|
US$1014.00 · In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GBZ25320.5-2013: Power systems management and associated information exchange -- Data and communications security -- Part 5: Security for GB/T 18657 and derivatives Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/Z 25320.5-2013 | English | 1014 |
Add to Cart
|
3 days [Need to translate]
|
Power systems management and associated information exchange -- Data and communications security -- Part 5: Security for GB/T 18657 and derivatives
| Valid |
GB/Z 25320.5-2013
|
PDF similar to GBZ25320.5-2013
Basic data | Standard ID | GB/Z 25320.5-2013 (GB/Z25320.5-2013) | | Description (Translated English) | Power systems management and associated information exchange -- Data and communications security -- Part 5: Security for GB/T 18657 and derivatives | | Sector / Industry | National Standard | | Classification of Chinese Standard | F21 | | Classification of International Standard | 29.240.01 | | Word Count Estimation | 51,515 | | Quoted Standard | IEC 60870-5-101; IEC 60870-5-102; IEC 60870-5-103; IEC 60870-5-104; IEC/TS 62351-1; IEC/TS 62351-2; IEC/TS 62351-3; ISO/IEC 9798-4; FIPS 186-2; FIPS 197; FIPS 198-1; RFC 2104; RFC 3174; RFC 3394; RFC 3629 | | Adopted Standard | IEC/TS 62351-5-2009, IDT | | Regulation (derived from) | National Standards Bulletin 2013 No. 2 | | Issuing agency(ies) | Ministry of Health of the People's Republic of China | | Summary | This standard specifies the messages used in the process and algorithms. This section applies at least listed in Table 1 of the agreement. |
GBZ25320.5-2013: Power systems management and associated information exchange -- Data and communications security -- Part 5: Security for GB/T 18657 and derivatives ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Power systems management and associated information exchange. Data and communications security. Part 5. Security for GB/T 18657 and derivatives
ICS 29.240.01
F21
People's Republic of China national standardization of technical guidance documents
Power System Management and Information Exchange
Data and communications security
Part 5. GB/T 18657 and so on
Derivative standard safety
Powersystems management and associated information exchange-
Part 5.SecurityforGB/T 18657andderivatives
(IEC /T S62351-5.2009, IDT)
2013-02-07.2013-07-01 implementation
General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
China National Standardization Administration released
Directory
Foreword Ⅲ
Introduction IV
1 Scope and purpose 1
1.1 Scope 1
1.2 Expected readers and uses 1
1.3 beyond the scope of this section 1
1.4 Used with other standards 1
1.5 File Structure and Research 2
1.6 Consistency 2
2 Normative references 2
3 Terms and definitions 3
4 abbreviation
5 Problem Description 3
5.1 Overview 3
5.2 Specific threats to deal with 4
5.3 Design problems faced 4
5.4 General principles 6
6 certification operation theory (informative) 8
6.1 Overview 8
Descriptive description
6.3 Message Sequence Example 10
6.4 State Machine Overview 14
7 Formal Specification 16
7.1 Overview 16
7.2 Message Definition 16
7.3 The formal process 28
Interoperability Requirements
8.1 Overview 40
8.2 Minimum Requirements 40
8.3 Optional 42
Special applications 43
9.1 Overview 43
9.2 Using TCP/IP 43
9.3 Use of redundant channels 43
9.4 Using an External Link Encryption Machine
10 reference to the requirements of this section 43
10.1 Overview 43
10.2 Selected Options 43
10.3 Think Key Operations 43
10.4 Address Information 43
10.5 Information Format Mapping 44
10.6 Reference to Procedures 44
11 Agreement Declaration of Consensus Achieved 44
11.1 Overview 44
11.2 Required Algorithms 44
11.3 HMAC Algorithm 44
11.4 Key Encryption Algorithm
11.5 Maximum error count 44
11.6 The Use of Error Messages 44
References 45
Foreword
GB /Z 25320 "power system management and information exchange data and communications security" is divided into the following sections.
--- Part 1. Introduction to communication network and system security and safety issues;
--- Part 2. Terms;
--- Part 3. Communication network and system security including TCP/IP protocol set;
--- Part 4. Protocol set containing MMS;
--- Part 5. GB/T 18657, etc. and their derivatives standards of security;
--- Part 6. Power enterprise automation communication network and system security;
--- Part 7. Network and system management data object model;
--- Part 8. Role-based access control of power system management.
This section GB /Z 25320 Part 5.
This section drafted in accordance with GB/T 1.1-2009 given rules.
This section uses the translation method identical with IEC /T S62351-5.2009 "Power System Management and its information exchange data and communications security
Full Part 5. IEC 60870-5 and its derivatives standards of safety. "
The documents of our country that are consistent with the corresponding international documents that are normative references in this section are as follows.
--- GB /Z 25320.1-2010 Power system management and information exchange - Data and communications security - Part 1. Communication networks
And system safety and security issues (IEC /T S62351-1.2007, IDT)
--- GB /Z 25320.2-2013 Power system management and its exchange of information data and communications security Part 2. Terminology
(IEC /T S62351-2.2008, IDT)
--- GB /Z 25320.3-2010 Power system management and its exchange of information data and communications security Part 3. Communication network
And System Security Including TCP/IP Protocol Set (IEC /T S62351-3.2007, IDT)
--- DL/T 634.5101-2002 Telecontrol equipment and systems Part 5-101. Transmission protocol Basic Telecontrol tasks supporting standard
Standard (IEC 60870-5-101.2002, IDT)
--- DL/T 719-2000 Telecontrol equipment and systems Part 5. Transmission protocol Article 102. Accumulation of electric energy in electric power system
Transmission standards (IEC 60870-5-102.1996, IDT)
--- DL/T 667-1999 Telecontrol equipment and systems Part 5. Transmission protocol Part 103. Relay equipment information access
Mouth supporting standards (IEC 60870-5-103.1997, IDT)
--- DL/T 634.5104-2009 Telecontrol equipment and systems Section 5-104. Transmission protocol using standard transmission protocol set
IEC 60870-5-101 Network Access (IEC 60870-5-104.2006, IDT)
This part is proposed by China Electricity Council.
This part of the National Power System Management and Information Exchange Standardization Technical Committee (SAC/TC82) centralized.
This section drafted unit. Huazhong Power Grid Co., Ltd., State Grid Electric Power Research Institute, the State Power Dispatching and Communication Center, China Electric Power Science
Research Institute, China Southern Power Grid, East China Power Grid Co., Ltd., Fujian Provincial Electric Power Co., Ltd., Liaoning Provincial Power Co., Ltd.
The main drafters of this section. Han Shuibao, Xu Mu Liang, Yangqiuheng, Nan Guilin, Zhang Tao, Zhou Peng, Li Genwei, Deng Zhaoyun, Cao Lianjun, Ma Xiao,
Jiang Chengzhi.
Introduction
Computer, communications and networking technologies are currently widely used in power systems. There are various kinds of information in communications and computer networks
Possible security attacks pose a threat to the security of data and communications in power systems. These potential possible attacks target the power system
Security vulnerabilities in communication protocols at various levels of the system and imperfections in the security management of power system information infrastructure.
To this end, we adopted the international standard to develop GB /Z 25320 "Power System Management and its information exchange data and communication security", pass
Over the relevant communication protocols and in the information infrastructure management to add specific security measures to enhance and enhance the power system data and
Communication security.
Power System Management and Information Exchange
Data and communications security
Part 5. GB/T 18657 and so on
Derivative standard safety
1 Scope and purpose
1.1 Scope
For the purpose of any and every application that is based on or derived from IEC 60870-5 (GB/T 18657 "Telecontrol Equipment and Systems Part 5. Transmission Specifications")
Agreement for the operation of security, GB /Z 25320 provisions of this section used by the message, process and algorithm. This section applies at least
Table 1 lists the agreement.
Table 1 applies the scope of the standard
Number Name
IEC 60870-5-101 basic mission supporting mission
IEC 60870-5-102 Power system electrical energy metering transmission supporting standards
IEC 60870-5-103 relay protection equipment information interface supporting standards
IEC 60870-5-104 IEC 60870-5-101 Network access using standard transmission protocol set
DNP3 distributed network protocol (based on IEC 60870-1 to IEC 60870-5 and controlled by DNP user group)
1.2 prospective readers and purposes
This section of the initial reader is expected to develop the agreement listed in Table 1 working group staff. In order for the measures described in this section to take effect,
The protocol specification itself must adopt and cite these measures. This section is written to enable this process.
Subsequent readers of this section are expected to be product developers implementing these protocols.
Portions of this section are also useful for managers and administrators to understand the purpose and needs of the job.
1.3 beyond the scope of this section
According to the directives of Working Party 3 of IEC 57, this part of IEC 62351 focuses only on application-level certification and the resulting certification
Health and safety issues. Other issues involved in security protection, especially through the use of encryption to prevent eavesdropping and man-in-the-middle attacks
To exceed the scope of this section. Through the use of this standard in conjunction with other specifications, you can add encryption.
1.4 Used with other standards
Working groups that develop the protocols listed in Table 1 may publish standards that are used in conjunction with this section. Requirements These standards should describe the certification machine
The mapping of messages and procedures for each particular protocol.
These documents should not disregard any of the mandatory and prescriptive safety measures described in this section.
When used in IEC 60870-5-104, this section should be used in conjunction with IEC /T S62351-3.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GBZ25320.5-2013_English be delivered?Answer: Upon your order, we will start to translate GBZ25320.5-2013_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GBZ25320.5-2013_English with my colleagues?Answer: Yes. The purchased PDF of GBZ25320.5-2013_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|