Cargando…
Secure LoRa Firmware Update with Adaptive Data Rate Techniques †
Internet of Things (IoT) devices rely upon remote firmware updates to fix bugs, update embedded algorithms, and make security enhancements. Remote firmware updates are a significant burden to wireless IoT devices that operate using low-power wide-area network (LPWAN) technologies due to slow data ra...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8036830/ https://www.ncbi.nlm.nih.gov/pubmed/33808160 http://dx.doi.org/10.3390/s21072384 |
_version_ | 1783677002110205952 |
---|---|
author | Heeger, Derek Garigan, Maeve Eleni Tsiropoulou, Eirini Plusquellic, Jim |
author_facet | Heeger, Derek Garigan, Maeve Eleni Tsiropoulou, Eirini Plusquellic, Jim |
author_sort | Heeger, Derek |
collection | PubMed |
description | Internet of Things (IoT) devices rely upon remote firmware updates to fix bugs, update embedded algorithms, and make security enhancements. Remote firmware updates are a significant burden to wireless IoT devices that operate using low-power wide-area network (LPWAN) technologies due to slow data rates. One LPWAN technology, Long Range (LoRa), has the ability to increase the data rate at the expense of range and noise immunity. The optimization of communications for maximum speed is known as adaptive data rate (ADR) techniques, which can be applied to accelerate the firmware update process for any LoRa-enabled IoT device. In this paper, we investigate ADR techniques in an application that provides remote monitoring of cattle using small, battery-powered devices that transmit data on cattle location and health using LoRa. In addition to issues related to firmware update speed, there are significant concerns regarding reliability and security when updating firmware on mobile, energy-constrained devices. A malicious actor could attempt to steal the firmware to gain access to embedded algorithms or enable faulty behavior by injecting their own code into the device. A firmware update could be subverted due to cattle moving out of the LPWAN range or the device battery not being sufficiently charged to complete the update process. To address these concerns, we propose a secure and reliable firmware update process using ADR techniques that is applicable to any mobile or energy-constrained LoRa device. The proposed system is simulated and then implemented to evaluate its performance and security properties. |
format | Online Article Text |
id | pubmed-8036830 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-80368302021-04-12 Secure LoRa Firmware Update with Adaptive Data Rate Techniques † Heeger, Derek Garigan, Maeve Eleni Tsiropoulou, Eirini Plusquellic, Jim Sensors (Basel) Article Internet of Things (IoT) devices rely upon remote firmware updates to fix bugs, update embedded algorithms, and make security enhancements. Remote firmware updates are a significant burden to wireless IoT devices that operate using low-power wide-area network (LPWAN) technologies due to slow data rates. One LPWAN technology, Long Range (LoRa), has the ability to increase the data rate at the expense of range and noise immunity. The optimization of communications for maximum speed is known as adaptive data rate (ADR) techniques, which can be applied to accelerate the firmware update process for any LoRa-enabled IoT device. In this paper, we investigate ADR techniques in an application that provides remote monitoring of cattle using small, battery-powered devices that transmit data on cattle location and health using LoRa. In addition to issues related to firmware update speed, there are significant concerns regarding reliability and security when updating firmware on mobile, energy-constrained devices. A malicious actor could attempt to steal the firmware to gain access to embedded algorithms or enable faulty behavior by injecting their own code into the device. A firmware update could be subverted due to cattle moving out of the LPWAN range or the device battery not being sufficiently charged to complete the update process. To address these concerns, we propose a secure and reliable firmware update process using ADR techniques that is applicable to any mobile or energy-constrained LoRa device. The proposed system is simulated and then implemented to evaluate its performance and security properties. MDPI 2021-03-30 /pmc/articles/PMC8036830/ /pubmed/33808160 http://dx.doi.org/10.3390/s21072384 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) ). |
spellingShingle | Article Heeger, Derek Garigan, Maeve Eleni Tsiropoulou, Eirini Plusquellic, Jim Secure LoRa Firmware Update with Adaptive Data Rate Techniques † |
title | Secure LoRa Firmware Update with Adaptive Data Rate Techniques † |
title_full | Secure LoRa Firmware Update with Adaptive Data Rate Techniques † |
title_fullStr | Secure LoRa Firmware Update with Adaptive Data Rate Techniques † |
title_full_unstemmed | Secure LoRa Firmware Update with Adaptive Data Rate Techniques † |
title_short | Secure LoRa Firmware Update with Adaptive Data Rate Techniques † |
title_sort | secure lora firmware update with adaptive data rate techniques † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8036830/ https://www.ncbi.nlm.nih.gov/pubmed/33808160 http://dx.doi.org/10.3390/s21072384 |
work_keys_str_mv | AT heegerderek securelorafirmwareupdatewithadaptivedataratetechniques AT gariganmaeve securelorafirmwareupdatewithadaptivedataratetechniques AT elenitsiropouloueirini securelorafirmwareupdatewithadaptivedataratetechniques AT plusquellicjim securelorafirmwareupdatewithadaptivedataratetechniques |