Design of firmware upgrade algorithm for HINOC system
-
摘要: 高性能同轴网络(HINOC,High performance Network Over Coax)是面向下一代广播电视网的同轴电缆接入新技术,是实现模拟电视系统双向数字改造以及广播电视三网融合战略的关键技术之一.HINOC系统中的嵌入式设备HB(HINOC Bridge)与HM(HINOC Modem)需要通过在线升级实现软件版本的不断更新.针对目前一般的软件在线升级系统中普遍存在的整体加密传输效率低、硬件失效缺乏保护等问题,本升级系统设计在文件的传输和文件烧写的基本步骤上引入了文件差分编码解码、文件校验与加密解密以及异常保护机制.实际测试结果显示,升级系统能够满足HINOC系统在效率、安全性和可靠性方面的要求,保证了嵌入式系统的信息安全以及嵌入式设备在异常情况下的稳定工作.Abstract: High performance network over coax (HINOC) is a new technology of coaxial cable access, used for next generation broadcasting network. It can be used in triple play and the two-way cable TV network of digital and upgrade. The system is made up of HINOC bridge (HB) and HINOC modem (HM). In order to improve software function, it is necessary to update embedded software. File transmission and FLASH ROM program are basic processes in upgrades. In consideration of problems existed in widely used upgrades system such as low efficiency of encryption transmission and the lack protection for hardware failures, the system design introduced mechanisms such as coding and decoding of delta information, cryptography, file verification, and abnormal protection. According to the experimental results, the design meets requirements of HINOC in terms of efficiency, security and reliability. Information safety can be effectively protected, and the embedded devices can maintain basic function when abnormal problems happen.
-
[1] GY/T 265—2012 NGB宽带接主系统 HINOC传输和媒质接入控制技术规范[S] GY/T 265—2012 NGB broadband access system-technical specification of HINOC physical layer and media access control protocol[S](in Chinese) [2] 欧阳锋,崔竞飞, 赵玉萍,等.HINOC同轴电缆接入系统技术方案[J].广播与电视技术,2011,38(10):34-38 Ouyang Feng,Cui Jingfei,Zhao Yuping,et al.Technology of high performance network over coax[J].Radio & TV Broadcast Engineering,2011,38(10):34-38(in Chinese) [3] Cui W W, Duan X H,Yuan W,et al.Design and implementation of HINOC network management system based on SNMP[C]//Signal Processing, Communication and Computing(ICSPCC).Washington,D C:IEEE Computer Society,2012:527-532 [4] 陈璐,钟声. 网络文件传输方法和系统:中国,102420822[P].2012-04-28 Chen Lu,Zhong Sheng.Transfer method and system of network file:China,102420822[P].2012-04-28(in Chinese) [5] David A. Security enhanced firmware update procedures in embedded systems[D].Linköping:Linköping University,2008 [6] Andrew C. Secure firmware update:US,2006143600[P].2006-07-06 [7] Ryozo K, Mariko K,Satoshi M,et al.A delta representation scheme for updating between versions of mobile phone software[J].Electronics and Communications in Japan,2007,90(7): 2637 [8] 王广辉. 嵌入式固件远程升级技术的研究与实现[D].成都:电子科技大学,2011 Wang Guanghui.Design and implementation of remote upgrades based on embedded device[D].Chengdu:University of Electronic Science and Technology of China,2011(in Chinese) [9] 张绍兰. 几类密码Hash函数的设计与安全性分析[D].北京:北京邮电大学,2011 Zhang Shaolan.Design and security analysis on several cryptography hash functions[D].Beijing:Beijing University of Posts and Telecommunications,2011(in Chinese) [10] 梁杰. MD5-Hash函数的安全性分析[D].上海:上海交通大学,2007 Liang Jie.Security analysis of Hash function MD5[D].Shanghai:Shanghai Jiao Tong University,2007(in Chinese) [11] Putri Ratna A A, Dewi Purnamasari P,Shaugi A,et al.Analysis and comparison of MD5 and SHA-1 algorithm implementation in simple-O authentication based security system[C]//2013 International Conference on Quality in Research,QiR 2013-In Conjunction with ICCS 2013:The 2nd International Conference on Civic Space.Washington,D C:IEEE Computer Society,2013:99-104 [12] Järvinen K, Tommiska M,Skyttä J.Hardware implementation analysis of the MD5 hash algorithm[C]//Proceedings of the Annual Hawaii International Conference on System Sciences.Washington,D C:IEEE Computer Society,2005:298 [13] Ramesh A, Suruliandi A.Performance analysis of encryption algorithms for information security[C]//Proceedings of IEEE International Conference on Circuit,Power and Computing Technologies,ICCPCT 2013.Washington,D C:IEEE Computer Society,2013:840-844 [14] Stallings W, Brown L.Computer security principles and practice[M].2nd ed.Upper Saddle River,New Jersey:Prentice Hall,2011:71-101 [15] Wu X H, Zhou Y P.Analysis of data encryption algorithm based on WEB[C]//ICCET 2010-2010 International Conference on Computer Engineering and Technology,Proceedings.Piscataway,NJ:IEEE Computer Society,2010,7:673-677
点击查看大图
计量
- 文章访问数: 892
- HTML全文浏览量: 170
- PDF下载量: 617
- 被引次数: 0