Advantages of OTA
Cost saving
Time saving (issues spotted to fixed, frequency of updates)
Higher customer satisfaction
Increase values (devices and manufacturer revenue)
General Update Process
Packing: Develop → Pack → Sign
Delivery: Send/receive (encrypted or not)
Authentication: Check signature
Attestation: Send signed info
OTA Update Security Concerns
Software/firmware update packages: tampering, replay, IP
disclosure.
Installed software: tampering, blocking.
Hardware: Tampering
Users: Privacy, Safety.
Cloud server (Backend): Availability.
OTA Update Challenges
Hardware limitation
Connectivity and Reachability
Complex software distribution
Attacker model
Possible actions that attackers can do:
Intercept communication either between the devices and the update servers.
Modify the content of messages on these communication channels.
Inject malicious software into devices/components.
Obtain/Modify cryptographic keys stored on devices or update servers.
OTA update approaches
Symmetric encryption
Hash function
Asymmetric key
Hardware security module
Secure update framework
Symmetric encryption: Pros and Cons
Pros:
Efficient and fast execution
Secure link
Cons
High bandwidth
Limited scalability
Hash Function: Pros and Cons
Pros:
Efficient and fast execution
Scalable
Cons
High memory
DoS attack
Hardware Security Module: Pros and Cons
Pros:
Physical security
Secure execution
Cons
High cost