Skip to main content

WiFi dans les trains : Le guide complet pour les opérateurs ferroviaires et les passagers

Ce guide de référence détaille l'architecture, les défis de déploiement et les opportunités commerciales du WiFi passager dans les trains. Conçu pour les dirigeants informatiques et opérationnels, il aborde l'agrégation du backhaul, la segmentation du réseau et la manière de transformer une obligation de conformité en analyses passagers exploitables.

📖 4 min de lecture📝 810 mots🔧 2 exemples3 questions📚 8 termes clés

🎧 Écouter ce guide

Voir la transcription
TRAIN WIFI: THE COMPLETE GUIDE FOR RAIL OPERATORS AND PASSENGERS A Purple WiFi Intelligence Podcast Runtime: Approximately 10 minutes --- [INTRODUCTION & CONTEXT — 1 minute] Welcome to the Purple WiFi Intelligence podcast. I'm your host, and today we're tackling one of the most technically complex and commercially significant connectivity challenges in the transport sector: passenger WiFi on trains. If you're a rail operator, a network architect working with a train operating company, or an IT director responsible for rolling stock connectivity, this episode is built for you. We're going to cover the full picture — from the physical architecture of how WiFi actually gets onto a moving train, through to the security risks your passengers face, the compliance obligations you carry, and the analytics opportunity that most operators are leaving on the table. Let's start with a number that sets the scene. According to Ookla's Speedtest Intelligence data from Q2 2025, the gap between Europe's best and worst train WiFi is staggering. Sweden delivers a median download speed of 64.58 megabits per second on its rail network. The United Kingdom, by contrast, delivers just 1.09 megabits per second. That's a 59-fold difference — on the same continent, in the same year. That gap isn't primarily a technology problem. It's a policy and investment problem. And understanding why is the first step to fixing it. --- [TECHNICAL DEEP-DIVE — 5 minutes] Let's get into the architecture. A modern passenger WiFi deployment on a train has three distinct layers, and most operators underinvest in the wrong one. The first layer is the WAN backhaul — the connection between the train and the outside world. This is where your data actually comes from. Historically, this was a single LTE modem with a roof-mounted antenna. Modern deployments aggregate multiple uplinks simultaneously: two or more LTE or 5G modems from different mobile network operators, trackside WiFi in stations and depots, and increasingly, low-Earth-orbit satellite connectivity from providers like Starlink. The aggregation logic — deciding which uplink to use, how to bond them, and how to fail over gracefully — runs on a WAN gateway device mounted in the train's equipment bay. This is the layer that determines your ceiling. You can have the most sophisticated onboard WiFi infrastructure imaginable, but if your backhaul is a single congested LTE connection in a rural cutting, your passengers will notice. Ookla's data confirms this: countries with modern WiFi hardware but poor backhaul infrastructure — like Spain and Italy — still underperform on real-world speeds. Backhaul is the dominant bottleneck. The second layer is the onboard network itself. This is where the WAN gateway connects to an onboard router and, typically, a rail server. The router handles VLAN segmentation — and this is critically important from a security perspective. Your passenger WiFi must run on a completely isolated VLAN, with no routing path to the operational network that carries your CCTV feeds, your Passenger Information System, your automatic ticketing systems, or — most critically — your European Train Control System signalling data. In 2024, a cyberattack on a UK passenger WiFi network demonstrated exactly what happens when this segmentation is inadequate. The attack propagated from the public-facing WiFi into systems it should never have been able to reach. IEEE 802.1X port-based authentication and strict inter-VLAN firewall rules are non-negotiable here. The rail server layer adds containerised application hosting — think local content caching, onboard entertainment portals, real-time journey information displays, and captive portal services. Running these locally means passengers get a responsive experience even when backhaul connectivity degrades in tunnels or rural sections. The third layer is the passenger-facing WiFi itself. This is where your access points live — typically ceiling-mounted throughout each carriage, operating on 802.11ac WiFi 5 or, in newer deployments, 802.11ax WiFi 6. Here's a critical finding from the Ookla data: in Germany, switching from WiFi 4 to WiFi 5 delivers a 241% speed improvement for passengers. Switching from the 2.4 gigahertz band to 5 gigahertz delivers a 328% improvement. Yet across Europe, nearly 40% of train WiFi connections still run on WiFi 4, and the UK has over half of all connections on that legacy standard. The cabin hardware upgrade cycle is overdue. Now, there's one physical challenge that's unique to trains and genuinely difficult to solve: RF attenuation through modern rolling stock windows. Contemporary train windows often incorporate metallic coatings for thermal insulation and UV filtering. These coatings can attenuate mobile signals by 20 to 30 decibels — more than a layer of reinforced concrete. This is why roof-mounted antennas feeding internal repeaters are essential, rather than relying on passengers' devices to connect directly to trackside infrastructure. Some operators are now pursuing RF-permeable window retrofits, but this is a significant capital programme. On the backhaul evolution front, the most exciting development right now is LEO satellite integration. Starlink's maritime and mobility product has demonstrated sustained throughputs of 100 