Firmware upgradation of ARM7 through communication link: Via UART over CAN

Having Linux loaded on ARM9 Microcontroller, it can be used as a master in the communication with the other microcontrollers. The system which I have developed consists of ARM9 as a master, Two ARM7s as Slaves. The communication between ARM9-ARM7 is via UART over a CAN. ARM7 further communicates serially (RS232) with the peripheral nodes. A networked Embedded System has been developed wherein the serial data is brought over Ethernet. The ARM7 board, which is directly linked with the peripherals, can be modified of its functionality as and when required. The functionality of ARM7 can be modified by upgrading its firmware. To upgrade the firmware same communication link has been used. ARM7 receives the new firmware via same ARM9-ARM7 communication link. The Flash Write operation is performed using the source code to write the new firmware. Bootloader application for the ARM7 has been developed. The signature has been incorporated to assure authenticity of the new Firmware. Intel Hex File Format is used to parse the hex file.

[1]  Wu Xiaoping,et al.  Research on the Embedded Security Architecture Based on the Control Flow Security , 2009, 2009 Second International Workshop on Computer Science and Engineering.

[2]  Ming Zhang,et al.  Research and Design of Embedded Tank Car Monitoring System Based on ARM9 , 2009, 2009 Second International Symposium on Computational Intelligence and Design.

[3]  Russell Tessier,et al.  A security approach for off-chip memory in embedded microprocessor systems , 2009, Microprocess. Microsystems.

[4]  Lionel Torres,et al.  A parallelized way to provide data encryption and integrity checking on a processor-memory bus , 2006, 2006 43rd ACM/IEEE Design Automation Conference.

[5]  Ryan Kastner,et al.  Managing Security in FPGA-Based Embedded Systems , 2008, IEEE Design & Test of Computers.

[6]  Shaojun Jiang,et al.  Design of Embedded Network Interface Controller Based on ARM9 and ARMLinux , 2009 .

[7]  A. Annamalai,et al.  Data driven security alarm model for embedded applications , 2008, 2008 International Conference on Computing, Communication and Networking.

[8]  Ahmad-Reza Sadeghi,et al.  Reconfigurable trusted computing in hardware , 2007, STC '07.

[9]  Yogendra Shah,et al.  Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications , 2009, MobiSec.

[10]  Tilman Wolf,et al.  Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.