• Shopping Cart
    There are no items in your cart

BS EN 62734:2015

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Industrial networks. Wireless communication network and communication profiles. ISA 100.11a

Available format(s)

Hardcopy , PDF

Withdrawn date

09-15-2022

Superseded by

BS EN 62734:2015+A1:2019

Language(s)

English

Published date

01-31-2015

US$737.12
Excluding Tax where applicable

Committee
GEL/65/3
DevelopmentNote
Supersedes BS PD IEC/PAS 62734 & 12/30259506 DC. (02/2015)
DocumentType
Standard
Pages
872
PublisherName
British Standards Institution
Status
Withdrawn
SupersededBy
Supersedes

IEC 62734:2014 provides specifications in accordance with the OSI Basic Reference Model, ISO/IEC 7498-1, (e.g., PhL, DL, etc.). It is intended to provide reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications. It defines a protocol suite, including system management, gateway considerations, and security specifications, for low-data-rate wireless connectivity with fixed, portable, and slowly-moving devices, often operating under severe energy and power constraints. The application focus is the performance needs of process automation monitoring and control where end-to-end communication latencies on the order of at least 100 ms can be tolerated.

Standards Relationship
IEC 62734:2014 Identical
EN 62734:2015 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 26907:2009 Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard
ISO 18435-2:2012 Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements
ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 7498-3:1997 Information technology — Open Systems Interconnection — Basic Reference Model: Naming and addressing
ISO/IEC 9646-7:1995 Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements
ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
IEC TS 62443-1-1:2009 Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models
ISA 100.11A : 2011 WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS
ISO 2382-12:1988 Information processing systems Vocabulary Part 12: Peripheral equipment
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
NAMUR NE 107 : 2017 SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
IEC 62591:2016 Industrial networks - Wireless communication network and communication profiles - WirelessHART<sup>TM</sup>
IEC TR 62390:2005 Common automation device - Profile guideline
IEEE 802.3-2012 IEEE Standard for Ethernet
IEEE 802.15.4-2011 IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)
EN 300 440-1 : 1.6.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
IEEE 802.1Q-2014 IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks
EN 300 328-1 : 1.3.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS
IEEE 802.11-2016 IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 10731:1994 Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services
ISO/IEC/IEEE 60559:2011 Information technology — Microprocessor Systems — Floating-Point arithmetic
IEC 62657-2:2017 Industrial communication networks - Wireless communication networks - Part 2: Coexistence management
NAMUR NE 105 : 2016 SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
IEC 62601:2015 Industrial networks - Wireless communication network and communication profiles - WIA-PA
IEC 61512-1:1997 Batch control - Part 1: Models and terminology
IEC 62264-1:2013 Enterprise-control system integration - Part 1: Models and terminology
IEC 61804-3:2015 Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics
ISO/IEC 2375:2003 Information technology — Procedure for registration of escape sequences and coded character sets
IEEE 802.16-2012 IEEE Standard for Air Interface for Broadband Wireless Access Systems
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO 3166-1:2013 Codes for the representation of names of countries and their subdivisions Part 1: Country codes
ISA TR100.00.01 : 2006 THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL
ISO 21188:2006 Public key infrastructure for financial services Practices and policy framework
ISO/IEC 2382-14:1997 Information technology Vocabulary Part 14: Reliability, maintainability and availability
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
ISO/IEC 7498-4:1989 Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
IEC 61499-4:2013 Function blocks - Part 4: Rules for compliance profiles
ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.