REMOTE SOTA ALGORITHM FOR NB-IOT WIRELESS SENSORS – IMPLEMENTATION AND RESULTS
Piotr Szydłowski
piotr.szydlowski@efento.plEfento sp. z o.o., Cracow, Poland (Poland)
Karol Zaręba
Efento sp. z o.o., Cracow, Poland (Poland)
Abstract
In this paper we share our experience with remote software updates for NB-IoT devices. The experience was collected over the years, when managing a fleet of tens of thousands of NB-IoT wireless sensors deployed worldwide by our customers. The paper discusses the main concerns that must be taken into account when designing the remote software over the air (SOTA) update mechanism, describes the remote update algorithm developed and used by us and presents the achieved experimental results based on remote software update of 5 000 NB-IoT sensors deployed in 10 European countries.
Keywords:
Internet of Things, wireless sensors, NB-IoT, software over the airReferences
Greenberg A.: Hackers Remotely Kill a Jeep on the Highway, With Me in It. [http://www.wired.com] (21.07.2015).
Google Scholar
Khan S. M. Z.: Narrowband Internet of Things (NB-IoT): from Radio Network Coverage to Device Energy Consumption Modeling and Energy-Efficient Application. Tallinn University of Technology [http://doi.org/10.23658/TALTECH.7/2022].
Google Scholar
Klinedinst D., King C.: On Board Diagnostics: Risks and Vulnerabilities of the Connected Vehicle. Software Engineering Institute, Carnegie Mellon University, 2016.
Google Scholar
Moran B. et al.: A Firmware Update Architecture for Internet of Things. RFC 9019. Internet Engineering Task Force, April 2021.
DOI: https://doi.org/10.17487/RFC9019
Google Scholar
Moran B. et al.: A Manifest Information Model for Firmware Updates in IoT Devices. RFC 9124. Internet Engineering Task Force, 2021.
DOI: https://doi.org/10.17487/RFC9124
Google Scholar
OMA SpecWorks, OMA LightweightM2M (LwM2M) Object and Resource Registry, 2023.
Google Scholar
OWASP IoT Security Team, OWASP Internet of Things Top10, 2018.
Google Scholar
Sinha S.: State of IoT 2023: Number of connected IoT devices growing 16% to 16.7 billion globally, IoT Analytics, May 24, 2023.
Google Scholar
Standards for Efficient Cryptography, Certicom Research, SEC 1: Elliptic Curve Cryptography, 2009.
Google Scholar
Tu T. F. et al.: A comprehensive study of Mozi botnet. International Journal of Intelligent Systems 37, 2022, 6877–6908 [http://doi.org/10.1002/int.22866].
DOI: https://doi.org/10.1002/int.22866
Google Scholar
Vanstone S. A.: Responses to NISTs Proposal. Communications of the ACM 35(7), 1992, 50–52.
DOI: https://doi.org/10.1145/129902.129905
Google Scholar
Zandberg K. et al.: Secure Firmware Updates for Constrained IoT Devices Using Open Standards: A Reality Check. IEEE Access 7, 2019, 71907–71920 [http://doi.org/10.1109/ACCESS.2019.2919760].
DOI: https://doi.org/10.1109/ACCESS.2019.2919760
Google Scholar
Authors
Karol ZarębaEfento sp. z o.o., Cracow, Poland Poland
Statistics
Abstract views: 78PDF downloads: 89
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.