{"id":255066,"date":"2024-10-19T16:51:31","date_gmt":"2024-10-19T16:51:31","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-ts-62351-52013\/"},"modified":"2024-10-25T12:17:52","modified_gmt":"2024-10-25T12:17:52","slug":"bsi-pd-iec-ts-62351-52013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-ts-62351-52013\/","title":{"rendered":"BSI PD IEC\/TS 62351-5:2013"},"content":{"rendered":"

This part of IEC 62351 specifies messages, procedures and algorithms for securing the operation of all protocols based on or derived from IEC 60870-5: Telecontrol equipment and systems \u2013 Transmission protocols. This Technical Specification applies to at least those protocols listed in Table 1.<\/p>\n

Table 1 \u2013 Scope of application to standards<\/b><\/p>\n

The initial audience for this Technical Specification is intended to be the members of the working groups developing the protocols listed in Table 1. For the measures described in this specification to take effect, they must be accepted and referenced by the specifications for the protocols themselves. This document is written to enable that process.<\/p>\n

The subsequent audience for this specification is intended to be the developers of products that implement these protocols.<\/p>\n

Portions of this specification may also be of use to managers and executives in order to understand the purpose and requirements of the work.<\/p>\n

This part of IEC\/TS 62351 focuses only on application layer authentication and security issues arising from such authentication. Other security concerns \u2013 in particular, protection from eavesdropping or man-in-the-middle attacks through the use of encryption \u2013 are considered to be outside the scope. Encryption may be added through the use of this specification with other specifications.<\/p>\n

This document is organized working from the general to the specific, as follows:<\/p>\n