Industrial networks - Wireless communication network and communication profiles - ISA 100.11a

IEC 62734:2014 provides specifications in accordance with the OSI Basic Reference Model, ISO/IEC 7498-1, (e.g., PhL, DL, etc.). It is intended to provide reliable and secure wireless operation for non-critical monitoring, alerting, supervisory control, open loop control, and closed loop control applications. It defines a protocol suite, including system management, gateway considerations, and security specifications, for low-data-rate wireless connectivity with fixed, portable, and slowly-moving devices, often operating under severe energy and power constraints. The application focus is the performance needs of process automation monitoring and control where end-to-end communication latencies on the order of at least 100 ms can be tolerated.

Industrielle Kommunikationsnetze - Drahtlose Kommunikationsnetze und Kommunikationsprofile - ISA 100.11a

Réseaux industriels - Réseau de communication sans fil et profils de communication - ISA 100.11a

L'IEC 62734:2014 fournit des spécifications conformes au Modèle de référence de base OSI, ISO/IEC 7498-1, (par exemple: PhL, DL, etc.). Elle vise à assurer le fonctionnement fiable et sécurisé en mode sans fil pour les applications non critiques de contrôle, d'alerte, de commande de surveillance, de commande à boucle ouverte et de commande à boucle fermée. La présente norme définit une suite de protocoles, y compris la gestion de système, des considérations de passerelle et des spécifications de sécurité, pour une connectivité sans fil à bas débit avec des appareils fixes, portatifs et lentement mobiles, fonctionnant souvent sous des contraintes sévères d'énergie et de puissance. L'application est principalement axée sur les besoins de performance du contrôle et de la surveillance d'automation de processus où des latences de communication de bout en bout de l'ordre d'au moins 100 ms peuvent être tolérées.

Industrijska omrežja - Brezžično komunikacijsko omrežje in komunikacijski profili - ISA 100.11a (IEC 62734:2014)

General Information

Status
Published
Publication Date
22-Jan-2015
Technical Committee
Drafting Committee
Current Stage
6060 - Document made available
Due Date
23-Jan-2015
Completion Date
23-Jan-2015

RELATIONS

Buy Standard

Standard
EN 62734:2015 - BARVE
English language
871 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN 62734:2015
01-junij-2015

,QGXVWULMVNDRPUHåMD%UH]åLþQRNRPXQLNDFLMVNRRPUHåMHLQNRPXQLNDFLMVNLSURILOL

,6$D ,(&

Industrial networks - Wireless communication network and communication profiles - ISA

100.11a (IEC 62734:2014)
Industrielle Kommunikationsnetze - Drahtlose Kommunikationsnetze und
Kommunikationsprofile - ISA 100.11a (IEC 62734:2014)

Réseaux industriels - Réseau de communication sans fil et profils de communication -

ISA 100.11a (IEC 62734:2014)
Ta slovenski standard je istoveten z: EN 62734:2015
ICS:
25.040.01 Sistemi za avtomatizacijo v Industrial automation
industriji na splošno systems in general
33.040.40 Podatkovna komunikacijska Data communication
omrežja networks
35.100.01 Medsebojno povezovanje Open systems
odprtih sistemov na splošno interconnection in general
SIST EN 62734:2015 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN 62734:2015
---------------------- Page: 2 ----------------------
SIST EN 62734:2015
EUROPEAN STANDARD EN 62734
NORME EUROPÉENNE
EUROPÄISCHE NORM
January 2015
ICS 25.040; 33.040; 35.100
English Version
Industrial networks - Wireless communication network and
communication profiles - ISA 100.11a
(IEC 62734:2014)

Réseaux industriels - Réseau de communication sans fil et Industrielle Kommunikationsnetze - Drahtlose

profils de communication - ISA 100.11a Kommunikationsnetze und Kommunikationsprofile - ISA

(IEC 62734:2014) 100.11a
(IEC 62734:2014)

This European Standard was approved by CENELEC on 2014-12-02. CENELEC members are bound to comply with the CEN/CENELEC

Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.

Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC

Management Centre or to any CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by translation

under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the

same status as the official versions.

CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,

Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia,

Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland,

Turkey and the United Kingdom.
European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels

© 2015 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.

Ref. No. EN 62734:2015 E
---------------------- Page: 3 ----------------------
SIST EN 62734:2015
EN 62734:2015 - 2 -
Foreword

The text of document 65C/778/FDIS, future edition 1 of IEC 62734, prepared by SC 65C "Industrial

networks" of IEC/TC 65 "Industrial-process measurement, control and automation" was submitted to

the IEC-CENELEC parallel vote and approved by CENELEC as EN 62734:2015.
The following dates are fixed:
(dop) 2015-09-02
• latest date by which the document has to be
implemented at national level by
publication of an identical national
standard or by endorsement
• latest date by which the national (dow) 2017-12-02
standards conflicting with the
document have to be withdrawn

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights. CENELEC [and/or CEN] shall not be held responsible for identifying any or all such

patent rights.
Endorsement notice

The text of the International Standard IEC 62734:2014 was approved by CENELEC as a European

Standard without any modification.

In the official version, for Bibliography, the following notes have to be added for the standards indicated:

IEC 61158 Series NOTE Harmonized as EN 61158 Series.
IEC 61499-4:2005 NOTE Harmonized as EN 61499-4:2006 (not modified).
IEC 61512-1 NOTE Harmonized as EN 61512-1.
IEC 61804-3 NOTE Harmonized as EN 61804-3.
IEC 62264-1:2013 NOTE Harmonized as EN 62264-1:2013 (not modified).
IEC 62591 NOTE Harmonized as EN 62591.
ISO 3166-1 NOTE Harmonized as EN ISO 3166-1.
Superseded by EN 61499-4:2013 (IEC 61499-4:2013): DOW = 2016-03-06.
---------------------- Page: 4 ----------------------
SIST EN 62734:2015
- 3 - EN 62734:2015
Annex ZA
(normative)
Normative references to international publications
with their corresponding European publications

The following documents, in whole or in part, are normatively referenced in this document and are

indispensable for its application. For dated references, only the edition cited applies. For undated

references, the latest edition of the referenced document (including any amendments) applies.

NOTE 1 When an International Publication has been modified by common modifications, indicated by (mod), the relevant

EN/HD applies.

NOTE 2 Up-to-date information on the latest versions of the European Standards listed in this annex is available here:

www.cenelec.eu
Publication Year Title EN/HD Year
ISO/IEC 646 - Information technology; ISO 7-bit coded - -
character set for information interchange
ISO/IEC 10731 - Information technology - Open Systems - -
Interconnection - Basic Reference Model -
Conventions for the definition of OSI
services
ISO/IEC 18033-3 - Information technology - Security - -
techniques - Encryption algorithms -
Part 3: Block ciphers
ISO/IEC 19772 - Information technology - Security - -
techniques - Authenticated encryption
ANSI X 9.63 2011 Public Key Cryptography for Financial - -
Services Industry - Key Agreement and
Key Transport Using Elliptic Curve
Cryptography
IETF RFC 2460 1998 Internet Protocol - Version 6 (IPv6) - - -
Specification
IETF RFC 2464 - Transmission of IPv6 Packets over - -
Ethernet Networks
IETF RFC 2529 - Transmission of IPv6 over IPv4 Domains - -
without Explicit Tunnels
IETF RFC 3168 - The Addition of Explicit Congestion - -
Notification (ECN) to IP
IETF RFC 4213 - Basic Transition Mechanisms for IPv6 - -
Hosts and Routers
IETF RFC 4291 2006 IP Version 6 Addressing Architecture - -
IETF RFC 4944 - Transmission of IPv6 Packets over IEEE - -
802.15.4 Networks
IETF RFC 6282 2011 Compression Format for IPv6 Datagrams - -
over IEEE 802.15.4-Based Networks
IETF RFC 6298 - Computing TCP's Retransmission Timer - -
---------------------- Page: 5 ----------------------
SIST EN 62734:2015
EN 62734:2015 - 4 -
Publication Year Title EN/HD Year
IEEE 802.15.4 2011 IEEE Standard for Local and metropolitan - -
area networks - Part 15.4: Low-Rate
Wireless Personal Area Networks (LR-
WPANs)
SEC 1 2009 Elliptic Curve Cryptography, version 2
SEC 4 Elliptic Curve Qu-Vanstone Implicit
Certificate Scheme (ECQV), version 0.97
---------------------- Page: 6 ----------------------
SIST EN 62734:2015
IEC 62734
Edition 1.0 2014-10
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Industrial networks – Wireless communication network and communication
profiles – ISA 100.11a
Réseaux industriels – Réseau de communication sans fil et profils de
communication – ISA 100.11a
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
PRICE CODE
INTERNATIONALE
CODE PRIX XH
ICS 25.040; 33.040; 35.100 ISBN 978-2-8322-1874-7

