Become a leader in the IoT community!
Join our community of embedded and IoT practitioners to contribute experience, learn new skills and collaborate with other developers with complementary skillsets.
Join our community of embedded and IoT practitioners to contribute experience, learn new skills and collaborate with other developers with complementary skillsets.
I’m developing an IoT device using SIM7080G cellular chip and ESP32-C3. With the rise of IoT attacks and vulnerabilities, I want to ensure my device is fortified against unauthorized access, data breaches etc
What will be the most effective techniques for securing the Firmware Upgrade Over-The-Air (FOTA) in my IoT device, to prevent potential security threats and ensure the integrity of my device and data?
@IoT Cloud @PCB & Analog
Securing the FOTA connection itself? That’s going to be handled by the network mostly, no?
If you’re talking about physical security, blow pins and add a firmware/hardware tpm
Yes,
FOTA updates ensure only trusted and verified updates are installed, protecting the device, data, and network.
Wanted to get a step by step guide or what to do. @marveeamasi @superbike_z any thoughts on this
Hmmm yeah but like Brandon, I wanna make sure you I understand you. Are you looking to secure how you are doing the FOTA like the network link itself or are you thinking about on device security?
If you are looking at ensuring the FOTA update itself is secure, then you would need to look into signing the update and then only doing the update if the signature is good. Even better is having a TPM (Trusted Platform Module) to store the keys on your IoT deivice.
CONTRIBUTE TO THIS THREAD