Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

PD IEC/TS 62351-5:2013

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives

Available format(s)

Hardcopy , PDF

Superseded date

01-03-2023

Superseded by

BS EN IEC 62351-5:2023

Language(s)

English

Published date

31-08-2014

$669.38
Including GST where applicable

Committee
PEL/57
DevelopmentNote
Supersedes DD IEC/TS 62351-5. (08/2014)
DocumentType
Standard
Pages
120
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

This part of IEC 62351 specifies messages, procedures and algorithms for securing the operation of all protocols based on or derived from IEC 60870-5: Telecontrol equipment and systems – Transmission protocols. This Technical Specification applies to at least those protocols listed in Table 1. Table 1 – Scope of application to standards Number Name IEC 60870-5-101 Companion standard for basic telecontrol tasks IEC 60870-5-102 Companion standard for the transmission of integrated totals in electric power systems IEC 60870-5-103 Companion standard for the informative interface of protection equipment IEC 60870-5-104 Network access for IEC 60870-5-101 using standard transport profiles DNP3 Distributed Network Protocol (based on IEC 60870-1 through IEC 60870-5 and controlled by the DNP Users Group) The initial audience for this Technical Specification is intended to be the members of the working groups developing the protocols listed in Table 1. For the measures described in this specification to take effect, they must be accepted and referenced by the specifications for the protocols themselves. This document is written to enable that process. The subsequent audience for this specification is intended to be the developers of products that implement these protocols. Portions of this specification may also be of use to managers and executives in order to understand the purpose and requirements of the work. This part of IEC/TS 62351 focuses only on application layer authentication and security issues arising from such authentication. Other security concerns – in particular, protection from eavesdropping or man-in-the-middle attacks through the use of encryption – are considered to be outside the scope. Encryption may be added through the use of this specification with other specifications. This document is organized working from the general to the specific, as follows: Clauses 2 through 4 provide background terms, definitions, and references. Clause 5 describes the problems this specification is intended to address. Clause 6 describes the mechanism generically without reference to a specific protocol. Clauses 7 and 8 describe the mechanism more precisely and are the primary normative part of this specification. Clause 9 describes a few particular implementation issues that are special cases. Clause 10 describes the requirements for other standards referencing this specification. Clause 11 describes the Protocol Implementation Conformance Statement (PICS) for this mechanism. Unless specifically labelled as informative or optional, all clauses of this specification are normative.

Standards Relationship
IEC TS 62351-5:2013 Identical

IEC 60870-5-102:1996 Telecontrol equipment and systems - Part 5: Transmission protocols - Section 102: Companion standard for the transmission of integrated totals in electric power systems
IEC TS 62351-3:2007 Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
IEC 60870-5-104:2006+AMD1:2016 CSV Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles
IEC 60870-5-103:1997 Telecontrol equipment and systems - Part 5-103: Transmission protocols - Companion standard for the informative interface of protection equipment
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
IEC 60870-5-101:2003+AMD1:2015 CSV Telecontrol equipment and systems - Part 5-101: Transmissionprotocols - Companion standard for basic telecontrol tasks
IEC TS 62351-1:2007 Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues
IEC TR 60870-1-3:1997 Telecontrol equipment and systems - Part 1: General considerations - Section 3: Glossary
IEC TS 62351-8:2011 Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more