to 200 megabits per second on moving vehicles, with latency in the 20 to 40 millisecond range — genuinely usable for video conferencing. Several European operators are in active trials. The economics are improving rapidly, and for rural and cross-border routes where terrestrial mobile coverage is patchy, LEO satellite is increasingly the pragmatic solution. Let's talk about the captive portal and data layer, because this is where the commercial opportunity sits — and where most operators are leaving significant value on the table. When a passenger connects to your WiFi, the captive portal is your primary touchpoint. Done well, it captures a verified email address or social login, presents your terms of service and privacy notice in a GDPR-compliant format, and begins building a first-party data profile of that passenger's journey behaviour. Done badly, it's a friction-heavy obstacle that passengers abandon, or worse, a compliance liability. Under GDPR, you need a lawful basis for processing passenger data — typically consent, obtained at the point of connection. That consent must be freely given, specific, informed, and unambiguous. Pre-ticked boxes don't count. You need a clear record of when consent was given, what was consented to, and the ability to honour subject access requests and deletion requests. Platforms like Purple's Guest WiFi solution handle this compliance layer natively, with audit-ready consent logs and automated data retention policies. The analytics that flow from compliant data collection are genuinely valuable. Journey frequency, peak connection times, carriage occupancy patterns, dwell time at stations — this is operational intelligence that feeds into capacity planning, service design, and targeted communications. It's the same data model that retailers and hospitality operators have been using for years, now available to rail operators through the WiFi access layer. --- [IMPLEMENTATION RECOMMENDATIONS & PITFALLS — 2 minutes] Let me give you the three decisions that will make or break your deployment. First: invest in backhaul before you invest in cabin hardware. A state-of-the-art WiFi 6 access point network fed by a single congested LTE modem will disappoint passengers. Audit your route coverage first. Identify the black spots — tunnels, rural cuttings, cross-border sections. Design your uplink aggregation strategy around those gaps. Consider multi-operator SIM bonding as a minimum, and evaluate LEO satellite for routes where terrestrial coverage is genuinely inadequate. Second: treat network segmentation as a safety-critical requirement, not an IT best practice. Your passenger WiFi and your operational network must be on separate VLANs with explicit deny-all inter-VLAN firewall rules. Penetration test the boundary annually. The 2024 UK incident should be a wake-up call for every operator that hasn't done this audit. Third: don't deploy a captive portal without a data strategy. If you're going to ask passengers to register, give them a reason to do so — faster speeds, journey updates, loyalty points — and have a clear plan for what you'll do with the data you collect. A captive portal that collects data with no downstream use is a compliance risk with no commercial upside. The pitfalls to avoid: Don't underestimate the coupling scenario. When multiple train units are joined, your network topology changes dynamically. Your onboard routing must handle inter-unit connectivity without creating bridging loops or VLAN mismatches. Test this explicitly in your acceptance testing. And don't neglect remote management. Every onboard router needs out-of-band management access — typically via a dedicated management VLAN and VPN — so your NOC can diagnose and remediate issues without sending an engineer to the depot. --- [RAPID-FIRE Q&A — 1 minute] Quick fire. Should I deploy WiFi 6 or stick with WiFi 5? If you're specifying new rolling stock, WiFi 6 — the per-device efficiency gains in crowded carriages are significant. For existing fleets, WiFi 5 upgrades deliver strong ROI. Is Starlink ready for production rail deployments? For rural and cross-border routes, yes. For urban commuter services with frequent tunnel sections, it's a complement to cellular, not a replacement. What's the minimum viable captive portal for GDPR compliance? A clear privacy notice, explicit opt-in consent for marketing, a record of that consent, and a documented data retention policy. Anything less is a regulatory exposure. Should passengers use a VPN on train WiFi? Yes, if they're handling sensitive business data. The network is shared and the operator's security posture is unknown to the passenger. --- [SUMMARY & NEXT STEPS — 1 minute] To wrap up: train WiFi is a multi-layer engineering challenge where backhaul quality is the dominant performance variable, security segmentation is a safety-critical requirement, and the captive portal is an underutilised commercial asset. The operators winning on passenger satisfaction — LNER in the UK, the Swedish national network, SBB in Switzerland — have treated connectivity as core infrastructure, not an afterthought. They've invested in trackside coverage, modern onboard hardware, and compliant data platforms. If you're planning a deployment or an upgrade cycle, start with a backhaul audit, design your VLAN architecture with security as the primary constraint, and choose a guest WiFi platform that handles compliance natively and turns connection data into actionable analytics. Purple's platform is built for exactly this use case — from the captive portal and consent management layer through to the WiFi analytics dashboard that gives your operations team visibility into passenger behaviour across your entire fleet. You can find out more at purple.ai, or explore the transport industry section directly. Thanks for listening. Until next time. --- END OF SCRIPT