Warning! Make sure that you obtained this publication from an authorized distributor.

Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé.

® Registered trademark of the International Electrotechnical Commission
Marque déposée de la Commission Electrotechnique Internationale
---------------------- Page: 7 ----------------------
SIST EN 62734:2015
– 2 – IEC 62734:2014 © IEC 2014
CONTENTS

FOREWORD ......................................................................................................................... 31

0 Introduction ................................................................................................................... 33

0.1 General ................................................................................................................. 33

0.2 Document structure ............................................................................................... 33

0.3 Potentially relevant patents ................................................................................... 33

1 Scope ............................................................................................................................ 35

2 Normative references .................................................................................................... 35

3 Terms, definitions, abbreviated terms, acronyms, and conventions ................................ 36

3.1 Terms and definitions............................................................................................ 36

3.1.1 (N)-layer and other terms and definitions from the open systems

interconnection Basic Reference Model ......................................................... 36

3.1.2 Other terms and definitions ............................................................................ 45

3.1.3 Symbols for symmetric keys, and for asymmetric keys and certificates .......... 63

3.1.4 Terms used to describe device behavior ........................................................ 64

3.2 Abbreviated terms and acronyms .......................................................................... 65

3.3 Conventions .......................................................................................................... 71

3.3.1 Service interfaces .......................................................................................... 71

3.3.2 Table cells ..................................................................................................... 72

3.3.3 Italics............................................................................................................. 72

3.3.4 Bold face ....................................................................................................... 73

3.3.5 Informal declarations of named constants ...................................................... 73

4 Overview ....................................................................................................................... 73

4.1 General ................................................................................................................. 73

4.2 Interoperability and related issues ........................................................................ 73

4.3 Quality of service .................................................................................................. 74

4.4 Worldwide applicability ......................................................................................... 74

4.5 Network architecture ............................................................................................. 74

4.5.1 Interfaces ...................................................................................................... 74

4.5.2 Data structures .............................................................................................. 75

4.5.3 Network description ....................................................................................... 76

4.5.4 Generic protocol data unit construction .......................................................... 77

4.5.5 Abstract data and concrete representations ................................................... 78

4.6 Network characteristics ......................................................................................... 80

4.6.1 General ......................................................................................................... 80

4.6.2 Scalability ...................................................................................................... 80

4.6.3 Extensibility ................................................................................................... 81

4.6.4 Simple operation ........................................................................................... 81

4.6.5 Site-license-exempt operation ....................................................................... 81

4.6.6 Robustness in the presence of interference, including from other

wireless systems ........................................................................................... 81

4.6.7 Determinism and contention-free media access ............................................. 81

4.6.8 Self-organizing networking with support for redundancy ................................ 82

4.6.9 Internet-protocol-compatible NL ..................................................................... 82

4.6.10 Coexistence with other radio frequency systems ............................................ 82

4.6.11 Time-slotted assigned-channel D-transactions as the basis for

communication .............................................................................................. 84

