Electricity metering data exchange - The DLMS/COSEM suite - Part 8-8: Communication profile for ISO/IEC 14908 series networks

IEC 62056-8-8:2020 describes how the DLMS/COSEM Application layer and the COSEM object model, as specified in IEC 62056‑5‑3:2017, IEC 62056‑6‑1:2017 and IEC 62056‑6‑2:2017, can be used over the lower layers specified in the IEC 14908 series, forming a DLMS/COSEM ISO/IEC 14908 communication profile. This document is part of the IEC 62056 series. Its structure follows IEC 62056-1-0 and IEC TS 62056-1-1.

Échange des données de comptage de l'électricité – La suite DLMS/COSEM – Partie 8-8: Profil de communication pour réseaux série ISO/IEC 14908

IEC 62056-8-8:2020 décrit la manière dont la couche application DLMS/COSEM et le modèle d'objet COSEM spécifiés dans l'IEC 62056‑5‑3:2017, l'IEC 62056‑6‑1:2017 et
l'IEC 62056‑6‑2:2017 peuvent être utilisés sur les couches inférieures spécifiées dans la série IEC 14908, pour former un profil de communication DLMS/COSEM ISO/IEC14908.
Le présent document fait partie de la série IEC 62056. Sa structure s'aligne sur celle de l'IEC 62056-1-0 et de l'IEC TS 62056-1-1.

General Information

Status
Published
Publication Date
27-Apr-2020
Current Stage
PPUB - Publication issued
Completion Date
28-Apr-2020
Ref Project

Buy Standard

Standard
IEC 62056-8-8:2020 - Electricity metering data exchange - The DLMS/COSEM suite - Part 8-8: Communication profile for ISO/IEC 14908 series networks
English and French language
208 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (sample)

IEC 62056-8-8
Edition 1.0 2020-04
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Electricity metering data exchange – The DLMS/COSEM suite –
Part 8-8: Communication profile for ISO/IEC 14908 series networks
Échange des données de comptage de l'électricité – La suite DLMS/COSEM –
Partie 8-8: Profil de communication pour réseaux de la série ISO/IEC 14908
IEC 62056-8-8:2020-04(en-fr)
---------------------- Page: 1 ----------------------
THIS PUBLICATION IS COPYRIGHT PROTECTED
Copyright © 2020 IEC, Geneva, Switzerland

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form

or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from

either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC

copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or

your local IEC member National Committee for further information.

Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite

ni utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie

et les microfilms, sans l'accord écrit de l'IEC ou du Comité national de l'IEC du pays du demandeur. Si vous avez des

questions sur le copyright de l'IEC ou si vous désirez obtenir des droits supplémentaires sur cette publication, utilisez

les coordonnées ci-après ou contactez le Comité national de l'IEC de votre pays de résidence.

IEC Central Office Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC

The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes

International Standards for all electrical, electronic and related technologies.
About IEC publications

The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the

latest edition, a corrigendum or an amendment might have been published.

IEC publications search - webstore.iec.ch/advsearchform Electropedia - www.electropedia.org

The advanced search enables to find IEC publications by a The world's leading online dictionary on electrotechnology,

variety of criteria (reference number, text, technical containing more than 22 000 terminological entries in English

committee,…). It also gives information on projects, replaced and French, with equivalent terms in 16 additional languages.

and withdrawn publications. Also known as the International Electrotechnical Vocabulary

(IEV) online.
IEC Just Published - webstore.iec.ch/justpublished

Stay up to date on all new IEC publications. Just Published IEC Glossary - std.iec.ch/glossary

details all new publications released. Available online and 67 000 electrotechnical terminology entries in English and

once a month by email. French extracted from the Terms and Definitions clause of

IEC publications issued since 2002. Some entries have been

IEC Customer Service Centre - webstore.iec.ch/csc collected from earlier publications of IEC TC 37, 77, 86 and

If you wish to give us your feedback on this publication or CISPR.
need further assistance, please contact the Customer Service
Centre: sales@iec.ch.
A propos de l'IEC

La Commission Electrotechnique Internationale (IEC) est la première organisation mondiale qui élabore et publie des

Normes internationales pour tout ce qui a trait à l'électricité, à l'électronique et aux technologies apparentées.

A propos des publications IEC

Le contenu technique des publications IEC est constamment revu. Veuillez vous assurer que vous possédez l’édition la

plus récente, un corrigendum ou amendement peut avoir été publié.
Recherche de publications IEC - Electropedia - www.electropedia.org

webstore.iec.ch/advsearchform Le premier dictionnaire d'électrotechnologie en ligne au

La recherche avancée permet de trouver des publications IEC monde, avec plus de 22 000 articles terminologiques en

en utilisant différents critères (numéro de référence, texte, anglais et en français, ainsi que les termes équivalents dans

comité d’études,…). Elle donne aussi des informations sur les 16 langues additionnelles. Egalement appelé Vocabulaire

projets et les publications remplacées ou retirées. Electrotechnique International (IEV) en ligne.

