Skip to content

OTA updates

OTA updates (Over-the-Air updates) are remote software or firmware updates delivered to connected devices without on-site visits. In EV charging, OTA updates typically refer to updating an EV charger’s firmware, modem/router configuration, or connected controller software via a CPMS (often using OCPP) or a vendor device-management platform.

What OTA updates can include

OTA updates in charging infrastructure commonly cover:
– Charger firmware (control logic, UI, payment/authorization behavior)
– Communication stack updates (OCPP stability, TLS/cert handling improvements)
– Security patches and vulnerability fixes
– Bug fixes for metering, session handling, connector locking, error recovery
– Feature additions (smart charging functions, diagnostics, new protocols)
– Modem/router settings (APN profiles, VPN config) where managed centrally
– Certificates and credentials updates (especially relevant for secure OCPP setups)

Why OTA updates matter

OTA updates are essential for operating chargers at scale:
– Improve uptime by fixing known defects and stability issues
– Reduce field service visits and lower OPEX
– Address cybersecurity risks faster through patching
– Keep interoperability working with CPMS changes and roaming requirements
– Enable controlled rollout of new capabilities across a fleet of chargers

Typical OTA update workflow

A mature OTA process usually includes:
– Version planning and release notes (what changes, why, compatibility)
– Testing on a pilot group or staging environment
– Scheduled rollout windows to reduce operational impact
– Automated health checks after update (connectivity, transaction start/stop, metering)
– Rollback or recovery procedures if issues occur
– Update reporting and audit logs for compliance and troubleshooting

Risks and considerations

OTA updates must be managed carefully because they can affect many sites at once:
– Failed updates can temporarily take chargers offline
– Inconsistent connectivity can interrupt updates and cause partial states
– New firmware may change behavior (tariffs display, session timing, fault handling)
– Certificate or security changes can break connectivity if mismanaged
– Multi-vendor fleets require careful compatibility and version control

Security best practices

– Use a secure update pipeline with signed firmware and integrity checks
– Distribute updates over encrypted channels (TLS)
– Restrict who can trigger updates using RBAC and MFA
– Maintain audit logs (who approved, who initiated, which devices, when)
– Validate vendor provenance and supply chain security for update packages
– Monitor post-update anomalies (offline spikes, session failures, repeated faults)

Common pitfalls

– Rolling out to the entire fleet without phased testing
– Updating during peak utilization periods
– Lack of rollback strategy and recovery tooling
– Poor communication to site hosts and support teams
– No change control, making root-cause analysis difficult when issues appear

OTA control
Firmware lifecycle management
Firmware updates
Secure update pipeline
CPMS
OCPP
Uptime
Mean Time To Repair (MTTR)
Network segmentation
Cybersecurity audits