Skip to content

DeviceBoard – Secure Device Firmware Update (SDFU) User Guide

DeviceBoard – Secure Device Firmware Update (SDFU) User Guide

DeviceBoard – Secure Device Firmware Update (SDFU) User Guide

Version: 1.0

Audience: Hub Admins, Device Engineers, Firmware Developers, Operations Teams

Purpose: Learn how to securely upload, distribute, schedule, and manage firmware updates for IoT devices connected to DeviceBoard.

1. Introduction to Secure Device Firmware Update (SDFU)

Secure Device Firmware Update (SDFU) in DeviceBoard provides a reliable, encrypted, and controlled method to update device firmware across your IoT fleet. It ensures that only authenticated devices receive authorized firmware files and that update processes remain tamper-proof.

Key Capabilities

  • Secure firmware upload and storage
  • Version control & release management
  • Device compatibility checks
  • Targeted device group updates
  • Scheduled or immediate rollout
  • Hash verification and integrity checks
  • Optional cryptographic signing
  • Progress tracking and delivery monitoring
  • Automatic fallback and retry handling
  • Audit logging for compliance

2. How Secure Firmware Update Works in DeviceBoard

  1. Firmware File Upload
    Firmware is uploaded by the Hub Admin and stored securely.
  2. Metadata & Versioning Setup
    The Hub Admin defines version number, description, checksum, supported device models, etc.
  3. Assignment to Device / Device Group
    You choose which devices should receive the firmware.
  4. Update Delivery Method Selection
    • Immediate update
    • Scheduled update
    • Staged rollout (wave-based)
  5. Device Receives Firmware Package
    Device downloads the firmware via a secure channel (MQTT/HTTP/LwM2M/Gateway depending on model).
  6. Device Performs Verification
    • Firmware integrity (SHA checksum)
    • Firmware signature (if PKI is used)
  7. Device Applies Firmware
    Device installs the firmware and reboots if required.
  8. Device Confirms Update Completion
    DeviceBoard marks update as:
    • Success
    • Failed
    • In Progress
  9. Audit Log is Stored
    Every update action is logged for compliance and traceability.

3. Prerequisites for Secure Firmware Update

3.1 Device Requirements

  • Secure file download (HTTPS, MQTTS, LwM2M, etc.)
  • Flashing firmware from external sources
  • Reporting OTA progress codes
  • Integrity/Signature validation (recommended)

3.2 Platform Requirements

  • RBAC permission to access Firmware module
  • ABAC permission for update execution
  • Access to device groups

3.3 Firmware File Requirements

  • Correct binary format for device
  • Version metadata maintained by manufacturer
  • Optional cryptographic signature

4. Uploading and Registering Firmware in DeviceBoard

Step 1 — Navigate to Firmware Management

Menu → Devices → Firmware Repository

Step 2 — Click “Upload Firmware”

Start the upload process.

Step 3 — Fill in Firmware Metadata

  • Firmware Name: e.g., “PumpController v1.4.2”
  • Version: semantic versioning recommended (e.g., 1.4.2)
  • Supported Device Models: select one or more models
  • Description: purpose of update
  • Release Notes: optional but recommended

Step 4 — Upload Firmware Binary

  • .bin
  • .hex
  • .zip (for multi-file updates)
  • .elf
  • Custom archive formats

Step 5 — Provide Integrity Checksum

DeviceBoard requires a SHA-256 checksum for validation.
You can click “Auto-generate checksum” or paste an externally computed value.

Step 6 — (Optional) Upload Signature File

  • signature.sig
  • certificate.pem

Step 7 — Save Firmware Package

The firmware is now available in the repository.

5. Assigning Firmware to Devices

Method 1 — Update a Single Device

  1. Go to Devices → Select Device
  2. Open Firmware Update tab
  3. Click “Assign Firmware”
  4. Choose firmware version
  5. Click Update Now or schedule

Method 2 — Update Multiple Devices

Useful for updating:

  • Device Groups
  • Device Models
  • Large fleets

Steps:

  1. Go to Firmware Repository
  2. Select firmware
  3. Click “Distribute Update”
  4. Choose:
    • Device Model
    • Device Group
    • Asset Group
    • Manual device selection
  5. Choose rollout strategy
  6. Click Start Update

6. Rollout Strategies

DeviceBoard supports multiple delivery strategies.

