• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

EN 62734:2015

Current

Current

The latest, up-to-date edition.

Industrial networks - Wireless communication network and communication profiles - ISA 100.11a

Published date

23-01-2015

Sorry this product is not available in your region.

FOREWORD
0 Introduction
1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms,
   and conventions
4 Overview
5 System
6 System management role
7 Security
8 Physical layer
9 Data-link layer
10 Network layer
11 Transport layer
12 Application layer
13 Provisioning
Annex A (informative) - User layer/application profiles
Annex B (normative) - Communication role profiles
Annex C (informative) - Background information
Annex D (normative) - Configuration defaults
Annex E (informative) - Use of backbone networks
Annex F (normative) - Basic security concepts - Notation
        and representation
Annex G (informative) - Using certificate chains for
        over-the-air provisioning
Annex H (normative) - Security building blocks
Annex I (informative) - Definition templates
Annex J (informative) - Operations on attributes
Annex K (normative) - Standard object types
Annex L (informative) - Standard data types
Annex M (normative) - Identification of tunneled legacy
        fieldbus protocols
Annex N (informative) - Tunneling and native object mapping
Annex O (informative) - Generic protocol translation
Annex P (informative) - Exemplary GIAP adaptations for this standard
Annex Q (informative) - Exemplary GIAP adaptations for IEC 62591
Annex R (informative) - Host system interface to standard-compliant
        devices via a gateway
Annex S (informative) - Symmetric-key operation test vectors
Annex T (informative) - Data-link and network headers for
        join requests
Annex U (informative) - Gateway role
Annex V (informative) - Compliance with ETSI EN 300 328 v1.8.1
Bibliography
Annex ZA (normative) - Normative references to international
         publications with their corresponding
         European publications

IEC 62734:2014 provides specifications in accordance with the OSI Basic Reference Model, ISO/IEC 7498-1, (e.g., PhL, DL, etc.). It is intended to provide reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications. It defines a protocol suite, including system management, gateway considerations, and security specifications, for low-data-rate wireless connectivity with fixed, portable, and slowly-moving devices, often operating under severe energy and power constraints. The application focus is the performance needs of process automation monitoring and control where end-to-end communication latencies on the order of at least 100 ms can be tolerated.

Committee
CLC/TC 65X
DevelopmentNote
New AMD 1 Child is Added
DocumentType
Standard
ProductNote
New AMD 1 Child is Added
PublisherName
European Committee for Standards - Electrical
Status
Current

Standards Relationship
OVE/ONORM EN 62734 : 2015 Identical
UNE-EN 62734:2015 Identical
I.S. EN 62734:2015 Identical
NF EN 62734 : 2015 Identical
NBN EN 62734 : 2015 Identical
DIN EN 62734:2015-07 Identical
IEC 62734:2014 Identical
CEI EN 62734 : 2015 Identical
BS EN 62734:2015 Identical
PN EN 62734 : 2015 Identical
NEN EN IEC 62734 : 2015 Identical
PNE-FprEN 62734 Identical

TS 103 329 : 1.1.1 WIRELESS INDUSTRIAL APPLICATIONS (WIA); RADIO EQUIPMENT TO BE USED IN THE 5,725 GHZ TO 5,875 GHZ FREQUENCY RANGE WITH POWER LEVEL UP TO 400 MW; METHODS AND CONCEPTS FOR A WIA SYSTEM APPROACH TO SHARING IN THE 5,725 GHZ TO 5,875 GHZ BAND

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 26907:2009 Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard
ISO 18435-2:2012 Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements
ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 7498-3:1997 Information technology — Open Systems Interconnection — Basic Reference Model: Naming and addressing
ISO/IEC 9646-7:1995 Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements
ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
IEC TS 62443-1-1:2009 Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models
ISA 100.11A : 2011 WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS
ISO 2382-12:1988 Information processing systems Vocabulary Part 12: Peripheral equipment
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
NAMUR NE 107 : 2017 SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
IEC 62591:2016 Industrial networks - Wireless communication network and communication profiles - WirelessHART<sup>TM</sup>
IEC TR 62390:2005 Common automation device - Profile guideline
IEEE 802.3-2012 IEEE Standard for Ethernet
IEEE 802.15.4-2011 IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)
EN 300 440-1 : 1.6.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
IEEE 802.1Q-2014 IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks
EN 300 328-1 : 1.3.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS
IEEE 802.11-2016 IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 10731:1994 Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services
ISO/IEC/IEEE 60559:2011 Information technology — Microprocessor Systems — Floating-Point arithmetic
IEC 62657-2:2017 Industrial communication networks - Wireless communication networks - Part 2: Coexistence management
NAMUR NE 105 : 2016 SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
IEC 62601:2015 Industrial networks - Wireless communication network and communication profiles - WIA-PA
IEC 61512-1:1997 Batch control - Part 1: Models and terminology
IEC 62264-1:2013 Enterprise-control system integration - Part 1: Models and terminology
IEC 61804-3:2015 Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics
ISO/IEC 2375:2003 Information technology — Procedure for registration of escape sequences and coded character sets
IEEE 802.16-2012 IEEE Standard for Air Interface for Broadband Wireless Access Systems
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO 3166-1:2013 Codes for the representation of names of countries and their subdivisions Part 1: Country codes
ISA TR100.00.01 : 2006 THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL
ISO 21188:2006 Public key infrastructure for financial services Practices and policy framework
ISO/IEC 2382-14:1997 Information technology Vocabulary Part 14: Reliability, maintainability and availability
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
ISO/IEC 7498-4:1989 Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
IEC 61499-4:2013 Function blocks - Part 4: Rules for compliance profiles
ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.