BS EN 62734:2015
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
Hardcopy , PDF
15-09-2022
English
31-01-2015
Committee |
GEL/65/3
|
DevelopmentNote |
Supersedes BS PD IEC/PAS 62734 & 12/30259506 DC. (02/2015)
|
DocumentType |
Standard
|
Pages |
872
|
PublisherName |
British Standards Institution
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
IEC 62734:2014 provides specifications in accordance with the OSI Basic Reference Model, ISO/IEC 7498-1, (e.g., PhL, DL, etc.). It is intended to provide reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications. It defines a protocol suite, including system management, gateway considerations, and security specifications, for low-data-rate wireless connectivity with fixed, portable, and slowly-moving devices, often operating under severe energy and power constraints. The application focus is the performance needs of process automation monitoring and control where end-to-end communication latencies on the order of at least 100 ms can be tolerated.
Standards | Relationship |
IEC 62734:2014 | Identical |
EN 62734:2015 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 26907:2009 | Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard |
ISO 18435-2:2012 | Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 7498-3:1997 | Information technology — Open Systems Interconnection — Basic Reference Model: Naming and addressing |
ISO/IEC 9646-7:1995 | Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements |
ISO/IEC 7498-1:1994 | Information technology Open Systems Interconnection Basic Reference Model: The Basic Model |
IEC TS 62443-1-1:2009 | Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models |
ISA 100.11A : 2011 | WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS |
ISO 2382-12:1988 | Information processing systems Vocabulary Part 12: Peripheral equipment |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
NAMUR NE 107 : 2017 | SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
IEC 62591:2016 | Industrial networks - Wireless communication network and communication profiles - WirelessHART<sup>TM</sup> |
IEC TR 62390:2005 | Common automation device - Profile guideline |
IEEE 802.3-2012 | IEEE Standard for Ethernet |
IEEE 802.15.4-2011 | IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
EN 300 440-1 : 1.6.1 | ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
IEEE 802.1Q-2014 | IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks |
EN 300 328-1 : 1.3.1 | ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS |
IEEE 802.11-2016 | IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 10731:1994 | Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services |
ISO/IEC/IEEE 60559:2011 | Information technology — Microprocessor Systems — Floating-Point arithmetic |
IEC 62657-2:2017 | Industrial communication networks - Wireless communication networks - Part 2: Coexistence management |
NAMUR NE 105 : 2016 | SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
IEC 62601:2015 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
IEC 61512-1:1997 | Batch control - Part 1: Models and terminology |
IEC 62264-1:2013 | Enterprise-control system integration - Part 1: Models and terminology |
IEC 61804-3:2015 | Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics |
ISO/IEC 2375:2003 | Information technology — Procedure for registration of escape sequences and coded character sets |
IEEE 802.16-2012 | IEEE Standard for Air Interface for Broadband Wireless Access Systems |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 646:1991 | Information technology ISO 7-bit coded character set for information interchange |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO 3166-1:2013 | Codes for the representation of names of countries and their subdivisions Part 1: Country codes |
ISA TR100.00.01 : 2006 | THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL |
ISO 21188:2006 | Public key infrastructure for financial services Practices and policy framework |
ISO/IEC 2382-14:1997 | Information technology Vocabulary Part 14: Reliability, maintainability and availability |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
ISO/IEC 7498-4:1989 | Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
IEC 61499-4:2013 | Function blocks - Part 4: Rules for compliance profiles |
ANSI X9.82-1 : 2006(R2013) | RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES |
ISO/IEC 18028-3:2005 | Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.