• There are no items in your cart

I.S. EN 62734:2015

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
Available format(s)

Hardcopy , PDF

Superseded date

10-29-2019

Language(s)

English

Published date

01-01-2015

Preview

FOREWORD
0 Introduction
1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms,
   and conventions
4 Overview
5 System
6 System management role
7 Security
8 Physical layer
9 Data-link layer
10 Network layer
11 Transport layer
12 Application layer
13 Provisioning
Annex A (informative) - User layer/application profiles
Annex B (normative) - Communication role profiles
Annex C (informative) - Background information
Annex D (normative) - Configuration defaults
Annex E (informative) - Use of backbone networks
Annex F (normative) - Basic security concepts - Notation
        and representation
Annex G (informative) - Using certificate chains for
        over-the-air provisioning
Annex H (normative) - Security building blocks
Annex I (informative) - Definition templates
Annex J (informative) - Operations on attributes
Annex K (normative) - Standard object types
Annex L (informative) - Standard data types
Annex M (normative) - Identification of tunneled legacy
        fieldbus protocols
Annex N (informative) - Tunneling and native object mapping
Annex O (informative) - Generic protocol translation
Annex P (informative) - Exemplary GIAP adaptations for this standard
Annex Q (informative) - Exemplary GIAP adaptations for IEC 62591
Annex R (informative) - Host system interface to standard-compliant
        devices via a gateway
Annex S (informative) - Symmetric-key operation test vectors
Annex T (informative) - Data-link and network headers for
        join requests
Annex U (informative) - Gateway role
Annex V (informative) - Compliance with ETSI EN 300 328 v1.8.1
Bibliography
Annex ZA (normative) - Normative references to international
         publications with their corresponding European
         publications

Defines a method of reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications.

DevelopmentNote
For CENELEC adoptions of IEC publications, please check www.iec.ch to be sure that you have any corrigenda that may apply. (01/2017)
DocumentType
Standard
Pages
1860
PublisherName
National Standards Authority of Ireland
Status
Superseded
SupersededBy

Standards Relationship
EN 62734:2015 Identical

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 26907:2009 Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard
ISO 18435-2:2012 Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements
ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 7498-3:1997 Information technology Open Systems Interconnection Basic Reference Model: Naming and addressing
ISO/IEC 9646-7:1995 Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements
ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model
IEC TS 62443-1-1:2009 Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models
ISA 100.11A : 2011 WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS
ISO 2382-12:1988 Information processing systems Vocabulary Part 12: Peripheral equipment
ISO 11568-2:2012 Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle
NAMUR NE 107 : 2017 SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
IEC 62591:2016 Industrial networks - Wireless communication network and communication profiles - WirelessHART<sup>TM</sup>
IEC TR 62390:2005 Common automation device - Profile guideline
IEEE 802.3-2012 IEEE Standard for Ethernet
IEEE 802.15.4-2011 IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)
EN 300 440-1 : 1.6.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
IEEE 802.1Q-2014 IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks
EN 300 328-1 : 1.3.1 ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS
IEEE 802.11-2016 IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
ISO/IEC 19790:2012 Information technology Security techniques Security requirements for cryptographic modules
ISO/IEC 10731:1994 Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services
ISO/IEC/IEEE 60559:2011 Information technology Microprocessor Systems Floating-Point arithmetic
IEC 62657-2:2017 Industrial communication networks - Wireless communication networks - Part 2: Coexistence management
NAMUR NE 105 : 2016 SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
IEC 62601:2015 Industrial networks - Wireless communication network and communication profiles - WIA-PA
IEC 61512-1:1997 Batch control - Part 1: Models and terminology
IEC 62264-1:2013 Enterprise-control system integration - Part 1: Models and terminology
IEC 61804-3:2015 Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics
ISO/IEC 2375:2003 Information technology — Procedure for registration of escape sequences and coded character sets
IEEE 802.16-2012 IEEE Standard for Air Interface for Broadband Wireless Access Systems
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO 3166-1:2013 Codes for the representation of names of countries and their subdivisions Part 1: Country codes
ISA TR100.00.01 : 2006 THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL
ISO 21188:2006 Public key infrastructure for financial services Practices and policy framework
ISO/IEC 2382-14:1997 Information technology Vocabulary Part 14: Reliability, maintainability and availability
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
ISO/IEC 7498-4:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 4: Management framework
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
IEC 61499-4:2013 Function blocks - Part 4: Rules for compliance profiles
ANSI X9.82-1 : 2006(R2013) RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

View more information
US$882.48
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.