{"id":196439,"date":"2026-05-05T17:38:22","date_gmt":"2026-05-05T15:38:22","guid":{"rendered":"https:\/\/eurecat.org\/?p=196439"},"modified":"2026-05-05T17:48:57","modified_gmt":"2026-05-05T15:48:57","slug":"cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future","status":"publish","type":"post","link":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/","title":{"rendered":"Cyber-resilience in cyber-physical systems: protecting the connected mobility of the future"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1424.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>The mobility of the future is built on <strong>highly interconnected cyber-physical systems, where vehicles, infrastructure and digital services make decisions in real time<\/strong>.<\/p>\n<p>In this environment, <strong>a cyber-attack has a systemic effect and not only affects data <\/strong>but can have direct physical consequences, such as altering trajectories, disrupting services or compromising people&#8217;s safety.<\/p>\n<p>This reality turns <strong>autonomous vehicles, electric charging stations and shared mobility platforms into parts of a critical infrastructure, <\/strong>fully connected to the city and to other key systems, such as the power grid, public administration or telecommunications.<\/p>\n<p>While this integration generates great opportunities, it also broadens the attack surface and even opens the door to the realisation of risks that can impact <strong>road safety, user privacy and the continuity of essential services<\/strong>. For this reason, protection across the entire value chain is critical.<\/p>\n<p>It is in this context that <strong>cyber-resilience in cyber-physical mobility systems becomes a key element<\/strong>. It is not just about preventing cyber-attacks, but about <strong>ensuring that systems are capable of withstanding them, responding to them and recovering effectively and efficiently<\/strong>, all while maintaining their functionality and the trust of users.<\/p>\n<p>Below, we explore three areas that exemplify this challenge: autonomous and connected mobility, electric mobility, and shared mobility.<\/p>\n<p>This approach complements other applications of <a href=\"https:\/\/eurecat.org\/en\/cyber-resilience-critical-infrastructure-technologies-solutions-protect-systems-cyber-attacks\/\">cyber-resilience in cyber-physical systems such as critical infrastructures.<\/a><\/p>\n<p><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-margin-top:40px;--awb-margin-bottom:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1200\" height=\"800\" title=\"Ciberresiliencia_2\" src=\"https:\/\/eurecat.org\/wp-content\/uploads\/2026\/05\/Sistemes_ciberfisics_2.jpg\" alt class=\"img-responsive wp-image-195451\"\/><\/span><\/div><div class=\"fusion-text fusion-text-1\"><\/div><\/p>\n<h2><strong>Cyber-Physical Systems in Autonomous Mobility: Risks and Solutions<\/strong><\/h2>\n<p><strong>Autonomous mobility<\/strong>, known as <a href=\"https:\/\/www.ccam.eu\/\">CCAM (Connected, Cooperative and Automated Mobility)<\/a>, <strong>represents a paradigm shift in transport<\/strong>. Autonomous vehicles rely on a combination of sensors such as LiDARs, radars and cameras, as well as artificial intelligence algorithms that process data in real time to make driving decisions.<\/p>\n<p>These vehicles communicate with other vehicles and the infrastructure via <strong>V2X (Vehicle-to-Everything) communications<\/strong>. Their <strong>continuous communication is essential for safety and efficiency<\/strong>, but it also creates new attack vectors. Any manipulation of these communications could lead to trajectory errors, driving alterations, or collisions, with direct consequences in the physical world.<\/p>\n<p>To address this challenge, the <a href=\"https:\/\/eurecat.org\/en\/real-world-trials-in-catalonia-showcase-new-cybersecurity-tools-for-autonomous-and-connected-vehicles\/\">SELFY project<\/a>, coordinated by Eurecat, <strong>has developed self-assessment and self-protection tools that strengthen the cyber-resilience of connected vehicles in urban environments. <\/strong><\/p>\n<p>Their solutions allow <strong>for the real-time monitoring of the status of on-board systems<\/strong>, the detection of vulnerabilities and the application of mitigation measures before a critical incident occurs. The system analyses both the vehicle&#8217;s behaviour and its interactions with the urban infrastructure.<\/p>\n<blockquote>\n<p><strong><em>Una soluci\u00f3n desarrollada por Eurecat ha permitido detectar m\u00e1s del 95 % de los veh\u00edculos vulnerables y m\u00e1s del 90 % de las brechas de seguridad durante pruebas piloto en entornos controlados. <\/em><\/strong><\/p>\n<\/blockquote>\n<\/div><div class=\"fusion-text fusion-text-3\"><div class=\"fusion-text fusion-text-3\"><\/div>\n<p>The results have been demonstrated in pilot tests carried out in Catalonia and Austria, <strong>where the tools developed detected more than 95% of vulnerable vehicles and over 90% of security breaches<\/strong>, highlighting the potential of these technologies to improve the security of connected mobility.<\/p>\n<p>In parallel, the <a href=\"https:\/\/eurecat.org\/en\/portfolio-items\/smart-city-manager\/\">Smart City Manager project<\/a> expands this vision to an urban scale. By using <em>Big Data<\/em>, <em>Blockchain <\/em>and artificial intelligence, this technological solution enables the analysis of anonymised data, traffic flow prediction and the detection of anomalous situations, facilitating safer, more efficient and data-driven management.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-top:40px;--awb-margin-bottom:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1200\" height=\"800\" title=\"Ciberresiliencia-5\" src=\"https:\/\/eurecat.org\/wp-content\/uploads\/2026\/05\/Sistemes_ciberfisics_3.jpg\" alt class=\"img-responsive wp-image-195458\"\/><\/span><\/div><div class=\"fusion-text fusion-text-5\"><div class=\"fusion-text fusion-text-5\"><\/div>\n<h2><strong>Electric mobility: an interconnected network with new challenges<\/strong><\/h2>\n<p>Electric mobility transforms not only the vehicle but the entire associated infrastructure. Vehicles, charging stations and power grids form an ecosystem of connected infrastructures and interconnected digital systems, where any vulnerability can trigger a chain reaction.<\/p>\n<p><strong>Charging stations, for example, can become entry points for attacks that affect both the vehicle and the power grid<\/strong>. Furthermore, mobile applications, web interfaces and management systems can expose critical data and functionalities if they are not designed with security in mind from the outset.<\/p>\n<p>In this context, <strong>a cyber-attack could not only compromise data but also cause physical disruption<\/strong>, particularly in systems that manage energy, such as batteries.<\/p>\n<p>Given this complexity, as part of <a href=\"https:\/\/eurecat.org\/en\/portfolio-items\/twin-loop\/\">the TWIN LOOP project,<\/a> <a href=\"https:\/\/eurecat.org\/en\/field-of-knowledge\/it-ot-security\/\">Eurecat&#8217;s IT&amp;OT Security Unit<\/a> has developed a virtual environment to launch a series of cyber-attacks to assess which countermeasures are more effective in mitigating them. This approach allows for the optimisation of the vehicle&#8217;s performance, while also improving its security and resilience throughout its entire life cycle.<\/p>\n<p>Specifically, Eurecat has provided advanced cybersecurity solutions, such as a <strong>virtual environment to simulate attacks and validate cybersecurity solutions in electric vehicles, <\/strong>as well as an <strong>identity management system and post-quantum encryption solutions <\/strong>to protect critical vehicle data and communications.<\/p>\n<h2><strong>Digital identity as a critical point in shared mobility<\/strong><\/h2>\n<p>Shared mobility services, such as car-sharing, bicycles or electric scooters, rely on digital platforms that manage access through mobile applications and electronic credentials. This makes digital identity a central element of the system.<\/p>\n<p>If this layer is not adequately designed and protected, it can become a weak point. The use of weak passwords, their reuse, or a lack of robust authentication can allow unauthorised access or expose personal data.<\/p>\n<p>To address these risks, in <a href=\"https:\/\/eurecat.org\/portfolio-items\/madras\/\">the MADRAS project<\/a>, Eurecat has developed advanced solutions to ensure the security of digital identification in shared mobility environments, such as electric motorcycles. Among the innovations is <strong>the use of fingerprint sensors as an alternative to passwords<\/strong>. This system improves both security and the user experience, reducing the risk of theft or misuse.<\/p>\n<div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:800px;--awb-max-height:533px;\"><div class=\"video-shortcode\"><div class=\"fluid-width-video-wrapper\" style=\"padding-top:66.63%;\" ><iframe title=\"YouTube video player 1\" src=\"https:\/\/www.youtube.com\/embed\/Efo5I7Hwjsc?wmode=transparent&autoplay=0\" width=\"800\" height=\"533\" allowfullscreen allow=\"autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture;\"><\/iframe><\/div><\/div><\/div>\n<h2><\/h2>\n<h2><strong>Cyber-resilience: the foundation of trust in future mobility<\/strong><\/h2>\n<p>Future mobility will be autonomous, electric, shared and deeply interconnected. This means that the systems that make it possible \u2013vehicles, infrastructure and digital platforms\u2013 must be not only efficient but also secure and resilient.<\/p>\n<p>Cyber-resilience thus becomes a key element for <strong>ensuring trust, service continuity and the adoption of new technologies<\/strong>. Identifying vulnerabilities, simulating attack scenarios and deploying efficient response mechanisms are essential actions to protect both users and infrastructure.<\/p>\n<p>Through its participation in public <a href=\"https:\/\/eurecat.org\/en\/services\/strategic-rdi\/\">R&amp;D&amp;I projects<\/a> such as SELFY, TWIN LOOP, Smart City Manager and MADRAS, and private projects in direct collaboration with companies, Eurecat demonstrates how applied research can transform these challenges into real-world solutions.<\/p>\n<p>In an increasingly connected world, protecting cyber-physical mobility systems is, ultimately, protecting the future of transport.<\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":18,"featured_media":196421,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2770,424],"tags":[],"class_list":["post-196439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-entrades-del-blog-en","category-it-security-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber-resilience in cyber-physical systems<\/title>\n<meta name=\"description\" content=\"Cyber-resilience protects cyber-physical mobility systems: autonomous vehicles, electric charging networks and shared transport.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber-resilience in cyber-physical systems\" \/>\n<meta property=\"og:description\" content=\"Cyber-resilience protects cyber-physical mobility systems: autonomous vehicles, electric charging networks and shared transport.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/\" \/>\n<meta property=\"og:site_name\" content=\"Eurecat\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-05T15:38:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T15:48:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eurecat.org\/wp-content\/uploads\/2026\/05\/Sistemes_ciberfisics_1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eurecatMP\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eurecatMP\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/\"},\"author\":{\"name\":\"eurecatMP\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#\\\/schema\\\/person\\\/051e9b3bc391417e64352aab4e839ee4\"},\"headline\":\"Cyber-resilience in cyber-physical systems: protecting the connected mobility of the future\",\"datePublished\":\"2026-05-05T15:38:22+00:00\",\"dateModified\":\"2026-05-05T15:48:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/\"},\"wordCount\":2018,\"image\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Sistemes_ciberfisics_1-1.jpg\",\"articleSection\":[\"Blog\",\"IT-Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/\",\"url\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/\",\"name\":\"Cyber-resilience in cyber-physical systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Sistemes_ciberfisics_1-1.jpg\",\"datePublished\":\"2026-05-05T15:38:22+00:00\",\"dateModified\":\"2026-05-05T15:48:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#\\\/schema\\\/person\\\/051e9b3bc391417e64352aab4e839ee4\"},\"description\":\"Cyber-resilience protects cyber-physical mobility systems: autonomous vehicles, electric charging networks and shared transport.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Sistemes_ciberfisics_1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Sistemes_ciberfisics_1-1.jpg\",\"width\":800,\"height\":533,\"caption\":\"sistemes ciberf\u00edsics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inici\",\"item\":\"https:\\\/\\\/eurecat.org\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-resilience in cyber-physical systems: protecting the connected mobility of the future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/eurecat.org\\\/en\\\/\",\"name\":\"Eurecat\",\"description\":\"Otro sitio realizado con WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eurecat.org\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/en\\\/#\\\/schema\\\/person\\\/051e9b3bc391417e64352aab4e839ee4\",\"name\":\"eurecatMP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/80d0c99d56016aec5ff6894630c58bc495070ec5622da4899c9add08bcd8f36a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/80d0c99d56016aec5ff6894630c58bc495070ec5622da4899c9add08bcd8f36a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/80d0c99d56016aec5ff6894630c58bc495070ec5622da4899c9add08bcd8f36a?s=96&d=mm&r=g\",\"caption\":\"eurecatMP\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber-resilience in cyber-physical systems","description":"Cyber-resilience protects cyber-physical mobility systems: autonomous vehicles, electric charging networks and shared transport.