I.S. EN 62734:2015
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
Hardcopy , PDF
English
01-01-2015
29-10-2019
For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
Only cited Standards give presumption of conformance to New Approach Directives/Regulations.
Dates of withdrawal of national standards are available from NSAI.
FOREWORD
0 Introduction
1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms,
and conventions
4 Overview
5 System
6 System management role
7 Security
8 Physical layer
9 Data-link layer
10 Network layer
11 Transport layer
12 Application layer
13 Provisioning
Annex A (informative) - User layer/application profiles
Annex B (normative) - Communication role profiles
Annex C (informative) - Background information
Annex D (normative) - Configuration defaults
Annex E (informative) - Use of backbone networks
Annex F (normative) - Basic security concepts - Notation
and representation
Annex G (informative) - Using certificate chains for
over-the-air provisioning
Annex H (normative) - Security building blocks
Annex I (informative) - Definition templates
Annex J (informative) - Operations on attributes
Annex K (normative) - Standard object types
Annex L (informative) - Standard data types
Annex M (normative) - Identification of tunneled legacy
fieldbus protocols
Annex N (informative) - Tunneling and native object mapping
Annex O (informative) - Generic protocol translation
Annex P (informative) - Exemplary GIAP adaptations for this standard
Annex Q (informative) - Exemplary GIAP adaptations for IEC 62591
Annex R (informative) - Host system interface to standard-compliant
devices via a gateway
Annex S (informative) - Symmetric-key operation test vectors
Annex T (informative) - Data-link and network headers for
join requests
Annex U (informative) - Gateway role
Annex V (informative) - Compliance with ETSI EN 300 328 v1.8.1
Bibliography
Annex ZA (normative) - Normative references to international
publications with their corresponding European
publications
Defines a method of reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications.
| DevelopmentNote |
For CENELEC adoptions of IEC publications, please check www.iec.ch to be sure that you have any corrigenda that may apply. (01/2017)
|
| DocumentType |
Standard
|
| Pages |
1860
|
| PublisherName |
National Standards Authority of Ireland
|
| Status |
Superseded
|
| SupersededBy |
| Standards | Relationship |
| EN 62734:2015 | Identical |
| DIN EN 62734:2015-07 | Equivalent |
| BS EN 62734:2015 | Equivalent |
| ISO/IEC 18031:2011 | Information technology — Security techniques — Random bit generation |
| ISO/IEC 19772:2009 | Information technology — Security techniques — Authenticated encryption |
| ISO/IEC 26907:2009 | Information technology — Telecommunications and information exchange between systems — High-rate ultra-wideband PHY and MAC standard |
| ISO 18435-2:2012 | Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements |
| ISO/IEC 18033-1:2015 | Information technology — Security techniques — Encryption algorithms — Part 1: General |
| ISO/IEC 7498-3:1997 | Information technology — Open Systems Interconnection — Basic Reference Model: Naming and addressing |
| ISO/IEC 9646-7:1995 | Information technology — Open Systems Interconnection — Conformance testing methodology and framework — Part 7: Implementation Conformance Statements |
| ISO/IEC 7498-1:1994 | Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model |
| IEC TS 62443-1-1:2009 | Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models |
| ISA 100.11A : 2011 | WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS |
| ISO 2382-12:1988 | Information processing systems — Vocabulary — Part 12: Peripheral equipment |
| ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
| NAMUR NE 107 : 2017 | SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES |
| ISO/IEC 11770-2:2008 | Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques |
| IEC 62591:2016 | Industrial networks - Wireless communication network and communication profiles - WirelessHART<sup>TM</sup> |
| IEC TR 62390:2005 | Common automation device - Profile guideline |
| IEEE 802.3-2012 | IEEE Standard for Ethernet |
| IEEE 802.15.4-2011 | IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
| ETSI EN 300 440-1 V1.6.1 (2010-08) | Electromagnetic compatibility and Radio spectrum Matters (ERM); Short range devices; Radio equipment to be used in the 1 GHz to 40 GHz frequency range; Part 1: Technical characteristics and test methods |
| ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
| ISO/IEC 18033-3:2010 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers |
| IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
| IEEE 802.1Q-2014 | IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks |
| ETSI EN 300 328-1 V1.3.1 (2001-12) | Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission systems; Data transmission equipment operating in the 2,4 GHz ISM band and using spread spectrum modulation techniques; Part 1: Technical characteristics and test conditions |
| IEEE 802.11-2016 | IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
| ISO/IEC 10731:1994 | Information technology — Open Systems Interconnection — Basic Reference Model — Conventions for the definition of OSI services |
| ISO/IEC/IEEE 60559:2011 | Information technology — Microprocessor Systems — Floating-Point arithmetic |
| IEC 62657-2:2017 | Industrial communication networks - Wireless communication networks - Part 2: Coexistence management |
| NAMUR NE 105 : 2016 | SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES |
| ISO/IEC 10181-1:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Overview |
| FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
| IEC 62601:2015 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
| IEC 61512-1:1997 | Batch control - Part 1: Models and terminology |
| IEC 62264-1:2013 | Enterprise-control system integration - Part 1: Models and terminology |
| IEC 61804-3:2015 | Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics |
| ISO/IEC 2375:2003 | Information technology — Procedure for registration of escape sequences and coded character sets |
| IEEE 802.16-2012 | IEEE Standard for Air Interface for Broadband Wireless Access Systems |
| ISO/IEC 9796-2:2010 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms |
| ISO/IEC 646:1991 | Information technology — ISO 7-bit coded character set for information interchange |
| FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
| ISO/IEC 9797-1:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher |
| ISO/IEC 10118-3:2004 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions |
| ISO 3166-1:2013 | Codes for the representation of names of countries and their subdivisions — Part 1: Country codes |
| ISA TR100.00.01 : 2006 | THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL |
| ISO 21188:2006 | Public key infrastructure for financial services — Practices and policy framework |
| ISO/IEC 2382-14:1997 | Information technology — Vocabulary — Part 14: Reliability, maintainability and availability |
| ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
| ISO/IEC 10118-2:2010 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher |
| ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
| ISO/IEC 7498-4:1989 | Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework |
| ISO/IEC 9797-2:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function |
| ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
| ISO/IEC 27000:2016 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
| ISO/IEC 11770-1:2010 | Information technology — Security techniques — Key management — Part 1: Framework |
| IEC 61499-4:2013 | Function blocks - Part 4: Rules for compliance profiles |
| ANSI X9.82-1 : 2006(R2013) | RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES |
| ISO/IEC 18028-3:2005 | Information technology — Security techniques — IT network security — Part 3: Securing communications between networks using security gateways |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
| ISO/IEC 9798-1:2010 | Information technology — Security techniques — Entity authentication — Part 1: General |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.