Enhancing IoT Security Through Manifest-Based Firmware Updates
Enhancing IoT Security Through Manifest-Based Firmware Updates
Firmware Updates
Madhavan M Paramaguru V Mrs. K. Abirami
Electronics and Communication Electronics and Communication Electronics and Communication
Engineering Engineering Engineering
Easwari Engineering College Easwari Engineering College Easwari Engineering College Chennai,
Chennai,Tamil Nadu 600089,India Chennai,Tamil Nadu 600089,India Tamil Nadu 600089, India
[email protected] [email protected] [email protected]
III. METHODOLOGY
A. System Architecture
The architecture is divided into two segments:
● Firmware Sender Side
● IoT Device Side
Fig.1.Flow chart explaining sender side process
A.1. Firmware Sender Side
The Firmware Sender Side is responsible for preparing the A.2 IoT Device Side
firmware update package, generating a manifest file, and The IoT device side is tasked with receiving, verifying, and
signing it before transmission to the IoT device. The key installing the firmware update. The key steps involved are as
steps involved are as follows: follows:
A.1.1 Firmware Generation A.2.1 Receiving Components
The sender begins by preparing a new version of the The IoT device receives the manifest file and firmware
firmware file, incorporating new features, improvements, or package from the Firmware Sender. The manifest file
security patches. contains metadata such as the firmware version, sequence
number, hash values, and digital signature.
C. Update Process
A robust threat model and security analysis are critical to Once connected, the heap memory drops slightly to 46,568
evaluating the effectiveness of the secure firmware update bytes, indicating that some memory is allocated for network
mechanism. The proposed system addresses various attack buffers and connection parameters. This memory
vectors that threaten IoT devices, ensuring the integrity, consumption remains constant throughout the update
authenticity, and confidentiality of firmware updates. Below process, suggesting that network-related memory usage is
are the key threats considered and the corresponding stable after the initial connection phase.
mitigation strategies.
B. Manifest Retrieval & Processing
A. Tampering with Firmware or Manifest
Attackers may attempt to alter the firmware or manifest B.1 HTTP GET Request for Manifest
during transmission to inject malicious code or disrupt
device functionality. The system mitigates this threat by Fetching the manifest from the firmware server takes 3.5
using SHA-256 to generate a hash for both the manifest and seconds, which includes the time required for DNS
firmware. The hash acts as a digital fingerprint, ensuring any resolution, establishing an HTTP connection, sending the
modifications can be detected. Additionally, the sender’s GET request, and receiving the manifest response. The
private key is used to sign the manifest, and the IoT device retrieval time is reasonable given that the manifest size is
verifies this signature with the sender’s public key, ensuring relatively small.
authenticity[9].
B. Replay Attacks
In replay attacks, attackers resend old, valid manifests B.2 Manifest Parsing
and firmware to roll back devices to vulnerable states. To
counter this, the manifest includes a sequence_number field, The parsing process is highly efficient, taking only 8
which is a timestamp or incremental counter. The IoT device milliseconds. The memory drop of approximately 1.2 KB
maintains a record of the latest sequence number it has suggests that temporary buffers were allocated during
processed, rejecting manifests with older sequence parsing, possibly for extracting JSON fields such as version,
numbers[7]. sequence number, firmware URI, hash, and signature. Once
parsing is completed, the heap memory stabilizes, ensuring
that unnecessary memory is not held beyond its required memory, likely due to temporary buffers used for hash
usage. computation [8].
C. Version & Sequence Number Verification
F. Over-the-Air (OTA) Update & Reboot
This process involves comparing the retrieved manifest's
version and sequence number with the previous values The OTA update process, which involves writing the new
stored on the device. The 18-millisecond execution time firmware to flash memory and rebooting the system, takes
indicates that this is a lightweight operation, as it only approximately 22 seconds. The logs confirm that the device
involves reading stored values from memory and performing successfully loads the new firmware, and there are no
basic comparisons. indications of boot failures or corrupted firmware.
The heap memory drops slightly, reflecting the temporary The bootloader verifies the integrity of the flashed firmware
allocation of buffers for loading and comparing stored before execution, ensuring that the update process has been
manifest values. However, since the difference is minor, this completed correctly. The device then transitions to normal
step does not significantly impact overall memory operation, running the newly installed firmware.
availability.
D. Digital Signature Verification
Heap Memory
Process Time Elapsed
(Approx.)
The cryptographic verification of the manifest’s digital
WiFi Connection 21.8 sec 46,568 bytes
signature is a computationally intensive step, requiring 478
milliseconds to complete. This duration accounts for the Manifest Download 3.5 sec 45,824 bytes
cryptographic operations involved in validating the Manifest Parsing 8 ms 44,320 bytes
authenticity and integrity of the received manifest using the Version Check 18 ms 42,584 bytes
embedded public key. Signature Verification 478 ms 42,584 bytes
Firmware Download
50 sec 42,440 bytes
Interestingly, there is no noticeable drop in free heap & Hashing
memory during this process, suggesting that the OTA Update &
22 sec Not measured
cryptographic computations are optimized for memory Reboot
efficiency. The implementation does not seem to create
excessive memory overhead, allowing the device to perform Table.1. Overall Performance Summary
signature verification without running into resource
constraints. VII. CONCLUSION
E. Firmware Download & Hash Computation IoT device security and performance depend on firmware
updates, yet putting in place a safe and effective update
E.1 HTTP GET Request for Firmware system is still quite difficult. This project presents a
manifest-based firmware update methodology that verifies
Retrieving the firmware binary from the update server takes the firmware's validity and integrity prior to installation. The
approximately 50 seconds, making it the most time- system makes sure that only trustworthy firmware is
consuming step in the update process. The transfer time is installed, avoiding malicious or unauthorized changes, by
directly influenced by network conditions, HTTP server utilizing digital signatures and hash-based integrity checking
response time, and available bandwidth. [9].
