Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published December 30, 2021 | Version CC BY-NC-ND 4.0
Journal article Open

Proposed Methods to Rollback A Failed Update of IoT Devices

  • 1. Institute of Information Technology, Vietnam Academy of Science and Technology, Hanoi, Vietnam.

Contributors

Contact person:

  • 1. Institute of Information Technology, Vietnam Academy of Science and Technology, Hanoi, Vietnam.

Description

Abstract: The increasing number of IoT devices leads to the demand for updating them securely, and stably. Without updating there is a high risk of being attack by hackers or malfunction due to outdated packages. To the date of this article, a lot of IoT updating methods were introduced. Among them are updating using VM containers, using packages, or using blockchain. However, some methods take time to recover a failed update while some cases require the minimum downtime of the IoT devices, or even some devices cannot communicate to the control server or cannot perform the rollback themselves after the update failure. In this article, our contribution is implementing different methods to reduce the rollback down time issue including using primary - secondary selection, using git revert, and using blockchain-based revert.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

B32971211221.pdf

Files (760.2 kB)

Name Size Download all
md5:00a659d2813dc9fd9df349192bdb131c
760.2 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2249-8958 (ISSN)

References

  • The IoT landscape in 2020 and the need to keep our connected devices secure. Available online: https://licelus.com/insights/the-iot-landscape-in-2020-and-the-need-to-keep-our-connected-devices-secure
  • How Ubuntu Core transforms over-the-air software updates. Available online: https://pages.ubuntu.com/rs/066-EOV-335/images/Over-the-air%20software_12.05.20.pdf
  • Balena Mechanism. Available online: https://www.balena.io/static/flow-desktop@1x-291bec507a7c6ed12a8d2d7e282c4a0b.png
  • Balena update strategies. Available online: https://www.balena.io/docs/learn/deploy/release-strategy/update-strategies/
  • Two Ways to Update Embedded Devices Over-The-Air. Available online: https://mender.io/blog/the-two-main-ways-to-update-embedded-devices-over-the-air
  • Konstantinos Arakadakis, Pavlos Charalampidis, Antonis Makrogiannakis, Alexandros Fragkiadakis, Firmware over-the-air programming techniques for IoT networks - A survey, arXiv:2009.02260.
  • Learn Blockchains by Building One. Available online: https://medium.com/@vanflymen/learn-blockchains-by-building-one-117428612f46
  • Elizabeth Nathania Witanto, Yustus Eko Oktian, Sang-Gon Lee and Jin-Heung Lee, A Blockchain-Based OCF Firmware Update for IoT Devices, Journal of Applied Science, 2020, 10, 6744; doi:10.3390/app10196744.
  • Saraju P. Mohanty, Proof of Authentication: IoT-Friendly Blockchains, Article in IEEE Potentials · January 2019, DOI: 10.1109/MPOT.2018.2850541.
  • Aymen Boudguiga, Nabil Bouzerna, Louis Granboulan, Alexis Olivereau, Flavien Quesnel, Anthony Roger, Renaud Sirdey, Towards Better Availability and Accountability for IoT Updates by means of a Blockchain, IEEE Security & Privacy on the Blockchain (IEEE S&B 2017) an IEEE EuroS&P 2017 and Eurocrypt 2017 affiliated workshop, IEEE, Apr 2017, Paris, France. hal-01516350
  • Jonathan Bell, Thomas D. LaToza, Foteini Baldmitsi and Angelos Stavrou, 2017 IEEE/ACM 12th International Workshop on Software Engineering for Science (SE4Science).
  • Tanweer Alam, Blockchain and its Role in the Internet of Things (IoT), International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 151-157, 2019.
  • Liangqin Gong, Daniyal M. Alghazzawi and Li Cheng, BCoT Sentry: A Blockchain-Based Identity Authentication Framework for IoT Devices, Information 2021, 12, 203.
  • Alfonso Panarello * ID, Nachiket Tapas ID, Giovanni Merlino ID, Francesco Longo ID and Antonio Puliafito, Blockchain and IoT Integration: A Systematic Survey, Sensors 2018, 18, 2575; doi:10.3390/s18082575.
  • Nidhi Agarwal, Framework for Integration of Blockchain with IoT Devices, Mphasis.
  • K. Christidis, M. Devetsiokiotis, Blockchains and Smart Contracts for the IoT, Digital Object Identifier 10.1109/ACCESS.2016.2566339.
  • Nafiz Al Asad; Md. Tausif Elahi; Abdullah Al Hasan; Mohammad Abu Yousuf, Permission-Based Blockchain with Proof of Authority for Secured Healthcare Data Sharing, 2020 2nd International Conference on Advanced Information and Communication Technology (ICAICT)
  • Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui, Xiong, Student Dusit Niyato, Ping Wang, Yonggang, Wen, and Dong In Kim, A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks, IEEE Access (Volume: 7)
  • John D. Blischak, Emily R. Davenport, Greg Wilson, A Quick Introduction to Version Control with Git and GitHub, PLOS Computational Biology
  • Ismail Butun, Patrik ¨Osterberg, and Houbing Song, Security of the Internet of Things: Vulnerabilities, Attacks and Countermeasures, IEEE Communications Surveys & Tutorials 22(1):616-644, 2019
  • Miao Yu, Jianwei Zhuge, Ming Cao, Zhiwei Shi and Lin Jiang, A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices, Future Internet 2019, 12, 27; doi:10.3390/fi12020027.

Subjects

ISSN: 2249-8958 (Online)
https://portal.issn.org/resource/ISSN/2249-8958#
Retrieval Number: 100.1/ijeat.B32971211221
https://www.ijeat.org/portfolio-item/B32971211221/
Journal Website: www.ijeat.org
https://www.ijeat.org
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org