• Title/Summary/Keyword: Firmware update

Search Result 13, Processing Time 0.025 seconds

A Remote Firmware Update Mechanism for a TDMA-based Bidirectional Linear Wireless Sensor Network (양방향 통신을 지원하는 시분할 기반 선형 무선 센서 네트워크를 위한 원격 펌웨어 업데이트 방법)

  • Moon, Jung-Ho;Kim, Dae-Il;Park, Lae-Jeong;Lee, Hyung-Bong;Chung, Tae-Yoon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.8
    • /
    • pp.867-875
    • /
    • 2009
  • A wireless sensor network inherently comprises a plurality of sensor nodes widely deployed for sensing environmental information. To add new functions or to correct some faulty functions of an existing wireless sensor network, the firmware for each sensor node needs to be updated. Firmware update would be quite troublesome if it requires the gathering, reprogramming, and redeploy of all of already deployed sensor nodes. Over-the-air programming (OTA) facilitates the firmware update process, thereby allowing convenient maintenance of an already-deployed sensor network. This paper proposes and implements a remote firmware update mechanism for a TDMA-based wireless sensor network, in which the firmware for sensor nodes constituting the TDMA-based sensor network can be easily updated and the update process can be conveniently monitored from a remote site. We verify the validity of the proposed firmware update method via experiments and introduce three wireless sensor networks installed in outdoor sites in which the proposed firmware update mechanism has been exploited.

DSP Firmware Update Using USB Flash Drive (USB 플래시 드라이브를 이용한 DSP 펌웨어 업데이트)

  • Jin-Sun Kim;Joon-Young Choi
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.1
    • /
    • pp.25-30
    • /
    • 2023
  • We propose a method to update DSP (Digital Signal Processor) firmware using USB (Universal Serial Bus) flash drives. The DSP automatically detects USB drives based on an interrupt when the USB drive is inserted into the USB port. The new firmware binary file is found in the mounted USB drive, and the destination address of DSP flash memory is identified for the firmware update writing by investigating the firmware file header. After the new firmware is written to the DSP flash memory, the DSP is reset and rebooted with the newly updated firmware. By employing TI's TMS320F28379D control card with USB ports, we conduct experiments and verify the normal operation of the implemented method.

Low-Power Metamorphic MCU using Partial Firmware Update Method for Irregular Target Systems Control (불규칙한 대상 시스템 제어를 위하여 부분 펌웨어 업데이트 기법을 이용한 저전력 변성적 MCU)

  • Baek, Jongheon;Jung, Jiwoong;Kim, Minsung;Kwon, Jisu;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.301-307
    • /
    • 2021
  • In addition to the revival of the Internet of Things, embedded systems, which are at the core of the Internet of Things, require intelligent control as things change. Embedded systems, however, are heavily constrained by resources such as hardware, memory, time and power. When changes are needed to firmware in an embedded system, flash Memory must be initialized and the entire firmware must be uploaded again. Therefore, it is time- and energy-efficient in that areas that do not need to be modified must also be initialized and rewritten. In this paper, we propose how to upload firmware in installments to each sector of flash memory so that only firmware can be replace the firmware in the parts that need to be modified when the firmware needs to be modified. In this paper, the proposed method was evaluated using real target board, and as a result, the time was reduced by about half.

A Study on the Requirements Analysis and Design for System Development of Remote Firmware Upgrade Management System Based-on AMI (AMI 기반 원격 펌웨어업그레이드 시스템 개발을 위한 요구분석 및 설계에 관한 연구)

  • Jung, Nam-Joon;Yang, Il-Kwon;Choi, Seong-Hwan;Jin, Young-Taek
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.1
    • /
    • pp.155-161
    • /
    • 2012
  • The firmware upgrade, which is remotely performed, is an essential function in smart metering or AMI (Advanced Metering Infrastructure). In other words, the AMI software and firmware can be switched for maintaining and improvement without replacement of H/W devices in AMI environment. Also, if number and type of devices are increase, the demand of remote update service will be increased. Through the firmware upgrade service remotely, the electric power corporation may be able to benefit various fields. For example, there are to adapt more easily in many environments, real-time service and to cut maintenance costs. In this paper, we proposed to design an international level FUMS(Firmware Upgrade Management System) which includes requirement function, architecture and protocol related with DCU, Smart Meter.

