{"id":252637,"date":"2024-10-19T16:40:54","date_gmt":"2024-10-19T16:40:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62056-5-32016\/"},"modified":"2024-10-25T12:00:43","modified_gmt":"2024-10-25T12:00:43","slug":"bs-en-62056-5-32016","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62056-5-32016\/","title":{"rendered":"BS EN 62056-5-3:2016"},"content":{"rendered":"
This part of IEC 62056 specifies the DLMS\/COSEM application layer in terms of structure, services and protocols for COSEM clients and servers, and defines how to use the DLMS\/COSEM application layer in various communication profiles.<\/p>\n
It defines services for establishing and releasing application associations, and data communication services for accessing the methods and attributes of COSEM interface objects, defined in IEC 62056-6-2:2016, using either logical name (LN) or short name (SN) referencing.<\/p>\n
Annex A (normative) defines how to use the COSEM application layer in various communication profiles. It specifies how various communication profiles can be constructed for exchanging data with metering equipment using the COSEM interface model, and what are the necessary elements to specify in each communication profile. The actual, media-specific communication profiles are specified in separate parts of the IEC 62056 series.<\/p>\n
Annex B (normative) specifies the SMS short wrapper.<\/p>\n
Annex C, Annex D and Annex E (informative) include encoding examples for APDUs.<\/p>\n
Annex F (informative) provides an overview of cryptography.<\/p>\n
Annex G (informative) lists the main technical changes in this edition of the standard.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
7<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3 Terms, definitions and abbreviations 3.1 Terms and definitions Abbreviations <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4 Overview 4.1 DLMS\/COSEM application layer structure Figures Figure 1 \u2013 Structure of the COSEM Application layers <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.2 DLMS\/COSEM application layer services 4.2.1 ASO services 4.2.2 Services provided for application association establishment and release <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.2.3 Services provided for data transfer <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Tables Table 1 \u2013 Clarification of the meaning of PDU Size for DLMS\/COSEM <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.2.4 Layer management services 4.2.5 Summary of DLMS\/COSEM application layer services 4.3 DLMS\/COSEM application layer protocols Figure 2 \u2013 Summary of DLMS\/COSEM AL services <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5 Information security in DLMS\/COSEM 5.1 Definitions 5.2 General <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.3 Data access security 5.3.1 Overview 5.3.2 No security (lowest level security) authentication 5.3.3 Low Level Security (LLS) authentication <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.3.4 High Level Security (HLS) authentication <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.4 Data transport security 5.4.1 Applying, removing or checking the protection: ciphering and deciphering Figure 3 \u2013 Authentication mechanisms during AA establishment <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.4.2 Security context 5.4.3 Security policy <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 5.4.4 Security suite 5.4.5 Security material 5.4.6 Ciphered xDLMS APDUs Table 2 \u2013 Security suites Table 3 \u2013 Ciphered xDLMS APDUs <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Figure 4 \u2013 Structure of service specific global ciphering and dedicated ciphering APDUs Figure 5 \u2013 Structure of general global ciphering and dedicated ciphering APDUs <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.4.7 Cryptographic keys Table 4 \u2013 Use of the fields of the ciphered APDUs <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.4.8 The Galois\/Counter Mode of Operation (GCM) Table 5 \u2013 Cryptographic keys and their management <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Figure 6 \u2013 Cryptographic protection of xDLMS APDUs using GCM <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Table 6 \u2013 Security control byte Table 7 \u2013 Plaintext and additional authenticated data <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Table 8 \u2013 Example for ciphered APDUs <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Table 9 \u2013 HLS example with GMAC <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 6 DLMS\/COSEM application layer service specification 6.1 Service primitives and parameters Figure 7 \u2013 Service primitives <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Figure 8 \u2013 Time sequence diagrams <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 6.2 The COSEM-OPEN service Table 10 \u2013 Codes for AL service parameters <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | Table 11 \u2013 Service parameters of the COSEM-OPEN service primitives <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 6.3 The COSEM-RELEASE service Table 12 \u2013 Service parameters of the COSEM-RELEASE service primitives <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 6.4 COSEM-ABORT service <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 6.5 Protection and general block transfer parameters Table 13 \u2013 Service parameters of the COSEM-ABORT service primitives <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Figure 9 \u2013 Additional service parameters to control cryptographic protection and general block transfer <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Table 14 \u2013 Additional service parameters <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Table 15 \u2013 Security parameters <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 6.6 The GET service Table 16 \u2013 Service parameters of the GET service <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Table 17 \u2013 GET service request and response types <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 6.7 The SET service <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Table 18 \u2013 Service parameters of the SET service <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Table 19 \u2013 SET service request and response types <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 6.8 The ACTION service <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Table 20 \u2013 Service parameters of the ACTION service <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Table 21 \u2013 ACTION service request and response types <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 6.9 The DataNotification service Table 22 \u2013 Service parameters of the DataNotification service primitives <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 6.10 The EventNotification service Table 23 \u2013 Service parameters