7 CONCLUSION
We have presented a novel approach for securely dis-
tributing SW updates over the Internet, to devices in
Industrial Control Systems (ICS). Our approach ad-
dresses several requirements provided by a real-world
ICS operator, and has the following benefits: it en-
ables the secure distribution of different types of SW
updates, originated by different types of authors; it
leaves the device operator in control of the update
process, even for third-party SW updates; it ensures
not only integrity and source authentication, but also
confidentiality of SW updates. Furthermore our ap-
proach builds on well established and adopted foun-
dations such as fine-grained authentication and secure
sessions. To the best of our knowledge, this is the
first approach for secure SW distribution that has all
these benefits. Future work will focus on the imple-
mentation and performance evaluation of a SW up-
date process based on our approach, considering real
ICS platforms as devices to update.
ACKNOWLEDGMENTS
This work was supported by the SSF project
Sec4Factory (grant RIT17-0032); by VINNOVA
through the Celtic-Next project CRITISEC; and by
the H2020 project SIFIS-Home (Grant agreement
952652). The authors would like to thank Arash
Vahidi for the helpful discussions and feedback.
REFERENCES
Ambrosin, M., Busold, C., Conti, M., Sadeghi, A.-R., and
Schunter, M. (2014). Updaticator: Updating billions
of devices by an efficient, scalable and secure software
update distribution over untrusted cache-enabled net-
works. In European Symposium on Research in Com-
puter Security, pages 76–93. Springer.
Arakadakis, K., Charalampidis, P., Makrogiannakis, A., and
Fragkiadakis, A. (2021). Firmware over-the-air pro-
gramming techniques for iot networks-a survey. ACM
Computing Surveys (CSUR), 54(9):1–36.
Asokan, N., Nyman, T., Rattanavipanon, N., Sadeghi, A.-
R., and Tsudik, G. (2018). ASSURED: Architecture
for Secure Software Update of Realistic Embedded
Devices. IEEE Transactions on Computer-Aided De-
sign of Integrated Circuits and Systems, 37(11):2290–
2300.
Birman, K. P. (2012). Guide to Reliable Distributed
Systems. Building High-Assurance Applications and
Cloud-Hosted Services. Springer.
Catuogno, L., Galdi, C., and Persiano, G. (2017). Secure
dependency enforcement in package management sys-
tems. IEEE Transactions on Dependable and Secure
Computing, 17(2):377–390.
Davidson, C. C., Andel, T., Yampolskiy, M., McDonald,
J. T., Glisson, B., and Thomas, T. (2018). On SCADA
PLC and Fieldbus Cyber-Security. In The Interna-
tional Conference on Cyber Warfare and Security.
Academic Conferences and Publishing International.
El Jaouhari, S. and Bouvet, E. (2022). Secure firmware
over-the-air updates for iot: Survey, challenges, and
discussions. Internet of Things, 18:100508.
Fassino, J. (2016). Secure Firmware Update in Schneider
Electric IOT-enabled offers. In Internet of Things Soft-
ware Update Workshop (IoTSU). Internet Architecture
Board (IAB).
Hardt, D. (2012). The OAuth 2.0 Authorization Frame-
work. RFC 6749 (Proposed Standard). Updated by
RFC 8252.
Hernández-Ramos, J. L., Baldini, G., Matheu, S. N., and
Skarmeta, A. (2020). Updating iot devices: challenges
and potential approaches. In 2020 Global Internet of
Things Summit (GIoTS), pages 1–5. IEEE.
IEC (2015). Security for industrial automation and control
systems – Part 2-3: Patch management in the IACS
environment. Technical Report IEC TR 62443-2-3,
International Electrotechnical Commission (IEC).
IETF (2022). SUIT - Software Updates for the Internet of
Things.
Moran, B., Tschofenig, H., and Birkholz, H. (2022). A
Manifest Information Model for Firmware Updates in
Internet of Things (IoT) Devices. RFC 9124.
Moran, B., Tschofenig, H., Brown, D., and Meriac, M.
(2021). A firmware update architecture for internet
of things. RFC 9019.
Mugarza, I., Flores, J. L., and Montero, J. L. (2020). Se-
curity issues and software updates management in
the industrial internet of things (iiot) era. Sensors,
20(24):7160.
Petrov, S. (2018). Patch Delivery Infrastructure in SCADA
Systems. Master’s thesis, KTH Royal School of Tech-
nology.
Rescorla, E. (2018). The Transport Layer Security (TLS)
Protocol Version 1.3. RFC 8446.
Rescorla, E., Tschofenig, H., and Modadugu, N. (2022).
The Datagram Transport Layer Security (DTLS) Pro-
tocol Version 1.3. RFC 9147.
Schaad, J. (2017). CBOR Object Signing and Encryption
(COSE). RFC 8152 (Proposed Standard).
Seitz, L., Selander, G., Wahlstroem, E., Erdtman, S., and
Tschofenig, H. (2022). Authentication and authoriza-
tion for constrained environments using the oauth 2.0
framework (ace-oauth). RFC 9200.
Selander, G., Mattsson, J. P., Palombini, F., and Seitz, L.
(2019). Object security for constrained restful envi-
ronments (oscore). RFC 8613.
Tschofenig, H. and Fossati, T. (2016). Transport layer secu-
rity (tls) / datagram transport layer security (dtls) pro-
files for the internet of things. RFC 7925 (Proposed
Standard).
Secure Software Updates for IoT Based on Industry Requirements
705