Z.
    [J]. 16TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2020), 2020, : 404 - 411
  • [3] [Anonymous], 2018, LoRaWAN Application Layer Clock Synchronization Specification v1.0.0. Standard
  • [4] [Anonymous], NETWORK SECURITY, V2020, P4, DOI [DOI 10.1016/S1353-4858, 10.1016/S1353-4858(20)30114-8, DOI 10.1016/S1353-4858(20)30114-8]
  • [5] Aras E, 2017, IEEE INT C CYBERNET, P361, DOI 10.1109/cybconf.2017.7985777
  • [6] Atzori M., 2017, BLOCKCHAIN TECHNOLOG, V6, P45
  • [7] Bormann C., 2014, APPL MICROBIOL BIOT, V85, P2071, DOI [10.1016/j.bbapap.2013.06.007, DOI 10.1016/J.BBAPAP.2013.06.007]
  • [8] Brtnik V., 2018, SECURITY RISK ASSESS
  • [9] Cloud Security Alliance, REC IOT FIRMW UPD PR
  • [10] Private Blockchain Network for IoT Device Firmware Integrity Verification and Update
    Dhakal, Samip
    Jaafar, Fehmi
    Zavarsky, Pavol
    [J]. 201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019), 2019, : 164 - 170