{"id":252637,"date":"2024-10-19T16:40:54","date_gmt":"2024-10-19T16:40:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62056-5-32016\/"},"modified":"2024-10-25T12:00:43","modified_gmt":"2024-10-25T12:00:43","slug":"bs-en-62056-5-32016","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62056-5-32016\/","title":{"rendered":"BS EN 62056-5-3:2016"},"content":{"rendered":"

This part of IEC 62056 specifies the DLMS\/COSEM application layer in terms of structure, services and protocols for COSEM clients and servers, and defines how to use the DLMS\/COSEM application layer in various communication profiles.<\/p>\n

It defines services for establishing and releasing application associations, and data communication services for accessing the methods and attributes of COSEM interface objects, defined in IEC 62056-6-2:2016, using either logical name (LN) or short name (SN) referencing.<\/p>\n

Annex A (normative) defines how to use the COSEM application layer in various communication profiles. It specifies how various communication profiles can be constructed for exchanging data with metering equipment using the COSEM interface model, and what are the necessary elements to specify in each communication profile. The actual, media-specific communication profiles are specified in separate parts of the IEC 62056 series.<\/p>\n

Annex B (normative) specifies the SMS short wrapper.<\/p>\n

Annex C, Annex D and Annex E (informative) include encoding examples for APDUs.<\/p>\n

Annex F (informative) provides an overview of cryptography.<\/p>\n

Annex G (informative) lists the main technical changes in this edition of the standard.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
13<\/td>\nFOREWORD <\/td>\n<\/tr>\n
15<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
16<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
18<\/td>\n3 Terms, definitions and abbreviations
3.1 Terms and definitions
Abbreviations <\/td>\n<\/tr>\n
20<\/td>\n4 Overview
4.1 DLMS\/COSEM application layer structure
Figures
Figure 1 \u2013 Structure of the COSEM Application layers <\/td>\n<\/tr>\n
21<\/td>\n4.2 DLMS\/COSEM application layer services
4.2.1 ASO services
4.2.2 Services provided for application association establishment and release <\/td>\n<\/tr>\n
22<\/td>\n4.2.3 Services provided for data transfer <\/td>\n<\/tr>\n
23<\/td>\nTables
Table 1 \u2013 Clarification of the meaning of PDU Size for DLMS\/COSEM <\/td>\n<\/tr>\n
27<\/td>\n4.2.4 Layer management services
4.2.5 Summary of DLMS\/COSEM application layer services
4.3 DLMS\/COSEM application layer protocols
Figure 2 \u2013 Summary of DLMS\/COSEM AL services <\/td>\n<\/tr>\n
28<\/td>\n5 Information security in DLMS\/COSEM
5.1 Definitions
5.2 General <\/td>\n<\/tr>\n
29<\/td>\n5.3 Data access security
5.3.1 Overview
5.3.2 No security (lowest level security) authentication
5.3.3 Low Level Security (LLS) authentication <\/td>\n<\/tr>\n
30<\/td>\n5.3.4 High Level Security (HLS) authentication <\/td>\n<\/tr>\n
32<\/td>\n5.4 Data transport security
5.4.1 Applying, removing or checking the protection: ciphering and deciphering
Figure 3 \u2013 Authentication mechanisms during AA establishment <\/td>\n<\/tr>\n
33<\/td>\n5.4.2 Security context
5.4.3 Security policy <\/td>\n<\/tr>\n
34<\/td>\n5.4.4 Security suite
5.4.5 Security material
5.4.6 Ciphered xDLMS APDUs
Table 2 \u2013 Security suites
Table 3 \u2013 Ciphered xDLMS APDUs <\/td>\n<\/tr>\n
35<\/td>\nFigure 4 \u2013 Structure of service specific global ciphering and dedicated ciphering APDUs
Figure 5 \u2013 Structure of general global ciphering and dedicated ciphering APDUs <\/td>\n<\/tr>\n
36<\/td>\n5.4.7 Cryptographic keys
