Blockchain-based Firmware Update Framework for Internet-of-Things Environment

Similar documents
Internet of secure things: issues and perspectives. Pasquale Pace Dimes - UNICAL

IoT security based on the DPK platform

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Formal Expression of BBc-1 Mechanism and Its Security Analysis

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

Detecting Insider Attacks on Databases using Blockchains

NON-TECHNICAL WHITEPAPER Version 1.0

DAG based DLT Network

CrossMount MediaTek White Paper April2015

Express Monitoring 2019

A Blockchain-based Architecture for Collaborative DDoS Mitigation with Smart Contracts

Wireless Network Security Fundamentals and Technologies

Introduction to Blockchain

Integrated Security Management Framework

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

OpenbankIT: a banking platform for e- money management based on blockchain technology

Innovation policy for Industry 4.0

Trustworthy user authentication, authorization, data integrity AND consent management

EXECUTIVE PRODUCT SUMMARY

lifeid Foundation FAQ v.1

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

IoT Security and Risk Management

1. INTRODUCTION 2. PROPOSED SYSTEM. Parashar Sangle, IJECS Volume 05 Issue 12 Dec., 2016 Page No Page 19489

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Blockchain and Additive Manufacturing

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract

Software Security. Final Exam Preparation. Be aware, there is no guarantee for the correctness of the answers!

Decentralized Database for Developers. White Paper v March 31,2018

ABOUT SOME OF THE BLOCKCHAIN PROBLEMS

CAODV Free Blackhole Attack in Ad Hoc Networks

Consensus & Blockchain

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

5G and Licensed/Unlicensed Convergence

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

ETHERNITY DECENTRALIZED CLOUD COMPUTING

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

Sybil Attack Detection and Prevention Using AODV in VANET

DNS Naming Services for Service Discovery and Remote Control for Internet-of-Things Devices

How Secure is Blockchain? June 6 th, 2017

A Static-Dynamic Conjunct Windows Process Integrity Detection Model

Cyber-Physical Chain (CPChain) Light Paper

Smart Organization. Vivek Ghule Department of Computer Engineering Vishwakarma Institute of Information Technology Pune, India

IEEE networking projects

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering

What someone said about junk hacking

Mobile Security Fall 2012

Security improvement in IOT based on Software

* Inter-Cloud Research: Vision

Security of NFC payments

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager

PERFECT MIX FOR PERFECT DATA PROTECTION

CyberOffice: A Smart Mobile Application for Instant Meetings

Software-defined Storage: Fast, Safe and Efficient

FP7 NEMESYS Project: Advances on Mobile Network Security

Introduction and Statement of the Problem

Secure Initial Access Authentication in WLAN

Redefining Broadband. Alex Arena Group Managing Director

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

Lecture 44 Blockchain Security I (Overview)

Protecting the Home Front

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

Incentivized Delivery Network of IoT Software Updates Based on Proofs-of-Distribution

IDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters

IoT Security in Smart Cities

Blockchain Integrated Secured Architecture for Advance Wireless Networks in Internet of Things

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

PRODUCT GUIDE Wireless Intrusion Prevention Systems

Small-cell-based Solution to Make Diverse Services Possible

CIP Security Pull Model from the Implementation Standpoint

Outcomes of the ITU Regional Workshop on the Internet of Things (IoT) and Future Networks. (19-20 June 2017, Saint Petersburg, Russia)

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

GS-AN039. Provisioning Methods with S2W INTRODUCTION SETTING UP WEB PROVISIONING USING LIMITED AP PROVISIONING MODE

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Virtualization and Softwarization Technologies for End-to-end Networking

The Integrated Smart & Security Platform Powered the Developing of IOT

Wormhole: A Smart Contract Solution for Bitcoin Cash

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Deployment of an Artificial Intelligence (AI) IoT Gateway. Daniele Cleri AAEON Europe on behalf of Texim Europe

Emerging Trends of Micro Data Centers

Reliable Broadcast Message Authentication in Wireless Sensor Networks

A Study of Open Middleware for Wireless Sensor Networks

Leveraging SDN for Collaborative DDoS Mitigation

Resilient, crowd-sourced LPWAN infrastructure using blockchain

Caterpillar: A Blockchain-Based Business Process Management System

F-Interop Online Platform of Interoperability and Performance Tests for the Internet of Things

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices

ENEE 457: E-Cash and Bitcoin

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

Potential Mitigation Strategies for the Common Vulnerabilities of Control Systems Identified by the NERC Control Systems Security Working Group

GIoTS & IOT Week 2017: IOT Reality Check Patrick Wetterwald, CTAO IOT Standards and Architecture

A COMPARATIVE STUDY IN DYNAMIC JOB SCHEDULING APPROACHES IN GRID COMPUTING ENVIRONMENT

Design Patterns which Facilitate Message Digest Collision Attacks on Blockchains

Transcription:

Int'l Conf. Information and Knowledge Engineering IKE'18 151 Blockchain-based Firmware Update Framework for Internet-of-Things Environment Alexander Yohan 1, Nai-Wei Lo 2, Suttawee Achawapong 3 Department of Information Management National Taiwan University of Science and Technology Taipei, Taiwan nwlo@cs.ntust.edu.tw 2 {d10309802 1, m10409817 3 }@mail.ntust.edu.tw Abstract Internet-of-Things is becoming an important technology for improving the people s quality of life. With this being the case, a lot of IoT devices are manufactured and the applications of IoT are increasing drastically in the past five years. Improper device management and firmware distribution from the device manufacturer could harm the IoT environment. In this paper, a firmware update framework for IoT devices based on blockchain technology is proposed. The proposed framework aims to securely verify the firmware deployed by the device manufacturer and to securely distribute the firmware to the end-device. A PUSH-based firmware update method is adopted to deliver the new version of firmware from the legitimate vendor. In addition, smart contract and consensus mechanism from blockchain technology are utilized to preserve the integrity of the distributed firmware. Keywords Internet-of-Things; firmware update; blockchain; smart contract I. INTRODUCTION The applications of Internet-of-Things (IoT) devices increase drastically along with the rapid development of embedded system and wireless communication technology in the past five years. One of the popular uses of IoT devices is in smart home, in which various equipments or devices in a house (e.g. light bulb, refrigerator, TV, air conditioner) are connected to a gateway and can be controlled without the need to have physical contact with the device. According to Gartner report, 3,9 billion units out-of 6,4 billion units of IoT devices in the market are dominated by consumer application-based devices [1]. The total number of IoT devices circulating in the market is predicted to increase by 219% and reached 20,4 billion units by 2020. As IoT technology grows to become a massive technology, there are many emerging vulnerabilities and security challenges in IoT environments [2] [4]. Miessler and Smith [3] listed several vulnerabilities of IoT environment, such as manipulation in code execution flow of the device, seizure of device s console access, interference in the update process of device firmware. Considering that IoT device has the capability to connect with other devices and to connect with Internet, it is possible for malicious attacker to exploit one of existing IoT vulnerabilities to affect billion of devices. The significant growth of IoT devices and its applications could cause various issues for the IoT device manufacturer to manage the distributed IoT devices. This is especially the case during the firmware update process of IoT device. A centralized network model for IoT environment might not be suitable and it could lead to single-point of failure. As the blockchain technology is built upon decentralization concept, it could help to distribute the workload of network traffic during the firmware update process to several blockchain nodes [2], [5], [6]. In addition, one of the principal characteristics of blockchain technology is data transparency, which means all transaction data within the blockchain network is observable by any parties in the blockchain network. In this paper, a firmware update framework for IoT device based on blockchain technology is proposed. The proposed scheme utilizes smart contract [7] and consensus protocol from blockchain technology to verify the firmware integrity during the update process. A push-based firmware update scheme is adopted in blockchain-based environment for the proposed framework. A device vendor/manufacturer creates a contract for the newly released firmware version and publishes the contract to all nodes in the blockchain network. When a new firmware update contract is published to the blockchain network, it must go through peer verification process through the consensus protocol. Once the contract is verified, the passive node will send a notification of newly added firmware version to IoT gateway. Then, the IoT gateway could forward the information regarding firmware update to the registered IoT devices. The contributions of our work are as follows: A novel design of firmware update framework based on blockchain technology is proposed. There are five entities involved in the proposed firmware update framework, namely: vendor repository, vendor node, passive node, IoT gateway, and IoT device. Two process workflow diagrams are designed to support the functionalities of the proposed firmware update framework. These two processes are: the process to create firmware update contract and the process to distribute of firmware update.

