{"id":255719,"date":"2024-10-19T16:54:21","date_gmt":"2024-10-19T16:54:21","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-tr-62351-90-22018\/"},"modified":"2024-10-25T12:22:25","modified_gmt":"2024-10-25T12:22:25","slug":"bsi-pd-iec-tr-62351-90-22018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-tr-62351-90-22018\/","title":{"rendered":"BSI PD IEC TR 62351-90-2:2018"},"content":{"rendered":"

This part of IEC 62351, which is a technical report, addresses the need to perform Deep Packet Inspection (DPI) on communication channels secured by IEC 62351. The main focus is the illustration of the state-of-the art of DPI techniques that can be applied to the various kinds of channels, highlighting the possible security risks and implementation costs. Additional, beyond state-of-the-art proposals are also described in order to circumvent the main limits of existing solutions.<\/p>\n

It is to be noted that some communications secured by IEC 62351 are not encrypted, but only add integrity and non-repudiation of the message \u2013 however they are mentioned here for the sake of completeness around IEC 62351 and DPI.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nCONTENTS <\/td>\n<\/tr>\n
6<\/td>\nFOREWORD <\/td>\n<\/tr>\n
8<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
10<\/td>\n3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
3.2 Abbreviated terms
4 Overview <\/td>\n<\/tr>\n
11<\/td>\n5 Monitoring and auditing requirements
5.1 Use cases from utilities
5.2 Use cases from vendors <\/td>\n<\/tr>\n
12<\/td>\n5.3 A similar use case: Encrypted SIP Calls Recording
6 Overview of encrypted channels in IEC 62351
6.1 General
6.2 IEC 62351-3
6.3 IEC TS 62351-4 <\/td>\n<\/tr>\n
13<\/td>\n6.4 IEC TS 62351-6
7 DPI for encrypted communication techniques evaluation framework <\/td>\n<\/tr>\n
14<\/td>\n8 State of the art of ready techniques
8.1 General
8.2 Unencrypted TLS
Figures
Figure 1 \u2013 Unencrypted TLS sample architecture <\/td>\n<\/tr>\n
15<\/td>\n8.3 Private key sharing
Figure 2 \u2013 Private Key sharing sample architecture <\/td>\n<\/tr>\n
16<\/td>\n9 State of the art of techniques that need adaptation
9.1 General
9.2 Proxy <\/td>\n<\/tr>\n
17<\/td>\nFigure 3 \u2013 Proxy scenario sample architecture <\/td>\n<\/tr>\n
18<\/td>\n9.3 Advanced Middlebox (mcTLS) <\/td>\n<\/tr>\n
19<\/td>\nFigure 4 \u2013 Advanced Middlebox sample architecture <\/td>\n<\/tr>\n
20<\/td>\n9.4 Secure session-key sharing
Figure 5 \u2013 Secure session-key sharing sample architecture <\/td>\n<\/tr>\n
22<\/td>\n9.5 Delayed secure session-key sharing
Figure 6 \u2013 Delayed secure session-sharing sample architecture <\/td>\n<\/tr>\n
23<\/td>\n9.6 Application-level mirroring <\/td>\n<\/tr>\n
24<\/td>\nFigure 7 \u2013 Application-level mirroring sample architecture <\/td>\n<\/tr>\n
25<\/td>\n10 Additional proposals
10.1 Secure private-key sharing <\/td>\n<\/tr>\n
26<\/td>\n11 State of the art summary <\/td>\n<\/tr>\n
27<\/td>\nTable 1 \u2013 State of the art summary <\/td>\n<\/tr>\n
28<\/td>\n12 Practical considerations for ready techniques
12.1 General
12.2 Unencrypted TLS
12.3 Private-key sharing
12.4 Recommendations to mitigate risks <\/td>\n<\/tr>\n
29<\/td>\n13 Future challenges <\/td>\n<\/tr>\n
30<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Power systems management and associated information exchange. Data and communications security – Deep packet inspection of encrypted communications<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2018<\/td>\n32<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":255723,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-255719","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/255719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/255723"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=255719"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=255719"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=255719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}