IEEE 1686-2013
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities
01-02-2023
English
13-01-2014
1 Overview
2 Normative references
3 NIST Cryptographic Toolkit acronyms
4 Use of this standard
5 IED cyber security features
Annex A (informative) - Table of Compliance (TOC)
Annex B (informative) - Bibliography
The standard defines the functions and features to be provided in intelligent electronic devices (IEDs) to accommodate critical infrastructure protection (CIP) programs.
Committee |
Power System Communications and Cybersecurity
|
DocumentType |
Standard
|
ISBN |
978-0-7381-8824-9
|
Pages |
29
|
PublisherName |
Institute of Electrical & Electronics Engineers
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
IEC 62351-9:2017 | Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |
IEC TR 62351-13:2016 | Power systems management and associated information exchange - Data and communications security - Part 13: Guidelines on security topics to be covered in standards and specifications |
PD IEC/TR 62351-10:2012 | Power systems management and associated information exchange. Data and communications security Security architecture guidelines |
TR 103 118 : 1.1.1 | MACHINE-TO-MACHINE COMMUNICATIONS (M2M); SMART ENERGY INFRASTRUCTURES SECURITY; REVIEW OF EXISTING SECURITY MEASURES AND CONVERGENCE INVESTIGATIONS |
BS EN 62351-9:2017 | Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment |
IEEE C37.244-2013 | IEEE Guide for Phasor Data Concentrator Requirements for Power System Protection, Control, and Monitoring |
IEEE 1827-2016 | IEEE Guide for Electrical and Control Design of Hydroelectric Water Conveyance Facilities |
IEC TR 62351-10:2012 | Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines |
IEEE C37.233 : 2009 | GUIDE FOR POWER SYSTEM PROTECTION TESTING |
IEC TR 62351-90-1:2018 | Power systems management and associated information exchange - Data and communications security - Part 90-1: Guidelines for handling role-based access control in power systems |
I.S. EN 62351-9:2017 | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT |
16/30343872 DC : DRAFT JUNE 2016 | BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT |
IEEE 1815.1-2015 | IEEE Standard for Exchanging Information Between Networks Implementing IEC 61850 and IEEE Std 1815(TM) [Distributed Network Protocol (DNP3)] |
IEEE C37.240-2014 | IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems |
IEEE 1815-2012 REDLINE | IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3) |
IEEE 2030.100-2017 | IEEE Recommended Practice for Implementing an IEC 61850-Based Substation Communications, Protection, Monitoring, and Control System |
EN 62351-9:2017 | Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |
IEEE C37.231-2006 | IEEE Recommended Practice for Microprocessor-Based Protection Equipment Firmware Control |
IEEE C37.238-2011 | IEEE Standard Profile for Use of IEEE 1588 Precision Time Protocol in Power System Applications |
IEEE C2-2017 | NATIONAL ELECTRICAL SAFETY CODE (NESC)(R) |
IEEE 1711-2010 | IEEE Trial-Use Standard for a Cryptographic Protocol for Cyber Security of Substation Serial Links |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.