2017
DOI: 10.1007/978-3-319-60717-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Firmware Verification of Embedded Devices Based on a Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Emerging applications: Ongoing advances in blockchain technology and machine learning technologies have also been topical areas of research in IoT-ware. Firmware data transmitted to IoT devices connected to a blockchain network is cryptographically proofed and signed by the true sender holding a unique public key, ensuring authentication and integrity of firmware [ 57 , 58 , 59 , 60 , 101 , 102 ]. When an IoT device needs to be updated, a smart contract [ 61 ] sends the hash or metadata file to that IoT device to obtain a copy of the update through peer-to-peer exchange with other nodes [ 58 , 59 ], or it is directly downloaded from the manufacturer’s server [ 62 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Emerging applications: Ongoing advances in blockchain technology and machine learning technologies have also been topical areas of research in IoT-ware. Firmware data transmitted to IoT devices connected to a blockchain network is cryptographically proofed and signed by the true sender holding a unique public key, ensuring authentication and integrity of firmware [ 57 , 58 , 59 , 60 , 101 , 102 ]. When an IoT device needs to be updated, a smart contract [ 61 ] sends the hash or metadata file to that IoT device to obtain a copy of the update through peer-to-peer exchange with other nodes [ 58 , 59 ], or it is directly downloaded from the manufacturer’s server [ 62 ].…”
Section: Related Workmentioning
confidence: 99%
“…Prominent IoT security organizations such as the European Union Agency for Cybersecurity (ENISA), OWASP, IoTSF, and Symantec recommend IoT firmware updating as one of the most important steps towards improving IoT security. Several IoT secure update protocols, including the IETF SUIT [ 134 ] standard, have been suggested by prior studies [ 16 , 34 , 89 , 102 , 108 ]. A standardized firmware update framework for this purpose can protect against one of the biggest attack vectors in the IoT paradigm [ 137 ].…”
Section: Contemporary Research and Open Challengesmentioning
confidence: 99%
“…Centralized solutions based on the server-client model include [16][17][18], etc. Decentralized solutions, mostly based on blockchain, include [7,19,20], etc. However, as mentioned above, there is very little work that deals with forward security.…”
Section: Related Workmentioning
confidence: 99%
“…Via the abolition of a requirement for recognizing users and banning data packets that are not originating from the internet, the current regulations cannot efficiently protect internal user data. Lee et al [8] introduced an upgrade that handles software upgrades of embedded systems utilizing a blockchain, cryptographic certificates that are implemented with shared keys, and introduces encryption protocols utilizing a private key. A smart house has several tiny, embedded devices that are linked to each other.…”
Section: Literature Reviewmentioning
confidence: 99%