Skip to content

OTA control

OTA control (Over-the-Air control) is the ability to monitor, configure, and operate EV chargers remotely via a network connection—sending commands and applying settings without visiting the site. In EV charging, OTA control typically happens through a CPMS using protocols like OCPP, and includes remote actions such as start/stop, resets, configuration changes, and controlled access to diagnostics.

What OTA control is used for

Common OTA control functions in charging networks include:
– Remote start/stop of charging sessions (where allowed)
– Remote reset or reboot of the charger
– Connector unlock commands (with safety constraints)
– Setting site limits and smart charging parameters (load management)
– Updating configuration values (tariffs display settings, authorization modes)
– Pulling diagnostics logs and fault information
– Enabling/disabling connectors or putting chargers into maintenance mode
– Managing local authorization lists and user access rules

Why OTA control matters

OTA control is critical for operating networks at scale:
– Reduces truck rolls and lowers OPEX by resolving issues remotely
– Improves uptime and reduces MTTR with faster interventions
– Enables consistent configuration across many sites and charger models
– Supports faster commissioning and troubleshooting during rollouts
– Helps enforce policies (demand limits, access control, scheduled profiles)

OTA control vs OTA updates

These are related but different:
OTA control: remote commands and configuration changes
OTA firmware updates: remote delivery of new software/firmware to the charger
Both rely on secure connectivity but have different risk profiles and governance needs.

Security considerations

Because OTA control can directly affect charger operation, it must be secured:
– Use encrypted communication (TLS) and secure identities
– Protect CPMS admin access with RBAC and MFA
– Apply network segmentation so site devices are isolated from corporate networks
– Limit who can issue critical commands and require approval workflows where needed
– Maintain audit logs for every remote command (who, what, when, why)
– Monitor for anomalies (unusual command frequency, repeated resets, unauthorized access)

Operational best practices

– Define a clear command playbook (when to reset, when to disable, escalation steps)
– Use staged rollouts for configuration changes to avoid mass outages
– Validate changes in a test environment before production deployment
– Track outcomes (remote resolution rate, repeat faults) to improve procedures
– Ensure time sync and connectivity stability to prevent command failures

Common pitfalls

– Overusing remote resets instead of fixing root causes (connectivity, grounding, firmware bugs)
– Misconfiguration at scale (wrong site limits or authorization settings)
– Weak credential management or shared admin accounts
– Lack of audit trails, complicating incident investigation
– Inconsistent behavior across charger models despite “OCPP support”

OTA firmware updates
Firmware lifecycle management
Secure update pipeline
CPMS
OCPP
Monitoring access
Uptime
Mean Time To Repair (MTTR)
Role-based access control (RBAC)
Multi-factor authentication (MFA)