Volume 40 Issue 10
Oct.  2014
Turn off MathJax
Article Contents
Cui Jingfei, Wang Jinlin, Zhang Zhenet al. Design of firmware upgrade algorithm for HINOC system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2014, 40(10): 1355-1360. doi: 10.13700/j.bh.1001-5965.2013.0667(in Chinese)
Citation: Cui Jingfei, Wang Jinlin, Zhang Zhenet al. Design of firmware upgrade algorithm for HINOC system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2014, 40(10): 1355-1360. doi: 10.13700/j.bh.1001-5965.2013.0667(in Chinese)

Design of firmware upgrade algorithm for HINOC system

doi: 10.13700/j.bh.1001-5965.2013.0667
  • Received Date: 19 Nov 2013
  • Publish Date: 20 Oct 2014
  • High performance network over coax (HINOC) is a new technology of coaxial cable access, used for next generation broadcasting network. It can be used in triple play and the two-way cable TV network of digital and upgrade. The system is made up of HINOC bridge (HB) and HINOC modem (HM). In order to improve software function, it is necessary to update embedded software. File transmission and FLASH ROM program are basic processes in upgrades. In consideration of problems existed in widely used upgrades system such as low efficiency of encryption transmission and the lack protection for hardware failures, the system design introduced mechanisms such as coding and decoding of delta information, cryptography, file verification, and abnormal protection. According to the experimental results, the design meets requirements of HINOC in terms of efficiency, security and reliability. Information safety can be effectively protected, and the embedded devices can maintain basic function when abnormal problems happen.

     

  • loading
  • [1]
    GY/T 265—2012 NGB宽带接主系统 HINOC传输和媒质接入控制技术规范[S] GY/T 265—2012 NGB broadband access system-technical specification of HINOC physical layer and media access control protocol[S](in Chinese)
    [2]
    欧阳锋,崔竞飞, 赵玉萍,等.HINOC同轴电缆接入系统技术方案[J].广播与电视技术,2011,38(10):34-38 Ouyang Feng,Cui Jingfei,Zhao Yuping,et al.Technology of high performance network over coax[J].Radio & TV Broadcast Engineering,2011,38(10):34-38(in Chinese)
    [3]
    Cui W W, Duan X H,Yuan W,et al.Design and implementation of HINOC network management system based on SNMP[C]//Signal Processing, Communication and Computing(ICSPCC).Washington,D C:IEEE Computer Society,2012:527-532
    [4]
    陈璐,钟声. 网络文件传输方法和系统:中国,102420822[P].2012-04-28 Chen Lu,Zhong Sheng.Transfer method and system of network file:China,102420822[P].2012-04-28(in Chinese)
    [5]
    David A. Security enhanced firmware update procedures in embedded systems[D].Linköping:Linköping University,2008
    [6]
    Andrew C. Secure firmware update:US,2006143600[P].2006-07-06
    [7]
    Ryozo K, Mariko K,Satoshi M,et al.A delta representation scheme for updating between versions of mobile phone software[J].Electronics and Communications in Japan,2007,90(7): 2637
    [8]
    王广辉. 嵌入式固件远程升级技术的研究与实现[D].成都:电子科技大学,2011 Wang Guanghui.Design and implementation of remote upgrades based on embedded device[D].Chengdu:University of Electronic Science and Technology of China,2011(in Chinese)
    [9]
    张绍兰. 几类密码Hash函数的设计与安全性分析[D].北京:北京邮电大学,2011 Zhang Shaolan.Design and security analysis on several cryptography hash functions[D].Beijing:Beijing University of Posts and Telecommunications,2011(in Chinese)
    [10]
    梁杰. MD5-Hash函数的安全性分析[D].上海:上海交通大学,2007 Liang Jie.Security analysis of Hash function MD5[D].Shanghai:Shanghai Jiao Tong University,2007(in Chinese)
    [11]
    Putri Ratna A A, Dewi Purnamasari P,Shaugi A,et al.Analysis and comparison of MD5 and SHA-1 algorithm implementation in simple-O authentication based security system[C]//2013 International Conference on Quality in Research,QiR 2013-In Conjunction with ICCS 2013:The 2nd International Conference on Civic Space.Washington,D C:IEEE Computer Society,2013:99-104
    [12]
    Järvinen K, Tommiska M,Skyttä J.Hardware implementation analysis of the MD5 hash algorithm[C]//Proceedings of the Annual Hawaii International Conference on System Sciences.Washington,D C:IEEE Computer Society,2005:298
    [13]
    Ramesh A, Suruliandi A.Performance analysis of encryption algorithms for information security[C]//Proceedings of IEEE International Conference on Circuit,Power and Computing Technologies,ICCPCT 2013.Washington,D C:IEEE Computer Society,2013:840-844
    [14]
    Stallings W, Brown L.Computer security principles and practice[M].2nd ed.Upper Saddle River,New Jersey:Prentice Hall,2011:71-101
    [15]
    Wu X H, Zhou Y P.Analysis of data encryption algorithm based on WEB[C]//ICCET 2010-2010 International Conference on Computer Engineering and Technology,Proceedings.Piscataway,NJ:IEEE Computer Society,2010,7:673-677

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(920) PDF downloads(617) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return