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/","og_locale":"en_US","og_type":"article","og_title":"Cyber-resilience in cyber-physical systems","og_description":"Cyber-resilience protects cyber-physical mobility systems: autonomous vehicles, electric charging networks and shared transport.","og_url":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/","og_site_name":"Eurecat","article_published_time":"2026-05-05T15:38:22+00:00","article_modified_time":"2026-05-05T15:48:57+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/eurecat.org\/wp-content\/uploads\/2026\/05\/Sistemes_ciberfisics_1-1.jpg","type":"image\/jpeg"}],"author":"eurecatMP","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eurecatMP","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/#article","isPartOf":{"@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/"},"author":{"name":"eurecatMP","@id":"https:\/\/eurecat.org\/en\/#\/schema\/person\/051e9b3bc391417e64352aab4e839ee4"},"headline":"Cyber-resilience in cyber-physical systems: protecting the connected mobility of the future","datePublished":"2026-05-05T15:38:22+00:00","dateModified":"2026-05-05T15:48:57+00:00","mainEntityOfPage":{"@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/"},"wordCount":2018,"image":{"@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2026\/05\/Sistemes_ciberfisics_1-1.jpg","articleSection":["Blog","IT-Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/","url":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/","name":"Cyber-resilience in cyber-physical systems","isPartOf":{"@id":"https:\/\/eurecat.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/#primaryimage"},"image":{"@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2026\/05\/Sistemes_ciberfisics_1-1.jpg","datePublished":"2026-05-05T15:38:22+00:00","dateModified":"2026-05-05T15:48:57+00:00","author":{"@id":"https:\/\/eurecat.org\/en\/#\/schema\/person\/051e9b3bc391417e64352aab4e839ee4"},"description":"Cyber-resilience protects cyber-physical mobility systems: autonomous vehicles, electric charging networks and shared transport.","breadcrumb":{"@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/#primaryimage","url":"https:\/\/eurecat.org\/wp-content\/uploads\/2026\/05\/Sistemes_ciberfisics_1-1.jpg","contentUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2026\/05\/Sistemes_ciberfisics_1-1.jpg","width":800,"height":533,"caption":"sistemes ciberf\u00edsics"},{"@type":"BreadcrumbList","@id":"https:\/\/eurecat.org\/en\/cyber-resilience-in-cyber-physical-systems-protecting-the-connected-mobility-of-the-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inici","item":"https:\/\/eurecat.org\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber-resilience in cyber-physical systems: protecting the connected mobility of the future"}]},{"@type":"WebSite","@id":"https:\/\/eurecat.org\/en\/#website","url":"https:\/\/eurecat.org\/en\/","name":"Eurecat","description":"Otro sitio realizado con WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eurecat.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/eurecat.org\/en\/#\/schema\/person\/051e9b3bc391417e64352aab4e839ee4","name":"eurecatMP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/80d0c99d56016aec5ff6894630c58bc495070ec5622da4899c9add08bcd8f36a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/80d0c99d56016aec5ff6894630c58bc495070ec5622da4899c9add08bcd8f36a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/80d0c99d56016aec5ff6894630c58bc495070ec5622da4899c9add08bcd8f36a?s=96&d=mm&r=g","caption":"eurecatMP"}}]}},"_links":{"self":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/posts\/196439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/comments?post=196439"}],"version-history":[{"count":1,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/posts\/196439\/revisions"}],"predecessor-version":[{"id":196441,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/posts\/196439\/revisions\/196441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/media\/196421"}],"wp:attachment":[{"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/media?parent=196439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/categories?post=196439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eurecat.org\/en\/wp-json\/wp\/v2\/tags?post=196439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}