Table 4 \u2013 Use of the fields of the ciphered APDUs <\/td>\n<\/tr>\n
39<\/td>\n5.4.8 The Galois\/Counter Mode of Operation (GCM)
Table 5 \u2013 Cryptographic keys and their management <\/td>\n<\/tr>\n
42<\/td>\nFigure 6 \u2013 Cryptographic protection of xDLMS APDUs using GCM <\/td>\n<\/tr>\n
43<\/td>\nTable 6 \u2013 Security control byte
Table 7 \u2013 Plaintext and additional authenticated data <\/td>\n<\/tr>\n
45<\/td>\nTable 8 \u2013 Example for ciphered APDUs <\/td>\n<\/tr>\n
47<\/td>\nTable 9 \u2013 HLS example with GMAC <\/td>\n<\/tr>\n
48<\/td>\n6 DLMS\/COSEM application layer service specification
6.1 Service primitives and parameters
Figure 7 \u2013 Service primitives <\/td>\n<\/tr>\n
49<\/td>\nFigure 8 \u2013 Time sequence diagrams <\/td>\n<\/tr>\n
50<\/td>\n6.2 The COSEM-OPEN service
Table 10 \u2013 Codes for AL service parameters <\/td>\n<\/tr>\n
51<\/td>\nTable 11 \u2013 Service parameters of the COSEM-OPEN service primitives <\/td>\n<\/tr>\n
55<\/td>\n6.3 The COSEM-RELEASE service
Table 12 \u2013 Service parameters of the COSEM-RELEASE service primitives <\/td>\n<\/tr>\n
57<\/td>\n6.4 COSEM-ABORT service <\/td>\n<\/tr>\n
58<\/td>\n6.5 Protection and general block transfer parameters
Table 13 \u2013 Service parameters of the COSEM-ABORT service primitives <\/td>\n<\/tr>\n
59<\/td>\nFigure 9 \u2013 Additional service parameters to control cryptographic protection and general block transfer <\/td>\n<\/tr>\n
60<\/td>\nTable 14 \u2013 Additional service parameters <\/td>\n<\/tr>\n
61<\/td>\nTable 15 \u2013 Security parameters <\/td>\n<\/tr>\n
62<\/td>\n6.6 The GET service
Table 16 \u2013 Service parameters of the GET service <\/td>\n<\/tr>\n
63<\/td>\nTable 17 \u2013 GET service request and response types <\/td>\n<\/tr>\n
64<\/td>\n6.7 The SET service <\/td>\n<\/tr>\n
65<\/td>\nTable 18 \u2013 Service parameters of the SET service <\/td>\n<\/tr>\n
66<\/td>\nTable 19 \u2013 SET service request and response types <\/td>\n<\/tr>\n
67<\/td>\n6.8 The ACTION service <\/td>\n<\/tr>\n
68<\/td>\nTable 20 \u2013 Service parameters of the ACTION service <\/td>\n<\/tr>\n
69<\/td>\nTable 21 \u2013 ACTION service request and response types <\/td>\n<\/tr>\n
71<\/td>\n6.9 The DataNotification service
Table 22 \u2013 Service parameters of the DataNotification service primitives <\/td>\n<\/tr>\n
72<\/td>\n6.10 The EventNotification service
Table 23 \u2013 Service parameters of the EventNotification service primitives <\/td>\n<\/tr>\n
73<\/td>\n6.11 The TriggerEventNotificationSending service
Table 24 \u2013 Service parameters of the TriggerEventNotificationSending.requestservice primitive <\/td>\n<\/tr>\n
74<\/td>\n6.12 Variable access specification
6.13 The Read service
Table 25 \u2013 Variable Access Specification <\/td>\n<\/tr>\n
75<\/td>\nTable 26 \u2013 Service parameters of the Read service <\/td>\n<\/tr>\n
76<\/td>\nTable 27 \u2013 Use of the Variable_Access_Specification variants and the Read.response choices <\/td>\n<\/tr>\n
78<\/td>\n6.14 The Write service <\/td>\n<\/tr>\n
79<\/td>\nTable 28 \u2013 Service parameters of the Write service
Table 29 \u2013 Use of the Variable_Access_Specification variants and the Write.response choices <\/td>\n<\/tr>\n
81<\/td>\n6.15 The UnconfirmedWrite service
Table 30 \u2013 Service parameters of the UnconfirmedWrite service <\/td>\n<\/tr>\n
82<\/td>\n6.16 The InformationReport service
Table 31 \u2013 Use of the Variable_Access_Specification variants <\/td>\n<\/tr>\n
83<\/td>\n6.17 Client side layer management services: the SetMapperTable.request
6.18 Summary of services and LN\/SN data transfer service mapping
Table 32 \u2013 Service parameters of the InformationReport service
