SUBSTATION DATA CONCENTRATOR SYNC 3000 Series
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid
electronics Review A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid Jesús Lázaro 1,* , Armando Astarloa 1, Mikel Rodríguez 2, Unai Bidarte 1 and Jaime Jiménez 1 1 UPV/EHU, 48015 Bilbao, Spain; [email protected] (A.A.); [email protected] (U.B.); [email protected] (J.J.) 2 System-on-Chip Engineering, 48950 Erandio, Spain; [email protected] * Correspondence: [email protected] Abstract: Since the 1990s, the digitalization process has transformed the communication infras- tructure within the electrical grid: proprietary infrastructures and protocols have been replaced by the IEC 61850 approach, which realizes interoperability among vendors. Furthermore, the latest networking solutions merge operational technologies (OTs) and informational technology (IT) traffics in the same media, such as time-sensitive networking (TSN)—standard, interoperable, deterministic, and Ethernet-based. It merges OT and IT worlds by defining three basic traffic types: scheduled, best-effort, and reserved traffic. However, TSN demands security against potential new cyberattacks, primarily, to protect real-time critical messages. Consequently, security in the smart grid has turned into a hot topic under regulation, standardization, and business. This survey collects vulnerabilities of the communication in the smart grid and reveals security mechanisms introduced by international electrotechnical commission (IEC) 62351-6 and how to apply them to time-sensitive networking. Citation: Lázaro, J.; Astarloa, A.; Keywords: IEC 62351-6; smart grid; time-sensitive networking; IEC 61950 Rodríguez, M.; Bidarte U.; Jiménez, J. A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid. 1. Introduction Electronics 2021, 10, 1881. -
2013-09 (Adobe Reader)
Turinys AKTUALIJOS SUDAROMA LAIKINOJI DARBO GRUPË „TEISMO MEDICINOS PROCESAI“ .... 5 STANDARTIZACIJA INFORMACIJA APIE VIEÐAJAI APKLAUSAI TEIKIAMUS EUROPOS IR LIETUVOS STANDARTØ BEI KITØ LEIDINIØ PROJEKTUS ................................. 6 IÐLEISTI LIETUVOS STANDARTAI IR KITI LEIDINIAI ........................................... 6 NETEKÆ GALIOS LIETUVOS STANDARTAI IR KITI LEIDINIAI ............................ 11 TARPTAUTINIØ IR EUROPOS ÁSTAIGØ BEI ORGANIZACIJØ STANDARTAI IR KITI LEIDINIAI, KURIUOS DEPARTAMENTAS GAVO RUGPJÛÈIO MËNESÁ ............................................................................ 13 TARPTAUTINËS STANDARTIZACIJOS ORGANIZACIJOS STANDARTAI IR KITI LEIDINIAI ............... 13 TARPTAUTINËS ELEKTROTECHNIKOS KOMISIJOS STANDARTAI IR KITI LEIDINIAI ................... 16 RATIFIKUOTI EUROPOS STANDARTIZACIJOS KOMITETO STANDARTAI IR KITI LEIDINIAI ............ 17 RATIFIKUOTI EUROPOS ELEKTROTECHNIKOS STANDARTIZACIJOS KOMITETO STANDARTAI ...................................................................................... 19 RATIFIKUOTI EUROPOS TELEKOMUNIKACIJØ STANDARTØ INSTITUTO STANDARTAI IR KITI LEIDINIAI ............................................................................................... 21 REDAKCINË KOLEGIJA R. Rukðënienë (pirmininkë), L. Balèiauskienë, S. Vaitkevièienë, V. Masalskytë, V. Tamoðevièienë Redaktorë V. Tamoðevièienë Maketuotoja A. Skomskienë 2013-09-09 © Lietuvos standartizacijos departamentas, 2013 Lietuvos standartizacijos departamento BIULETENIS 2013 Nr. 9 VILNIUS, 2013 Lietuvos standartizacijos -
IEC 62351-7 ® Edition 1.0 2017-07
This is a preview - click here to buy the full publication IEC 62351-7 ® Edition 1.0 2017-07 INTERNATIONAL STANDARD colour inside Power systems management and associated information exchange – Data and communications security – Part 7: Network and System Management (NSM) data object models INTERNATIONAL ELECTROTECHNICAL COMMISSION ICS 33.200 ISBN 978-2-8322-4442-5 Warning! Make sure that you obtained this publication from an authorized distributor. ® Registered trademark of the International Electrotechnical Commission This is a preview - click here to buy the full publication – 2 – IEC 62351-7:2017 © IEC 2017 CONTENTS FOREWORD ........................................................................................................................... 8 1 Scope ............................................................................................................................ 10 2 Normative references .................................................................................................... 10 3 Terms and definitions .................................................................................................... 12 4 Abbreviated terms and acronyms ................................................................................... 13 5 Overview of Network and System Management (NSM) .................................................. 14 5.1 Objectives ............................................................................................................. 14 5.2 NSM concepts...................................................................................................... -
