Shopping Cart

No products in the cart.

BS EN 62056-5-3:2016:2017 Edition

$215.11

Electricity metering data exchange. The DLMS/COSEM suite – DLMS/COSEM application layer

Published By Publication Date Number of Pages
BSI 2017 204
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weโ€™re here to assist you 24/7.
Email:[email protected]

This part of IEC 62056 specifies the DLMS/COSEM application layer in terms of structure, services and protocols for COSEM clients and servers, and defines how to use the DLMS/COSEM application layer in various communication profiles.

It defines services for establishing and releasing application associations, and data communication services for accessing the methods and attributes of COSEM interface objects, defined in IEC 62056-6-2:2016, using either logical name (LN) or short name (SN) referencing.

Annex A (normative) defines how to use the COSEM application layer in various communication profiles. It specifies how various communication profiles can be constructed for exchanging data with metering equipment using the COSEM interface model, and what are the necessary elements to specify in each communication profile. The actual, media-specific communication profiles are specified in separate parts of the IEC 62056 series.

Annex B (normative) specifies the SMS short wrapper.

Annex C, Annex D and Annex E (informative) include encoding examples for APDUs.

Annex F (informative) provides an overview of cryptography.

Annex G (informative) lists the main technical changes in this edition of the standard.

PDF Catalog

PDF Pages PDF Title
7 English
CONTENTS
13 FOREWORD
15 INTRODUCTION
16 1 Scope
2 Normative references
18 3 Terms, definitions and abbreviations
3.1 Terms and definitions
Abbreviations
20 4 Overview
4.1 DLMS/COSEM application layer structure
Figures
Figure 1 โ€“ Structure of the COSEM Application layers
21 4.2 DLMS/COSEM application layer services
4.2.1 ASO services
4.2.2 Services provided for application association establishment and release
22 4.2.3 Services provided for data transfer
23 Tables
Table 1 โ€“ Clarification of the meaning of PDU Size for DLMS/COSEM
27 4.2.4 Layer management services
4.2.5 Summary of DLMS/COSEM application layer services
4.3 DLMS/COSEM application layer protocols
Figure 2 โ€“ Summary of DLMS/COSEM AL services
28 5 Information security in DLMS/COSEM
5.1 Definitions
5.2 General
29 5.3 Data access security
5.3.1 Overview
5.3.2 No security (lowest level security) authentication
5.3.3 Low Level Security (LLS) authentication
30 5.3.4 High Level Security (HLS) authentication
32 5.4 Data transport security
5.4.1 Applying, removing or checking the protection: ciphering and deciphering
Figure 3 โ€“ Authentication mechanisms during AA establishment
33 5.4.2 Security context
5.4.3 Security policy
34 5.4.4 Security suite
5.4.5 Security material
5.4.6 Ciphered xDLMS APDUs
Table 2 โ€“ Security suites
Table 3 โ€“ Ciphered xDLMS APDUs
35 Figure 4 โ€“ Structure of service specific global ciphering and dedicated ciphering APDUs
Figure 5 โ€“ Structure of general global ciphering and dedicated ciphering APDUs
36 5.4.7 Cryptographic keys
Table 4 โ€“ Use of the fields of the ciphered APDUs
39 5.4.8 The Galois/Counter Mode of Operation (GCM)
Table 5 โ€“ Cryptographic keys and their management
42 Figure 6 โ€“ Cryptographic protection of xDLMS APDUs using GCM
43 Table 6 โ€“ Security control byte
Table 7 โ€“ Plaintext and additional authenticated data
45 Table 8 โ€“ Example for ciphered APDUs
47 Table 9 โ€“ HLS example with GMAC
48 6 DLMS/COSEM application layer service specification
6.1 Service primitives and parameters
Figure 7 โ€“ Service primitives
49 Figure 8 โ€“ Time sequence diagrams
50 6.2 The COSEM-OPEN service
Table 10 โ€“ Codes for AL service parameters
51 Table 11 โ€“ Service parameters of the COSEM-OPEN service primitives
55 6.3 The COSEM-RELEASE service
Table 12 โ€“ Service parameters of the COSEM-RELEASE service primitives
57 6.4 COSEM-ABORT service
58 6.5 Protection and general block transfer parameters
Table 13 โ€“ Service parameters of the COSEM-ABORT service primitives
59 Figure 9 โ€“ Additional service parameters to control cryptographic protection and general block transfer
60 Table 14 โ€“ Additional service parameters
61 Table 15 โ€“ Security parameters
62 6.6 The GET service
Table 16 โ€“ Service parameters of the GET service
63 Table 17 โ€“ GET service request and response types
64 6.7 The SET service
65 Table 18 โ€“ Service parameters of the SET service
66 Table 19 โ€“ SET service request and response types
67 6.8 The ACTION service
68 Table 20 โ€“ Service parameters of the ACTION service
