IEC TS 62351-5-2013 Power systems management and associated information exchange - Data and communications security - Part 5 Security for IEC 60870-5 and deriva.pdf
《IEC TS 62351-5-2013 Power systems management and associated information exchange - Data and communications security - Part 5 Security for IEC 60870-5 and deriva.pdf》由会员分享,可在线阅读,更多相关《IEC TS 62351-5-2013 Power systems management and associated information exchange - Data and communications security - Part 5 Security for IEC 60870-5 and deriva.pdf(120页珍藏版)》请在麦多课文档分享上搜索。
1、 IEC/TS 62351-5 Edition 2.0 2013-04 TECHNICAL SPECIFICATION Power systems management and associated information exchange Data and communications security Part 5: Security for IEC 60870-5 and derivatives IEC/TS 62351-5:2013(E) THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2013 IEC, Geneva, Switze
2、rland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either IEC or IECs member National Committee in the country
3、 of the requester. If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or your local IEC member National Committee for further information. IEC Central Office Tel.: +41 22 919 02 11 3, rue de Varemb
4、Fax: +41 22 919 03 00 CH-1211 Geneva 20 infoiec.ch Switzerland www.iec.ch About the IEC The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes International Standards for all electrical, electronic and related technologies. About IEC public
5、ations The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the latest edition, a corrigenda or an amendment might have been published. Useful links: IEC publications search - www.iec.ch/searchpub The advanced search enables you to find I
6、EC publications by a variety of criteria (reference number, text, technical committee,). It also gives information on projects, replaced and withdrawn publications. IEC Just Published - webstore.iec.ch/justpublished Stay up to date on all new IEC publications. Just Published details all new publicat
7、ions released. Available on-line and also once a month by email. Electropedia - www.electropedia.org The worlds leading online dictionary of electronic and electrical terms containing more than 30 000 terms and definitions in English and French, with equivalent terms in additional languages. Also kn
8、own as the International Electrotechnical Vocabulary (IEV) on-line. Customer Service Centre - webstore.iec.ch/csc If you wish to give us your feedback on this publication or need further assistance, please contact the Customer Service Centre: csciec.ch. IEC/TS 62351-5 Edition 2.0 2013-04 TECHNICAL S
9、PECIFICATION Power systems management and associated information exchange Data and communications security Part 5: Security for IEC 60870-5 and derivatives INTERNATIONAL ELECTROTECHNICAL COMMISSION XE ICS 33.200 PRICE CODE ISBN 978-2-83220-732-1 Registered trademark of the International Electrotechn
10、ical Commission Warning! Make sure that you obtained this publication from an authorized distributor. 2 TS 62351-5 IEC:2013(E) CONTENTS FOREWORD . 6 1 Scope and object 8 2 Normative references . 9 3 Terms and definitions . 10 4 Abbreviated terms 11 5 Problem description (informative) . 11 5.1 Overvi
11、ew of clause 11 5.2 Specific threats addressed 11 5.3 Design issues 11 5.3.1 Overview of subclause . 11 5.3.2 Asymmetric communications 11 5.3.3 Message-oriented 12 5.3.4 Poor sequence numbers or no sequence numbers . 12 5.3.5 Limited processing power 12 5.3.6 Limited bandwidth 12 5.3.7 No access to
12、 authentication server 12 5.3.8 Limited frame length 13 5.3.9 Limited checksum 13 5.3.10 Radio systems . 13 5.3.11 Dial-up systems . 13 5.3.12 Variety of protocols affected 13 5.3.13 Differing data link layers 14 5.3.14 Long upgrade intervals 14 5.3.15 Remote sites . 14 5.3.16 Multiple users 14 5.3.
