• I.S. EN 62734:2015

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A

    Available format(s):  Hardcopy, PDF

    Superseded date:  29-10-2019

    Language(s):  English

    Published date:  01-01-2015

    Publisher:  National Standards Authority of Ireland

    For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
    Only cited Standards give presumption of conformance to New Approach Directives/Regulations.

    Dates of withdrawal of national standards are available from NSAI.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    FOREWORD
    0 Introduction
    1 Scope
    2 Normative references
    3 Terms, definitions, abbreviated terms, acronyms,
       and conventions
    4 Overview
    5 System
    6 System management role
    7 Security
    8 Physical layer
    9 Data-link layer
    10 Network layer
    11 Transport layer
    12 Application layer
    13 Provisioning
    Annex A (informative) - User layer/application profiles
    Annex B (normative) - Communication role profiles
    Annex C (informative) - Background information
    Annex D (normative) - Configuration defaults
    Annex E (informative) - Use of backbone networks
    Annex F (normative) - Basic security concepts - Notation
            and representation
    Annex G (informative) - Using certificate chains for
            over-the-air provisioning
    Annex H (normative) - Security building blocks
    Annex I (informative) - Definition templates
    Annex J (informative) - Operations on attributes
    Annex K (normative) - Standard object types
    Annex L (informative) - Standard data types
    Annex M (normative) - Identification of tunneled legacy
            fieldbus protocols
    Annex N (informative) - Tunneling and native object mapping
    Annex O (informative) - Generic protocol translation
    Annex P (informative) - Exemplary GIAP adaptations for this standard
    Annex Q (informative) - Exemplary GIAP adaptations for IEC 62591
    Annex R (informative) - Host system interface to standard-compliant
            devices via a gateway
    Annex S (informative) - Symmetric-key operation test vectors
    Annex T (informative) - Data-link and network headers for
            join requests
    Annex U (informative) - Gateway role
    Annex V (informative) - Compliance with ETSI EN 300 328 v1.8.1
    Bibliography
    Annex ZA (normative) - Normative references to international
             publications with their corresponding European
             publications

    Abstract - (Show below) - (Hide below)

    Defines a method of reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications.

    General Product Information - (Show below) - (Hide below)

    Development Note For CENELEC adoptions of IEC publications, please check www.iec.ch to be sure that you have any corrigenda that may apply. (01/2017)
    Document Type Standard
    Publisher National Standards Authority of Ireland
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
    ISO/IEC 26907:2009 Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard
    ISO 18435-2:2012 Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements
    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ISO/IEC 7498-3:1997 Information technology Open Systems Interconnection Basic Reference Model: Naming and addressing
    ISO/IEC 9646-7:1995 Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements
    ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
    IEC TS 62443-1-1:2009 Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models
    ISA 100.11A : 2011 WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS
    ISO 2382-12:1988 Information processing systems Vocabulary Part 12: Peripheral equipment
    ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
    NAMUR NE 107 : 2017 SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    IEC 62591:2016 Industrial networks - Wireless communication network and communication profiles - WirelessHARTTM
    IEC TR 62390:2005 Common automation device - Profile guideline
    IEEE 802.3-2012 IEEE Standard for Ethernet
    IEEE 802.15.4-2011 IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)
    EN 300 440-1 : 1.6.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
    IEEE 802.1Q-2014 IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks
    EN 300 328-1 : 1.3.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS
    IEEE 802.11-2016 IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 10731:1994 Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services
    ISO/IEC/IEEE 60559:2011 Information technology Microprocessor Systems Floating-Point arithmetic
    IEC 62657-2:2017 Industrial communication networks - Wireless communication networks - Part 2: Coexistence management
    NAMUR NE 105 : 2016 SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES
    ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
    FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
    IEC 62601:2015 Industrial networks - Wireless communication network and communication profiles - WIA-PA
    IEC 61512-1:1997 Batch control - Part 1: Models and terminology
    IEC 62264-1:2013 Enterprise-control system integration - Part 1: Models and terminology
    IEC 61804-3:2015 Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics
    ISO/IEC 2375:2003 Information technology — Procedure for registration of escape sequences and coded character sets
    IEEE 802.16-2012 IEEE Standard for Air Interface for Broadband Wireless Access Systems
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO 3166-1:2013 Codes for the representation of names of countries and their subdivisions Part 1: Country codes
    ISA TR100.00.01 : 2006 THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL
    ISO 21188:2006 Public key infrastructure for financial services Practices and policy framework
    ISO/IEC 2382-14:1997 Information technology Vocabulary Part 14: Reliability, maintainability and availability
    ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
    ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
    ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
    ISO/IEC 7498-4:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 4: Management framework
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    IEC 61499-4:2013 Function blocks - Part 4: Rules for compliance profiles
    ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
    ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective