Advertisement

Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware

  • Wencong Han
  • Quanxin Zhang
  • Chongzhi Gao
  • Jingjing Hu
  • Fang Yan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11337)

Abstract

At present, smart watches are loved by users because of their convenience, high efficiency, aesthetics and practicality. Smart watches interconnect with matching smart phones instead of working individually to achieve their maximum functionality. The wireless network interface serves as an interconnection bridge between smart watches and smart phones to realize application data exchange, which introduces a risk to personal security and privacy. Therefore, improving Wi-Fi firmware security is very important. To boost the security of the wearable device, we propose a security upgrade and replacement scheme of the Wi-Fi firmware by expanding the security function of the Wi-Fi watch firmware and a reliable replacement method, which can effectively improve the security of the smart watch. We implement firmware switching and recovery at the kernel level. Data encryption module is added to the firmware to enhance data interaction security. Experiments show that our approach improves robustness of Wi-Fi firmware upgrade and data interaction security while guarantees the ordinary functionality of the Wi-Fi module.

Keywords

Smart watch Upgrade Wi-Fi firmware Tizen OS Decompile 

Notes

Acknowledgement

This work was supported by Guangzhou scholars project for universities of Guangzhou (No. 1201561613).

References

  1. 1.
    Do, Q., Martini, B., Choo, K.K.R.: Is the data on your wearable device secure? An Android Wear smartwatch case study. Softw. Pract. Exp. 47(3), 391–403 (2017)CrossRefGoogle Scholar
  2. 2.
    Moynihan, T.: Hands-on: Samsung’s gear S2 classic may be the first great smartwatch (2015)Google Scholar
  3. 3.
    Gadyatskaya, O., Massacci, F., Zhauniarovich, Y.: Security in the Firefox OS and Tizen mobile platforms. Computer 47(6), 57–63 (2014)CrossRefGoogle Scholar
  4. 4.
    Tan, Y.A., Xue, Y., Liang, C., et al.: A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107, 69–82 (2018)CrossRefGoogle Scholar
  5. 5.
    Chung, C.: Baseboard management controller and method of loading firmware (2017)Google Scholar
  6. 6.
    Schulz, M., Wegemer, D., Hollick, M.: DEMO: using NexMon, the C-based Wi-Fi firmware modification framework. In: ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 213–215. ACM (2016)Google Scholar
  7. 7.
    Raleigh, J.: Bin hook (2012)Google Scholar
  8. 8.
    Debates, S.P., et al.: Contextually updating wireless device firmware. US9307067 (2016)Google Scholar
  9. 9.
    Dai, S., Wang, H.: Design and implementation of an embedded web server based on ARM-Linux (2010)Google Scholar
  10. 10.
    Schulz, M., Wegemer, D., Hollick, M.: NexMon: a cookbook for firmware modifications on smartphones to enable monitor mode (2015)Google Scholar
  11. 11.
    Xiao-Hui, W.: The establishment of ARM-linux based cross-compiler environment. Comput. Knowl. Technol. 15, 106 (2007)Google Scholar
  12. 12.
    Srinivasan, V., et al.: Energy-aware task and interrupt management in Linux. In: Ottawa Linux Symposium (2008)Google Scholar
  13. 13.
    Narayanaswami, C., Raghunath, M.T.: Application design for a smart watch with a high resolution display. In: International Symposium on Wearable Computers, pp. 7–14. IEEE (2000)Google Scholar
  14. 14.
    Jaygarl, H., et al.: Professional Tizen Application Development (2014)Google Scholar
  15. 15.
    Zhang, X., Tan, Y.A., Xue, Y., et al.: Cryptographic key protection against FROST for mobile devices. Cluster Comput. 20(3), 1–10 (2017)Google Scholar
  16. 16.
    Zhong-Hua, M.A., et al.: Research on data sharing technology based on FTP protocol. Earthquake 3, 012 (2008)Google Scholar
  17. 17.
    Kim, H.S., Seo, J.S., Seo, J.: Development of a smart wearable device for human activity and biometric data measurement. Int. J. Control Autom. 8, 45–52 (2015)Google Scholar
  18. 18.
    Lee, S., Chou, V.Y., Lin, J.H.: Wireless data communications using FIFO for synchronization memory. US, US 6650880 B1 (2003)Google Scholar
  19. 19.
    Dey, H., Roy, U.K.: Performance analysis of encrypted data files by improved RC4 (IRC4) and original RC4. In: Satapathy, S.C., Bhateja, V., Raju, K.Srujan, Janakiramaiah, B. (eds.) Data Engineering and Intelligent Computing. AISC, vol. 542, pp. 513–519. Springer, Singapore (2018).  https://doi.org/10.1007/978-981-10-3223-3_50CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Wencong Han
    • 1
  • Quanxin Zhang
    • 1
  • Chongzhi Gao
    • 3
  • Jingjing Hu
    • 1
  • Fang Yan
    • 2
  1. 1.School of Computer Science and TechnologyBeijing Institute of TechnologyBeijingChina
  2. 2.School of InformationBeijing Wuzi UniversityBeijingChina
  3. 3.School of Computer ScienceGuangzhou UniversityGuangzhouChina

Personalised recommendations