Skip to main content

Firmware Verification of Embedded Devices Based on a Blockchain

  • Conference paper
  • First Online:
Quality, Reliability, Security and Robustness in Heterogeneous Networks (QShine 2016)

Abstract

In this paper, a new firmware verification scheme is presented that utilizes blockchain technologies for securing network embedded devices. In the proposed scheme, an embedded device requests a firmware verification to nodes connected in a blockchain network and gets a response whether its firmware is up-to-date or not. If not latest, the embedded device can securely download and install the latest firmware from a firmware update server. Even in the case that the version of the firmware is up-to-date, its integrity is checked via the blockchain nodes. The proposed scheme guarantees that the embedded device’s firmware is not tampered and latest. The effects of attacks targeting known vulnerabilities are thus minimized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gartner: Gartner Says 4.9 Billion Connected Things Will Be in Use in 2015. Gartner Newsroom, November 2014

    Google Scholar 

  2. Firmware - Wikipedia. https://en.wikipedia.org/wiki/Firmware

  3. Choi, B.-C., Lee, S.-H., Na, J.-C., Lee, J.-H.: Secure firmware validation and update for consumer devices in home networking. IEEE Trans. Consum. Electron. 62(1), 39–44 (2016)

    Article  Google Scholar 

  4. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009), Unpublished Manuscript

    Google Scholar 

  5. Blockchain Bitcoin Wiki. https://en.bitcoin.it/wiki/Blockchain

  6. Hu, Y., Perrig, A., Johnson, D.B.: Efficient security mechanisms for routing protocols. In: Proceedings of the NDSS 2003, February 2003

    Google Scholar 

  7. Badev, A., Chen, M.: Bitcoin: Technical Background and Data Analysis. Federal Reserve Board, Washington, D.C. (2013)

    Google Scholar 

  8. Bider, D., Baushke, M.: SHA-2 data integrity for the secure shell (SSH) transport layer protocol. IETF RFC 6668, July 2012

    Google Scholar 

  9. Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. OReilly Media, Sebastopol (2014)

    Google Scholar 

  10. Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., Moeller, B.: Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). IETF RFC 4492, May 2006

    Google Scholar 

Download references

Acknowledgment

This work was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2014R1A1A1006770).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Boohyung Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Lee, B., Malik, S., Wi, S., Lee, JH. (2017). Firmware Verification of Embedded Devices Based on a Blockchain. In: Lee, JH., Pack, S. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 199. Springer, Cham. https://doi.org/10.1007/978-3-319-60717-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60717-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60716-0

  • Online ISBN: 978-3-319-60717-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics