IEC 62734:2014
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
07-31-2019
English - French
10-28-2014
FOREWORD
0 Introduction
1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms,
and conventions
4 Overview
5 System
6 System management role
7 Security
8 Physical layer
9 Data-link layer
10 Network layer
11 Transport layer
12 Application layer
13 Provisioning
Annex A (informative) - User layer/application profiles
Annex B (normative) - Communication role profiles
Annex C (informative) - Background information
Annex D (normative) - Configuration defaults
Annex E (informative) - Use of backbone networks
Annex F (normative) - Basic security concepts - Notation
and representation
Annex G (informative) - Using certificate chains for
over-the-air provisioning
Annex H (normative) - Security building blocks
Annex I (informative) - Definition templates
Annex J (informative) - Operations on attributes
Annex K (normative) - Standard object types
Annex L (informative) - Standard data types
Annex M (normative) - Identification of tunneled legacy
fieldbus protocols
Annex N (informative) - Tunneling and native object mapping
Annex O (informative) - Generic protocol translation
Annex P (informative) - Exemplary GIAP adaptations for
this standard
Annex Q (informative) - Exemplary GIAP adaptations for
IEC 62591
Annex R (informative) - Host system interface to
standard-compliant devices via a gateway
Annex S (informative) - Symmetric-key operation test
vectors
Annex T (informative) - Data-link and network headers for
join requests
Annex U (informative) - Gateway role
Annex V (informative) - Compliance with ETSI EN 300 328 v1.8.1
Bibliography
IEC 62734:2014 provides specifications in accordance with the OSI Basic Reference Model, ISO/IEC 7498-1, (e.g., PhL, DL, etc.). It is intended to provide reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications. It defines a protocol suite, including system management, gateway considerations, and security specifications, for low-data-rate wireless connectivity with fixed, portable, and slowly-moving devices, often operating under severe energy and power constraints. The application focus is the performance needs of process automation monitoring and control where end-to-end communication latencies on the order of at least 100 ms can be tolerated.
Committee |
TC 65/SC 65C
|
DevelopmentNote |
Supersedes IEC PAS 62734. Stability date: 2019. (10/2014)
|
DocumentType |
Standard
|
Pages |
1847
|
PublisherName |
International Electrotechnical Committee
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
OVE/ONORM EN 62734 : 2015 | Identical |
NF EN 62734 : 2015 | Identical |
NBN EN 62734 : 2015 | Identical |
NEN EN IEC 62734 : 2015 | Identical |
PN EN 62734 : 2015 | Identical |
BS EN 62734:2015 | Identical |
CEI EN 62734 : 2015 | Identical |
EN 62734:2015 | Identical |
DIN EN 62734:2015-07 | Identical |
14/30316025 DC : 0 | BS EN 62657-2 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORKS - PART 2: COEXISTENCE MANAGEMENT |
14/30316021 DC : 0 | BS EN 62657-1 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORKS - PART 1: WIRELESS COMMUNICATION REQUIREMENTS AND SPECTRUM CONSIDERATIONS |
EN 62657-1:2017 | Industrial communication networks - Wireless communication networks - Part 1: Wireless communication requirements and spectrum considerations |
EN 62657-2:2017 | Industrial communication networks - Wireless communication networks - Part 2: Coexistence management |
BS EN 62657-2:2017 | Industrial communication networks. Wireless communication networks Coexistence management |
GR IP6 009 : 1.1.1 | IPV6-BASED INDUSTRIAL INTERNET LEVERAGING 6TISCH TECHNOLOGY |
I.S. EN 62657-2:2017 | INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORKS - PART 2: COEXISTENCE MANAGEMENT |
IEC 62657-1:2017 | Industrial communication networks - Wireless communication networks - Part 1: Wireless communication requirements and spectrum considerations |
BS EN 62657-1:2017 | Industrial communication networks. Wireless communication networks Wireless communication requirements and spectrum considerations |
I.S. EN 62657-1:2017 | INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORKS - PART 1: WIRELESS COMMUNICATION REQUIREMENTS AND SPECTRUM CONSIDERATIONS |
IEC 62657-2:2017 | Industrial communication networks - Wireless communication networks - Part 2: Coexistence management |
CEI EN IEC 62769-4:2023 | Field Device Integration (FDI®) Part 4: FDI Packages |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 26907:2009 | Information technology Telecommunications and information exchange between systems High-rate ultra-wideband PHY and MAC standard |
ISO 18435-2:2012 | Industrial automation systems and integration — Diagnostics, capability assessment and maintenance applications integration — Part 2: Descriptions and definitions of application domain matrix elements |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 7498-3:1997 | Information technology Open Systems Interconnection Basic Reference Model: Naming and addressing |
ISO/IEC 9646-7:1995 | Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements |
ISO/IEC 7498-1:1994 | Information technology Open Systems Interconnection Basic Reference Model: The Basic Model |
IEC TS 62443-1-1:2009 | Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models |
ISA 100.11A : 2011 | WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS |
ISO 2382-12:1988 | Information processing systems Vocabulary Part 12: Peripheral equipment |
ISO 11568-2:2012 | Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
NAMUR NE 107 : 2017 | SELF-MONITORING AND DIAGNOSIS OF FIELD DEVICES |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
IEC 62591:2016 | Industrial networks - Wireless communication network and communication profiles - WirelessHART<sup>TM</sup> |
IEC TR 62390:2005 | Common automation device - Profile guideline |
IEEE 802.3-2012 | IEEE Standard for Ethernet |
IEEE 802.15.4-2011 | IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) |
EN 300 440-1 : 1.6.1 | ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 1: TECHNICAL CHARACTERISTICS AND TEST METHODS |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
IEEE 802.1Q-2014 | IEEE Standard for Local and metropolitan area networks--Bridges and Bridged Networks |
EN 300 328-1 : 1.3.1 | ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); WIDEBAND TRANSMISSION SYSTEMS; DATA TRANSMISSION EQUIPMENT OPERATING IN THE 2,4 GHZ ISM BAND AND USING SPREAD SPECTRUM MODULATION TECHNIQUES; PART 1: TECHNICAL CHARACTERISTICS AND TEST CONDITIONS |
IEEE 802.11-2016 | IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
ISO/IEC 19790:2012 | Information technology Security techniques Security requirements for cryptographic modules |
ISO/IEC 10731:1994 | Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services |
ISO/IEC/IEEE 60559:2011 | Information technology Microprocessor Systems Floating-Point arithmetic |
IEC 62657-2:2017 | Industrial communication networks - Wireless communication networks - Part 2: Coexistence management |
CFR 47(PTS0-19) : OCT 2017 | TELECOMMUNICATION - FEDERAL COMMUNICATIONS COMMISSION |
NAMUR NE 105 : 2016 | SPECIFICATIONS FOR INTEGRATING FIELDBUS DEVICES IN ENGINEERING TOOLS FOR FIELD DEVICES |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
IEC 62601:2015 | Industrial networks - Wireless communication network and communication profiles - WIA-PA |
IEC 61512-1:1997 | Batch control - Part 1: Models and terminology |
EN 300 440-2 : 1.4.1 | ELECTROMAGNETIC COMPATIBILITY AND RADIO SPECTRUM MATTERS (ERM); SHORT RANGE DEVICES; RADIO EQUIPMENT TO BE USED IN THE 1 GHZ TO 40 GHZ FREQUENCY RANGE; PART 2: HARMONIZED EN COVERING THE ESSENTIAL REQUIREMENTS OF ARTICLE 3.2 OF THE R&TTE DIRECTIVE |
IEC 62264-1:2013 | Enterprise-control system integration - Part 1: Models and terminology |
IEC 61804-3:2015 | Function Blocks (FB) for process control and Electronic Device Description Language (EDDL) - Part 3: EDDL syntax and semantics |
ISO/IEC 2375:2003 | Information technology — Procedure for registration of escape sequences and coded character sets |
IEEE 802.16-2012 | IEEE Standard for Air Interface for Broadband Wireless Access Systems |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 646:1991 | Information technology ISO 7-bit coded character set for information interchange |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO 3166-1:2013 | Codes for the representation of names of countries and their subdivisions Part 1: Country codes |
ISA TR100.00.01 : 2006 | THE AUTOMATION ENGINEER'S GUIDE TO WIRELESS TECHNOLOGY - PART 1: THE PHYSICS OF RADIO, A TUTORIAL |
ISO 21188:2006 | Public key infrastructure for financial services Practices and policy framework |
ISO/IEC 2382-14:1997 | Information technology Vocabulary Part 14: Reliability, maintainability and availability |
ISO 11568-4:2007 | Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
ISO/IEC 7498-4:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 4: Management framework |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
IEC 61499-4:2013 | Function blocks - Part 4: Rules for compliance profiles |
ANSI X9.82-1 : 2006(R2013) | RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES |
IEEE 802.15.4E : 2012 | LOCAL AND METROPOLITAN AREA NETWORKS - PART 15.4: LOW-RATE WIRELESS PERSONAL AREA NETWORKS (LR-WPANS) - AMENDMENT 1: MAC SUBLAYER |
ISO/IEC 18028-3:2005 | Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Please Login or Create an Account so you can add users to your Multi user PDF Later.
Important note : All end users must be registered with an Account prior to user licenses being assigned.
Users cannot be edited or removed once added to your Multi user PDF.
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.