header_image.png

Résumé Exécutif

Pour les opérateurs ferroviaires, un WiFi de haute qualité dans les trains est passé d'un avantage pour les passagers à une infrastructure opérationnelle essentielle. L'écart entre les déploiements de pointe et les systèmes hérités est frappant : les données d'Ookla pour le T2 2025 montrent que la Suède offre des vitesses de téléchargement médianes de 64,58 Mbps, tandis que le Royaume-Uni stagne à 1,09 Mbps [1]. Cette différence de 59 fois n'est pas principalement un problème technologique ; c'est un échec d'architecture et de stratégie d'investissement.

Ce guide fournit un modèle neutre vis-à-vis des fournisseurs pour les directeurs informatiques, les architectes réseau et les responsables des opérations de site. Nous analysons l'architecture à trois couches requise pour une connectivité embarquée résiliente, explorons l'exigence de sécurité critique de la segmentation du réseau et démontrons comment des plateformes comme Guest WiFi transforment les données de connexion brutes en intelligence commerciale exploitable. Que vous gériez une ligne interurbaine à grande vitesse ou un service de banlieue régional, les principes d'agrégation du backhaul et de capture de données conforme au GDPR restent identiques.

Plongée Technique : L'Architecture à Trois Couches

Un déploiement WiFi moderne dans les trains est fondamentalement différent des déploiements statiques que l'on trouve dans le Commerce de Détail ou l' Hôtellerie . Le réseau doit maintenir la persistance de session tout en se déplaçant à 300 km/h, en passant d'une cellule de voie à l'autre et en pénétrant le matériel roulant fortement isolé.

architecture_overview.png

Couche 1 : Backhaul WAN et Agrégation

Le plafond de votre expérience passager est entièrement dicté par votre capacité de backhaul. Un seul modem LTE avec une antenne montée sur le toit n'est plus viable. Les architectures modernes utilisent une WAN Gateway pour agréger plusieurs liaisons montantes :

  • Agrégation Cellulaire : Combinaison de connexions 4G/5G de plusieurs opérateurs de réseaux mobiles (MNO) pour atténuer les zones blanches de couverture d'un seul réseau.
  • Infrastructure Latérale de Voie : Réseaux sans fil dédiés 5 GHz ou 60 GHz déployés le long du corridor ferroviaire.
  • Satellite LEO : Constellations en orbite terrestre basse (par exemple, Starlink) offrant un débit de 100-200 Mbps dans les sections rurales ou transfrontalières où le cellulaire terrestre échoue [2].

Couche 2 : Le Réseau Embarqué et la Segmentation

La WAN Gateway alimente un routeur embarqué et un serveur ferroviaire. Cette couche gère la tâche critique de la Segmentation du Réseau.

> "Le WiFi passager doit fonctionner sur un VLAN complètement isolé, sans chemin de routage vers le réseau opérationnel qui transporte les flux CCTV, les systèmes d'information passagers (PIS) ou les données de signalisation du système européen de contrôle des trains (ETCS)."

Une cyberattaque en 2024 sur un réseau WiFi passager au Royaume-Uni a démontré les risques graves d'une segmentation inadéquate, où des vulnérabilités exposées au public ont compromis une infrastructure terminale plus large [3]. La mise en œuvre de l'authentification basée sur les ports IEEE 802.1X et de règles de pare-feu inter-VLAN strictes est une exigence de sécurité non négociable. De plus, le serveur ferroviaire offre un hébergement d'applications conteneurisées, permettant aux services de mise en cache de contenu local et de portail captif de fonctionner même lorsque la connectivité backhaul est interrompue.

Couche 3 : Accès Passager et Matériel de Cabine

La dernière couche est constituée des points d'accès (AP) distribués dans toutes les voitures. Le matériel hérité est un frein important aux performances. En Allemagne, la mise à niveau du WiFi 4 (802.11n) vers le WiFi 5 (802.11ac) a entraîné une amélioration de la vitesse de 241 %, tandis que le déplacement du trafic de la bande 2,4 GHz vers 5 GHz a généré une augmentation de 328 % [1]. Pourtant, près de 40 % des connexions ferroviaires européennes reposent encore sur le WiFi 4.

comparison_chart.png

Guide d'Implémentation : Déploiement et Conformité

Le déploiement du WiFi dans les trains est un projet d'intégration de systèmes complexe. Les étapes suivantes décrivent une stratégie de déploiement robuste :

  1. Réaliser un Audit du Backhaul : Avant de spécifier les AP de cabine, auditez votre itinéraire pour détecter les lacunes de couverture cellulaire. Concevez votre stratégie d'agrégation de liaisons montantes autour de ces zones blanches.
  2. Spécifier des Fenêtres Perméables aux RF : Les fenêtres de train modernes utilisent des revêtements métalliques pour l'efficacité thermique, ce qui peut atténuer les signaux cellulaires de 20 à 30 dB. Des antennes montées sur le toit alimentant des AP internes sont obligatoires pour surmonter cela.
  3. Mettre en Œuvre un Portail Captif Robuste : Le portail captif est l'interface principale entre le passager et l'opérateur. Il doit capturer en toute sécurité les identifiants vérifiés (e-mail ou connexion sociale) tout en présentant les conditions de service.
  4. Assurer la Conformité au GDPR : Les opérateurs doivent établir une base légale pour le traitement des données des passagers. Le consentement doit être donné librement et enregistré sans ambiguïté. Protégez Votre Réseau avec un DNS et une Sécurité Robustes est une considération essentielle ici.

ROI et Impact Commercial : Transformer les Données en Intelligence

Fournir du WiFi gratuit représente une dépense opérationnelle significative. Pour générer un ROI, les opérateurs doivent exploiter la couche de connexion pour collecter des données de première partie.

Lorsque les passagers s'authentifient via un portail captif conforme, les opérateurs peuvent créer des profils riches de comportement de voyage. C'est là que WiFi Analytics devient transformateur. En analysant les fréquences de connexion, les temps d'arrêt dans des gares spécifiques et les schémas d'occupation des voitures, les opérateurs obtiennent une intelligence opérationnelle qui rivalise avec les informations recueillies dans les pôles de Transport et les aéroports.

Par exemple, comprendre qu'une cohorte spécifique de voyageurs d'affaires se connecte systématiquement sur le service de 07h30 permet des communications marketing ciblées et à forte valeur ajoutée ou l'intégration de programmes de fidélité. Cette approche basée sur les données transforme le réseau WiFi en fd'un centre de coûts à un actif générateur de revenus.

Écoutez le briefing

Pour une analyse plus approfondie de l'architecture et de la stratégie commerciale, écoutez notre briefing technique complet :


Références : [1] Ookla Speedtest Intelligence, "Fast Trains, Slow Wi-Fi: The Reality of Onboard Connectivity in Europe and Asia", T2 2025. [2] Essais industriels, Intégration de satellites LEO pour la mobilité, 2024-2025. [3] Railway Technology, "UK passenger wifi network hacked", Septembre 2024.

Termes clés et définitions

WAN Aggregation

The process of combining multiple Wide Area Network connections (e.g., two 5G connections and a satellite link) into a single logical connection to increase throughput and resilience.

Critical for trains moving through varying cellular coverage areas to prevent dropped connections.

Network Segmentation (VLAN)

Dividing a computer network into smaller, isolated sub-networks. Virtual Local Area Networks (VLANs) keep traffic separated logically even if it shares the same physical switches.

Essential for preventing a compromised passenger device from accessing critical train control systems.

Captive Portal

A web page that a user of a public-access network is obliged to view and interact with before access is granted.

Used to enforce terms of service, collect user data, and secure GDPR consent.

RF Attenuation

The reduction in signal strength as radio waves pass through a medium.