IEC Just Published - webstore.iec.ch/justpublished Glossaire IEC - std.iec.ch/glossary

Restez informé sur les nouvelles publications IEC. Just 67 000 entrées terminologiques électrotechniques, en anglais

Published détaille les nouvelles publications parues. et en français, extraites des articles Termes et Définitions des

Disponible en ligne et une fois par mois par email. publications IEC parues depuis 2002. Plus certaines entrées

antérieures extraites des publications des CE 37, 77, 86 et
Service Clients - webstore.iec.ch/csc CISPR de l'IEC.
Si vous désirez nous donner des commentaires sur cette
publication ou si vous avez des questions contactez-nous:
sales@iec.ch.
---------------------- Page: 2 ----------------------
IEC 62056-8-8
Edition 1.0 2020-04
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Electricity metering data exchange – The DLMS/COSEM suite –
Part 8-8: Communication profile for ISO/IEC 14908 series networks
Échange des données de comptage de l'électricité – La suite DLMS/COSEM –
Partie 8-8: Profil de communication pour réseaux de la série ISO/IEC 14908
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 17.220; 35.110; 91.140.50 ISBN 978-2-8322-8082-9

Warning! Make sure that you obtained this publication from an authorized distributor.

Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé.

® Registered trademark of the International Electrotechnical Commission
Marque déposée de la Commission Electrotechnique Internationale
---------------------- Page: 3 ----------------------
– 2 – IEC 62056-8-8:2020  IEC 2020
CONTENTS

FOREWORD ........................................................................................................................... 7

INTRODUCTION ..................................................................................................................... 9

1 Scope ............................................................................................................................ 10

2 Normative references .................................................................................................... 10

3 Terms, definitions and abbreviated terms ...................................................................... 11

3.1 Terms and definitions ............................................................................................ 11

3.2 Abbreviated terms ................................................................................................. 12

4 Targeted communication environments .......................................................................... 13

5 Use of the communication layers for this profile ............................................................. 13

5.1 Information related to the use of the standard specifying the lower layers ............. 13

5.2 The structure of the communication profile ............................................................ 14

5.3 Lower layers and their use .................................................................................... 14

5.3.1 Overview ....................................................................................................... 14

5.3.2 Physical layer ................................................................................................ 15

5.3.3 Data link layer ............................................................................................... 15

5.3.4 Network layer ................................................................................................ 15

5.3.5 Transport layer .............................................................................................. 15

5.4 Service mapping and Adaptation layer .................................................................. 16

5.4.1 Overview ....................................................................................................... 16

5.4.2 Adaptation layer ............................................................................................ 16

5.5 Registration and connection management ............................................................. 27

6 Identification and addressing schemes .......................................................................... 27

7 Specific considerations for the application layer services ............................................... 28

7.1 Overview............................................................................................................... 28

7.2 Application Association establishment and release: ACSE services ...................... 28

7.2.1 Application association establishment ............................................................ 28

7.2.2 Application association release ...................................................................... 29

7.2.3 COSEM-OPEN and COSEM-RELEASE service parameters ........................... 29

7.3 xDLMS services .................................................................................................... 30

7.4 Security mechanisms ............................................................................................ 30

7.4.1 DLMS/COSEM security .................................................................................. 30

7.4.2 Adaptation layer security ............................................................................... 30

7.4.3 Lower layers security ..................................................................................... 30

7.5 Transferring long application messages ................................................................ 30

7.6 Media access, bandwidth and timing considerations ............................................. 30

7.7 Other considerations ............................................................................................. 30

8 Communication configuration and management ............................................................. 31

9 The COSEM Application Process ................................................................................... 31

10 Additional considerations for the use of this profile ........................................................ 31

Annex A (informative) Examples .......................................................................................... 32

Annex B (normative) Interface classes ................................................................................. 33

B.1 Interface classes ................................................................................................... 33

B.1.1 ISO/IEC 14908 Identification .......................................................................... 33

B.1.2 ISO/IEC 14908 Protocol setup ....................................................................... 33

B.1.3 ISO/IEC 14908 Protocol status ...................................................................... 34

---------------------- Page: 4 ----------------------
IEC 62056-8-8:2020  IEC 2020 – 3 –

B.1.4 ISO/IEC 14908 Diagnostic ............................................................................. 35

B.2 Relation to OBIS ................................................................................................... 37

Annex C (informative) Implementation guide and migration path .......................................... 38