152 Int'l Conf. Information and Knowledge Engineering IKE'18 This paper is organized as follows. Existing works on firmware update mechanism for IoT and existing blockchainbased firmware update mechanism are explained in Section II. The proposed blockchain-based firmware update framework is explained in Section III. Finally, the concluding remarks is presented in Section IV. II. LITERATURE REVIEW A. Firmware Update Mechanism for Internet-of-Things As the popularity of IoT devices grow, various cyberattacks targeting the IoT devices and its applications are discovered. Several attack on IoT environment targets on the device firmware as in [4], [8], in which malicious firmware is injected into target device to sabotage the functionalities of the corresponding target device. Malicious attacker is able to exploit the vulnerabilities and remotely control the target device to launch denial-of-service or even violate the privacy of the target device owner. There are two processes to perform the firmware update mechanisms for IoT devices: manual and automatic updates. In the manual update process, the device owner must initiate the firmware update process manually. In general, this update process is adopted in the traditional firmware update mechanism and preferred by device owner with limited network bandwidth or limited network connectivity. However, the manual firmware update mechanism is not efficient since the device owner must do all the manual operations and it is more time consuming. In addition, there is a high chance that human error could happen during the firmware update process. Compared to the manual update process, the automatic update process looks more enticing to be adopted nowadays. As the manufacturer of IoT device could initiate the firmware update process without the active participation from the device owner. The current automatic firmware update process uses clientserver architecture, in which the vendor s repository is the server side and the IoT device becomes the client side. In general, there are two ways to deliver the firmware from the server to the client: PUSH and PULL methods[9]. The differences between these two methods lie in the initiator of the firmware update process. In the PUSH method, the device vendor initiates the firmware update process by distributing the firmware binary to the IoT device management (gateway). In contrast, the IoT device initiates the firmware update process by sending download firmware binary request to the server of device vendor in the PULL method. B. Blockchain-based Firmware Update Mechanism Lee and Lee in [10] proposed a blockchain-based firmware verification and firmware update schemes for embedded devices in IoT environment. In the scheme of Lee and Lee, the blockchain technology is utilized in their proposed firmware update framework to verify the firmware version, verify the authenticity of the firmware, and distribute the firmware binary to the connected nodes in the blockchain network. Each embedded device is designed as one node in the blockchain network. As each embedded device represents each node in the blockchain network, this means that each embedded device needs to store a copy of blockchain ledger in its local storage. As the embedded devices are resource constraints device, the scheme proposed by Lee and Lee might be difficult to be implemented in the real world IoT environment. In addition, there are various kinds of on-the-shelf embedded devices that require different firmware. In this case, a request node might Fig. 1. The proposed system architecture for blockchain-based firmware update framework.

Int'l Conf. Information and Knowledge Engineering IKE'18 153 take longer time to wait for a response. Therefore, the firmware update framework proposed by Lee and Lee does not suitable for heterogeneous IoT ecosystem. Boudguiga et al. in [11] proposed the application of blockchain technology to update the firmware of IoT devices from different vendors. In the firmware update framework of Boudguiga et al., each IoT device must periodically poll any random node in the blockchain network in order to check the firmware version. When a device vendor publishes a new version of firmware update to the blockchain network, the newly created firmware update needs to be verified first by nodes in the blockchain network through consensus protocol. When one of IoT devices from the associated device vendor wants to perform the firmware update process, the device must create a transaction of firmware update request. In this scheme, the IoT devices would not be able to download the firmware binary from its corresponding vendor unless the nodes in the blockchain network have verified the associated firmware. In addition, all nodes in the blockchain network in the proposed framework of Boudguiga et al. must store all the firmware binaries that have ever published in the blockchain network. III. PROPOSED FRAMEWORK DESIGN In this paper, a blockchain-based firmware update framework is proposed. In the proposed firmware update framework, PUSH-based firmware update method is selected to distribute the new version of firmware binary from the repository of device manufacturer to the IoT device. In the proposed framework, the device vendor distributes a new version of firmware by pushing the information related with the corresponding firmware to the blockchain network. Fig. 1 shows the proposed architecture of blockchain-based firmware update framework. There are five entities in the proposed firmware update framework listed as follows: Vendor repository: a firmware repository owned by device vendor to store the firmware binaries and provides firmware information. Vendor node: a node in blockchain network owned by device manufacturer. Vendor node creates and distributes the firmware update contract to the other nodes in the blockchain network. In addition, vendor node acts as miner and actively verifies all transaction in the blockchain network. Passive node: a node owned by broker or service provider that connecting IoT gateways to the blockchain network. Passive nodes receive and could execute the firmware update contract from vendor node. Each passive node is connected with zero to many IoT gateways. IoT gateway: a gateway for IoTs device such a Wi-Fi router in smart home environment. IoT gateway stores information of the registered IoT devices, such as device manufacturer, device model, and the installed firmware version. Each gateway is identified by a public address (or wallet address) in a passive node (wallet container). Fig. 2. The process flow for creating a new firmware update contract.

154 Int'l Conf. Information and Knowledge Engineering IKE'18 IoT device: sensors or embedded devices. A. Assumptions Assumptions for the proposed protocol are listed as follows: 1. Each device vendor has at least one vendor node in the blockchain network and one vendor repository to store the firmware binaries and the corresponding information. 2. Vendor repository is connected with vendor node through a secure channel. 3. Passive node does not participate in the mining process and only needs to synchronize the data stored in the node s local ledger with the data from public ledger data. 4. Each IoT device is connected to IoT gateway through a secure channel. B. Proposed Framework The proposed firmware update framework is designed based on Ethereum blockchain platform. The proposed framework consists of two processes: the process to create firmware update contract and the process to distribute the firmware binary file. The firmware verification process utilizes the verification mechanism of blockchain network (i.e. Proofof-Work) in order to verify the firmware update contract and to verify the integrity of firmware binary file. The firmware update contract creation process is shown in Fig. 2 and explained as follows: 1. Device vendor develops a new firmware for a specific device and stores the firmware binary and the information associated with the new firmware version into the vendor repository. Once the new firmware update information has been stored in the vendor repository, the vendor issues a firmware update contract creation to the vendor node. 2. The vendor node creates a new firmware update contract and records the new firmware information inside the newly created contract. Afterward, the vendor node deploys the newly created firmware update contract to the blockchain network for the verification process. 3. All the other vendor nodes (the miner nodes) in the blockchain network verify and validate the newly created firmware update contract. After the verification of new firmware update contract has finished, the miner nodes update the validation status of the newly created contract and notify all the other nodes regarding the verification result. 4. The miner nodes collect all firmware update contracts that have been verified and store it into the blockchain s ledger. After a firmware update contract is stored in the blockchain s ledger, the distribution of firmware binary based on the corresponding contract can be executed. The system flow for the distribution process of firmware binary is shown in Fig. 3 and explained as follows: 1. After a new firmware update contract is verified and recorded in the blockchain, the passive node could send a notification about the newly released firmware Fig. 3. The process flow for distributing the binary file of a firmware.

Int'l Conf. Information and Knowledge Engineering IKE'18 155 update to all IoT gateways managed by the corresponding passive node. 2. The IoT gateway checks the information regarding the newly released firmware update with the information of all IoT devices managed by the corresponding gateway. If the gateway finds any IoT device that matched with the requirement of the firmware update from the received contract, then the gateway will send a request to the associated passive node for detailed information to download the firmware s binary file. 3. The passive node receives the firmware update request from the gateway. Next, the passive node checks the requirements on the firmware update contract that matched with the received firmware update request. If the requirements are satisfied, the passive node sends the URI of the requested firmware binary to the requesting IoT gateway. 4. After the IoT gateway receives the URI of the requested firmware binary, the gateway sends a request to the vendor repository to download the requested firmware binary. 5. The vendor repository receives the request sent by the corresponding IoT gateway. Afterwards, the vendor repository sends the requested binary file to the requesting IoT gateway. 6. After the IoT gateway has finished downloading the binary file of a firmware, the gateway forwards the firmware binary file to the associated IoT device. IV. CONCLUSION As the applications of IoT devices grow significantly, the device manufacturer faced various problems related with the management of the distributed IoT devices. One of the problems faced by the device vendor is the distribution of new version of firmware for the manufactured devices. In the past, a centralized network architecture model is used for distributing the firmware of IoT device. However, the centralized network architecture might not suitable anymore considering the rapid growth of IoT devices application. In this paper, a blockchain-based firmware update framework for IoT device is proposed. The proposed framework utilizes blockchain technology in order to securely verify the firmware version and to verify the integrity of the distributed firmware binary during the update process. A pushbased firmware update scheme is adopted in the proposed framework. In addition, the proposed firmware update framework consists of two main processes. The first main process is the creation of firmware update contract. In the first process, each vendor is required to create a firmware update contract for each firmware released, and the contract must be deployed to the blockchain network for verification process. Next, the Peer nodes in the blockchain network verify the newly deployed firmware update contract through consensus protocol. The second main process is the distribution of firmware binary to end devices. In this process, secure verification mechanisms is applied to securely distribute the firmware binary from the repository of device manufacturer to the requesting IoT device. ACKNOWLEDGMENT The authors gratefully acknowledge the support from TWISC and Ministry of Science and Technology, Taiwan, under the Grant Numbers MOST 105-2221-E-011-080-MY3, MOST 106-3114-E-011-003, and MOST 106-2218-E-011-003. REFERENCES [1] R. van der Meulen, Gartner Says 8.4 Billion Connected Things Will Be in Use in 2017, Up 31 Percent From 2016, 07-Feb-2017. [2] M. A. Khan and K. Salah, IoT security: Review, blockchain solutions, and open challenges, Futur. Gener. Comput. Syst., vol. 82, pp. 395 411, May 2018. [3] D. Miessler and C. Smith, OWASP Internet of Things Project - OWASP. [Online]. Available: https://www.owasp.org/index.php/owasp_internet_of_things_project #tab=iot_vulnerabilities. [Accessed: 10-Apr-2018]. [4] A. Cui, M. Costello, and S. J. Stolfo, When Firmware Modifications Attack : A Case Study of Embedded Exploitation, 20th Annu. Netw. Distrib. Syst. Secur. Symp., 2013. [5] K. Christidis and M. Devetsikiotis, Blockchains and Smart Contracts for the Internet of Things, IEEE Access, vol. 4, pp. 2292 2303, 2016. [6] N. Kshetri, Blockchain s roles in strengthening cybersecurity and protecting privacy, Telecomm. Policy, vol. 41, no. 10, pp. 1027 1038, Nov. 2017. [7] Ethereum, Introduction To Smart Contracts, 2016. [Online]. Available: http://solidity.readthedocs.io/en/latest/introduction-to-smartcontracts.html. [Accessed: 10-Apr-2018]. [8] M. A. Prada-Delgado, A. Vazquez-Reyes, and I. Baturone, Trustworthy firmware update for Internet-of-Thing Devices using physical unclonable functions, in 2017 Global Internet of Things Summit (GIoTS), 2017, pp. 1 5. [9] K. Doddapaneni, R. Lakkundi, S. Rao, S. G. Kulkarni, and B. Bhat, Secure FoTA Object for IoT, in 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), 2017, pp. 154 159. [10] B. Lee and J.-H. Lee, Blockchain-based secure firmware update for embedded devices in an Internet of Things environment, J. Supercomput., vol. 73, no. 3, pp. 1152 1167, Mar. 2017. [11] A. Boudguiga et al., Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain, in 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017, pp. 50 58.