BS PD IEC/TR 61850-90-2:2016

Standard (Kun elektronisk)
NOK 7 125,00 (excl. VAT) InformationMonitor standard
Get online access
Status: Check Published
Norwegian title: Communication networks and systems for power utility automation. Using IEC 61850 for communication between substations and control centres
English title: Communication networks and systems for power utility automation. Using IEC 61850 for communication between substations and control centres
Item type: Standard (Kun elektronisk)
Language: Engelsk
Edition: (2016-03-31)

NOK 7 125,00 (excl. VAT)
NOK 8 906,25 (with VAT)

Scope: BS PD IEC/TR 61850-90-2:2016, which is a technical report, provides a comprehensive overview of the different aspects that need to be considered while using IEC 61850 for information exchange between substations and control or maintenance centres or other system level applications. In particular, this technical report:<ul> <li> defines use cases and communication requirements that require an information exchange between substations and control or maintenance centres <li> describes the usage of the configuration language of IEC 61850-6 <li> gives guidelines for the selection of communication services and architectures compatible with IEC 61850 <li> describes the engineering workflow <li> introduces the use of a Proxy/Gateway concept <li> describes the links regarding the Specific Communication Service Mapping (SCSM) This technical report does not define constraints or limitations for specific device implementations. There is no specific chapter for cyber security which is tackled when it is necessary. The model, for IEC TR 61850-90-2, provides security functions based upon the security threats and security functions found in IEC TS 62351-1 and IEC TS 62351-2. This technical report touches several security aspects with the following basic assumptions: <li> Information authentication and integrity (e.g. the ability to provide tamper detection) is needed <li> Confidentiality is optional</ul> It shall be possible to provide information authentication and integrity in an end-to-end method, regardless of information hierarchies. The typical method to provide this security function is through some type of information/message authentication code. IEC 62351-4:2007 and IEC 62351-91 describe how authentication and integrity is achieved for IEC 61850-8-1. A later version of IEC 62351-4 will provide means to ensure end-to-end data integrity through Proxy/Gateways. <br><br>Beneath information authentication and integrity, information availability is an important aspect for telecontrol. This technical report provides redundancy architectures to enhance the availability of information in control and maintenance centres. <br><br>The scheme shown in Figure 1 gives an overview of the connectivity and the communication paths. In particular it indicates the principle to access directly or indirectly - via the Proxy/Gateway - to an IED. An application of security controls for substation to control centre communication can be found in IEC 62351-10:2012, 6.4.3. Thus, the substation automation system has to be considered inside a perimeter of cyber security. The access is totally checked by security access points (this document does not describe such a security access point). The boundary of the electronic security perimeter is defined by the point, where the communication line leaves the perimeter of the substation over public ground. There might be more than one security access point, where separation of applications (e.g. control centre and maintenance centre) is required. When more than one client needs access to the same security access point information level access control, e.g. according to IEC TS 62351- 8:2011, may be added. IEC TS 62351-8:2011 may also be used in other cases, where different access rights are required. <br><br>The majority of applications for which this technical report is applicable will use the services of MMS (ISO 9506) mapped to ISO/IEC 8802-3 frame formats, as described in IEC 61850-8-1:2011. <br><br>The primary application for the use of indirect access, as described in this technical report, will be for telecontrol applications. Nevertheless this technical report does not imply that the use of a Proxy/Gateway is required for telecontrol applications. Direct access may also be used for telecontrol applications where applicable and accepted by the customer. <br><br><br><b>Cross References:</b><br>IEC 60870-4:1990<br>IEC 60870-5-103:1997<br>IEC 60870-5-104:2006<br>IEC 61158-6<br>IEC TS 61850-2:2003<br>IEC 61850-4:2011<br>IEC 61850-5:2013 <br>IEC 61850-6:2009<br>IEC 61850-7-1:2011<br>IEC 61850-7-2:2010<br>IEC 61850-7-3:2010<br>IEC 61850-7-4:2010<br>IEC 61850-8-1:2011<br>ISO 9506-1<br>ISO 9506-2<br>IEC 61850-9-2:2011<br>IEC TS 61850-80-4<br>IEC 62056<br>IEC TR 61850-90-3<br>IEC TR 61850-90-5:2012<br>IEC TR 61850-90-12:2015<br>IEC 62056-6<br>IEC TS 62351-4:2007<br>IEC TS 62351-8:2011<br>IEC 62351-9<br>IEC TR 62351-10:2012<br>IEC 62351-11<br>IEC 81346-1:2009<br>IEC 81346-2:2009 <br>IEEE 1815-2012<br>RFC 1122:1989<br>IEC TR 61850-7-500<br>IEC TR 61850-90-10<br>IEC TR 61850-90-11<br>IEC TR 61850-90-17<br><br><br><b>All current amendments available at time of purchase are included with the purchase of this document.</b>
Adopted: 2016-03-31
Delivered by: Techstreet