of the EventNotification service primitives <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 6.11 The TriggerEventNotificationSending service Table 24 \u2013 Service parameters of the TriggerEventNotificationSending.requestservice primitive <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 6.12 Variable access specification 6.13 The Read service Table 25 \u2013 Variable Access Specification <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Table 26 \u2013 Service parameters of the Read service <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Table 27 \u2013 Use of the Variable_Access_Specification variants and the Read.response choices <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 6.14 The Write service <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Table 28 \u2013 Service parameters of the Write service Table 29 \u2013 Use of the Variable_Access_Specification variants and the Write.response choices <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 6.15 The UnconfirmedWrite service Table 30 \u2013 Service parameters of the UnconfirmedWrite service <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 6.16 The InformationReport service Table 31 \u2013 Use of the Variable_Access_Specification variants <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 6.17 Client side layer management services: the SetMapperTable.request 6.18 Summary of services and LN\/SN data transfer service mapping Table 32 \u2013 Service parameters of the InformationReport service Table 33 \u2013 Service parameters of the SetMapperTable.request service primitives <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 7 DLMS\/COSEM application layer protocol specification 7.1 The control function 7.1.1 State definitions of the client side control function Table 34 \u2013 Summary of ACSE services Table 35 \u2013 Summary of xDLMS services for LN referencing Table 36 \u2013 Summary of xDLMS services for SN referencing <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Figure 10 \u2013 Partial state machine for the client side control function <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 7.1.2 State definitions of the server side control function Figure 11 \u2013 Partial state machine for the server side control function <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 7.2 The ACSE services and APDUs 7.2.1 ACSE functional units, services and service parameters <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | Table 37 \u2013 ACSE functional units, services and service parameters <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 7.2.2 Registered COSEM names <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | Table 38 \u2013 Use of ciphered \/ unciphered APDUs <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 7.2.3 APDU encoding rules 7.2.4 Protocol for application association establishment <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | Figure 12 \u2013 MSC for successful AA establishment preceded by a successful lower layer connection establishment <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 7.2.5 Protocol for application association release <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | Figure 13 \u2013 Graceful AA release using the A-RELEASE service <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | Figure 14 \u2013 Graceful AA release by disconnecting the supporting layer <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 7.3 Protocol for the data transfer services 7.3.1 Negotiation of services and options \u2013 the conformance block Figure 15 \u2013 Aborting an AA following a PH-ABORT.indication <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 7.3.2 Confirmed and unconfirmed service invocations Table 39 \u2013 xDLMS Conformance block <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 7.3.3 Protocol for the GET service Figure 16 \u2013 MSC of the GET service Table 40 \u2013 GET service types and APDUs <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Figure 17 \u2013 MSC of the GET service with block transfer <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 7.3.4 Protocol for the SET service Figure 18 \u2013 MSC of the GET service with block transfer, long GET aborted Table 41 \u2013 SET service types and APDUs <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | Figure 19 \u2013 MSC of the SET service Figure 20 \u2013 MSC of the SET service with block transfer <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 7.3.5 Protocol for the ACTION service Figure 21 \u2013 MSC of the ACTION service Table 42 \u2013 ACTION service types and APDUs <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | Figure 22 \u2013 MSC of the ACTION service with block transfer <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 7.3.6 Protocol of the DataNotification service 7.3.7 Protocol for the EventNotification service 7.3.8 Protocol for the Read service <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | Table 43 \u2013 Mapping between the GET and the Read services <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | Table 44 \u2013 Mapping between the ACTION and the Read services <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | Figure 23 \u2013 MSC of the Read service used for reading an attribute Figure 24 \u2013 MSC of the Read service used for invoking a method <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 7.3.9 Protocol for the Write service Figure 25 \u2013 MSC of the Read Service used for reading an attribute, with block transfer <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | Table 45 \u2013 Mapping between the SET and the Write services <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | Table 46 \u2013 Mapping between the ACTION and the Write service <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | Figure 26 \u2013 MSC of the Write service used for writing an attribute Figure 27 \u2013 MSC of the Write service used for invoking a method <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | 7.3.10 Protocol for the UnconfirmedWrite service Figure 28 \u2013 MSC of the Write service used for writing an attribute, with block transfer <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 7.3.11 Protocol for the InformationReport service Figure 29 \u2013 MSC of the Unconfirmed Write service used for writing an attribute Table 47 \u2013 Mapping between the SET and the UnconfirmedWrite services Table 48 \u2013 Mapping between the ACTION and the UnconfirmedWrite services <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 7.3.12 Protocol of general block transfer mechanism Table 49 \u2013 Mapping between the EventNotification and InformationReport services <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | Figure 30 \u2013 Partial service invocations and GBT APDUs <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | Figure 31 \u2013 GET service with GBT, switching to streaming <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | Figure 