Implementing secure OTA

IoT products will inevitably require updates. Updates of firmware may support new feature sets, or close vulnerabilities found after development of the product has completed. If there is no way for the device itself to restrict unauthorized or modified firmware from being loaded and used, then bad actors can manipulate firmware images and load malicious code directly to the device.

IoT product developers must allow users to load only validated, secure software. This can be done using cryptographic controls to hash and digitally sign the firmware images. A public key associated with the signature certificate is loaded in secure cryptographic storage on the device, and that key is used to validate the signature applied ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.