• IEC TS 62351-5:2013

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Superseded date:  18-01-2023

    Language(s):  English

    Published date:  29-04-2013

    Publisher:  International Electrotechnical Committee

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    FOREWORD
    1 Scope and object
    2 Normative references
    3 Terms and definitions
    4 Abbreviated terms
    5 Problem description (informative)
    6 Theory of operation (informative)
    7 Formal specification
    8 Interoperability requirements
    9 Special Applications
    10 Requirements for referencing
       this specification
    11 Protocol implementation conformance
       statement
    Annex A (informative) - Compliance with
            ISO/IEC 11770
    Bibliography

    Abstract - (Show below) - (Hide below)

    IEC/TS 62351-5:2013(E) specifies messages, procedures and algorithms for securing the operation of all protocols based on or derived from IEC 60870-5: Telecontrol equipment and systems - Transmission protocols. This Technical Specification applies to at least those protocols listed in IEC 60870-5-101, 5-102, 5-103, 5-104. This new edition includes the following main changes with respect to the previous edition:
    - adds the capability to change Update Keys remotely;
    - adds security statistics to aid in detecting attacks;
    - adds measures to avoid being forced to change session keys too often;
    - discards unexpected messages more often as possible attacks;
    - adds to the list of permitted security algorithms;
    - adds new rules for calculating challenge sequence numbers.

    General Product Information - (Show below) - (Hide below)

    Committee TC 57
    Development Note Stability Date: 2017. (09/2017)
    Document Type Technical Specification
    Publisher International Electrotechnical Committee
    Status Superseded
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    BS EN 62351-7:2017 Power systems management and associated information exchange. Data and communications security Network and System Management (NSM) data object models
    I.S. EN 62351-9:2017 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
    IEC TR 62351-10:2012 Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines
    PD IEC/TS 60870-5-7:2013 Telecontrol equipment and systems Transmission protocols. Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351)
    IEC 62351-9:2017 Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment
    IEC TR 62351-13:2016 Power systems management and associated information exchange - Data and communications security - Part 13: Guidelines on security topics to be covered in standards and specifications
    PD IEC/TR 62351-10:2012 Power systems management and associated information exchange. Data and communications security Security architecture guidelines
    BS EN 62351-9:2017 Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment
    NEMA CPSP 1 : 2015 SUPPLY CHAIN BEST PRACTICES
    IEC 62351-7:2017 Power systems management and associated information exchange - Data and communications security - Part 7: Network and System Management (NSM) data object models
    PD IEC/TR 61850-90-12:2015 Communication networks and systems for power utility automation Wide area network engineering guidelines
    DD IEC/TS 62351-8:2011 Power systems management and associated information exchange. Data and communications security Role-based access control
    IEC TS 62351-8:2011 Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control
    IEC TR 62351-90-1:2018 Power systems management and associated information exchange - Data and communications security - Part 90-1: Guidelines for handling role-based access control in power systems
    16/30343872 DC : DRAFT JUNE 2016 BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
    EN 62351-7:2017 Power systems management and associated information exchange - Data and communications security - Part 7: Network and System Management (NSM) data object models
    IEEE 1815.1-2015 IEEE Standard for Exchanging Information Between Networks Implementing IEC 61850 and IEEE Std 1815(TM) [Distributed Network Protocol (DNP3)]
    I.S. EN 62351-7:2017 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 7: NETWORK AND SYSTEM MANAGEMENT (NSM) DATA OBJECT MODELS
    IEEE 1815-2012 REDLINE IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)
    EN 62351-9:2017 Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment

    Standards Referencing This Book - (Show below) - (Hide below)

    IEC 60870-5-102:1996 Telecontrol equipment and systems - Part 5: Transmission protocols - Section 102: Companion standard for the transmission of integrated totals in electric power systems
    IEC TS 62351-3:2007 Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    IEC 60870-5-104:2006+AMD1:2016 CSV Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles
    IEC 60870-5-103:1997 Telecontrol equipment and systems - Part 5-103: Transmission protocols - Companion standard for the informative interface of protection equipment
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
    ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
    IEC 60870-5-101:2003+AMD1:2015 CSV Telecontrol equipment and systems - Part 5-101: Transmissionprotocols - Companion standard for basic telecontrol tasks
    IEC TS 62351-1:2007 Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues
    IEC TR 60870-1-3:1997 Telecontrol equipment and systems - Part 1: General considerations - Section 3: Glossary
    IEC TS 62351-8:2011 Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective