MCUBoot Over-the-Air Download (OAD)

The following sections aim to describe the lower layers of OAD software that are common across all protocol stack implementations. This includes the OAD image header, the flash layout, Secure Bootloader, and the oad image tool.

Warning

The BLE-Stack OAD Profile does not implement or perform any security or authentication mechanisms as part of the firmware update process. System developers should take measures to adequately authenticate peer devices and only accept and/or apply firmware images transferred from trusted sources via the OAD Profile. TI recommends applications use Bluetooth LE Secure Connections (LESC) with Man-in-the-Middle (MITM) protection with peer devices when performing wireless firmware updates, although the use of the LESC feature does not itself guarantee image authenticity.

When using the Secure OAD feature along with recommended parameters, firmware images are authenticated on the device using ECDSA signature validation algorithms to ensure image authenticity prior to updating the running firmware image. Just as with the OAD Profile, TI recommends applications use Bluetooth LE Secure Connections with Man-in-the-Middle (MITM) protection with peer devices when performing wireless firmware updates.

Attention

Currently the BLE5-Stack does not support off-chip OAD yet.

The following sections aim to describe the BLE5-Stack specific application and profile layer of the OAD solution. The OAD application section will describe the BLE OAD process from a high level in terms of events and states, and the profile section will cover the actual structures that are sent over the air.