Skip to main content

Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11337))

  • 1912 Accesses

Abstract

At present, smart watches are loved by users because of their convenience, high efficiency, aesthetics and practicality. Smart watches interconnect with matching smart phones instead of working individually to achieve their maximum functionality. The wireless network interface serves as an interconnection bridge between smart watches and smart phones to realize application data exchange, which introduces a risk to personal security and privacy. Therefore, improving Wi-Fi firmware security is very important. To boost the security of the wearable device, we propose a security upgrade and replacement scheme of the Wi-Fi firmware by expanding the security function of the Wi-Fi watch firmware and a reliable replacement method, which can effectively improve the security of the smart watch. We implement firmware switching and recovery at the kernel level. Data encryption module is added to the firmware to enhance data interaction security. Experiments show that our approach improves robustness of Wi-Fi firmware upgrade and data interaction security while guarantees the ordinary functionality of the Wi-Fi module.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Do, Q., Martini, B., Choo, K.K.R.: Is the data on your wearable device secure? An Android Wear smartwatch case study. Softw. Pract. Exp. 47(3), 391–403 (2017)

    Article  Google Scholar 

  2. Moynihan, T.: Hands-on: Samsung’s gear S2 classic may be the first great smartwatch (2015)

    Google Scholar 

  3. Gadyatskaya, O., Massacci, F., Zhauniarovich, Y.: Security in the Firefox OS and Tizen mobile platforms. Computer 47(6), 57–63 (2014)

    Article  Google Scholar 

  4. Tan, Y.A., Xue, Y., Liang, C., et al.: A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107, 69–82 (2018)

    Article  Google Scholar 

  5. Chung, C.: Baseboard management controller and method of loading firmware (2017)

    Google Scholar 

  6. Schulz, M., Wegemer, D., Hollick, M.: DEMO: using NexMon, the C-based Wi-Fi firmware modification framework. In: ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 213–215. ACM (2016)

    Google Scholar 

  7. Raleigh, J.: Bin hook (2012)

    Google Scholar 

  8. Debates, S.P., et al.: Contextually updating wireless device firmware. US9307067 (2016)

    Google Scholar 

  9. Dai, S., Wang, H.: Design and implementation of an embedded web server based on ARM-Linux (2010)

    Google Scholar 

  10. Schulz, M., Wegemer, D., Hollick, M.: NexMon: a cookbook for firmware modifications on smartphones to enable monitor mode (2015)

    Google Scholar 

  11. Xiao-Hui, W.: The establishment of ARM-linux based cross-compiler environment. Comput. Knowl. Technol. 15, 106 (2007)

    Google Scholar 

  12. Srinivasan, V., et al.: Energy-aware task and interrupt management in Linux. In: Ottawa Linux Symposium (2008)

    Google Scholar 

  13. Narayanaswami, C., Raghunath, M.T.: Application design for a smart watch with a high resolution display. In: International Symposium on Wearable Computers, pp. 7–14. IEEE (2000)

    Google Scholar 

  14. Jaygarl, H., et al.: Professional Tizen Application Development (2014)

    Google Scholar 

  15. Zhang, X., Tan, Y.A., Xue, Y., et al.: Cryptographic key protection against FROST for mobile devices. Cluster Comput. 20(3), 1–10 (2017)

    Google Scholar 

  16. Zhong-Hua, M.A., et al.: Research on data sharing technology based on FTP protocol. Earthquake 3, 012 (2008)

    Google Scholar 

  17. Kim, H.S., Seo, J.S., Seo, J.: Development of a smart wearable device for human activity and biometric data measurement. Int. J. Control Autom. 8, 45–52 (2015)

    Google Scholar 

  18. Lee, S., Chou, V.Y., Lin, J.H.: Wireless data communications using FIFO for synchronization memory. US, US 6650880 B1 (2003)

    Google Scholar 

  19. Dey, H., Roy, U.K.: Performance analysis of encrypted data files by improved RC4 (IRC4) and original RC4. In: Satapathy, S.C., Bhateja, V., Raju, K.Srujan, Janakiramaiah, B. (eds.) Data Engineering and Intelligent Computing. AISC, vol. 542, pp. 513–519. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-3223-3_50

    Chapter  Google Scholar 

Download references

Acknowledgement

This work was supported by Guangzhou scholars project for universities of Guangzhou (No. 1201561613).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fang Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Han, W., Zhang, Q., Gao, C., Hu, J., Yan, F. (2018). Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware. In: Vaidya, J., Li, J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science(), vol 11337. Springer, Cham. https://doi.org/10.1007/978-3-030-05063-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05063-4_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05062-7

  • Online ISBN: 978-3-030-05063-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics