{"id":361875,"date":"2024-10-20T01:38:02","date_gmt":"2024-10-20T01:38:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62351-62020\/"},"modified":"2024-10-26T02:32:49","modified_gmt":"2024-10-26T02:32:49","slug":"bs-en-iec-62351-62020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62351-62020\/","title":{"rendered":"BS EN IEC 62351-6:2020"},"content":{"rendered":"

IEC 62351-6:2020 specifies messages, procedures, and algorithms for securing the operation of all protocols based on or derived from the IEC 61850 series. This document applies to at least those protocols listed below: IEC 61850-8-1 Communication networks and systems for power utility automation \u2013 Part 8-1: Specific communication service mapping (SCSM) \u2013 Mappings to MMS (ISO\/IEC 9506-1 and ISO\/IEC 9506-2) and to ISO\/IEC 8802-3 IEC 61850-8-2 Communication networks and systems for power utility automation \u2013 Part 8-2: Specific communication service mapping (SCSM) \u2013 Mapping to Extensible Messaging Presence Protocol (XMPP) IEC 61850-9-2 Communication networks and systems for power utility automation \u2013 Part 9-2: Specific communication service mapping (SCSM) \u2013 Sampled values over ISO\/IEC 8802-3 IEC 61850-6 Communication networks and systems for power utility automation \u2013 Part 6: Configuration description language for communication in power utility automation systems related to IEDs The initial audience for this document is intended to be the members of the working groups developing or making use of the protocols listed in Table 1. For the measures described in this specification to take effect, they must be accepted and referenced by the specifications for the protocols themselves. This document is written to enable that process. The subsequent audience for this document is intended to be the developers of products that implement these protocols. Portions of this document may also be of use to managers and executives in order to understand the purpose and requirements of the work.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nAnnex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n
7<\/td>\nCONTENTS <\/td>\n<\/tr>\n
9<\/td>\nFOREWORD <\/td>\n<\/tr>\n
11<\/td>\n1 Scope and object
1.1 Scope
1.2 Namespace name and version
Tables
Table 1 \u2013 Scope of application to standards <\/td>\n<\/tr>\n
12<\/td>\n1.3 Code Component distribution
2 Normative references <\/td>\n<\/tr>\n
13<\/td>\n3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
3.2 Abbreviated terms <\/td>\n<\/tr>\n
14<\/td>\n4 Security issues addressed by this document
4.1 Operational issues affecting choice of security options
4.2 Security threats countered
4.3 Attack methods countered
5 Correlation of IEC 61850 parts and IEC 62351 parts
5.1 General <\/td>\n<\/tr>\n
15<\/td>\n5.2 IEC 61850-8-1 Profile for Client\/Server communications
5.2.1 General
Figures
Figure 1 \u2013 MMS Security Profiles <\/td>\n<\/tr>\n
16<\/td>\n5.2.2 Control centre to substation
5.2.3 Substation communications <\/td>\n<\/tr>\n
17<\/td>\n6 Multicast Association Protocols
6.1 General
6.2 Replay Protection
6.2.1 GOOSE replay protection <\/td>\n<\/tr>\n
18<\/td>\nFigure 2 \u2013 Replay Protection State Machine for GOOSE <\/td>\n<\/tr>\n
21<\/td>\n6.2.2 Sampled Value replay protection
Table 2 \u2013 Extract from IEC 61850-9-2 (Informative) <\/td>\n<\/tr>\n
22<\/td>\nFigure 3 \u2013 Replay Protection State Machine for SV <\/td>\n<\/tr>\n
24<\/td>\n7 Security for SNTP <\/td>\n<\/tr>\n
25<\/td>\n8 Layer 2 security for profiles for IEC 61850-8-1 GOOSE and IEC 61850-9-2 Sampled Value
8.1 Overview of Ethertype (informative)
8.2 Extended PDU
8.2.1 General format of extended PDU
Figure 4 \u2013 General format of extended PDU
Figure 5 \u2013 Definition of Reserved 1 <\/td>\n<\/tr>\n
26<\/td>\n8.2.2 Format of extension octets <\/td>\n<\/tr>\n
27<\/td>\nFigure 6 \u2013 Calculated MAC Domain <\/td>\n<\/tr>\n
28<\/td>\nFigure 7 \u2013 AES-GCM application on the example of a L2 GOOSE\/SV packet. <\/td>\n<\/tr>\n
30<\/td>\n9 Substation configuration language extensions
9.1 Service capability
9.1.1 Access Point support security for GOOSE Publisher
9.1.2 Access Point support security for SV Publisher
9.1.3 Acces Point support security for GOOSE and SMV subscriber <\/td>\n<\/tr>\n
31<\/td>\n9.1.4 Server Access Point support security for TPAA
9.1.5 Client Access Point support security for TPAA
9.2 Publish with security enabled
9.2.1 GOOSE
9.2.2 SV
9.3 Use of Simulation <\/td>\n<\/tr>\n
32<\/td>\n9.2.3 Key Policy and Management
10 Extension of LGOS and LSVS
11 Conformance
Table 3 \u2013 Extension of the LGOS class
Table 4 \u2013 Extension of the LSVS class <\/td>\n<\/tr>\n
33<\/td>\n11.1 General conformance
11.2 Conformance for implementations claiming IEC 61850-8-1 ISO 9506 profile security
11.2.1 General
Table 5 \u2013 Conformance table
Table 6 \u2013 PICS for IEC 61850-8-1 ISO 9506 profile <\/td>\n<\/tr>\n
34<\/td>\n11.2.2 IEC 62351-4 TLS Conformity for ISO-9506 Client\/Server Profile using ACSE Authentication
11.3 Conformance for implementations claiming VLAN profile security
Table 7 \u2013 PICS for TLS IEC 61850-8-1 Client\/Server using ACSE Authentication <\/td>\n<\/tr>\n
35<\/td>\nTable 8 \u2013 PICS for VLAN profiles
Table 9 \u2013 IEC 61850-8-1 L2 GOOSE Security <\/td>\n<\/tr>\n
36<\/td>\nTable 10 \u2013 IEC 61850-9-2 L2 SV Security
Table 11 \u2013 IEC 61850-8-1 Routable GOOSE <\/td>\n<\/tr>\n
37<\/td>\n11.4 Conformance for implementations claiming SNTP profile security
Table 12 \u2013 IEC 61850-9-2 Routable SMV
Table 13 \u2013 PICS for SNTP profiles <\/td>\n<\/tr>\n
38<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Power systems management and associated information exchange. Data and communications security – Security for IEC 61850<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2020<\/td>\n40<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":361881,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-361875","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/361875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/361881"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=361875"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=361875"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=361875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}