Applying trusted network technology to process control systems

Hamed Okhravi, David Nicol

Research output: Chapter in Book/Report/Conference proceedingChapter


Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

Original languageEnglish (US)
Title of host publicationCritical Infrastructure Protection II
EditorsMauricio Papa, Sujeet Shenoi
Number of pages14
StatePublished - 2008
Externally publishedYes

Publication series

NameIFIP International Federation for Information Processing
ISSN (Print)1571-5736


  • Process control system
  • Security architectures
  • Trusted networks

ASJC Scopus subject areas

  • Information Systems and Management

Fingerprint Dive into the research topics of 'Applying trusted network technology to process control systems'. Together they form a unique fingerprint.

Cite this