C.1 General ................................................................................................................. 38

C.2 Client-server model ............................................................................................... 38

C.2.1 General ......................................................................................................... 38

C.2.2 Clients ........................................................................................................... 38

C.2.3 Servers .......................................................................................................... 39

C.2.4 Application associations ................................................................................ 39

C.3 The COSEM objects.............................................................................................. 40

C.3.1 COSEM object model..................................................................................... 40

C.3.2 Referencing methods ..................................................................................... 41

C.3.3 The object_list ............................................................................................... 42

C.3.4 Mandatory COSEM objects ............................................................................ 42

C.3.5 Application specific objects ............................................................................ 42

C.3.6 Utility table objects ........................................................................................ 42

Annex D (informative) OSGP-AES-128-PSK security suite ................................................... 46

D.1 General ................................................................................................................. 46

D.2 Background........................................................................................................... 47

D.2.1 Overview ....................................................................................................... 47

D.2.2 System Assumptions ..................................................................................... 47

D.2.3 Threat Model ................................................................................................. 47

D.2.4 Design goals .................................................................................................. 48

D.2.5 Inspiration ..................................................................................................... 48

D.3 Terms and definition, abbreviated terms and notation ........................................... 48

D.3.1 Terms and definitions .................................................................................... 48

D.3.2 Abbreviated terms ......................................................................................... 50

D.3.3 Notation ......................................................................................................... 50

D.3.4 Other conventions ......................................................................................... 50

D.4 Cryptographic Primitives ....................................................................................... 51

D.4.1 General ......................................................................................................... 51

D.4.2 CMAC ............................................................................................................ 51

D.4.3 CCM .............................................................................................................. 51

D.5 Cryptographic Functions ....................................................................................... 52

D.5.1 Overview ....................................................................................................... 52

D.5.2 OSGP_KDF: Key Derivation Function ............................................................ 52

D.5.3 OSGP_MAC: Message Authentication Code Function .................................... 52

D.5.4 OSGP_MAC_VERIFY: Message Authentication Code Verification

Function ........................................................................................................ 53

D.5.5 OSGP_AE/OSGP_AD: Authenticated Encryption/Decryption Function ........... 53

D.5.6 OSGP_CSPRNG: Cryptographically Secure Pseudo Random Number

Generator ...................................................................................................... 55

D.6 Keys ..................................................................................................................... 56

D.7 Secure channel initialization ................................................................................. 58

D.7.1 Overview ....................................................................................................... 58

D.7.2 Secure Channel State (CryptoContext) .......................................................... 58

D.7.3 Flow .............................................................................................................. 58

D.7.4 Security Suite Negotiation ............................................................................. 63

D.7.5 LNAP Commissioning .................................................................................... 64

---------------------- Page: 5 ----------------------
– 4 – IEC 62056-8-8:2020  IEC 2020

D.7.6 Error Handling and Intrusion Detection .......................................................... 64

D.7.7 Messages ...................................................................................................... 64

D.8 Secure Channel Communication ........................................................................... 67

D.8.1 General ......................................................................................................... 67

D.8.2 The General Process ..................................................................................... 68

D.8.3 Unicast communication .................................................................................. 69

D.8.4 Broadcast Communication ............................................................................. 73

D.9 Firmware Downloading .......................................................................................... 75

D.10 Key Management .................................................................................................. 76

D.10.1 Renewing the Short-term, Meter-unique Keys ................................................ 76

D.10.2 Renewing the Short-term, Domain-unique Keys ............................................. 76

D.10.3 UpdateDomainKeysRequest .......................................................................... 77

D.10.4 UpdateDomainKeysResponse ........................................................................ 77

D.11 Updating the Long-term, Meter-unique Keys ......................................................... 77

D.11.1 General ......................................................................................................... 77

D.11.2 Key Validity Periods ....................................................................................... 78

D.12 Error Messages .................................................................................................... 78

D.12.1 Overview ....................................................................................................... 78

D.12.2 AuthenticationFailure ..................................................................................... 78

D.12.3 SequenceError .............................................................................................. 78

D.13 Security considerations ......................................................................................... 78

D.13.1 Reasoning ..................................................................................................... 78

D.13.2 Recommendation and Guidance for Implementers ......................................... 81

Annex E (normative) Repeating mechanism ......................................................................... 83

E.1 Overview............................................................................................................... 83

E.2 Terms and definitions ............................................................................................ 83

E.3 Protocol specification ............................................................................................ 84

E.3.1 Overview ....................................................................................................... 84

E.3.2 Addressing .................................................................................................... 84

E.3.3 Service types ................................................................................................. 84

E.3.4 Timers ........................................................................................................... 84

E.3.5 Request flow .................................................................................................. 85

E.3.6 Response flow ............................................................................................... 85

E.3.7 Authentication................................................................................................ 85

E.3.8 Examples....................................................................................................... 86

E.3.9 Broadcast ...................................................................................................... 87

E.4 Downlink frame format .......................................................................................... 87

E.4.1 Overview ....................................................................................................... 87

E.4.2 Proxy parameters of request frame ............................................................... 88

E.5 Uplink Frame format ............................................................................................. 92

E.5.1 Overview ....................................................................................................... 92

E.5.2 Proxy success ............................................................................................... 92

E.5.3 Repeating Failure .......................................................................................... 93

E.5.4 Authentication failure ..................................................................................... 93

Annex F (informative) ISO/IEC 14908-3 Registration and monitoring of LNAPs .................... 94

F.1 Scope ................................................................................................................... 94

F.2 Terms and definitions ............................................................................................ 94

F.3 Metering device lifecycle ....................................................................................... 94

F.4 ATM Protocol ........................................................................................................ 95

---------------------- Page: 6 ----------------------
IEC 62056-8-8:2020  IEC 2020 – 5 –

F.4.1 General ......................................................................................................... 95

F.4.2 ATM roles ...................................................................................................... 95

F.4.3 Automatic discovery....................................................................................... 95

F.4.4 Discovery domain .......................................................................................... 96

F.4.5 ATM messages .............................................................................................. 96

F.5 Commissioning ................................................................................................... 100

F.5.1 Overview ..................................................................................................... 100

F.5.2 Commissioning operations ........................................................................... 100

Bibliography ........................................................................................................................ 101

Figure 1 – Functional reference architecture ......................................................................... 13

Figure 2 – Structure of the communication profile ................................................................. 14

Figure 3 – Adaptation layer structure .................................................................................... 17

Figure 4 – Unprotected Adaptation layer PDU structure ........................................................ 18

Figure 5 – Protected Adaptation layer PDU structure ............................................................ 19

Figure 6 – Adaptation layer services ..................................................................................... 20

Figure 7 – Client and server ADP_DATA services ................................................................. 24

Figure D.1 – Key hierarchy diagram ...................................................................................... 56

Figure D.2 – Secure channel establishment .......................................................................... 59

Figure D.3 – Challenge request ............................................................................................ 60

Figure D.4 – Challenge response .......................................................................................... 60

Figure D.5 – Commission Request ........................................................................................ 61

Figure D.6 – Commission response ...................................................................................... 62

Figure D.7 – Crypto context establishment ............................................................................ 67

Figure D.8 – Authenticate encryption mechanism .................................................................. 68

Figure D.9 – Authenticated decryption .................................................................................. 69

Figure E.1 – Unacknowledged message exchange ................................................................ 86

Figure E.2 – Request / Response message ........................................................................... 86

Figure E.3 – Error during request transmission ..................................................................... 86

Figure E.4 – Error during response transmission ................................................................... 87

Figure E.5 – Proxy Repeater proxy message ........................................................................ 87

Figure E.6 – Proxy Agent proxy message format ................................................................... 87

Figure E.7 – Proxy Target message format ........................................................................... 88

Figure E.8 – Normal ProxyTrailer .......................................................................................... 90

Figure E.9 – Alternate Key Proxy Trailer ............................................................................... 90

Figure E.10 – Proxy SICB field structure ............................................................................... 90

Figure E.11 – Alternate Key format ....................................................................................... 91

Figure E.12 – ProxySubnetNode Address (Type1) ................................................................ 92

Figure E.13 – ProxyUniqueNode_ID Address (Type 2) .......................................................... 92

Figure E.14 – ProxyBroadcast Address (Type 3) ................................................................... 92

Figure E.15 – ProxySubnetNode Compact Address (Type 5 and 7) ....................................... 92

Figure E.16 – ProxyUniqueNodeCompact Address (Type 6) .................................................. 92

Table 1 – Control field........................................................................................................... 18

---------------------- Page: 7 ----------------------
– 6 – IEC 62056-8-8:2020  IEC 2020

Table 2 – Client and Server SAP........................................................................................... 28

Table 3 – Application associations and data exchange in the DLMS/COSEM over

ISO/IEC14908 profile ............................................................................................................ 29

Table C.1 – Pre-established association parameters ............................................................. 40

Table C.2 – base_name range for tables categories ............................................................. 43

Table C.3 – base_names for standard tables BT00 to BT79 ................................................. 44

Table D.1 – Security logical layers ........................................................................................ 46

Table D.2 – Key type and their scope ................................................................................... 57

Table D.3 – Challenge request .............................................................................................. 65

Table D.4 – Challenge response ........................................................................................... 65

Table D.5 – Commission request ..........................................................................

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.