ping these useless steps induces significant energy
savings. Besides, the update server processes only 1
instead of n connections. For a fleet of 4 devices, al-
most 750 kB of useless data transfer is saved. These
energy and bandwidth savings evolve in O(n), so
the result is worth the messaging overhead. The sys-
tem adds 10 kB of code in FLASH, for a reference
firmware size of 237 kB (sensor management code,
MQTT, TLS and device drivers libraries) and no ex-
tra RAM budget is required.
5 CONCLUSION
In this paper, we studied a way to group IoT de-
vices to strengthen the security of the firmware up-
date procedure. The method establishes a common
cryptographic key, and uses it to group IoT nodes.
This technique requires no compute-intensive pro-
cessing and no specific provisioning of the devices.
The secure group concept is used to create a syn-
chronized firmware update procedure. Besides, this
system requires very few server interactions as being
fully based on a device to device approach. This prop-
erty brings additional autonomy and robustness bene-
fits.
In future work, a more efficient device to de-
vice communication could be exploited to improve
power consumption and server independence, by us-
ing Long Range Wide Area Network (LoRaWAN) or
Bluetooth Mesh networking. Last but not least, we
may refine the heuristics to improve the system effi-
ciency: guard periods, unreachable devices manage-
ment, power saving impact on procedures.
ACKNOWLEDGEMENTS
The authors would like to thank Julien Montmasson
(ST Microelectronics) and G
´
eraud Plagne (ST Micro-
electronics) for their valuable comments and sugges-
tions to improve this contribution. The authors would
also like to thank Eloise Cheval (ST Microelectron-
ics) for her thorough reviews of this paper.
REFERENCES
Adams, E. (2021). Protect your customers with a secure
iot updating process. https://blog.securityinnovation.
com/secure-iot-updating-process. Last checked on
Oct 05, 2022.
Bellare, M. and Namprempre, C. (2000). Authenticated en-
cryption: Relations among notions and analysis of the
generic composition paradigm. In Okamoto, T., ed-
itor, Advances in Cryptology — ASIACRYPT 2000,
pages 531–545, Berlin, Heidelberg. Springer Berlin
Heidelberg.
B.F. Spencer, J., Ruiz-Sandoval, M. E., and Kurata, N.
(2004). Smart sensing technology: Opportunities
and challenges. https://citeseerx.ist.psu.edu/viewdoc/
download?doi=10.1.1.88.3329&rep=rep1&type=pdf.
Last checked on Oct 05, 2022.
Carlier, M., Steenhaut, K., and Braeken, A. (2018).
Symmetric-key based security for multicast communi-
cation in wireless sensor networks. In 2018 4th Inter-
national Conference on Cloud Computing Technolo-
gies and Applications (Cloudtech).
Chen, C.-M., Deng, X., Gan, W., Chen, J., and Islam, S.
K. H. (2021). A secure blockchain-based group key
agreement protocol for iot. The Journal of Supercom-
puting, 77(8):9046–9068.
Choi, S. and Lee, J.-H. (2020). Blockchain-based dis-
tributed firmware update architecture for iot devices.
IEEE Access, 8:37518–37525.
Demeter, D., Preuss, M., and Yaroslav, S. (2019).
Iot: a malware story. https://securelist.com/
iot-a-malware-story/94451/. Last checked on Oct 05,
2022.
Driscoll, K. (2018). Lightweight crypto for lightweight un-
manned arial systems. In 2018 Integrated Communi-
cations, Navigation, Surveillance Conference (ICNS),
pages 1–15.
European Commission (2022). Cyber resilience act.
https://digital-strategy.ec.europa.eu/en/library/
cyber-resilience-act. Last checked on Oct 04, 2022.
Fukuda, T. and Omote, K. (2021). Efficient blockchain-
based iot firmware update considering distribution in-
centives. In 2021 IEEE Conference on Dependable
and Secure Computing (DSC), pages 1–8.
Gebremichael, T., Jennehag, U., and Gidlund, M. (2018).
Lightweight iot group key establishment scheme us-
ing one-way accumulator. In 2018 International Sym-
posium on Networks, Computers and Communica-
tions (ISNCC), pages 1–7.
Gervais-Ducouret, S. (2011). Next smart sensors genera-
tion. In 2011 IEEE Sensors Applications Symposium,
pages 193–196.
Guegan, L. and Anne-C
´
ecile, O. (2019). Estimating the
end-to-end energy consumption of low-bandwidth.
J.L.Hern
´
andez-Ramos, G.Baldini, S.N.Matheu, and
A.Skarmeta (2020). Updating iot devices: challenges
and potential approaches. In 2020 Global Internet of
Things Summit (GIoTS).
Johnston, S. J., Scott, M., and Cox, S. J. (2016). Recom-
mendations for securing internet of things devices us-
ing commodity hardware. In 2016 IEEE 3rd World Fo-
rum on Internet of Things (WF-IoT), pages 307–310.
Kambourakis, G., Kolias, C., and Stavrou, A. (2017). The
mirai botnet and the iot zombie armies. In MILCOM
2017-2017 IEEE Military Communications Confer-
ence (MILCOM), pages 267–272. IEEE.
Kelly, R. (2020). H.r.1668 - iot cybersecurity improve-
ment act of 2020. https://www.congress.gov/bill/
SHOID: A Secure Herd of IoT Devices Firmware Update Protocol
379