Skip to content

Over-the-air updates (OTA)

Over-the-air (OTA) updates are remote software or firmware updates delivered to connected devices without an on-site visit. In EV charging, OTA updates typically refer to updating an EV charger’s firmware, communications stack, or security components via a CPMS (often using OCPP) or a vendor device-management platform.

What OTA updates can include

– Charger firmware updates (control logic, UI behavior, error handling)
– Security patches and vulnerability fixes
– OCPP communication improvements (stability, reconnect behavior, metering reporting)
– Smart charging and load control feature updates
– Diagnostics and logging enhancements
– Certificate and credential updates (for secure TLS/mTLS setups)
– Gateway/router configuration updates (APN, VPN, firewall rules) where centrally managed

Why OTA updates matter

– Improve uptime by fixing defects and reducing recurring faults
– Lower OPEX by reducing truck rolls and manual commissioning work
– Reduce cybersecurity risk through faster patching
– Maintain compatibility with evolving CPMS features and integrations
– Enable consistent improvements across large fleets of chargers

Typical OTA rollout process

A well-run OTA process usually includes:
– Testing in staging and piloting on a small subset of chargers
– Phased rollout by model, region, or site type
– Scheduling during low-utilization windows
– Post-update validation (online status, start/stop success, metering, alarms)
– Rollback/recovery plan if issues occur
– Version tracking and audit logs for governance and troubleshooting

Risks and considerations

– Connectivity interruptions can cause failed or partial updates
– A faulty release can create widespread downtime if not phased
– Firmware changes can affect billing, session logic, or user experience
– Certificate lifecycle mistakes can take chargers offline at scale
– Different vendors may interpret features differently even under the same OCPP version

Security best practices

– Use a secure update pipeline with signed firmware and integrity checks
– Deliver updates over TLS and restrict who can initiate them (RBAC, MFA)
– Log all update actions (who, what, where, when)
– Monitor network KPIs after rollout (offline spikes, session failure rate)
– Keep strong change control and release documentation

OTA control
Firmware lifecycle management
Secure update pipeline
OCPP
CPMS
Uptime
Mean Time To Repair (MTTR)
Network segmentation
Cybersecurity audits
Monitoring access