32 \u2013 GET service with partial invocations, GBT and streaming,recovery of 4th block sent in the 2nd stream <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | Figure 33 \u2013 GET service with partial invocations, GBT and streaming,recovery of 4th and 5th blocks <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | Figure 34 \u2013 GET service with partial invocations, GBT and streaming,recovery of last block <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | Figure 35 \u2013 SET service with GBT, with server not supporting streaming,recovery of 3rd block <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | Figure 36 \u2013 ACTION-WITH-LIST service with bi-directional GBT and block recovery <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | Figure 37 \u2013 DataNotification service with GBT with partial invocation <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 8 Abstract syntax of ACSE and COSEM APDUs <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | Annexes Annex A (normative) Using the COSEM application layer in various communications profiles A.1 General A.2 Targeted communication environments A.3 The structure of the profile A.4 Identification and addressing schemes <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | A.5 Supporting layer services and service mapping A.6 Communication profile specific parameters of the COSEM AL services A.7 Specific considerations \/ constraints using certain services within a given profile A.8 The 3-layer, connection-oriented, HDLC based communication profile A.9 The TCP-UDP\/IP based communication profiles (COSEM_on_IP) A.10 The S-FSK PLC profile <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | Annex B (normative) SMS short wrapper Figure B.1 \u2013 Short wrapper Table B.1 \u2013 Reserved Application Processes <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | Annex C (informative) AARQ and AARE encoding examples C.1 General C.2 Encoding of the xDLMS InitiateRequest \/ InitiateResponse APDUs <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | Table C.1 \u2013 Conformance block <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | Table C.2 \u2013 A-XDR encoding of the xDLMS InitiateRequest APDU <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | C.3 Specification of the AARQ and AARE APDUs Table C.3 \u2013 A-XDR encoding of the xDLMS InitiateResponse APDU <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | C.4 Data for the examples <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | C.5 Encoding of the AARQ APDU <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | Table C.4 \u2013 BER encoding of the AARQ APDU <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | C.6 Encoding of the AARE APDU Table C.5 \u2013 Complete AARQ APDU <\/td>\n<\/tr>\n | ||||||
159<\/td>\n | Table C.6 \u2013 BER encoding of the AARE APDU <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | Table C.7 \u2013 The complete AARE APDU <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | Annex D (informative) Encoding examples: AARQ and AARE APDUs usinga ciphered application context D.1 A-XDR encoding of the xDLMS InitiateRequest APDU, carrying a dedicated key Table D.1 \u2013 A-XDR encoding of the xDLMS InitiateRequest APDU <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | D.2 Authenticated encryption of the xDLMS InitiateRequest APDU Table D.2 \u2013 Authenticated encryption of the xDLMS InitiateRequest APDU <\/td>\n<\/tr>\n | ||||||
166<\/td>\n | D.3 The AARQ APDU Table D.3 \u2013 BER encoding of the AARQ APDU <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | D.4 A-XDR encoding of the xDLMS InitiateResponse APDU <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | D.5 Authenticated encryption of the xDLMS InitiateResponse APDU Table D.4 \u2013 A-XDR encoding of the xDLMS InitiateResponse APDU Table D.5 \u2013 Authenticated encryption of the xDLMS InitiateResponse APDU <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | D.6 The AARE APDU Table D.6 \u2013 BER encoding of the AARE APDU <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | D.7 The RLRQ APDU (carrying a ciphered xDLMS InitiateRequest APDU) <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | D.8 The RLRE APDU (carrying a ciphered xDLMS InitiateResponse APDU) Table D.7 \u2013 BER encoding of the RLRQ APDU Table D.8 \u2013 BER encoding of the RLRE APDU <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | Annex E (informative) Data transfer service examples Table E.1 \u2013 Objects used in the examples <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | Table E.2 \u2013 Example: Reading the value of a single attribute without block transfer <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | Table E.3 \u2013 Example: Reading the value of a list of attributes without block transfer <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | Table E.4 \u2013 Example: Reading the value of a single attribute with block transfer <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | Table E.5 \u2013 Example: Reading the value of a list of attributes with block transfer <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | Table E.6 \u2013 Example: Writing the value of a single attribute without block transfer <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | Table E.7 \u2013 Example: Writing the value of a list of attributes without block transfer <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | Table E.8 \u2013 Example: Writing the value of a single attribute with block transfer <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | Table E.9 \u2013 Example: Writing the value of a list of attributes with block transfer <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | Annex F (informative) Overview of cryptography F.1 General F.2 Hash functions <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | F.3 Symmetric key algorithms F.3.1 General F.3.2 Encryption and decryption Figure F.1 \u2013 Hash function <\/td>\n<\/tr>\n | ||||||
190<\/td>\n | F.3.3 Advanced Encryption Standard (AES) F.3.4 Encryption Modes of Operation Figure F.2 \u2013 Encryption and decryption <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | F.3.5 Message Authentication Code Figure F.3 \u2013 Message Authentication Codes (MACs) <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | F.3.6 Key establishment F.4 Asymmetric key algorithms F.4.1 General <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | F.4.2 Digital signatures F.4.3 Key establishment <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | Annex G (informative) Significant technical changes with respect to IEC 62056-5-3 Ed.1.0:2013 <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | Bibliography <\/td>\n<\/tr>\n | ||||||
199<\/td>\n | Index <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Electricity metering data exchange. The DLMS\/COSEM suite – DLMS\/COSEM application layer<\/b><\/p>\n |