hi Jussi,
Sorry for the late reply.
This is for replicator UAV/UGV. I have shown some of the components in the attached diagram and it's not exhaustive. Also many of these components may have different vendors. So the firmware schedule can't be uniform, the ESCs are supplied by one vendor, the BMS and flight controller may be from NXP. The ESC has a unsecured headless bootloader whereas NXP components may have a secure element (edgeLock SE050). The communication components from Doodlelabs.com may have completely different mechanisms.
Currently, I am using UAVCAN v1(Cyphal), which abstracts the communication layer, so the hardware may use CAN/Serial/Ethernet/TSN/Wireless, Cyphal being an abstract layer, and it works seamlessly with minimal changes if the hardware is changed. Likewise, I am wondering if TUF offers any such abstraction leading to managing firmware updates in UAVs. There needs to be a firmware update management module. This module would handle downloading firmware compliant updates from a TUF compliant repository, verifying the cryptographic signatures and metadata provided by TUF and then applying updates securely.
Since, ESC and the flight controller have a RTOS and the onboard computer has a linux OS. So where can I have the firmware update management module and human intervention should happen at which level? There can be 100s or 1000s or replicator UAV/UGV? Human intervention at individual UAV/UGV level is not feasible.
Thanks.
suvasis