BS EN IEC 62351-6:2020
$167.15
Power systems management and associated information exchange. Data and communications security – Security for IEC 61850
Published By | Publication Date | Number of Pages |
BSI | 2020 | 40 |
IEC 62351-6:2020 specifies messages, procedures, and algorithms for securing the operation of all protocols based on or derived from the IEC 61850 series. This document applies to at least those protocols listed below: IEC 61850-8-1 Communication networks and systems for power utility automation – Part 8-1: Specific communication service mapping (SCSM) – Mappings to MMS (ISO/IEC 9506-1 and ISO/IEC 9506-2) and to ISO/IEC 8802-3 IEC 61850-8-2 Communication networks and systems for power utility automation – Part 8-2: Specific communication service mapping (SCSM) – Mapping to Extensible Messaging Presence Protocol (XMPP) IEC 61850-9-2 Communication networks and systems for power utility automation – Part 9-2: Specific communication service mapping (SCSM) – Sampled values over ISO/IEC 8802-3 IEC 61850-6 Communication networks and systems for power utility automation – Part 6: Configuration description language for communication in power utility automation systems related to IEDs The initial audience for this document is intended to be the members of the working groups developing or making use of the protocols listed in Table 1. For the measures described in this specification to take effect, they must be accepted and referenced by the specifications for the protocols themselves. This document is written to enable that process. The subsequent audience for this document is intended to be the developers of products that implement these protocols. Portions of this document may also be of use to managers and executives in order to understand the purpose and requirements of the work.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | Annex ZA(normative)Normative references to international publicationswith their corresponding European publications |
7 | CONTENTS |
9 | FOREWORD |
11 | 1 Scope and object 1.1 Scope 1.2 Namespace name and version Tables Table 1 – Scope of application to standards |
12 | 1.3 Code Component distribution 2 Normative references |
13 | 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions 3.2 Abbreviated terms |
14 | 4 Security issues addressed by this document 4.1 Operational issues affecting choice of security options 4.2 Security threats countered 4.3 Attack methods countered 5 Correlation of IEC 61850 parts and IEC 62351 parts 5.1 General |
15 | 5.2 IEC 61850-8-1 Profile for Client/Server communications 5.2.1 General Figures Figure 1 – MMS Security Profiles |
16 | 5.2.2 Control centre to substation 5.2.3 Substation communications |
17 | 6 Multicast Association Protocols 6.1 General 6.2 Replay Protection 6.2.1 GOOSE replay protection |
18 | Figure 2 – Replay Protection State Machine for GOOSE |
21 | 6.2.2 Sampled Value replay protection Table 2 – Extract from IEC 61850-9-2 (Informative) |
22 | Figure 3 – Replay Protection State Machine for SV |
24 | 7 Security for SNTP |
25 | 8 Layer 2 security for profiles for IEC 61850-8-1 GOOSE and IEC 61850-9-2 Sampled Value 8.1 Overview of Ethertype (informative) 8.2 Extended PDU 8.2.1 General format of extended PDU Figure 4 – General format of extended PDU Figure 5 – Definition of Reserved 1 |
26 | 8.2.2 Format of extension octets |
27 | Figure 6 – Calculated MAC Domain |
28 | Figure 7 – AES-GCM application on the example of a L2 GOOSE/SV packet. |
30 | 9 Substation configuration language extensions 9.1 Service capability 9.1.1 Access Point support security for GOOSE Publisher 9.1.2 Access Point support security for SV Publisher 9.1.3 Acces Point support security for GOOSE and SMV subscriber |
31 | 9.1.4 Server Access Point support security for TPAA 9.1.5 Client Access Point support security for TPAA 9.2 Publish with security enabled 9.2.1 GOOSE 9.2.2 SV 9.3 Use of Simulation |
32 | 9.2.3 Key Policy and Management 10 Extension of LGOS and LSVS 11 Conformance Table 3 – Extension of the LGOS class Table 4 – Extension of the LSVS class |
33 | 11.1 General conformance 11.2 Conformance for implementations claiming IEC 61850-8-1 ISO 9506 profile security 11.2.1 General Table 5 – Conformance table Table 6 – PICS for IEC 61850-8-1 ISO 9506 profile |
34 | 11.2.2 IEC 62351-4 TLS Conformity for ISO-9506 Client/Server Profile using ACSE Authentication 11.3 Conformance for implementations claiming VLAN profile security Table 7 – PICS for TLS IEC 61850-8-1 Client/Server using ACSE Authentication |
35 | Table 8 – PICS for VLAN profiles Table 9 – IEC 61850-8-1 L2 GOOSE Security |
36 | Table 10 – IEC 61850-9-2 L2 SV Security Table 11 – IEC 61850-8-1 Routable GOOSE |
37 | 11.4 Conformance for implementations claiming SNTP profile security Table 12 – IEC 61850-9-2 Routable SMV Table 13 – PICS for SNTP profiles |
38 | Bibliography |