Table 33 \u2013 Service parameters of the SetMapperTable.request service primitives <\/td>\n<\/tr>\n
84<\/td>\n7 DLMS\/COSEM application layer protocol specification
7.1 The control function
7.1.1 State definitions of the client side control function
Table 34 \u2013 Summary of ACSE services
Table 35 \u2013 Summary of xDLMS services for LN referencing
Table 36 \u2013 Summary of xDLMS services for SN referencing <\/td>\n<\/tr>\n
85<\/td>\nFigure 10 \u2013 Partial state machine for the client side control function <\/td>\n<\/tr>\n
86<\/td>\n7.1.2 State definitions of the server side control function
Figure 11 \u2013 Partial state machine for the server side control function <\/td>\n<\/tr>\n
87<\/td>\n7.2 The ACSE services and APDUs
7.2.1 ACSE functional units, services and service parameters <\/td>\n<\/tr>\n
88<\/td>\nTable 37 \u2013 ACSE functional units, services and service parameters <\/td>\n<\/tr>\n
90<\/td>\n7.2.2 Registered COSEM names <\/td>\n<\/tr>\n
91<\/td>\nTable 38 \u2013 Use of ciphered \/ unciphered APDUs <\/td>\n<\/tr>\n
92<\/td>\n7.2.3 APDU encoding rules
7.2.4 Protocol for application association establishment <\/td>\n<\/tr>\n
93<\/td>\nFigure 12 \u2013 MSC for successful AA establishment preceded by a successful lower layer connection establishment <\/td>\n<\/tr>\n
97<\/td>\n7.2.5 Protocol for application association release <\/td>\n<\/tr>\n
98<\/td>\nFigure 13 \u2013 Graceful AA release using the A-RELEASE service <\/td>\n<\/tr>\n
99<\/td>\nFigure 14 \u2013 Graceful AA release by disconnecting the supporting layer <\/td>\n<\/tr>\n
100<\/td>\n7.3 Protocol for the data transfer services
7.3.1 Negotiation of services and options \u2013 the conformance block
Figure 15 \u2013 Aborting an AA following a PH-ABORT.indication <\/td>\n<\/tr>\n
101<\/td>\n7.3.2 Confirmed and unconfirmed service invocations
Table 39 \u2013 xDLMS Conformance block <\/td>\n<\/tr>\n
103<\/td>\n7.3.3 Protocol for the GET service
Figure 16 \u2013 MSC of the GET service
Table 40 \u2013 GET service types and APDUs <\/td>\n<\/tr>\n
104<\/td>\nFigure 17 \u2013 MSC of the GET service with block transfer <\/td>\n<\/tr>\n
106<\/td>\n7.3.4 Protocol for the SET service
Figure 18 \u2013 MSC of the GET service with block transfer, long GET aborted
Table 41 \u2013 SET service types and APDUs <\/td>\n<\/tr>\n
107<\/td>\nFigure 19 \u2013 MSC of the SET service
Figure 20 \u2013 MSC of the SET service with block transfer <\/td>\n<\/tr>\n
109<\/td>\n7.3.5 Protocol for the ACTION service
Figure 21 \u2013 MSC of the ACTION service
Table 42 \u2013 ACTION service types and APDUs <\/td>\n<\/tr>\n
110<\/td>\nFigure 22 \u2013 MSC of the ACTION service with block transfer <\/td>\n<\/tr>\n
111<\/td>\n7.3.6 Protocol of the DataNotification service
7.3.7 Protocol for the EventNotification service
7.3.8 Protocol for the Read service <\/td>\n<\/tr>\n
112<\/td>\nTable 43 \u2013 Mapping between the GET and the Read services <\/td>\n<\/tr>\n
113<\/td>\nTable 44 \u2013 Mapping between the ACTION and the Read services <\/td>\n<\/tr>\n
114<\/td>\nFigure 23 \u2013 MSC of the Read service used for reading an attribute
Figure 24 \u2013 MSC of the Read service used for invoking a method <\/td>\n<\/tr>\n
115<\/td>\n7.3.9 Protocol for the Write service
Figure 25 \u2013 MSC of the Read Service used for reading an attribute, with block transfer <\/td>\n<\/tr>\n
116<\/td>\nTable 45 \u2013 Mapping between the SET and the Write services <\/td>\n<\/tr>\n
117<\/td>\nTable 46 \u2013 Mapping between the ACTION and the Write service <\/td>\n<\/tr>\n
118<\/td>\nFigure 26 \u2013 MSC of the Write service used for writing an attribute
