Applying trusted network technology to process control systems

Hamed Okhravi, David Nicol

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

Original languageEnglish (US)
Title of host publicationCritical Infrastructure Protection II
EditorsMauricio Papa, Sujeet Shenoi
Pages57-70
Number of pages14
DOIs
StatePublished - 2008
Externally publishedYes

Publication series

NameIFIP International Federation for Information Processing
Volume290
ISSN (Print)1571-5736

Keywords

  • Process control system
  • Security architectures
  • Trusted networks

ASJC Scopus subject areas

  • Information Systems and Management

Fingerprint Dive into the research topics of 'Applying trusted network technology to process control systems'. Together they form a unique fingerprint.

Cite this