Analysis and Countermeasure for BadUSB Vulnerability (BadUSB 취약점 분석 및 대응 방안)

  • Seo, Jun-Ho;Moon, Jong-Sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.359-368
    • /
    • 2017
  • As the BadUSB is a vulnerability, in which a hacker tampers the firmware area of a USB flash drive. When the BadUSB device is plugged into the USB port of a host system, a malicious code acts automatically. The host system misunderstands the act of the malicious behavior as an normal behaviour for booting the USB device, so it is hard to detect the malicious code. Also, an antivirus software can't detect the tampered firmware because it inspects not the firmware area but the storage area. Because a lot of computer peripherals (such as USB flash drive, keyboard) are connected to host system with the USB protocols, the vulnerability has a negative ripple effect. However, the countermeasure against the vulnerability is not known now. In this paper, we analyze the tampered area of the firmware when a normal USB device is changed to the BadUSB device and propose the countermeasure to verify the integrity of the area when the USB boots. The proposed method consists of two procedures. The first procedure is to verify the integrity of the area which should be fixed even if the firmware is updated. The verification method use hashes, and the target area includes descriptors. The second procedure is to verify the integrity of the changeable area when the firmware is updated. The verification method use code signing, and the target area includes the function area of the firmware. We also propose the update protocol for the proposed structure and verify it to be true through simulation.

The Design and Implementation of ECU Simulator for the Smart Vehicle based on FOTA (FOTA 기반 지능형 자동차를 위한 범용 ECU 시뮬레이터 설계 및 구현)

  • Park, In-Hye;Ko, Jae-Jin;Kwak, Jae-Min
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.22-28
    • /
    • 2014
  • This paper presents the design and development of ECU simulator in order to verify automatic firmware update system of ECU SW on the vehicle. We designed and developed general-proposed ECU simulator as devide into HW and SW parts. HWadopt 32bit MPU, CAN, LIN, LCD, and touch-pad button to satisfy general-proposed ECU level. And SW constructed as finite-state-machine structure in order to support HW spec. We developed ECU manager which deliveries update data to verify validity of operation. And we tested ECU simulator with ECU manager. For test of validity of ECU simulator, we set 4 scenarios between ECU simulator and manager. As the result, we confirmed validity of operation in ECU simulator for automatic SW update system.

Smart Home Device Management System Using FOTA Technique based on TR-069 Protocol (FOTA기술을 적용한 TR-069기반의 스마트홈 디바이스 관리 시스템)

  • Son, Minjae;Park, Subin;Bae, Seongwon;Moon, Daejin;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.569-572
    • /
    • 2016
  • It is currently associated with the increase in smart home devices. So they are getting a lot IoT platform for managing and integrating these devices. However, existing platforms lack the firmware management for each device. In this paper, We will make easier the management of firmware, using a technique called POTA. This technology is a technology that allows you to update the firmware using a wireless internet without a computer and Utilizing the TR-069 protocol, we propose a system for controlling each device in CPE.

  • PDF

Hybrid blockchain-based secure firmware distribution system (하이브리드 블록체인 기반의 안전한 펌웨어 배포 시스템)

  • Son, Min-sung;Kim, Heeyoul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.121-132
    • /
    • 2019
  • As the 4th industrial age enters, the number of IoT devices is exploding. Accordingly, the importance of security is also increasing in proportion to the increasing number of security incidents of IoT devices. However, due to the limited performance of IoT devices, there are limitations to applying existing security solutions. Therefore, a new automatic firmware distribution solution is needed to solve this problem. To solve this problem, we propose a new automatic firmware update system that uses a hybrid blockchain that combines a public blockchain and a private blockchain. The public blockchain allows various firmware providers to distribute firmware using a common system. Private blockchain solves the transaction overload problem of the public blockchain and facilitates the management of IoT devices. It also uses distributed file storage to ensure high availability without failing. Therefore, this system is expected to be very effective for improving the security of IoT devices.

A Software Update Method Using Clustering WSNs (클러스터링을 이용한 SW 업데이트 방법)

  • Jeong, Hyeyeong;Ahn, Byoungchul
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.4
    • /
    • pp.245-251
    • /
    • 2014
  • Wireless Sensor Networks(WSNs) are applied to many monitoring applications. Present sensor nodes can perform many functions at the same time and contain complex software. During the lifetime of sensor nodes, they are required to reprogram their software because of their new functions, software, software bug fixes. The nodes are inaccessible physically or it is very difficult to upgrade their software by one by one. To upgrade the software of sensor nodes in WSNs remotely, this paper presents an energy efficient method by selecting an optimal relay node. The CHR(Cluster Head Relay) method is compared with SPIN and RANDOM method. Three methods are simulated in NS-2 with the same environmental parameters. Simulation results show that CHR shows faster update time and less power consumption compared with other two methods.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.