«ETSI TR 102 021-11 V1.1.1 (2011-07) Technical Report Terrestrial Trunked Radio (TETRA); User Requirement Specification TETRA Release 2.1; Part 11: Over ...»
• Modify and query channel parameters e.g. list of preferred channels or frequency range for initial cell selection, use of common secondary control channels.
• Modify and query SwMI addresses e.g. address of PSTN gateway, PABX gateway, Short Data Service Centre (SDSC).
• Modify and query Mobility Management parameters e.g. allowed networks (MNI), preferred location areas, subscriber classes, behaviour in cells with subscriber class mismatch.
• Modify and query security parameters e.g. provisioning of static cipher keys (SCK), mutual authentication, change of security class in DMO.
• Modify and query emergency call parameters e.g. destination address for emergency call and/or emergency status, call type, configuration of automatic transmission cycles after call setup.
• Modify and query parameters for short messages (SDS and Status) e.g. assignment of status text to status value, use of short-/standard report, text coding scheme.
• Modify and query Packet Data parameters e.g. access point name, protocol configuration options, authentication, static IP address.
• Modify and query Location Information parameters e.g. configuration of GPS receiver, provisioning of GPS
almanac data, configuration of LIP trigger, destination address for LIP messages:
EXAMPLE 4: Modify and query Direct Mode related parameters e.g. configuration of DMO groups, channels, key assignment, emergency call, DM timer, use of DM-REP or DM-GATE.
4.3 Firmware Over The Air (FOTA) Firmware Over The Air (FOTA) provides a way to update or patch the firmware of an MS remotely. FOTA updating technology can be used to deliver new features and services to customers and/or to solve problems in the field caused by a bug in the old firmware. The essence of FOTA is the ability to update the firmware on the MS in a safe, secure and fault tolerant way.
Due to bandwidth limitations, it is important to send just the updated, changed or added code; not the entire firmware package. There is no degradation in operational use when a firmware download occurs, the MS is fully operational.
During installation of the update the MS is maybe out of service for a maximum of a few minutes.
FOTA allows for MS firmware updates when the MS is already in customers hands. FOTA reduces support costs and increases consumer satisfaction by introducing a convenient method to distribute software improvements and new functionality.
Key features that should always be present in a FOTA solution are:
• The ability to suspend and resume an update.
• The MS user decides when the update will be installed.
• Once a firmware update has been installed, the MS should return to a usable state.
• The MS user and the FOTA server should receive a confirmation if the update has successfully completed.
The list of features above is not a complete list but represents a list of examples.
4.4 Over the air management of encryption keys To distribute or update CCKs, GCKs and SCKs in TETRA the Over The Air Re-keying (OTAR) mechanism is an already existing management tool. This mechanism makes it possible to send in a secure way air interface encryption keys from the SwMI over the air directly to an MS and can be applied as long as an authentication key K is available for the MS. The OTAR messages to an MS are encrypted using session encryption keys that are derived from the authentication key for this MS.
The OTAR mechanism can be used for both an individual MS and for groups of MSs.
A mechanism similar to OTAR is also available for the management of end-to-end encryption keys.
Key management in a two-way radio system can be a challenging and time consuming task, especially in large systems.
Over the Air Key Management (OTAR) is an effective method of maintaining and updating encryption keys in a two-way radio system. As with any task, there is a continued desire to improve the efficiency of the key management process. This is especially true when there is a large number of radios or end devices that are key managed in a two-way radio system. It is desirable for key management to be as unobtrusive as possible to other services offered in a two-way radio system. The more efficient the key management service is, the better the performance of the two-way radio system for key management and other services.