
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Devices相关文章列表 &#8211; Birlho Electro Parts Co., Ltd</title>
	<atom:link href="https://www.brilhoelectroparts.com/tag/devices/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.brilhoelectroparts.com</link>
	<description></description>
	<lastBuildDate>Tue, 24 Jun 2025 10:24:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.brilhoelectroparts.com/wp-content/uploads/2025/06/cropped-ficon-120x120.png</url>
	<title>Devices相关文章列表 &#8211; Birlho Electro Parts Co., Ltd</title>
	<link>https://www.brilhoelectroparts.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Secure Firmware Updates for LPWAN Devices</title>
		<link>https://www.brilhoelectroparts.com/secure-firmware-updates-for-lpwan-devices/</link>
		
		<dc:creator><![CDATA[Briltech]]></dc:creator>
		<pubDate>Tue, 03 Jun 2025 09:32:34 +0000</pubDate>
				<category><![CDATA[Success Case]]></category>
		<category><![CDATA[Devices]]></category>
		<category><![CDATA[Firmware]]></category>
		<category><![CDATA[Secure]]></category>
		<guid isPermaLink="false">http://br.object-c.cn/?p=4788</guid>

					<description><![CDATA[Introduction The IoT security market will reach&#160;$84 billion by 2028&#160;(Grand View Research), yet 62% of deployed devices lack proper update]]></description>
										<content:encoded><![CDATA[<h2 class="wp-block-heading"><strong>Introduction</strong></h2><p>The IoT security market will reach&nbsp;<strong>$84 billion by 2028</strong>&nbsp;(Grand View Research), yet 62% of deployed devices lack proper update mechanisms (2024 Palo Alto Networks threat report). Critical challenges include:</p><ul class="wp-block-list"><li><strong>50% longer update times</strong> from encryption overhead</li>

<li><strong>Bricking risks during power failures</strong></li>

<li><strong>Malicious payload injection</strong> through RF side-channels</li></ul><p>Briltech&#8217;s security lab has audited 40+ OTA implementations to develop this hardened framework.</p><hr class="wp-block-separator has-alpha-channel-opacity"/><h2 class="wp-block-heading"><strong>Section 1: Cryptography for Constrained Devices</strong></h2><h3 class="wp-block-heading"><strong>1.1 Algorithm Performance Comparison</strong></h3><figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Method</th><th>Code Size (KB)</th><th>RAM (KB)</th><th>Update Time*</th></tr></thead><tbody><tr><td>AES-128</td><td>3.2</td><td>0.5</td><td>1.0x</td></tr><tr><td>ChaCha20</td><td>4.1</td><td>0.8</td><td>1.2x</td></tr><tr><td>ECC P-256</td><td>8.7</td><td>2.4</td><td>3.5x</td></tr></tbody></table></figure><p>*For 100KB image @ 50kbps</p><p><strong>Case Study:</strong>&nbsp;Our dual-crypto approach in smart meters:</p><ul class="wp-block-list"><li><strong>AES-128 for bulk encryption</strong> (fast)</li>

<li><strong>ECC-256 for signatures</strong> (strong)</li></ul><h3 class="wp-block-heading"><strong>1.2 Secure Boot Implementation</strong></h3><pre class="wp-block-preformatted">void verify_update() {  
  if (sha3_256(firmware) != stored_hash) abort();  
  if (ecdsa_verify(sig, pubkey) == 0) abort();  
  flash_write(backup_sector); <em>// Atomic switch  </em>
}  </pre><hr class="wp-block-separator has-alpha-channel-opacity"/><h2 class="wp-block-heading"><strong>Section 2: Update Reliability Engineering</strong></h2><h3 class="wp-block-heading"><strong>2.1 Power-Failure Protection</strong></h3><figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Strategy</th><th>Overhead</th><th>Recovery Capability</th></tr></thead><tbody><tr><td>Dual Bank</td><td>+100% Flash</td><td>Full rollback</td></tr><tr><td>Delta Updates</td><td>30% smaller</td><td>Partial recovery</td></tr><tr><td>CRC-32 Checks</td><td>2% CPU</td><td>Detection only</td></tr></tbody></table></figure><p><strong>Briltech Recommendation:</strong></p><ul class="wp-block-list"><li><strong>256KB minimum flash</strong> for dual-bank updates</li>

<li><strong>Supercap backup</strong> (holds 500ms during brownout)</li></ul><h3 class="wp-block-heading"><strong>2.2 Bandwidth Optimization</strong></h3><ul class="wp-block-list"><li><strong>BSDiff binary patching</strong> (85% smaller updates)</li>

<li><strong>Compressed headers</strong> (CBOR encoding)</li>

<li><strong>Selective module updates</strong></li></ul><hr class="wp-block-separator has-alpha-channel-opacity"/><h2 class="wp-block-heading"><strong>Section 3: Attack Surface Mitigation</strong></h2><h3 class="wp-block-heading"><strong>3.1 Common Vulnerability Checklist</strong></h3><ol start="1" class="wp-block-list"><li><strong>Downgrade attacks</strong> (store version in secure element)</li>

<li><strong>Replay attacks</strong> (monotonic counters + 24h timeout)</li>

<li><strong>Timing attacks</strong> (constant-time crypto ops)</li></ol><h3 class="wp-block-heading"><strong>3.2 Regulatory Compliance</strong></h3><ul class="wp-block-list"><li><strong>ETSI TS 103 645</strong> (IoT baseline security)</li>

<li><strong>NIST IR 8259A</strong> (core cybersecurity features)</li>

<li><strong>GDPR Article 32</strong> (data integrity requirements)</li></ul>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
