EN 62734:2015
Current
The latest, up-to-date edition.
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
23-01-2015
FOREWORD
0 Introduction
1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms,
and conventions
4 Overview
5 System
6 System management role
7 Security
8 Physical layer
9 Data-link layer
10 Network layer
11 Transport layer
12 Application layer
13 Provisioning
Annex A (informative) - User layer/application profiles
Annex B (normative) - Communication role profiles
Annex C (informative) - Background information
Annex D (normative) - Configuration defaults
Annex E (informative) - Use of backbone networks
Annex F (normative) - Basic security concepts - Notation
and representation
Annex G (informative) - Using certificate chains for
over-the-air provisioning
Annex H (normative) - Security building blocks
Annex I (informative) - Definition templates
Annex J (informative) - Operations on attributes
Annex K (normative) - Standard object types
Annex L (informative) - Standard data types
Annex M (normative) - Identification of tunneled legacy
fieldbus protocols
Annex N (informative) - Tunneling and native object mapping
Annex O (informative) - Generic protocol translation
Annex P (informative) - Exemplary GIAP adaptations for this standard
Annex Q (informative) - Exemplary GIAP adaptations for IEC 62591
Annex R (informative) - Host system interface to standard-compliant
devices via a gateway
Annex S (informative) - Symmetric-key operation test vectors
Annex T (informative) - Data-link and network headers for
join requests
Annex U (informative) - Gateway role
Annex V (informative) - Compliance with ETSI EN 300 328 v1.8.1
Bibliography
Annex ZA (normative) - Normative references to international
publications with their corresponding
European publications
IEC 62734:2014 provides specifications in accordance with the OSI Basic Reference Model, ISO/IEC 7498-1, (e.g., PhL, DL, etc.). It is intended to provide reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications. It defines a protocol suite, including system management, gateway considerations, and security specifications, for low-data-rate wireless connectivity with fixed, portable, and slowly-moving devices, often operating under severe energy and power constraints. The application focus is the performance needs of process automation monitoring and control where end-to-end communication latencies on the order of at least 100 ms can be tolerated.
Committee |
CLC/TC 65X
|
DevelopmentNote |
New AMD 1 Child is Added
|
DocumentType |
Standard
|
ProductNote |
New AMD 1 Child is Added
|
PublisherName |
European Committee for Standards - Electrical
|
Status |
Current
|
Standards | Relationship |
OVE/ONORM EN 62734 : 2015 | Identical |
UNE-EN 62734:2015 | Identical |
I.S. EN 62734:2015 | Identical |
NF EN 62734 : 2015 | Identical |
NBN EN 62734 : 2015 | Identical |
DIN EN 62734:2015-07 | Identical |
IEC 62734:2014 | Identical |
CEI EN 62734 : 2015 | Identical |
BS EN 62734:2015 | Identical |
PN EN 62734 : 2015 | Identical |
NEN EN IEC 62734 : 2015 | Identical |
PNE-FprEN 62734 | Identical |
TS 103 329 : 1.1.1 | WIRELESS INDUSTRIAL APPLICATIONS (WIA); RADIO EQUIPMENT TO BE USED IN THE 5,725 GHZ TO 5,875 GHZ FREQUENCY RANGE WITH POWER LEVEL UP TO 400 MW; METHODS AND CONCEPTS FOR A WIA SYSTEM APPROACH TO SHARING IN THE 5,725 GHZ TO 5,875 GHZ BAND |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 26907:2009 | Information technology — Telecommunications and information exchange between systems — High-rate ultra-wideband PHY and MAC standard |
ISO 18435-2:2012 | Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 7498-3:1997 | Information technology — Open Systems Interconnection — Basic Reference Model: Naming and addressing |
ISO/IEC 9646-7:1995 | Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements |
ISO/IEC 7498-1:1994 | Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model |
IEC TS 62443-1-1:2009 | Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models |
ISA 100.11A : 2011 | WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS |
ISO 2382-12:1988 | Information processing systems Vocabulary Part 12: Peripheral equipment |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
NAMUR NE 107 : 2017 | SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
IEC 62591:2016 | Industrial networks - Wireless communication network and communication profiles - WirelessHART<sup>TM</sup> |
IEC TR 62390:2005 | Common automation device - Profile guideline |
IEEE 802.3-2012 | IEEE Standard for Ethernet |
IEEE 802.15.4-2011 | IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
EN 300 440-1 : 1.6.1 | ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
IEEE 802.1Q-2014 | IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks |
EN 300 328-1 : 1.3.1 | ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS |
IEEE 802.11-2016 | IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 10731:1994 | Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services |
ISO/IEC/IEEE 60559:2011 | Information technology — Microprocessor Systems — Floating-Point arithmetic |
IEC 62657-2:2017 | Industrial communication networks - Wireless communication networks - Part 2: Coexistence management |
NAMUR NE 105 : 2016 | SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
IEC 62601:2015 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
IEC 61512-1:1997 | Batch control - Part 1: Models and terminology |
IEC 62264-1:2013 | Enterprise-control system integration - Part 1: Models and terminology |
IEC 61804-3:2015 | Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics |
ISO/IEC 2375:2003 | Information technology — Procedure for registration of escape sequences and coded character sets |
IEEE 802.16-2012 | IEEE Standard for Air Interface for Broadband Wireless Access Systems |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 646:1991 | Information technology ISO 7-bit coded character set for information interchange |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO 3166-1:2013 | Codes for the representation of names of countries and their subdivisions Part 1: Country codes |
ISA TR100.00.01 : 2006 | THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL |
ISO 21188:2006 | Public key infrastructure for financial services Practices and policy framework |
ISO/IEC 2382-14:1997 | Information technology Vocabulary Part 14: Reliability, maintainability and availability |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
ISO/IEC 7498-4:1989 | Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
IEC 61499-4:2013 | Function blocks - Part 4: Rules for compliance profiles |
ANSI X9.82-1 : 2006(R2013) | RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES |
ISO/IEC 18028-3:2005 | Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.