Secure FOTA Update for Connected Devices
Typically, the firmware to be updated can be downloaded on to the device online directly or in an offline mechanism using USB pen drives or from local servers. With a minimal effort, it is possible to fake the source and download a malicious firmware on to the target. As a first and foremost process, the device must ensure the authenticity of the downloaded firmware. Our Secure FOTA designs leverage the mathematical strengths of asymmetric cryptographic algorithms to validate the firmware. The firmware image to be updated is signed with a private key that is securely stored & authenticated by the public key in the devices. With our Secure boot designs, the chain of trust is established right from the first code executed, thereby preventing any possibility of modifying the public key. In this way, it is impossible for a third party to spoof the image.
We have also developed numerous mechanisms to securely deliver the firmware to the target. In some cases, we have encrypted the image using symmetric cryptographic algorithms such as AES, to prevent possible reverse engineering of binaries. We have also helped setting up PKI infrastructure for our customers to manage their updates easily & integrate as a part of their Dev Ops system.