6.1 Immediate Update

All selected devices receive the update at once.

Use when:

  • Fleet size is small
  • Firmware is critical
  • Downtime is acceptable

6.2 Scheduled Update

Define:

  • Date
  • Time
  • Time zone

Useful for enterprise clients who prefer non-working hours.

6.3 Staged Rollout (Wave-Based Deployment)

Example:

  • Wave 1: 10 devices
  • Wave 2: 50 devices
  • Wave 3: 500 devices

DeviceBoard supports:

  • Automatic progression based on success rate
  • Manual approval between phases
  • Automatic rollback if failure threshold is reached

7. Device-Side Firmware Update Flow

Once a firmware update is assigned:

  1. Device receives an update notification event
  2. Device downloads firmware from secure endpoint
  3. Device verifies checksum/signature
  4. Device installs firmware
  5. Device reboots (if required)
  6. Device sends update completion status back to DeviceBoard

DeviceBoard records steps in update logs.

8. Monitoring Firmware Update Progress

Navigate to:

Firmware Repository → Firmware → Update Status

You can monitor:

  • Update state (queued, delivering, verifying, installing, success, failed)
  • Device progress (%)
  • Update failures with reason:
    • Integrity check failed
    • Connectivity timeout
    • Device reboot error
    • Insufficient memory
    • Permission issue

The dashboard shows graphs for:

  • Success rate
  • Device group coverage
  • Failure distribution

9. Firmware Update Security Features

✔ Ensure firmware packages cannot be intercepted.

✔ Verify authenticity and prevent malware injection.

✔ Guarantees file integrity.

✔ Only authorized admins can push updates.

✔ Allows fine-grained controls like:

  • View-only
  • Update-only
  • Approve-only
  • Full lifecycle admin

✔ Devices authenticate before firmware download.

✔ Records:

  • Who triggered update
  • When
  • Update scope
  • Success/failure outcomes

10. Update Logs and Audit Trail

Every firmware update generates audit logs:

  • User who initiated update
  • Device(s) receiving update
  • Timestamp
  • Firmware version
  • Download status
  • Validation results
  • Final status

Logs are essential for:

  • Security audits
  • Warranty validations
  • Customer SLA compliance
  • Failure investigation

11. Handling Update Failures

DeviceBoard categorizes failures into:

Recoverable Failures

  • Network timeout
  • Device busy
  • Temporary offline
  • Partition lock

Auto-retries apply.

Critical Failures

  • Signature mismatch
  • Wrong firmware format
  • Storage full
  • Unsupported device model

These require manual intervention.

DeviceBoard allows:

  • Retry update
  • Assign alternative version
  • Exclude device from rollout

12. Best Practices for Secure Device Firmware Management

12.1 Always Use Checksum and Signatures
Ensures firmware authenticity.

12.2 Use Staged Rollouts for Large Fleets
Minimizes risk and downtime.

12.3 Maintain Clear Versioning Standards
Use semantic versioning: major.minor.patch

12.4 Do Not Overwrite Old Versions
Keep at least 2 previous firmwares available for rollback.

12.5 Test Firmware on a Pilot Group
Deploy to a test set of devices before fleet update.

12.6 Monitor Device Health Before Update
Prevent bricking unstable devices.

13. Troubleshooting Guide

Issue Possible Cause Solution
Device stuck in “Downloading” Poor connectivity Retry or schedule update during stable period
Update failed at validation Wrong checksum or signature Verify firmware package
Device not responding post-update Reboot failure or firmware crash Remote recovery or manual intervention
Device sees “Firmware Not Compatible” Wrong device model Reassign correct firmware
Update not starting ABAC permissions missing Update user role rights

14. Summary

DeviceBoard’s Secure Device Firmware Update system provides:

  • End-to-end secure firmware lifecycle
  • Controlled rollout strategies
  • Robust validation & verification
  • Device group and model-based targeting
  • Real-time monitoring and audit logs
  • Integration with Device Models & RulesFlow
  • Enterprise-grade safety and reliability

This ensures your IoT devices always run stable, secure, and up-to-date firmware with minimal operational risk.