Whether it is an automotive ECU product or field-deployed Industrial Automation devices, integration of Firmware over the Air / FOTA update feature has become a mission-critical process.
Firmware Over the Air update is necessary to ensure secure and robust operations of remote devices in Industry 4.0, automotive and healthcare domains.
Leverage our IoT and Automotive domain expertise of more than 12 years, for custom development of hardware and software components for FOTA update.
Firmware Over the Air – Success Stories
Features of Our FOTA Update Solution for Remote Device Management
Our end-to-end FOTA solution can be customised to facilitate the following:
Firmware Over the Air – Services We Offer
- Flash Memory Selection – NOT, NAND & more, based on your project requirements.
- Integration of Wi-Fi/Bluetooth/GPRS/GSM modules for secure communication between the FOTA server and the target devices.
- Design and development of Firmware and integration with IoT protocols such as MQTT, CoAP; HTTPS & SSL for secure data exchange; FTP/FTPS for file transfer.
- Selection of specific encryption methods to check the sanity of the update package.
- Deciding the level of FOTA update required (At the whole system level, OS and application level, or only at the application level).
- Bootloader development to enable firmware download and reprogramming on the application device.
- Design and development of the FOTA management server interface and other GUIs to build/schedule/deploy/manage the update package.
- Design and development of the interface (GUI) to build/schedule/deploy/manage the update package.
- Tracking as well as reporting the successful instances of firmware updates.
- Integration of Firmware Rollback mechanism to mitigate any failure or bug detected during Over the Air update.
- Development of Automated test frameworks to enable devices to perform self-test & send status reports, at the end of an update.
After design and development of the FOTA feature for your connected devices, the hardware and software components are subjected to the following pre-production test-case scenarios:
- Power Failure
- Communication Failure
- Memory Corruption
- Failure to boot the new firmware image
- Flashing of a corrupted firmware image
- Failure to retrieve the information about the configuration & last status of the firmware
We also perform Image self-tests to check if all the firmware functions are working properly.
Ready-to-Deploy FOTA Micro Stack for Automotive Applications
We have developed a ready-to-deploy FOTA micro stack for expediting the development activities of automotive applications such as In-Vehicle Infotainment System, Digital Instrument Cluster, Digital Cockpit, etc.
Introduction of new software features or update of existing software can be accomplished through the FOTA micro stack. The stack facilitates Cloud based OTA in which the updates can be scheduled at a specific time. And at that time, the binaries are downloaded from the cloud. On system restart, the changes are installed and executed.
End to end implementation of an automotive FOTA solution takes 60-70 days. The ready-to-deploy stack enables the implementation of the FOTA solution within 18 days.
How Does the FOTA Micro Stack Work?
OTA updates are installed in the root file system of the automotive application. For instance, in Linux OS, there are three parts - U-Boot, Kernel and RootFS.
- Whenever the system reboots, it will load the bootloader, kernel and then check which partition to boot with, i.e., partition A or B.
- To update partition A, the firmware is downloaded and stored in persistent memory. The firmware is then extracted and installed in partition A. The system is then rebooted.
- Once it reboots, the same process is followed to update the firmware in partition B.
The FOTA micro stack consists of three modules:
- FOTA Gateway
- Download Engine
- Update Engine
The functions of each module are explained in the diagram below:
Error Handling Features of FOTA Micro Stack
- Error handling on connectivity loss with FOTA Server
- Error handling for firmware version (expected greater version than existing version of firmware)
- Error handling for download failure
- Error handling for installation failure (Recovery)
Smart Cluster Architecture with FOTA Micro Stack
The detailed layered architecture of a smart cluster with the FOTA micro stack implemented is shown below.
Meet Our IoT Leaders
Vidya Sagar, is an industry veteran with more than 18 years of experience in the domains of Infotainment, Car HUD and product engineering. Sagar is our IoT captain, spearheading our team in delivering cutting-edge IoT solutions to customers.
Sagar plays a key role in transforming our client’s complex business ideas and requirements into feasible solutions with his wealth of knowledge.Vidya Sagar Jampani, Business Unit Head (IoT)
(The Master of all ‘IoT Trades’!)
In a career spanning over 19 years, Emmanuel has worked across different domains in Embedded Systems Engineering.This includes Automated Build Systems, SOC System Integrations, Embedded Platform Software and Hardware, Mobile Application Development.
A thorough team player, Emmanuel is known for his solution-oriented approach; he has always played a pivotal role in the successful delivery of some of our complex projects.Emmanuel P John, Solution Architect – IoT
[Video] What Makes Firmware Over the Air (FOTA) an Automotive Superhero?
Components of FOTA Update System
OTA Update for Your Connected System: Business Benefits
- Safeguard your applications against any possible security vulnerability
- Efficient and remote management of your critical work product and site equipment.
- OPTIMIZE DATA COSTS and minimize system downtime by updating numerous changes in one go, over the air.
- Update your firmware in line with your SCALING business.
- Reduce on-field MAINTENANCE COSTS by updating firmware on device, post-deployment
- With FOTA you can do:
- Feature updates
- Functional updates
Anytime, on Any number of connected systems
FAQs Regarding FOTA Update: IoT and Automotive Devices
Ans. This decision regarding the method of firmware flashing will depend on the following factors:
- Number of devices to be updated ( A Gateway device is preferred if the number of deployed target devices is on the higher side)
- The type of communication interfaces available
- The operating environment of the deployed devices
- Desired cost-effectiveness of the FOTA feature
Ans. We had ensured to make security features part of the FOTA solution at the design stage of the SDLC.
Following are the details regarding our FOTA security features:
- Integrated HTTPS & SSL certifications: to ensure Secure data exchange
- Encryption Keys and security certificates for secure communication between server and target devices
- Role based Access Control to avoid any unauthorized data access
- Code Signing: to verify the authenticity and integrity of firmware executables and scripts and to safeguard them against any malicious tampering by unauthorized agents.
Ans. Based on our experience, a subscribe –publish mechanism for FOTA upgrade is ideal for large scale implementations. Additionally, a subscribe –publish mechanism offers following advantages over the Polling mechanism:
- Cost effective
- Minimizes data usage
Reason – field-deployed devices are not required to check for new firmware update every now & then . Any new firmware update package or image that gets published in the server, is notified to the devices as per the schedule.
Polling mechanism is easier to implement but consumes more data.
Ans. The following components, of our FOTA reference design, can be reused in order to save development time and cost of your customized FOTA solution:
- Ready to deploy Bootloader Software
- Software components deployed for secure file transfer, update notifications.
- Reusable Algorithms for accurately
- updating the new firmware,
- Identifying the update requirements
- Validating the existing firmware versions
Additionally, Gateway device (Linux based) can also be reused if the target application is also based on Linux.
Ans. IoT gateway devices that support firmware OTA flashing on connected devices can belong to one of the following categories:
- Processor and OS based Gateway: preferred for large scale (industrial) deployments. These are easily scalable and depend on application processor and the base OS ( Android/Linux).Cost of such IoT gateway devices is also comparatively higher.
- Microcontroller based Gateways: These are preferred for applications which require specific functionalities like – better device connectivity, reduced memory and power consumption; and involve lower BOM cost.
- Mobile Device as a Gateway: These are preferred when target devices are fewer in number and individually owned.
At Embitel, we have developed IoT gateway devices at various scales and for different application domains, specifically for telematics and industrial automation systems.
Ans. Following are the details regarding our backend server architecture:
- We have deployed Postgress relational database to leverage the following benefits:
- Open Source nature and support for an enterprise-class performance
- Cross platform compatibility ( UNIX, Windows, Native Windows)
- Responsive in high volume environments
- Exhaustive library and framework support
- Full database encryption to ensure security
- Our solution is backed by an Nginx server for file transfer. Our team took this decision based on the following features of an Nginx server:
- Versatile, efficient and light-weight web server
- Easy and simpler installations
- Ideal for serving static files pdf, zip, html, mp4 & others
- Support for high concurrent traffic
- Compatible with commonly-used web apps like WordPress, ruby, python, Joomla, drupal etc.
- We have also leveraged Django framework for developing interfaces for the target devices. The Django framework is known for its scalability, security and ease of execution – features that make it a favorite among the web developers.
Ans. In order to ensure security of backend operations in the server and to avoid unauthorized access of the backend data, we implement:
- Password based authentication control, or
- Certificate based authentication (CA)
Ans. All details related to firmware file and each of the versions (previous and the new) are stored systematically in the tables of the relational database.
The tables would include information such as the file name, the version number, and the action required (upgrade or delete) pertaining to each firmware package.
This ensures accurate version management of the firmware package, which is being deployed in the target devices.
In case a new version of the firmware has a bug or does not meet the desired expectations, there are provisions to roll back to the previous firmware version, using the information in the backend database.
Ans. We use the Nginx server for backend operations which provides robust support for load balancing The NGINX server is an efficient (HTTP) load balancer, suitable for wide range of web applications.
The NGINX server has an event-driven (event as in any communication request) architecture that empowers it to manage thousands of connections within a single process with efficient use of hardware and memory.
Thus, even if the number of connected devices that needs a FOTA upgrade increases post initial-deployment, the NGINX server can easily process their connection request without creating traffic spikes.
Ans. Our experienced solution development is a vibrant bunch of Industrial Automation and Automotive domain experts, with the following core skill-sets:
- Expertise in IoT communication protocols (MQTT, CoAP, HTTPS)
- Testing and validation expertise
- Experience in Bootloader Software Development
- Know-how and hands-on in system security best practices
How do I update an IoT device?
- IoT devices deployed at remote locations or on an expansive field can be upgraded through the FOTA update feature. This applies to all connected devices at industries/enterprises and automotive applications. There are three ways in which the device can be updated:
- Gateway-to-Cloud FOTA Update – A group of devices are connected to an IoT gateway. The FOTA update is sent to the gateway that is connected to the internet. The firmware on the individual devices do not undergo any changes, and only the gateway is updated with the new firmware. This is more commonly seen in use cases where the IoT devices are not internet-enabled and do not have too much computing power. In such cases, the individual devices are also protected from the internet by the gateway.
- Edge-to-Gateway-to-Cloud FOTA Update – In this method, the firmware on the individual IoT devices connected to the gateway are updated. However, the gateway itself may not be updated with new firmware at that point of time. The IoT devices in these use cases have enough computing capabilities and can perform the FOTA update without the need for internet connectivity.
- Edge-to-Cloud FOTA Update – This method of FOTA update is more prevalent in consumer IoT devices as they are in the proximity of WiFi signals at small commercial buildings or homes. The device receives the updates directly from a remote server through the Internet and the updates are installed.
What is FOTA Automotive?
- The modern car, truck or even a two-wheeler is powered by millions of lines of software code. New vehicles are embedded with more mini computers than ever before. Most of the operations in a vehicle are controlled by automotive ECUs – the cabin climate control, automotive lighting systems, safety modules, in-vehicle infotainment, and much more. Software update is, hence, a necessity for all modern vehicles as it keeps the automobile in perfect working condition.
- Most service stations update the software in a vehicle when it is brought in for servicing. Through the vehicle’s VIN number, the service centre personnel can identify the version of software that is used in the vehicle and whether it needs any update. The software is then downloaded and updated on the vehicle through a special cable that fits into the car’s mini computer. However, a more convenient way to update the software on a vehicle is through the internet. This is referred to as FOTA update.
- Firmware over the Air (FOTA) is a boon for all modern vehicles, as it enables automotive ECU software update. From the automotive OEM’s point of view, enabling FOTA update feature can minimize product recall expenses, improve product quality, increase operational efficiency and also deliver enhanced post-sale services to customers.
What is the need for software updates on a car?
- The reasons are many. Some of the most common needs are mentioned below:
- A software update reformats the vehicle’s ECU and hence, rectifies factory software issues that may be causing some inconvenience to the driver.
- When auto manufacturers identify opportunities to improve the efficiency or durability of the car’s ECU, they deploy FOTA updates to implement these firmware changes.
- FOTA update can also rectify latent safety issues that were not accounted for in the factory software.
How is FOTA installation done?
- FOTA Installation is a Three Step Process:
- New update or the new version of the software/firmware is made available in the cloud server by the device owners.
- The latest firmware update is downloaded and made available to the network of the IoT or automotive devices (For e.g., a Vehicle Telematics system in a car or an IoT enabled equipment in a manufacturing plant).
- The FOTA server stores all the information related to the devices in the network such as the current status and the existing version of the firmware in use, within a large database.
- The server also manages the process of sending the firmware to the target application as and when it is published or based on a schedule. The FOTA server identifies any bug in the firmware and reports it as well.
- The end devices or the applications pull the upgrades from the FOTA server based on either the subscribe-publish mechanism or a polling mechanism over a secure wireless (Wi-Fi/ BLE) connection.
- The firmware is then installed in the end-user application with the help of a bootloader.