Application of trusted network technology to industrial control networks

Hamed Okhravi, David M. Nicol

Research output: Contribution to journalArticle

Abstract

Interconnections between industrial control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

Original languageEnglish (US)
Pages (from-to)84-94
Number of pages11
JournalInternational Journal of Critical Infrastructure Protection
Volume2
Issue number3
DOIs
StatePublished - Oct 1 2009

Keywords

  • Firewalls
  • Industrial control systems
  • Security architecture
  • Trusted networks

ASJC Scopus subject areas

  • Modeling and Simulation
  • Safety, Risk, Reliability and Quality
  • Computer Science Applications
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Application of trusted network technology to industrial control networks'. Together they form a unique fingerprint.

Cite this