Openmuc User Guide
OpenMUC User Guide Table of Contents 1. Intro. 2 2. Quick Start . 2 2.1. Install OpenMUC . 3 2.2. Start the Demo . 3 2.3. WebUI Walk Through. 4 3. Tutorials . 7 3.1. Build a Simple M-Bus Data Logger. 7 3.2. Develop a Customised Application . 10 3.3. Develop a Customised WebUI Plugin . 13 4. Architecture. 20 4.1. File Structure of the Distribution . 22 4.2. Folder framework/ . 23 4.3. Devices and Channels. 24 4.4. Configuration via channels.xml . 24 4.5. Sampling, Listening and Logging . 28 5. OpenMUC Start Script . 29 5.1. Start OpenMUC . 29 5.2. Stop OpenMUC . 30 5.3. Restart OpenMUC . 30 5.4. Reload OpenMUC Configuration. 30 5.5. Update Bundles . 30 5.6. Remote Shell . 31 5.7. Auto Start at Boot Time . 31 6. Drivers. 32 6.1. Install a Driver . 32 6.2. Modbus . 33 6.3. M-Bus (wired) . 39 6.4. M-Bus (wireless) . 40 6.5. IEC 60870-5-104 . 41 6.6. IEC 61850. 42 6.7. IEC 62056 part 21 . 43 6.8. DLMS/COSEM . 44 6.9. KNX . 45 6.10. eHZ. 46 6.11. SNMP . 46 6.12. CSV . 48 6.13. Aggregator . 49 6.14. REST/JSON . 50 6.15. AMQP. 51 6.16. MQTT. 53 1 7. Dataloggers . 55 7.1. ASCII Logger . 55 7.2. AMQP Logger . 56 7.3. MQTT Logger . 57 7.4. SlotsDB Logger . 60 7.5. SQL Logger . 60 8. Libraries . .. -
Investigate M2M-Related Communication Standards That Exist on the Global Market Today
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Agder University Research Archive Investigate M2M-related communication standards that exist on the global market today by Aleksander Albretsen Thesis in partial fulfilment of the degree of Master in Technology in Information and Communication Technology Agder University College Faculty of Engineering and Science Grimstad Norway June 2006 Abstract Most M2M applications use well-known communication technologies to interconnect the devices. Even though they use well-known communication technologies there are no widely used and well-defined M2M standards regarding the data exchange (application layer). This thesis investigates and identifies M2M related communication standards that exist on the global market today, and are applicable for M2M standardisation. This thesis is limited to the following segments within M2M: Security, Automatic Meter Reading (AMR) and Utility Control. Today, and in the future, IP will play an important role within M2M. This thesis is therefore mainly focusing on standards that implement how to transfer the application layer using the IP-stack. M2M is defined in this thesis as an application with a central server communicating with end-devices through a gateway, using remote communication from server to gateway. The following standards are investigated and found applicable in one or more of the selected segments: CIP, MODBUS, LonWorks, KNX, DLMS/COSEM, M-BUS, SIA, M2MXML, OPC and ZigBee. Each of the standards is explained within the thesis. All standards are identified and categorised, and area of applications and proposed solutions are described. This thesis discusses the applicability regarding each segment, multiple services behind one gateway, bandwidth consumption, software update and interconnection of networks. -
SYNC 2000 Protocol Gateway
SYNC 2000 Protocol Gateway OVERVIEW SYNC 2000 Protocol Gateways support more than 40+ protocols and is used across utility applications. It features substation rugged hardware with a real time embedded Linux operating system. DNP3.0, IEC 60870-5 101/103/104, DLMS-COSEM, Modbus are some of the standard protocols supported in the product in addition to common proprietary protocols like SPABus, Courer, SEL used by legacy utility grid devices. Security • IEC 62351-3 transport layer security FEATURES • IEC 62351-5/DNP3 secure authentication • SSL based VPN with AES, DES or 3DES encryption over WAN/ Software Features LAN • Supports more than 40 utility protocols • Automatic startup, initialization with restart notification following Enhanced Capability power restoration • Internal and external pluggable cellular modem (GPRS EDGE/ • Multi-master communication capability CDMA/HSPA/EVDO)^ # • Up to 10000 data points supported • External pluggable RF/PSTN modem • Time sync based on NTP/SNTP/NMEA/protocol specific • Fiber Optic Ethernet# synchronization (IEC 104/DNP3.0 etc.) • Wide range of AC and DC power supplies • Transparent/tunneling support for remote configuration and disturbance record collection MODELS • Remote device management from Kalki.io • SNMP Agent/ Manager for NMS integration • SYNC 2000 - M1: 2 Serial, 1 Ethernet (Copper) • Can be used as terminal server • SYNC 2000 - M2: 6 Serial, 1 Ethernet (Copper) • SYNC 2000 - M4: 6 Serial, 1 Ethernet (Fiber Optic) Reliability • IEC 61850-3 compliant hardware# RELATED PRODUCTS • KEMA certified -
M2M); Applicability of M2M Architecture to Smart Grid Networks; Impact of Smart Grids on M2M Platform
ETSI TR 102 935 V2.1.1 (2012-09) Technical Report Machine-to-Machine communications (M2M); Applicability of M2M architecture to Smart Grid Networks; Impact of Smart Grids on M2M platform 2 ETSI TR 102 935 V2.1.1 (2012-09) Reference DTR/M2M-00011 Keywords M2M, smart grid, smart meter, use case ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. -
Author Information Only
Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB [email protected] Switzerland 1. Introduction Two trends are currently changing substation automation systems: IEC 61850 and the need for increased cyber security. IEC 61850 has gained global acceptance by both vendors as well as customers. Cyber security on the other hand has quickly become one of the most dominant topics for control systems in general and electrical utilities in particular. The combination of the two, securing IEC 61850 based communications, has been one of the goals of the recently published technical specification IEC 62351. In the authors‟ view IEC 62351 is overall a good starting point and will be the future standard to help secure IEC 61850 communication. However, there are some shortcomings of the current standard and some challenges that need to be addressed before IEC 62351 can be implemented and gain wide acceptance. This paper will highlight the challenge of addressing secure communication in the substation real-time environment, complying with the IEC 61850 real-time specifications. The major difficulties are to reach the performance defined in IEC 61850 for GOOSE and SV data with today‟s proposed technical specification defined for IEC 62351 part 6. In chapter 2, we will give a short overview about the structure of IEC 61850 as well as the detailed performance requirements for the various data types. Chapter 3 will present an introduction of the IEC 62351 standard including the used methods to secure the IEC 61850 communication. Chapter 4 will then show the major implementation issues of IEC 62351 part 6. -
Technical Specifications, Technical Reports, Publicly Available Specifications (PAS) and Guides (Hereafter Referred to As “IEC Publication(S)”)
This is a preview - click here to buy the full publication IEC/TS 62351-5 ® Edition 2.0 2013-04 TECHNICAL SPECIFICATION Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives INTERNATIONAL ELECTROTECHNICAL COMMISSION PRICE CODE XE ICS 33.200 ISBN 978-2-83220-732-1 Warning! Make sure that you obtained this publication from an authorized distributor. ® Registered trademark of the International Electrotechnical Commission This is a preview - click here to buy the full publication – 2 – TS 62351-5 © IEC:2013(E) CONTENTS FOREWORD ........................................................................................................................... 6 1 Scope and object .............................................................................................................. 8 2 Normative references ....................................................................................................... 9 3 Terms and definitions ..................................................................................................... 10 4 Abbreviated terms .......................................................................................................... 11 5 Problem description (informative) ................................................................................... 11 5.1 Overview of clause ................................................................................................ 11 5.2 Specific threats addressed ................................................................................... -
IEC 62351 Security Standards for the Power System Information Infrastructure
