Menu
0
Total price
0 €
PRICES include / exclude VAT
Homepage>BS EN IEC 62351-5:2023 Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives
sklademVydáno: 2023-03-01
BS EN IEC 62351-5:2023 Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives

BS EN IEC 62351-5:2023

Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
373.29 €
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
37.33 €
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
111.99 €
Anglicky Hardcopy
In stock
373.29 €
Označení normy:BS EN IEC 62351-5:2023
Počet stran:128
Vydáno:2023-03-01
ISBN:978 0 539 05925 0
Status:Standard
DESCRIPTION

BS EN IEC 62351-5:2023


This standard BS EN IEC 62351-5:2023 Power systems management and associated information exchange. Data and communications security is classified in these ICS categories:
  • 33.200 Telecontrol. Telemetering
This part of IEC 62351 defines the application authentication mechanism (A-profile) specifying messages, procedures and algorithms for securing the operation of all protocols based on or derived from IEC 60870-5: Telecontrol Equipment and Systems - Transmission Protocols. This Standard applies to at least those protocols listed in Table 1. [Table 1] The initial audience for this International Standard is intended to be the members of the working groups developing the protocols listed in Table 1. For the measures described in this standard to take effect, they must be accepted and referenced by the specifications for the protocols themselves. This document is written to enable that process. The working groups in charge of take this standard to the specific protocols listed in Table 1 may choose not to do so. The subsequent audience for this specification is intended to be the developers of products that implement these protocols. Portions of this standard may also be of use to managers and executives in order to understand the purpose and requirements of the work. This document is organized working from the general to the specific, as follows: - Clauses 2 through 4 provide background terms, definitions, and references. - Clause 5 describes the problems this specification is intended to address. - Clause 6 describes the mechanism generically without reference to a specific protocol. - Clauses 7 and 8 describe the mechanism more precisely and are the primary normative part of this specification. - Clause 9 define the interoperability requirements for this authentication mechanism. - Clause 10 describes the requirements for other standards referencing this specification Unless specifically labelled as informative or optional, all clauses of this specification are normative.