Given that the firmware size is 272 KB, the download speed Before installing the firmware, the project effectively creates
is around 5.4 KB per second, which suggests that either the a methodical updating procedure that starts with manifest
network bandwidth is limited or the embedded device has retrieval, integrity validation, and signature verification. The
constraints in processing and storing the incoming data manifest file contributes significantly to increased security
efficiently. by offering the structured metadata required for verification.
By doing away with manual intervention, automating the
E.2 Firmware Hash Verification manifest verification process increases efficiency and
security[10]. The reliability of IoT firmware updates is
The computed hash of the downloaded firmware matches improved by this project's emphasis on crucial security
the expected hash provided in the manifest, confirming that elements such firmware authenticity, integrity, and safe
the firmware has not been tampered with during deployment. By ensuring that IoT devices receive updates in
transmission. The hash verification process runs a secure manner, the suggested method reduces the
concurrently with the download process, ensuring that data possibility of altered firmware and cybersecurity concerns
integrity is validated before proceeding with the installation. while preserving the system's general stability and
functionality[6].
The entire step takes 50.2 seconds, which is similar to the
download time, indicating that hash computation is
performed in real-time while receiving firmware chunks. This project successfully demonstrates a secure and efficient
Heap memory remains stable, with only a minor drop in free manifest-based firmware update mechanism that enhances
the integrity and authenticity of firmware installations in IoT
devices. By incorporating automated verification and Things: A survey”.International Multidisciplinary Information
cryptographic security measures, the system mitigates the Technology and Engineering Conference (IMITEC).
risks associated with unauthorized firmware modifications.
Future work will focus on extending this update mechanism [5] Ojo, M. O. ;Giordano, S. ;Procissi, G. and Seitanidis, I. N.
to multiple low-end IoT devices with even lower resource (2018.) “A Review of Low-End, Middle-End, and High-End Iot
Devices,” IEEE Access, vol. 6, no. November, pp 70528–70554.
constraints than the ESP8266. This will require optimizing
cryptographic operations, minimizing memory and
[6] Taimur Bakhshi , Bogdan Ghita and Ievgeniia Kuzminykh
processing overhead, and exploring lightweight (2024) ‘A Review of IoT Firmware Vulnerabilities and Auditing
communication protocols to ensure secure updates on highly Techniques’, MDPI IOT Cybersecurity .
constrained hardware. Additionally, implementing
alternative update methods for devices lacking native [7] Zandberg, K. ;Schleiser, K. ;Acosta, F. ;Tschofenig, H. and
internet connectivity, such as serial or offline updates, will Baccelli, E. (2019) ‘Secure Firmware Updates for Constrained IoT
further enhance applicability. By broadening the system's Devices Using Open Standards: A Reality Check’ ,IEEE Access,
reach to lower-end IoT devices, this approach aims to pp 71907–71920 .
improve security and reliability across diverse embedded
systems, making secure firmware updates more accessible [8] Hasan, Haifaa Ahmed Hasan. (2022). A Review of Hash
and practical for resource-limited environments. Function Types and their Applications. Wasit Journal of Computer
and Mathematics Science. 1. 120-139. 10.31185/wjcm.52.
VIII. ACKNOWLEDGEMENT [9] Edem, Swathi & Vivek, G. & Rani, G.. (2016). Role of Hash
Function in Cryptography. 10-13. 10.22161/ijaers/si.3.
We extend our deepest gratitude to the individuals who [10] Ramakrishna, Donagani & Shaik, Mohammed. (2024). A
played pivotal roles in this endeavor. Our heartfelt Comprehensive Analysis of Cryptographic Algorithms: Evaluating
appreciation goes to our cherished family and friends, whose Security, Efficiency, and Future Challenges. IEEE Access. PP. 1-1.
unwavering encouragement, love, advice, and financial 10.1109/ACCESS.2024.3518533.
support were indispensable pillars throughout this journey.
Their belief in our pursuit fueled our determination. [11] Xu, Jingkun. (2025). A Comprehensive Study of Digital
Signatures: Algorithms, Challenges and Future Prospects. ITM
Web of Conferences. 73. 10.1051/itmconf/20257303009.
Sincere acknowledgments are extended to our esteemed
professor guide, Ms. K. Abirami. Her invaluable reminders
[12] Varchola, Michal & Güneysu, Tim & Mischke, Oliver. (2011).
and consistent supervision were instrumental in shaping the MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-
trajectory of our study. Her unwavering support and processor. 204-210. 10.1109/ReConFig.2011.61.
guidance not only provided clarity but also served as a
source of motivation. The collaborative efforts of family, [13] Luo, Zhengping & Liu, Ruowen & Mehta, Aarav.
friends, and Ms. K. Abirami formed a foundation for (2023). Understanding the RSA algorithm.
success. Each played a unique and crucial role in our 10.48550/arXiv.2308.02785.
achievements. Their contributions enriched our experience
and made overcoming challenges possible.
IX. REFERENCE