IEC TC57 WG15: IEC 62351 Security Standards for the Power System Information Infrastructure Frances Cleveland, WG15 Convenor Xanthus Consulting International Contents 1. OVERVIEW: IEC TC57 WG15 SECURITY FOR POWER SYSTEM COMMUNICATIONS ................... 1 2. DUAL INFRASTRUCTURES: THE POWER SYSTEM AND THE INFORMATION SYSTEM .................. 2 3. WHY CYBERSECURITY? ............................................................................................................ 3 3.1 Legacy Approach: Security by Obscurity .......................................................................... 3 3.2 Smart Grid as Cyber-Physical Systems .............................................................................. 4 4. SECURITY CONCEPTS ............................................................................................................... 5 4.1 Security Threats ............................................................................................................... 5 4.2 Security Purposes ............................................................................................................ 5 4.3 Security Processes ........................................................................................................... 6 4.4 Security Planning ............................................................................................................. 7 4.5 Security Requirements .................................................................................................... 8 4.6 Security Attacks .............................................................................................................. -
Timing, Networking & Security
Timing, Networking & Security Company Profile ........................................................................... 5 Technology ....................................................................................... 6 Providing Time-Sensitive Networking Providing High-Availability Networking Providing Security for Critical-Mission Embedded Systems IP Cores for FPGAs: Networking ....................................... 8 Deterministic Ethernet Switch IPs ...........................................................................8 Multiport TSN Switch IP Determinisitic HSR IP High-Availability Ethernet Switch IPs: ..............................................................10 HSR/PRP Swith IP Secure HSR IP MRP IP Time-Aware & Industrial Ethernet Switch IPs ..............................................12 Managed Ethernet Switch IP Unmanaged Ethernet Switch IP Profinet IP Ethernet IP/DLR IP Cyber-Security Surveillance Switch IP IP Cores for FPGAs : Synchronization ....................... 14 MultiSync IP IEEE 1588 Precise Time Multi-profile IP 1588Tiny Slave-Only IP IRIG-B Master IP IRIG-B Slave IP IP Cores for FPGAs: Security for Critical Traffic ....18 Substation Automation Systems (SAS) Crypto-core IP Secure Configuration-over-Ethernet IP Secure IEEE 1588 Secure HSR IP FPGA Networking Modules SMARTmpsoc Family ............................................................................................... 20 Module Brick Kits SMARTzynq Family .................................................................................................. -
IEC-International Electrotechnical Commission
Standards Manager Web Standards List IEC-International Electrotechnical Commission Id Number Title Year Organization Page 1 60034-2-3 Rotating electrical machines _ Part 2-3: Specific test methods for determining losses and efficiency of converter-fed AC 2020 IEC motors - Edition 1.0 2 60034-3 Rotating electrical machines _ Part 3: Specific requirements for synchronous generators driven by steam turbines or 2020 IEC combustion gas turbines and for synchronous compensators - Edition 7.0 3 60034-5 Rotating electrical machines _ Part 5: Degrees of protection provided by the integral design of rotating electrical machines 2020 IEC (IP code) _ Classification - Edition 5.0 4 60034-7 Rotating electrical machines _ Part 7: Classification of types of construction, mounting arrangements and terminal box 2020 IEC position (IM Code) - Edition 3.0 5 60034-11 Rotating electrical machines _ Part 11: Thermal protection - Edition 3.0 2020 IEC 6 60034-18-42 Rotating electrical machines _ Part 18-42: Partial discharge resistant electrical insulation systems (Type II) used in rotating 2020 IEC electrical machines fed from voltage converters _ Qualification tests - Edition 1.1; Consolidated Reprint 7 60045-1 Steam turbines _ Part 1: Specifications - Edition 2.0 2020 IEC 8 60050-113 NULL 2020 IEC AMD 2 9 60050-113 AMENDMENT 3 International Electrotechnical Vocabulary (IEV) _ Part 113: Physics for electrotechnology - Edition 1.0 2020 IEC AMD 3 10 60050-151 AMENDMENT 4 International Electrotechnical Vocabulary (IEV) _ Part 151: Electrical and magnetic devices