• PREN 50159 : DRAFT 2009

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS

    Available format(s): 

    Superseded date:  01-09-2010

    Language(s): 

    Published date:  12-01-2013

    Publisher:  European Committee for Standards - Electrical

    Pure ENs are not available for sale, please purchase a suitable national adoption

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Definitions
    4 Reference architecture
    5 Threats to the transmission system
    6 Classification of transmission systems
       6.1 Scope/purpose
       6.2 General aspects of classification
       6.3 Criteria for the classification of transmission
            systems
       6.4 Relationship between transmission systems and the
            threats
    7 Requirements for defences
       7.1 Introduction
       7.2 General requirements
       7.3 Specific defences
       7.4 Applicability of defences
    Annex A (informative) - Threats on open transmission systems
    Annex B (informative) - Categories of transmission systems
    Annex C (informative) - Guideline for defences
    Annex D (informative) - Guidelines for use of the standard
    Annex E (informative) - Mapping from previous standards
    Annex ZZ (informative) - Coverage of Essential Requirements
             of EC Directives
    Bibliography

    Abstract - (Show below) - (Hide below)

    Provides the basic requirements needed to achieve safety-related communication between safety-related equipment connected to the transmission system.

    General Product Information - (Show below) - (Hide below)

    Comment Closes On
    Committee TC 9X
    Document Type Draft
    Publisher European Committee for Standards - Electrical
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    EN 50129 : 2003 COR 2010 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED ELECTRONIC SYSTEMS FOR SIGNALLING
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    EN 50126 : 1999 RAILWAY APPLICATIONS - THE SPECIFICATION AND DEMONSTRATION OF RELIABILITY, AVAILABILITY, MAINTAINABILITY AND SAFETY (RAMS)
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective