X. Peng, C. Lin, "Architecture of Trustworthy Networks," 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), pp. 269-276, 2006. http://doi.ieeecomputersociety.org/10.1109/DASC.2006.20 Abstract Existing isolated and add-on secure systems are rarely robust under attack, misoperation and internal faults. Secure communication only offers little protection if one ore more components are compromised, and are not sufficient for holistic and systemic security. This paper proposes the concept of trustworthy networks, which makes advances along these traditional researches on network security in combination. We outline the key challenges in constructing trustworthy networks, and define three properties, namely security, survivability and controllability. Consulting human interactions, the abstract architecture for trustworthy networks is proposed, depicting protocols layers, topology structure, entities and components, and protocol steps.