UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

- Trained on our vast library of engineering resources.

IEC/TS 62351-5

Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives

active, Most Current
Buy Now
Organization: IEC
Publication Date: 1 April 2013
Status: active
Page Count: 120
ICS Code (Telecontrol. Telemetering): 33.200
scope:

Scope and object

This part of IEC 62351 specifies messages, procedures and algorithms for securing the operation of all protocols based on or derived from IEC 60870-5: Telecontrol equipment and systems - Transmission protocols.

The initial audience for this Technical Specification is intended to be the members of the working groups developing the protocols listed in Table 1. For the measures described in this specification to take effect, they must be accepted and referenced by the specifications for the protocols themselves. This document is written to enable that process.

The subsequent audience for this specification is intended to be the developers of products that implement these protocols.

Portions of this specification may also be of use to managers and executives in order to understand the purpose and requirements of the work.

This part of IEC/TS 62351 focuses only on application layer authentication and security issues arising from such authentication. Other security concerns - in particular, protection from eavesdropping or man-in-the-middle attacks through the use of encryption - are considered to be outside the scope. Encryption may be added through the use of this specification with other specifications.

This document is organized working from the general to the specific, as follows:

• Clauses 2 through 4 provide background terms, definitions, and references.

• Clause 5 describes the problems this specification is intended to address.

• Clause 6 describes the mechanism generically without reference to a specific protocol.

• Clauses 7 and 8 describe the mechanism more precisely and are the primary normative part of this specification.

• Clause 9 describes a few particular implementation issues that are special cases.

• Clause 10 describes the requirements for other standards referencing this specification.

• Clause 11 describes the Protocol Implementation Conformance Statement (PICS) for this mechanism.

Unless specifically labelled as informative or optional, all clauses of this specification are normative.

 

Document History

January 1, 2023
Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives
This part of IEC 62351 defines the application profile (A-profile) secure communication mechanism specifying messages, procedures and algorithms for securing the operation of all protocols based on...
IEC/TS 62351-5
April 1, 2013
Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives
Scope and object This part of IEC 62351 specifies messages, procedures and algorithms for securing the operation of all protocols based on or derived from IEC 60870-5: Telecontrol equipment and...
August 1, 2009
Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives
This part of IEC 62351 specifies messages, procedures and algorithms for securing the operation of all protocols based on or derived from the standard IEC 60870-5: Telecontrol equipment and systems –...

References

Advertisement