Description
Over The Air (OTA) in 3GPP refers to the mechanisms and procedures for the remote, wireless management of User Equipment (UE). This encompasses a broad range of functions, including firmware updates (FOTA), software updates (SOTA), application management, device configuration, and the provisioning of authentication credentials (e.g., for eSIM). The process is managed by network-based OTA platforms that communicate with the UE using standardized protocols over the cellular radio interface.
Architecturally, an OTA system involves several key components. The OTA server, operated by the mobile network operator (MNO), device manufacturer, or a service provider, hosts the update packages and manages the delivery campaigns. The UE contains an OTA client agent responsible for receiving notifications, downloading packages, verifying their integrity and authenticity (often using digital signatures), and executing the update process. Communication typically occurs via IP-based protocols (e.g., HTTPS) carried over the cellular data bearers. For critical updates like firmware, the process is carefully staged: the UE downloads the package, stores it in a secure partition, validates it, and then reboots into a secure mode to apply the update, ensuring robustness against power failure.
How it works involves a push or pull model. The server can initiate a session by sending a notification message to the UE (e.g., via SMS or a dedicated NAS transport). The UE then establishes a data connection to a specified URL to download the package. 3GPP specifications define security frameworks to protect OTA transactions, ensuring packages are not tampered with and only authorized servers can initiate updates. For RF performance testing, 'OTA' also refers to Over-the-Air radiated testing, where a device's total radiated power (TRP) and total isotropic sensitivity (TIS) are measured in an anechoic chamber. The provided definition, 'REFSENS RoAoA', is a specific OTA testing metric for determining a receiver's sensitivity contour relative to a reference direction, crucial for characterizing antenna performance in devices.
Purpose & Motivation
OTA technology was created to solve the massive logistical and cost problem of physically handling millions of devices for updates. Before OTA, fixing a software bug, patching a security vulnerability, or enabling a new network feature required users to bring devices to service centers or manually connect them to a computer, leading to poor update penetration and prolonged security risks.
3GPP standardized OTA procedures to enable efficient, scalable, and secure remote device management. This addresses critical operational needs: maintaining network compatibility as standards evolve (e.g., from 4G to 5G), rolling out critical security patches to protect the network and user data, and enabling new service features without hardware replacement. The motivation was to enhance the user experience, reduce support costs for operators and manufacturers, and ensure the long-term security and functionality of the massive ecosystem of cellular-connected devices. OTA is fundamental for the lifecycle management of everything from smartphones to IoT sensors.
Key Features
- Secure download and verification of update packages using digital signatures
- Support for Firmware-Over-The-Air (FOTA) and Software-Over-The-Air (SOTA)
- Robust update procedures with rollback capabilities in case of failure
- Device management protocols for remote configuration and control
- eSIM profile provisioning (Remote SIM Provisioning)
- Standardized OTA testing metrics for device RF performance (e.g., TRP, TIS, REFSENS)
Evolution Across Releases
Introduced standardized OTA device management capabilities for the first time in 3GPP, primarily for UE configuration and parameter updates. It laid the groundwork for secure remote management in the emerging mobile data era, defining basic protocols and security mechanisms.
Defining Specifications
| Specification | Title |
|---|---|
| TS 22.811 | 3GPP TS 22.811 |
| TS 23.875 | 3GPP TS 23.875 |
| TS 23.981 | 3GPP TS 23.981 |
| TS 25.144 | 3GPP TS 25.144 |
| TS 26.851 | 3GPP TS 26.851 |
| TS 29.544 | 3GPP TS 29.544 |
| TS 31.131 | 3GPP TR 31.131 |
| TS 33.303 | 3GPP TR 33.303 |
| TS 33.401 | 3GPP TR 33.401 |
| TS 33.834 | 3GPP TR 33.834 |
| TS 33.841 | 3GPP TR 33.841 |
| TS 34.114 | 3GPP TR 34.114 |
| TS 37.105 | 3GPP TR 37.105 |
| TS 37.144 | 3GPP TR 37.144 |
| TS 37.145 | 3GPP TR 37.145 |
| TS 37.544 | 3GPP TR 37.544 |
| TS 37.571 | 3GPP TR 37.571 |
| TS 38.101 | 3GPP TR 38.101 |
| TS 38.104 | 3GPP TR 38.104 |
| TS 38.141 | 3GPP TR 38.141 |
| TS 38.151 | 3GPP TR 38.151 |
| TS 38.161 | 3GPP TR 38.161 |
| TS 38.174 | 3GPP TR 38.174 |
| TS 38.176 | 3GPP TR 38.176 |
| TS 38.521 | 3GPP TR 38.521 |
| TS 38.551 | 3GPP TR 38.551 |
| TS 38.561 | 3GPP TR 38.561 |
| TS 38.755 | 3GPP TR 38.755 |
| TS 38.761 | 3GPP TR 38.761 |
| TS 38.762 | 3GPP TR 38.762 |
| TS 38.771 | 3GPP TR 38.771 |
| TS 38.793 | 3GPP TR 38.793 |
| TS 38.803 | 3GPP TR 38.803 |
| TS 38.809 | 3GPP TR 38.809 |
| TS 38.810 | 3GPP TR 38.810 |
| TS 38.815 | 3GPP TR 38.815 |
| TS 38.820 | 3GPP TR 38.820 |
| TS 38.827 | 3GPP TR 38.827 |
| TS 38.834 | 3GPP TR 38.834 |
| TS 38.839 | 3GPP TR 38.839 |
| TS 38.847 | 3GPP TR 38.847 |
| TS 38.849 | 3GPP TR 38.849 |
| TS 38.870 | 3GPP TR 38.870 |
| TS 38.871 | 3GPP TR 38.871 |
| TS 38.881 | 3GPP TR 38.881 |
| TS 38.884 | 3GPP TR 38.884 |
| TS 38.887 | 3GPP TR 38.887 |
| TS 38.894 | 3GPP TR 38.894 |
| TS 38.903 | 3GPP TR 38.903 |
| TS 38.912 | 3GPP TR 38.912 |
| TS 38.921 | 3GPP TR 38.921 |
| TS 38.922 | 3GPP TR 38.922 |