69 Table 21 โ€“ ACTION service request and response types
71 6.9 The DataNotification service
Table 22 โ€“ Service parameters of the DataNotification service primitives
72 6.10 The EventNotification service
Table 23 โ€“ Service parameters of the EventNotification service primitives
73 6.11 The TriggerEventNotificationSending service
Table 24 โ€“ Service parameters of the TriggerEventNotificationSending.requestservice primitive
74 6.12 Variable access specification
6.13 The Read service
Table 25 โ€“ Variable Access Specification
75 Table 26 โ€“ Service parameters of the Read service
76 Table 27 โ€“ Use of the Variable_Access_Specification variants and the Read.response choices
78 6.14 The Write service
79 Table 28 โ€“ Service parameters of the Write service
Table 29 โ€“ Use of the Variable_Access_Specification variants and the Write.response choices
81 6.15 The UnconfirmedWrite service
Table 30 โ€“ Service parameters of the UnconfirmedWrite service
82 6.16 The InformationReport service
Table 31 โ€“ Use of the Variable_Access_Specification variants
83 6.17 Client side layer management services: the SetMapperTable.request
6.18 Summary of services and LN/SN data transfer service mapping
Table 32 โ€“ Service parameters of the InformationReport service
Table 33 โ€“ Service parameters of the SetMapperTable.request service primitives
84 7 DLMS/COSEM application layer protocol specification
7.1 The control function
7.1.1 State definitions of the client side control function
Table 34 โ€“ Summary of ACSE services
Table 35 โ€“ Summary of xDLMS services for LN referencing
Table 36 โ€“ Summary of xDLMS services for SN referencing
85 Figure 10 โ€“ Partial state machine for the client side control function
86 7.1.2 State definitions of the server side control function
Figure 11 โ€“ Partial state machine for the server side control function
87 7.2 The ACSE services and APDUs
7.2.1 ACSE functional units, services and service parameters
88 Table 37 โ€“ ACSE functional units, services and service parameters
90 7.2.2 Registered COSEM names
91 Table 38 โ€“ Use of ciphered / unciphered APDUs
92 7.2.3 APDU encoding rules
7.2.4 Protocol for application association establishment
93 Figure 12 โ€“ MSC for successful AA establishment preceded by a successful lower layer connection establishment
97 7.2.5 Protocol for application association release
98 Figure 13 โ€“ Graceful AA release using the A-RELEASE service
99 Figure 14 โ€“ Graceful AA release by disconnecting the supporting layer
100 7.3 Protocol for the data transfer services
7.3.1 Negotiation of services and options โ€“ the conformance block
Figure 15 โ€“ Aborting an AA following a PH-ABORT.indication
101 7.3.2 Confirmed and unconfirmed service invocations
Table 39 โ€“ xDLMS Conformance block
103 7.3.3 Protocol for the GET service
Figure 16 โ€“ MSC of the GET service
Table 40 โ€“ GET service types and APDUs
104 Figure 17 โ€“ MSC of the GET service with block transfer
106 7.3.4 Protocol for the SET service
Figure 18 โ€“ MSC of the GET service with block transfer, long GET aborted
Table 41 โ€“ SET service types and APDUs
107 Figure 19 โ€“ MSC of the SET service
Figure 20 โ€“ MSC of the SET service with block transfer
109 7.3.5 Protocol for the ACTION service
Figure 21 โ€“ MSC of the ACTION service
Table 42 โ€“ ACTION service types and APDUs
110 Figure 22 โ€“ MSC of the ACTION service with block transfer
111 7.3.6 Protocol of the DataNotification service
7.3.7 Protocol for the EventNotification service
7.3.8 Protocol for the Read service
112 Table 43 โ€“ Mapping between the GET and the Read services
113 Table 44 โ€“ Mapping between the ACTION and the Read services
114 Figure 23 โ€“ MSC of the Read service used for reading an attribute
Figure 24 โ€“ MSC of the Read service used for invoking a method
115 7.3.9 Protocol for the Write service
Figure 25 โ€“ MSC of the Read Service used for reading an attribute, with block transfer
116 Table 45 โ€“ Mapping between the SET and the Write services
117 Table 46 โ€“ Mapping between the ACTION and the Write service
118 Figure 26 โ€“ MSC of the Write service used for writing an attribute
Figure 27 โ€“ MSC of the Write service used for invoking a method
119 7.3.10 Protocol for the UnconfirmedWrite service
Figure 28 โ€“ MSC of the Write service used for writing an attribute, with block transfer
120 7.3.11 Protocol for the InformationReport service
Figure 29 โ€“ MSC of the Unconfirmed Write service used for writing an attribute
Table 47 โ€“ Mapping between the SET and the UnconfirmedWrite services
Table 48 โ€“ Mapping between the ACTION and the UnconfirmedWrite services
121 7.3.12 Protocol of general block transfer mechanism
Table 49 โ€“ Mapping between the EventNotification and InformationReport services
123 Figure 30 โ€“ Partial service invocations and GBT APDUs
125 Figure 31 โ€“ GET service with GBT, switching to streaming
126 Figure 32 โ€“ GET service with partial invocations, GBT and streaming,recovery of 4th block sent in the 2nd stream
127 Figure 33 โ€“ GET service with partial invocations, GBT and streaming,recovery of 4th and 5th blocks
128 Figure 34 โ€“ GET service with partial invocations, GBT and streaming,recovery of last block
129 Figure 35 โ€“ SET service with GBT, with server not supporting streaming,recovery of 3rd block
130 Figure 36 โ€“ ACTION-WITH-LIST service with bi-directional GBT and block recovery
131 Figure 37 โ€“ DataNotification service with GBT with partial invocation
132 8 Abstract syntax of ACSE and COSEM APDUs
147 Annexes
Annex A (normative) Using the COSEM application layer in various communications profiles
A.1 General
A.2 Targeted communication environments
A.3 The structure of the profile
A.4 Identification and addressing schemes
148 A.5 Supporting layer services and service mapping
A.6 Communication profile specific parameters of the COSEM AL services
A.7 Specific considerations / constraints using certain services within a given profile
A.8 The 3-layer, connection-oriented, HDLC based communication profile
A.9 The TCP-UDP/IP based communication profiles (COSEM_on_IP)
A.10 The S-FSK PLC profile
149 Annex B (normative) SMS short wrapper
Figure B.1 โ€“ Short wrapper
Table B.1 โ€“ Reserved Application Processes
150 Annex C (informative) AARQ and AARE encoding examples
C.1 General
C.2 Encoding of the xDLMS InitiateRequest / InitiateResponse APDUs
151 Table C.1 โ€“ Conformance block
152 Table C.2 โ€“ A-XDR encoding of the xDLMS InitiateRequest APDU
153 C.3 Specification of the AARQ and AARE APDUs
Table C.3 โ€“ A-XDR encoding of the xDLMS InitiateResponse APDU
154 C.4 Data for the examples
155 C.5 Encoding of the AARQ APDU
156 Table C.4 โ€“ BER encoding of the AARQ APDU
158 C.6 Encoding of the AARE APDU
Table C.5 โ€“ Complete AARQ APDU
159 Table C.6 โ€“ BER encoding of the AARE APDU
163 Table C.7 โ€“ The complete AARE APDU
164 Annex D (informative) Encoding examples: AARQ and AARE APDUs usinga ciphered application context
D.1 A-XDR encoding of the xDLMS InitiateRequest APDU, carrying a dedicated key
Table D.1 โ€“ A-XDR encoding of the xDLMS InitiateRequest APDU
165 D.2 Authenticated encryption of the xDLMS InitiateRequest APDU
Table D.2 โ€“ Authenticated encryption of the xDLMS InitiateRequest APDU
166 D.3 The AARQ APDU
Table D.3 โ€“ BER encoding of the AARQ APDU
167 D.4 A-XDR encoding of the xDLMS InitiateResponse APDU
168 D.5 Authenticated encryption of the xDLMS InitiateResponse APDU
Table D.4 โ€“ A-XDR encoding of the xDLMS InitiateResponse APDU
Table D.5 โ€“ Authenticated encryption of the xDLMS InitiateResponse APDU
169 D.6 The AARE APDU
Table D.6 โ€“ BER encoding of the AARE APDU
170 D.7 The RLRQ APDU (carrying a ciphered xDLMS InitiateRequest APDU)
171 D.8 The RLRE APDU (carrying a ciphered xDLMS InitiateResponse APDU)
Table D.7 โ€“ BER encoding of the RLRQ APDU
Table D.8 โ€“ BER encoding of the RLRE APDU
172 Annex E (informative) Data transfer service examples
Table E.1 โ€“ Objects used in the examples
173 Table E.2 โ€“ Example: Reading the value of a single attribute without block transfer
174 Table E.3 โ€“ Example: Reading the value of a list of attributes without block transfer
176 Table E.4 โ€“ Example: Reading the value of a single attribute with block transfer
178 Table E.5 โ€“ Example: Reading the value of a list of attributes with block transfer
181 Table E.6 โ€“ Example: Writing the value of a single attribute without block transfer
182 Table E.7 โ€“ Example: Writing the value of a list of attributes without block transfer
183 Table E.8 โ€“ Example: Writing the value of a single attribute with block transfer
185 Table E.9 โ€“ Example: Writing the value of a list of attributes with block transfer
188 Annex F (informative) Overview of cryptography
F.1 General
F.2 Hash functions
189 F.3 Symmetric key algorithms
F.3.1 General
F.3.2 Encryption and decryption
Figure F.1 โ€“ Hash function
190 F.3.3 Advanced Encryption Standard (AES)
F.3.4 Encryption Modes of Operation
Figure F.2 โ€“ Encryption and decryption
191 F.3.5 Message Authentication Code
Figure F.3 โ€“ Message Authentication Codes (MACs)
192 F.3.6 Key establishment
F.4 Asymmetric key algorithms
F.4.1 General
193 F.4.2 Digital signatures
F.4.3 Key establishment
194 Annex G (informative) Significant technical changes with respect to IEC 62056-5-3 Ed.1.0:2013
196 Bibliography
199 Index
BS EN 62056-5-3:2016
$215.11