Proposed Methods to Rollback A Failed Update of IoT Devices
- 1. Institute of Information Technology, Vietnam Academy of Science and Technology, Hanoi, Vietnam.
Contributors
Contact person:
- 1. Institute of Information Technology, Vietnam Academy of Science and Technology, Hanoi, Vietnam.
Description
Abstract: The increasing number of IoT devices leads to the demand for updating them securely, and stably. Without updating there is a high risk of being attack by hackers or malfunction due to outdated packages. To the date of this article, a lot of IoT updating methods were introduced. Among them are updating using VM containers, using packages, or using blockchain. However, some methods take time to recover a failed update while some cases require the minimum downtime of the IoT devices, or even some devices cannot communicate to the control server or cannot perform the rollback themselves after the update failure. In this article, our contribution is implementing different methods to reduce the rollback down time issue including using primary - secondary selection, using git revert, and using blockchain-based revert.
Notes
Files
B32971211221.pdf
Files
(760.2 kB)
Name | Size | Download all |
---|---|---|
md5:00a659d2813dc9fd9df349192bdb131c
|
760.2 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2249-8958 (ISSN)
References
- The IoT landscape in 2020 and the need to keep our connected devices secure. Available online: https://licelus.com/insights/the-iot-landscape-in-2020-and-the-need-to-keep-our-connected-devices-secure
- How Ubuntu Core transforms over-the-air software updates. Available online: https://pages.ubuntu.com/rs/066-EOV-335/images/Over-the-air%20software_12.05.20.pdf
- Balena Mechanism. Available online: https://www.balena.io/static/flow-desktop@1x-291bec507a7c6ed12a8d2d7e282c4a0b.png
- Balena update strategies. Available online: https://www.balena.io/docs/learn/deploy/release-strategy/update-strategies/
- Two Ways to Update Embedded Devices Over-The-Air. Available online: https://mender.io/blog/the-two-main-ways-to-update-embedded-devices-over-the-air
- Konstantinos Arakadakis, Pavlos Charalampidis, Antonis Makrogiannakis, Alexandros Fragkiadakis, Firmware over-the-air programming techniques for IoT networks - A survey, arXiv:2009.02260.
- Learn Blockchains by Building One. Available online: https://medium.com/@vanflymen/learn-blockchains-by-building-one-117428612f46
- Elizabeth Nathania Witanto, Yustus Eko Oktian, Sang-Gon Lee and Jin-Heung Lee, A Blockchain-Based OCF Firmware Update for IoT Devices, Journal of Applied Science, 2020, 10, 6744; doi:10.3390/app10196744.
- Saraju P. Mohanty, Proof of Authentication: IoT-Friendly Blockchains, Article in IEEE Potentials · January 2019, DOI: 10.1109/MPOT.2018.2850541.
- Aymen Boudguiga, Nabil Bouzerna, Louis Granboulan, Alexis Olivereau, Flavien Quesnel, Anthony Roger, Renaud Sirdey, Towards Better Availability and Accountability for IoT Updates by means of a Blockchain, IEEE Security & Privacy on the Blockchain (IEEE S&B 2017) an IEEE EuroS&P 2017 and Eurocrypt 2017 affiliated workshop, IEEE, Apr 2017, Paris, France. hal-01516350
- Jonathan Bell, Thomas D. LaToza, Foteini Baldmitsi and Angelos Stavrou, 2017 IEEE/ACM 12th International Workshop on Software Engineering for Science (SE4Science).
- Tanweer Alam, Blockchain and its Role in the Internet of Things (IoT), International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 151-157, 2019.
- Liangqin Gong, Daniyal M. Alghazzawi and Li Cheng, BCoT Sentry: A Blockchain-Based Identity Authentication Framework for IoT Devices, Information 2021, 12, 203.
- Alfonso Panarello * ID, Nachiket Tapas ID, Giovanni Merlino ID, Francesco Longo ID and Antonio Puliafito, Blockchain and IoT Integration: A Systematic Survey, Sensors 2018, 18, 2575; doi:10.3390/s18082575.
- Nidhi Agarwal, Framework for Integration of Blockchain with IoT Devices, Mphasis.
- K. Christidis, M. Devetsiokiotis, Blockchains and Smart Contracts for the IoT, Digital Object Identifier 10.1109/ACCESS.2016.2566339.
- Nafiz Al Asad; Md. Tausif Elahi; Abdullah Al Hasan; Mohammad Abu Yousuf, Permission-Based Blockchain with Proof of Authority for Secured Healthcare Data Sharing, 2020 2nd International Conference on Advanced Information and Communication Technology (ICAICT)
- Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui, Xiong, Student Dusit Niyato, Ping Wang, Yonggang, Wen, and Dong In Kim, A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks, IEEE Access (Volume: 7)
- John D. Blischak, Emily R. Davenport, Greg Wilson, A Quick Introduction to Version Control with Git and GitHub, PLOS Computational Biology
- Ismail Butun, Patrik ¨Osterberg, and Houbing Song, Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures, IEEE Communications Surveys & Tutorials 22(1):616-644, 2019
- Miao Yu, Jianwei Zhuge, Ming Cao, Zhiwei Shi and Lin Jiang, A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices, Future Internet 2019, 12, 27; doi:10.3390/fi12020027.
Subjects
- ISSN: 2249-8958 (Online)
- https://portal.issn.org/resource/ISSN/2249-8958#
- Retrieval Number: 100.1/ijeat.B32971211221
- https://www.ijeat.org/portfolio-item/B32971211221/
- Journal Website: www.ijeat.org
- https://www.ijeat.org
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org