Shopping Cart

No products in the cart.

BS EN IEC 62351-6:2020

$167.15

Power systems management and associated information exchange. Data and communications security – Security for IEC 61850

Published By Publication Date Number of Pages
BSI 2020 40
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

IEC 62351-6:2020 specifies messages, procedures, and algorithms for securing the operation of all protocols based on or derived from the IEC 61850 series. This document applies to at least those protocols listed below: IEC 61850-8-1 Communication networks and systems for power utility automation – Part 8-1: Specific communication service mapping (SCSM) – Mappings to MMS (ISO/IEC 9506-1 and ISO/IEC 9506-2) and to ISO/IEC 8802-3 IEC 61850-8-2 Communication networks and systems for power utility automation – Part 8-2: Specific communication service mapping (SCSM) – Mapping to Extensible Messaging Presence Protocol (XMPP) IEC 61850-9-2 Communication networks and systems for power utility automation – Part 9-2: Specific communication service mapping (SCSM) – Sampled values over ISO/IEC 8802-3 IEC 61850-6 Communication networks and systems for power utility automation – Part 6: Configuration description language for communication in power utility automation systems related to IEDs The initial audience for this document is intended to be the members of the working groups developing or making use of the protocols listed in Table 1. For the measures described in this specification to take effect, they must be accepted and referenced by the specifications for the protocols themselves. This document is written to enable that process. The subsequent audience for this document is intended to be the developers of products that implement these protocols. Portions of this document may also be of use to managers and executives in order to understand the purpose and requirements of the work.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
7 CONTENTS
9 FOREWORD
11 1 Scope and object
1.1 Scope
1.2 Namespace name and version
Tables
Table 1 – Scope of application to standards
12 1.3 Code Component distribution
2 Normative references
13 3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
3.2 Abbreviated terms
14 4 Security issues addressed by this document
4.1 Operational issues affecting choice of security options
4.2 Security threats countered
4.3 Attack methods countered
5 Correlation of IEC 61850 parts and IEC 62351 parts
5.1 General
15 5.2 IEC 61850-8-1 Profile for Client/Server communications
5.2.1 General
Figures
Figure 1 – MMS Security Profiles
16 5.2.2 Control centre to substation
5.2.3 Substation communications
17 6 Multicast Association Protocols
6.1 General
6.2 Replay Protection
6.2.1 GOOSE replay protection
18 Figure 2 – Replay Protection State Machine for GOOSE
21 6.2.2 Sampled Value replay protection
Table 2 – Extract from IEC 61850-9-2 (Informative)
22 Figure 3 – Replay Protection State Machine for SV
24 7 Security for SNTP
25 8 Layer 2 security for profiles for IEC 61850-8-1 GOOSE and IEC 61850-9-2 Sampled Value
8.1 Overview of Ethertype (informative)
8.2 Extended PDU
8.2.1 General format of extended PDU
Figure 4 – General format of extended PDU
Figure 5 – Definition of Reserved 1
26 8.2.2 Format of extension octets
27 Figure 6 – Calculated MAC Domain
28 Figure 7 – AES-GCM application on the example of a L2 GOOSE/SV packet.
30 9 Substation configuration language extensions
9.1 Service capability
9.1.1 Access Point support security for GOOSE Publisher
9.1.2 Access Point support security for SV Publisher
9.1.3 Acces Point support security for GOOSE and SMV subscriber
31 9.1.4 Server Access Point support security for TPAA
9.1.5 Client Access Point support security for TPAA
9.2 Publish with security enabled
9.2.1 GOOSE
9.2.2 SV
9.3 Use of Simulation
32 9.2.3 Key Policy and Management
10 Extension of LGOS and LSVS
11 Conformance
Table 3 – Extension of the LGOS class
Table 4 – Extension of the LSVS class
33 11.1 General conformance
11.2 Conformance for implementations claiming IEC 61850-8-1 ISO 9506 profile security
11.2.1 General
Table 5 – Conformance table
Table 6 – PICS for IEC 61850-8-1 ISO 9506 profile
34 11.2.2 IEC 62351-4 TLS Conformity for ISO-9506 Client/Server Profile using ACSE Authentication
11.3 Conformance for implementations claiming VLAN profile security
Table 7 – PICS for TLS IEC 61850-8-1 Client/Server using ACSE Authentication
35 Table 8 – PICS for VLAN profiles
Table 9 – IEC 61850-8-1 L2 GOOSE Security
36 Table 10 – IEC 61850-9-2 L2 SV Security
Table 11 – IEC 61850-8-1 Routable GOOSE
37 11.4 Conformance for implementations claiming SNTP profile security
Table 12 – IEC 61850-9-2 Routable SMV
Table 13 – PICS for SNTP profiles
38 Bibliography
BS EN IEC 62351-6:2020
$167.15