2025-cab-areas-inves-digitalizacion-ciberseguridad-transporte

Cybersecurity for transport

 

2025-intro-areas-inves-digitalizacion-ciberseguridad-transporte

 

In the transport sector, ensuring security in terms of communications, the operating capacity of systems and resilience against cyberthreats is essential in order to maintain the integrity of infrastructures and connected vehicles. At Ceit, we develop state-of-the-art solutions ranging from data protection systems to simulation and robust positioning platforms, thus promoting safe and efficient transport.

 
 

2025-capacidades

Solutions

 

2025-capacidades-areas-inves-fabricación-avanzada-digitalizacion-ciberseguridad-transporte

 
 

Protection of critical communications

We design state-of-the-art technologies to protect communication between infrastructures and vehicles. These solutions guarantee communication integrity, thus reducing the risk of any manipulation or interception that may compromise the transport operation.


 
 

Robust positioning systems in hostile environments

We integrate GNSS systems with additional sources of information to ensure positioning accuracy in adverse conditions such as in dense urban environments or areas with electromagnetic interference. We use FDE (Fault Detection and Exclusion) algorithms to ensure reliability of operations, detecting and excluding any erroneous data in real time.


 
 

Simulation laboratories and testbeds

We combine digital twins with hybrid testbeds that enable us to optimise the design, development and use of secure solutions, adapting to the specific needs of the sector.


 
 

Secure data spaces for mobility

We develop platforms for secure sharing of data in the transport sector, ensuring regulatory compliance and privacy in terms of information. These solutions are applied both to the infrastructure and embedded systems, thus fostering interoperability.


 
 

Secure use of remote solutions

We implement SecDevOps methodologies that integrate security into all phases in the development, integration and use of remote solutions. This approach ensures that applications and systems will be robust in view of threats, from the time of their initial design to their operational implementation.