Modern train windows with metallic thermal coatings cause massive RF attenuation, requiring roof-mounted antennas.

LEO Satellite

Low Earth Orbit satellites that operate much closer to Earth than traditional geostationary satellites, offering lower latency and higher bandwidth.

Increasingly used as a backhaul solution for trains in rural or cross-border areas.

IEEE 802.1X

An IEEE Standard for port-based Network Access Control (PNAC), providing an authentication mechanism to devices wishing to attach to a LAN or WLAN.

Used to secure the operational network interfaces on the train from unauthorized access.

Rail Server

A ruggedized onboard computer designed to host containerized applications locally on the train.

Used to host local entertainment, caching, and captive portal services to reduce reliance on the WAN link.

First-Party Data

Information a company collects directly from its customers and owns.

The primary commercial output of a properly configured Guest WiFi network.

Études de cas

A regional rail operator running 4-carriage commuter trains through a mix of dense urban areas and deep rural valleys is experiencing severe passenger complaints regarding WiFi dropouts. Their current setup uses a single 4G LTE modem per train. How should they redesign their architecture?

  1. Upgrade the WAN Backhaul: Replace the single LTE modem with a WAN Gateway capable of uplink aggregation. Install dual-SIM routers using two different Mobile Network Operators (MNOs) to provide failover in urban areas.
  2. Address Rural Gaps: For the deep valleys where cellular coverage is non-existent, integrate a LEO satellite terminal (e.g., Starlink Mobility) into the WAN Gateway as a secondary aggregated link.
  3. Local Caching: Deploy an onboard rail server to cache the captive portal and key journey information locally, ensuring the passenger UI remains responsive even during brief total connection losses in tunnels.
Notes de mise en œuvre : This approach correctly identifies backhaul as the primary bottleneck. By aggregating multiple terrestrial links and adding a satellite failover, the operator ensures session persistence. The addition of local caching demonstrates an understanding of the passenger experience during unavoidable micro-outages.

An intercity rail franchise is upgrading its fleet and wants to use the new onboard WiFi to gather passenger analytics for marketing, similar to how [Retail](/industries/retail) venues operate. What compliance and technical steps must they take?

  1. Captive Portal Deployment: Implement a robust captive portal that requires users to authenticate via email or social login before accessing the internet.
  2. GDPR Compliance: Ensure the portal explicitly asks for opt-in consent for marketing communications. Pre-ticked boxes must not be used. The system must log the timestamp and version of the privacy policy consented to.
  3. Analytics Integration: Route the authenticated session data into a centralized WiFi Analytics platform to track journey frequency, dwell time, and cross-reference with ticketing data where permissible.
Notes de mise en œuvre : This solution addresses both the technical mechanism (captive portal) and the critical legal requirement (GDPR explicit consent). It successfully bridges the gap between providing a service and extracting commercial value safely.

Analyse de scénario

Q1. Your CTO wants to upgrade all carriage access points to WiFi 6 to solve passenger complaints about slow internet speeds. Your current backhaul is a single 4G connection. What is the correct architectural response?

💡 Astuce :Consider where the actual bottleneck in the data flow is occurring.

Afficher l'approche recommandée

Advise the CTO to halt the AP upgrade and invest the budget in a WAN Gateway capable of uplink aggregation. Upgrading to WiFi 6 will improve local device-to-AP speeds within the carriage, but the total throughput to the internet remains choked by the single 4G connection. Fix the backhaul bottleneck first.

Q2. During a network design review, an engineer suggests routing the train's CCTV data through the same router interfaces as the passenger WiFi to save on cabling costs. How do you respond?

💡 Astuce :Consider the security implications of mixing public and operational traffic.

Afficher l'approche recommandée

Reject the proposal immediately. Passenger WiFi and operational systems like CCTV must be strictly segmented into isolated VLANs with deny-all firewall rules between them. Mixing this traffic creates a critical security vulnerability, potentially allowing a malicious actor on the public WiFi to access or disrupt train operations.

Q3. The marketing team wants to automatically subscribe all passengers who use the free WiFi to a weekly newsletter to boost engagement. What must you configure on the captive portal to ensure this is legal?

💡 Astuce :Review the requirements for lawful data processing under GDPR.

Afficher l'approche recommandée

You must configure the captive portal to include an explicit, unticked opt-in checkbox for marketing communications. Automatic subscription or pre-ticked boxes violate GDPR requirements for freely given, unambiguous consent. The system must also log the timestamp of this consent for audit purposes.