Figure 27 \u2013 MSC of the Write service used for invoking a method <\/td>\n<\/tr>\n
119<\/td>\n7.3.10 Protocol for the UnconfirmedWrite service
Figure 28 \u2013 MSC of the Write service used for writing an attribute, with block transfer <\/td>\n<\/tr>\n
120<\/td>\n7.3.11 Protocol for the InformationReport service
Figure 29 \u2013 MSC of the Unconfirmed Write service used for writing an attribute
Table 47 \u2013 Mapping between the SET and the UnconfirmedWrite services
Table 48 \u2013 Mapping between the ACTION and the UnconfirmedWrite services <\/td>\n<\/tr>\n
121<\/td>\n7.3.12 Protocol of general block transfer mechanism
Table 49 \u2013 Mapping between the EventNotification and InformationReport services <\/td>\n<\/tr>\n
123<\/td>\nFigure 30 \u2013 Partial service invocations and GBT APDUs <\/td>\n<\/tr>\n
125<\/td>\nFigure 31 \u2013 GET service with GBT, switching to streaming <\/td>\n<\/tr>\n
126<\/td>\nFigure 32 \u2013 GET service with partial invocations, GBT and streaming,recovery of 4th block sent in the 2nd stream <\/td>\n<\/tr>\n
127<\/td>\nFigure 33 \u2013 GET service with partial invocations, GBT and streaming,recovery of 4th and 5th blocks <\/td>\n<\/tr>\n
128<\/td>\nFigure 34 \u2013 GET service with partial invocations, GBT and streaming,recovery of last block <\/td>\n<\/tr>\n
129<\/td>\nFigure 35 \u2013 SET service with GBT, with server not supporting streaming,recovery of 3rd block <\/td>\n<\/tr>\n
130<\/td>\nFigure 36 \u2013 ACTION-WITH-LIST service with bi-directional GBT and block recovery <\/td>\n<\/tr>\n
131<\/td>\nFigure 37 \u2013 DataNotification service with GBT with partial invocation <\/td>\n<\/tr>\n
132<\/td>\n8 Abstract syntax of ACSE and COSEM APDUs <\/td>\n<\/tr>\n
147<\/td>\nAnnexes
Annex A (normative) Using the COSEM application layer in various communications profiles
A.1 General
A.2 Targeted communication environments
A.3 The structure of the profile
A.4 Identification and addressing schemes <\/td>\n<\/tr>\n
148<\/td>\nA.5 Supporting layer services and service mapping
A.6 Communication profile specific parameters of the COSEM AL services
A.7 Specific considerations \/ constraints using certain services within a given profile
A.8 The 3-layer, connection-oriented, HDLC based communication profile
A.9 The TCP-UDP\/IP based communication profiles (COSEM_on_IP)
A.10 The S-FSK PLC profile <\/td>\n<\/tr>\n
149<\/td>\nAnnex B (normative) SMS short wrapper
Figure B.1 \u2013 Short wrapper
Table B.1 \u2013 Reserved Application Processes <\/td>\n<\/tr>\n
150<\/td>\nAnnex C (informative) AARQ and AARE encoding examples
C.1 General
C.2 Encoding of the xDLMS InitiateRequest \/ InitiateResponse APDUs <\/td>\n<\/tr>\n
151<\/td>\nTable C.1 \u2013 Conformance block <\/td>\n<\/tr>\n
152<\/td>\nTable C.2 \u2013 A-XDR encoding of the xDLMS InitiateRequest APDU <\/td>\n<\/tr>\n
153<\/td>\nC.3 Specification of the AARQ and AARE APDUs
Table C.3 \u2013 A-XDR encoding of the xDLMS InitiateResponse APDU <\/td>\n<\/tr>\n
154<\/td>\nC.4 Data for the examples <\/td>\n<\/tr>\n
155<\/td>\nC.5 Encoding of the AARQ APDU <\/td>\n<\/tr>\n
156<\/td>\nTable C.4 \u2013 BER encoding of the AARQ APDU <\/td>\n<\/tr>\n
158<\/td>\nC.6 Encoding of the AARE APDU
Table C.5 \u2013 Complete AARQ APDU <\/td>\n<\/tr>\n
159<\/td>\nTable C.6 \u2013 BER encoding of the AARE APDU <\/td>\n<\/tr>\n
163<\/td>\nTable C.7 \u2013 The complete AARE APDU <\/td>\n<\/tr>\n
164<\/td>\nAnnex D (informative) Encoding examples: AARQ and AARE APDUs usinga ciphered application context
D.1 A-XDR encoding of the xDLMS InitiateRequest APDU, carrying a dedicated key
Table D.1 \u2013 A-XDR encoding of the xDLMS InitiateRequest APDU <\/td>\n<\/tr>\n
