What will be the most effective techniques for securing the Firmware Upgrade Over-The-Air (FOTA)
I'm developing an IoT device using SIM7080G cellular chip and ESP32-C3. With the rise of IoT attacks and vulnerabilities, I want to ensure my device is fortified against unauthorized access, data breaches etc
What will be the most effective techniques for securing the Firmware Upgrade Over-The-Air (FOTA) in my IoT device, to prevent potential security threats and ensure the integrity of my device and data?
@IoT Cloud @PCB & Analog
5 Replies
Securing the FOTA connection itself? That's going to be handled by the network mostly, no?
If you're talking about physical security, blow pins and add a firmware/hardware tpm
Yes,
FOTA updates ensure only trusted and verified updates are installed, protecting the device, data, and network.
Wanted to get a step by step guide or what to do. @Marvee Amasi @ZacckOsiemo any thoughts on this
Hmmm yeah but like Brandon, I wanna make sure you I understand you. Are you looking to secure how you are doing the FOTA like the network link itself or are you thinking about on device security?
If you are looking at ensuring the FOTA update itself is secure, then you would need to look into signing the update and then only doing the update if the signature is good. Even better is having a TPM (Trusted Platform Module) to store the keys on your IoT deivice.