---------------------- Page: 8 ----------------------
SIST EN 62734:2015
IEC 62734:2014 © IEC 2014 – 3 –

4.6.12 Robust and flexible security ........................................................................... 86

4.6.13 System management ..................................................................................... 87

4.6.14 Application process using standard objects ................................................... 87

4.6.15 Tunneling ...................................................................................................... 87

5 System .......................................................................................................................... 87

5.1 General ................................................................................................................. 87

5.2 Devices ................................................................................................................. 88

5.2.1 General ......................................................................................................... 88

5.2.2 Device interworkability ................................................................................... 88

5.2.3 Profiles .......................................................................................................... 88

5.2.4 Quality of service ........................................................................................... 88

5.2.5 Device worldwide applicability ....................................................................... 88

5.2.6 Device description ......................................................................................... 89

5.2.7 Device addressing ......................................................................................... 93

5.2.8 Device phases ............................................................................................... 93

5.2.9 Device energy sources .................................................................................. 95

5.3 Networks .............................................................................................................. 95

5.3.1 General ......................................................................................................... 95

5.3.2 Minimal network............................................................................................. 95

5.3.3 Basic network topologies supported ............................................................... 96

5.3.4 Network configurations .................................................................................. 99

5.3.5 Gateway, system manager, and security manager ....................................... 104

5.4 Protocol suite structure ....................................................................................... 105

5.5 Data flow ............................................................................................................ 106

5.5.1 General ....................................................................................................... 106

5.5.2 Native communications ................................................................................ 107

5.5.3 Basic data flow ............................................................................................ 107

5.5.4 Data flow between I/O devices ..................................................................... 108

5.5.5 Data flow with legacy I/O device .................................................................. 108

5.5.6 Data flow with backbone .............................................................................. 112

5.5.7 Data flow between I/O devices via backbone ............................................... 112

5.5.8 Data flow to a standard-aware control system or device .............................. 112

5.6 Time reference.................................................................................................... 113

5.6.1 General ....................................................................................................... 113

5.6.2 Time synchronization ................................................................................... 114

5.7 Firmware upgrades ............................................................................................. 114

5.8 Wireless backbones and other infrastructures ..................................................... 114

6 System management role ............................................................................................ 114

6.1 General ............................................................................................................... 114

6.1.1 Overview ..................................................................................................... 114

6.1.2 Components and architecture ...................................................................... 115

6.1.3 Management functions ................................................................................. 116

6.2 DMAP ................................................................................................................. 116

6.2.1 General ....................................................................................................... 116

6.2.2 Architecture of device management ............................................................. 117

6.2.3 Definition of management objects ................................................................ 117

6.2.4 Management objects in DMAP ..................................................................... 117

6.2.5 Communications services provided to device management objects .............. 119

6.2.6 Attributes of management objects ................................................................ 120

---------------------- Page: 9 ----------------------
SIST EN 62734:2015
– 4 – IEC 62734:2014 © IEC 2014

6.2.7 Definitions of management objects in DMAP ................................................ 121

6.2.8 Functions of device management and layer management ............................ 130

6.3 System manager ................................................................................................. 140

6.3.1 General ....................................................................................................... 140

6.3.2 System management architecture ................................................................ 140

6.3.3 Standard system management object types ................................................. 141

6.3.4 Security management .................................................................................. 142

6.3.5 Addresses and address allocation ............................................................... 143

6.3.6 Firmware upgrade........................................................................................ 147

6.3.7 System performance monitoring .................................................................. 148

6.3.8 Device provisioning service ......................................................................... 149

6.3.9 Device management services ...................................................................... 149

6.3.10 System time services ................................................................................... 158

6.3.11 System communication configuration ........................................................... 162

6.3.12 Redundancy management ........................................................................... 195

6.3.13 System management protocols .................................................................... 196

6.3.14 Management policies and policy administration ........................................... 196

6.3.15 Operational interaction with plant operations or maintenance personnel ...... 196

7 Security ....................................................................................................................... 196

7.1 General ............................................................................................................... 196

7.2 Security services ................................................................................................ 197

7.2.1 Overview ..................................................................................................... 197

7.2.2 Keys ............................................................................................................ 198

7.3 PDU security ....................................................................................................... 202

7.3.1 General ....................................................................................................... 202

7.3.2 DPDU security ............................................................................................. 203

7.3.3 TL security functionality ............................................................................... 218

7.4 Joining process ................................................................................................... 234

7.4.1 General ....................................................................................................... 234

7.4.2 Prerequisites ............................................................................................... 234

7.4.3 Desired device end state and properties ...................................................... 235

7.4.4 Joining process steps common for symmetric-key and asymmetric-key

approaches .................................................................................................. 235

7.4.5 Symmetric-key joining process .................................................................... 238

7.4.6 Asymmetric-key joining process ................................................................... 248

7.4.7 Joining process and device lifetime failure recovery .................................... 264

7.5 Session establishment ........................................................................................ 266

7.5.1 General ....................................................................................................... 266

7.5.2 Description .................................................................................................. 266

7.5.3 Application protocol data unit protection using the master key ..................... 268

7.5.4 Proxy security management object methods related to the session

establishment .............................................................................................. 268

7.6 Key update ......................................................................................................... 271

7.6.1 General ....................................................................................................... 271

7.6.2 Description .................................................................................................. 271

7.6.3 Device security management object methods related to T-key update ......... 272

7.6.4 Failure recovery ........................................................................................... 276

7.7 Functionality of the security manager role ........................................................... 278

7.7.1 Proxy security management object .............................................................. 278

---------------------- Page: 10 ----------------------
SIST EN 62734:2015
IEC 62734:2014 © IEC 2014 – 5 –
7.7.2 Authorization of network devices and generation or derivation of initial

master keys ................................................................................................. 279

7.7.3 Interaction with device security management objects ................................... 279

7.7.4 Management of operational keys ................................................................. 279

7.8 Security policies.................................................................................................. 280

7.8.1 Definition of security policy .......................................................................... 280

7.8.2 Policy extent ................................................................................................ 280

7.8.3 Unconstrained security policy choices ......................................................... 281

7.8.4 Policy structures .......................................................................................... 281

7.9 Security functions available to the AL ................................................................. 283

7.9.1 Parameters on transport service requests that relate to security .................. 283

7.9.2 Direct access to cryptographic primitives ..................................................... 284

7.9.3 Symmetric-key cryptography ........................................................................ 285

7.10 Security statistics collection, threat detection, and reporting ............................... 286

7.11 DSMO functionality ............................................................................................. 287

7.11.1 General ....................................................................................................... 287

7.11.2 DSMO attributes .......................................................................................... 287

7.11.3 KeyDescriptor .............................................................................................. 288

7.11.4 DSMO alerts ................................................................................................ 293

8 Physical layer .............................................................................................................. 294

8.1 General ............................................................................................................... 294

8.2 Default physical layer .......................................................................................... 295

8.2.1 General requirements .................................................................................. 295

8.2.2 Additional requirements of IEEE 802.15.4 .................................................... 295

8.2.3 Exceptions to the IEEE 802.15.4 physical layer ........................................... 296

9 Data-link layer ............................................................................................................. 296

9.1 General ............................................................................................................... 296

9.1.1 Overview ..................................................................................................... 296

9.1.2 Coexistence strategies in the DL ................................................................. 297

9.1.3 Allocation of digital bandwidth ..................................................................... 297

9.1.4 Structure of the DPDU ................................................................................. 298

9.1.5 The DL and the IEEE 802.15.4 MAC ............................................................ 298

9.1.6 Routes and graphs ...................................................................................... 299

9.1.7 Slotted-channel-hopping, slow-channel-hopping, and timeslots ................... 306

9.1.8 Superframes ................................................................................................ 317

9.1.9 DL time keeping........................................................................................... 329

9.1.10 D-subnet addressing .................................................................................... 348

9.1.11 DL management service .............................................................................. 349

9.1.12 Relationship between DLE and DSC ............................................................ 351

9.1.13 DLE neighbor discovery ...............................................................................

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.