165<\/td>\nD.2 Authenticated encryption of the xDLMS InitiateRequest APDU
Table D.2 \u2013 Authenticated encryption of the xDLMS InitiateRequest APDU <\/td>\n<\/tr>\n
166<\/td>\nD.3 The AARQ APDU
Table D.3 \u2013 BER encoding of the AARQ APDU <\/td>\n<\/tr>\n
167<\/td>\nD.4 A-XDR encoding of the xDLMS InitiateResponse APDU <\/td>\n<\/tr>\n
168<\/td>\nD.5 Authenticated encryption of the xDLMS InitiateResponse APDU
Table D.4 \u2013 A-XDR encoding of the xDLMS InitiateResponse APDU
Table D.5 \u2013 Authenticated encryption of the xDLMS InitiateResponse APDU <\/td>\n<\/tr>\n
169<\/td>\nD.6 The AARE APDU
Table D.6 \u2013 BER encoding of the AARE APDU <\/td>\n<\/tr>\n
170<\/td>\nD.7 The RLRQ APDU (carrying a ciphered xDLMS InitiateRequest APDU) <\/td>\n<\/tr>\n
171<\/td>\nD.8 The RLRE APDU (carrying a ciphered xDLMS InitiateResponse APDU)
Table D.7 \u2013 BER encoding of the RLRQ APDU
Table D.8 \u2013 BER encoding of the RLRE APDU <\/td>\n<\/tr>\n
172<\/td>\nAnnex E (informative) Data transfer service examples
Table E.1 \u2013 Objects used in the examples <\/td>\n<\/tr>\n
173<\/td>\nTable E.2 \u2013 Example: Reading the value of a single attribute without block transfer <\/td>\n<\/tr>\n
174<\/td>\nTable E.3 \u2013 Example: Reading the value of a list of attributes without block transfer <\/td>\n<\/tr>\n
176<\/td>\nTable E.4 \u2013 Example: Reading the value of a single attribute with block transfer <\/td>\n<\/tr>\n
178<\/td>\nTable E.5 \u2013 Example: Reading the value of a list of attributes with block transfer <\/td>\n<\/tr>\n
181<\/td>\nTable E.6 \u2013 Example: Writing the value of a single attribute without block transfer <\/td>\n<\/tr>\n
182<\/td>\nTable E.7 \u2013 Example: Writing the value of a list of attributes without block transfer <\/td>\n<\/tr>\n
183<\/td>\nTable E.8 \u2013 Example: Writing the value of a single attribute with block transfer <\/td>\n<\/tr>\n
185<\/td>\nTable E.9 \u2013 Example: Writing the value of a list of attributes with block transfer <\/td>\n<\/tr>\n
188<\/td>\nAnnex F (informative) Overview of cryptography
F.1 General
F.2 Hash functions <\/td>\n<\/tr>\n
189<\/td>\nF.3 Symmetric key algorithms
F.3.1 General
F.3.2 Encryption and decryption
Figure F.1 \u2013 Hash function <\/td>\n<\/tr>\n
190<\/td>\nF.3.3 Advanced Encryption Standard (AES)
F.3.4 Encryption Modes of Operation
Figure F.2 \u2013 Encryption and decryption <\/td>\n<\/tr>\n
191<\/td>\nF.3.5 Message Authentication Code
Figure F.3 \u2013 Message Authentication Codes (MACs) <\/td>\n<\/tr>\n
192<\/td>\nF.3.6 Key establishment
F.4 Asymmetric key algorithms
F.4.1 General <\/td>\n<\/tr>\n
193<\/td>\nF.4.2 Digital signatures
F.4.3 Key establishment <\/td>\n<\/tr>\n
194<\/td>\nAnnex G (informative) Significant technical changes with respect to IEC 62056-5-3 Ed.1.0:2013 <\/td>\n<\/tr>\n
196<\/td>\nBibliography <\/td>\n<\/tr>\n
199<\/td>\nIndex <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Electricity metering data exchange. The DLMS\/COSEM suite – DLMS\/COSEM application layer<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n204<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":252640,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[285,2641],"product_tag":[],"class_list":{"0":"post-252637","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-17-220-20","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/252637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/252640"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=252637"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=252637"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=252637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}