13、17 Unreliable media . 14 5.4 General principles . 14 5.4.1 Overview of subclause . 14 5.4.2 Authentication only 14 5.4.3 Application layer only 15 5.4.4 Generic definition mapped onto different protocols 15 5.4.5 Bi-directional . 15 5.4.6 Challenge-response. 15 5.4.7 Pre-shared keys as default optio
14、n 15 5.4.8 Backwards tolerance . 15 5.4.9 Upgradeable 16 5.4.10 Perfect forward secrecy . 16 5.4.11 Multiple users and auditing 16 6 Theory of operation (informative) 16 6.1 Overview of clause 16 6.2 Narrative description . 16 6.2.1 Basic concepts 16 6.2.2 Initiating the challenge . 17 6.2.3 Replyin
15、g to the challenge 17 6.2.4 Authenticating . 18 6.2.5 Authentication failure . 18 TS 62351-5 IEC:2013(E) 3 6.2.6 Aggressive mode . 18 6.2.7 Changing keys . 18 6.2.8 Security statistics 22 6.3 Example message sequences . 22 6.3.1 Overview of subclause . 22 6.3.2 Challenge of a Critical ASDU . 23 6.3.
16、3 Aggressive Mode . 24 6.3.4 Initializing and changing Session Keys 24 6.4 State machine overview 28 7 Formal specification . 32 7.1 Overview of clause 32 7.2 Message definitions . 32 7.2.1 Distinction between messages and ASDUs 32 7.2.2 Challenge message . 33 7.2.3 Reply message 35 7.2.4 Aggressive
17、 Mode Request message 36 7.2.5 MAC := OS8i18i; i:=specified by MALKey Status Request message 38 7.2.6 Key Status message 38 7.2.7 Session Key Change message 41 7.2.8 Error message . 43 7.2.9 User Status Change message . 45 7.2.10 Update Key Change Request message 49 7.2.11 Update Key Change Reply me
18、ssage 51 7.2.12 Update Key Change message 52 7.2.13 Update Key Change Signature message 53 7.2.14 Update Key Change Confirmation message . 54 7.3 Formal procedures 55 7.3.1 Overview of subclause . 55 7.3.2 Security statistics 56 7.3.3 Challenger procedures 58 7.3.4 Responder procedures 74 7.3.5 Cont
19、rolling station procedures . 75 7.3.6 Controlled station procedures 88 8 Interoperability requirements 90 8.1 Overview of clause 90 8.2 Minimum requirements 90 8.2.1 Overview of subclause . 90 8.2.2 MAC algorithms . 90 8.2.3 Key wrap / transport algorithms . 91 8.2.4 Fixed values 91 8.2.5 Configurab
20、le values . 91 8.3 Options . 96 8.3.1 Overview of subclause . 96 8.3.2 MAC algorithms . 96 8.3.3 Encryption algorithms 98 8.3.4 Key wrap / transport algorithms . 98 8.3.5 Configurable values . 98 9 Special Applications . 99 4 TS 62351-5 IEC:2013(E) 9.1 Overview of clause 99 9.2 Use with TCP/IP 99 9.
21、3 Use with redundant channels. 99 9.4 Use with external link encryptors . 99 10 Requirements for referencing this specification. 99 10.1 Overview of clause 99 10.2 Selected options 99 10.3 Operations considered critical . 100 10.4 Addressing information 100 10.5 Message format mapping 100 10.6 Refer
22、ence to procedures . 100 11 Protocol implementation conformance statement 101 11.1 Overview of clause 101 11.2 Required algorithms 101 11.3 MAC algorithms . 101 11.4 Key wrap algorithms 101 11.5 Maximum Error messages sent 101 11.6 Use of Error messages 101 11.7 Update Key Change Methods 102 11.8 Us
23、er Status Change 102 Annex A (informative) Compliance with ISO/IEC 11770 103 Bibliography 109 Figure 1 Overview of interaction between Authority and stations 22 Figure 2 Example of successful Challenge of Critical ASDU . 23 Figure 3 Example of failed Challenge of Critical ASDU 23 Figure 4 Example of
24、 a successful Aggressive Mode Request . 24 Figure 5 Example of a failed Aggressive Mode Request . 24 Figure 6 Example of Session Key initialization and periodic update 25 Figure 7 Example of communications failure followed by Session Key change . 26 Figure 8 Example of successful User Status and Upd
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- IECTS6235152013POWERSYSTEMSMANAGEMENTANDASSOCIATEDINFORMATIONEXCHANGEDATAANDCOMMUNICATIONSSECURITYPART5SECURITYFORIEC608705ANDDERIVAPDF

链接地址:http://www.mydoc123.com/p-1242119.html