BS EN 62056-5-3:2016:2017 Edition
$215.11
Electricity metering data exchange. The DLMS/COSEM suite – DLMS/COSEM application layer
Published By | Publication Date | Number of Pages |
BSI | 2017 | 204 |
This part of IEC 62056 specifies the DLMS/COSEM application layer in terms of structure, services and protocols for COSEM clients and servers, and defines how to use the DLMS/COSEM application layer in various communication profiles.
It defines services for establishing and releasing application associations, and data communication services for accessing the methods and attributes of COSEM interface objects, defined in IEC 62056-6-2:2016, using either logical name (LN) or short name (SN) referencing.
Annex A (normative) defines how to use the COSEM application layer in various communication profiles. It specifies how various communication profiles can be constructed for exchanging data with metering equipment using the COSEM interface model, and what are the necessary elements to specify in each communication profile. The actual, media-specific communication profiles are specified in separate parts of the IEC 62056 series.
Annex B (normative) specifies the SMS short wrapper.
Annex C, Annex D and Annex E (informative) include encoding examples for APDUs.
Annex F (informative) provides an overview of cryptography.
Annex G (informative) lists the main technical changes in this edition of the standard.
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | English CONTENTS |
13 | FOREWORD |
15 | INTRODUCTION |
16 | 1 Scope 2 Normative references |
18 | 3 Terms, definitions and abbreviations 3.1 Terms and definitions Abbreviations |
20 | 4 Overview 4.1 DLMS/COSEM application layer structure Figures Figure 1 โ Structure of the COSEM Application layers |
21 | 4.2 DLMS/COSEM application layer services 4.2.1 ASO services 4.2.2 Services provided for application association establishment and release |
22 | 4.2.3 Services provided for data transfer |
23 | Tables Table 1 โ Clarification of the meaning of PDU Size for DLMS/COSEM |
27 | 4.2.4 Layer management services 4.2.5 Summary of DLMS/COSEM application layer services 4.3 DLMS/COSEM application layer protocols Figure 2 โ Summary of DLMS/COSEM AL services |
28 | 5 Information security in DLMS/COSEM 5.1 Definitions 5.2 General |
29 | 5.3 Data access security 5.3.1 Overview 5.3.2 No security (lowest level security) authentication 5.3.3 Low Level Security (LLS) authentication |
30 | 5.3.4 High Level Security (HLS) authentication |
32 | 5.4 Data transport security 5.4.1 Applying, removing or checking the protection: ciphering and deciphering Figure 3 โ Authentication mechanisms during AA establishment |
33 | 5.4.2 Security context 5.4.3 Security policy |
34 | 5.4.4 Security suite 5.4.5 Security material 5.4.6 Ciphered xDLMS APDUs Table 2 โ Security suites Table 3 โ Ciphered xDLMS APDUs |
35 | Figure 4 โ Structure of service specific global ciphering and dedicated ciphering APDUs Figure 5 โ Structure of general global ciphering and dedicated ciphering APDUs |
36 | 5.4.7 Cryptographic keys Table 4 โ Use of the fields of the ciphered APDUs |
39 | 5.4.8 The Galois/Counter Mode of Operation (GCM) Table 5 โ Cryptographic keys and their management |
42 | Figure 6 โ Cryptographic protection of xDLMS APDUs using GCM |
43 | Table 6 โ Security control byte Table 7 โ Plaintext and additional authenticated data |
45 | Table 8 โ Example for ciphered APDUs |
47 | Table 9 โ HLS example with GMAC |
48 | 6 DLMS/COSEM application layer service specification 6.1 Service primitives and parameters Figure 7 โ Service primitives |
49 | Figure 8 โ Time sequence diagrams |
50 | 6.2 The COSEM-OPEN service Table 10 โ Codes for AL service parameters |
51 | Table 11 โ Service parameters of the COSEM-OPEN service primitives |
55 | 6.3 The COSEM-RELEASE service Table 12 โ Service parameters of the COSEM-RELEASE service primitives |
57 | 6.4 COSEM-ABORT service |
58 | 6.5 Protection and general block transfer parameters Table 13 โ Service parameters of the COSEM-ABORT service primitives |
59 | Figure 9 โ Additional service parameters to control cryptographic protection and general block transfer |
60 | Table 14 โ Additional service parameters |
61 | Table 15 โ Security parameters |
62 | 6.6 The GET service Table 16 โ Service parameters of the GET service |
63 | Table 17 โ GET service request and response types |
64 | 6.7 The SET service |
65 | Table 18 โ Service parameters of the SET service |
66 | Table 19 โ SET service request and response types |
67 | 6.8 The ACTION service |
68 | Table 20 โ Service parameters of the ACTION service |
69 | Table 21 โ ACTION service request and response types |
71 | 6.9 The DataNotification service Table 22 โ Service parameters of the DataNotification service primitives |
72 | 6.10 The EventNotification service Table 23 โ Service parameters of the EventNotification service primitives |
73 | 6.11 The TriggerEventNotificationSending service Table 24 โ Service parameters of the TriggerEventNotificationSending.requestservice primitive |
74 | 6.12 Variable access specification 6.13 The Read service Table 25 โ Variable Access Specification |
75 | Table 26 โ Service parameters of the Read service |
76 | Table 27 โ Use of the Variable_Access_Specification variants and the Read.response choices |
78 | 6.14 The Write service |
79 | Table 28 โ Service parameters of the Write service Table 29 โ Use of the Variable_Access_Specification variants and the Write.response choices |
81 | 6.15 The UnconfirmedWrite service Table 30 โ Service parameters of the UnconfirmedWrite service |
82 | 6.16 The InformationReport service Table 31 โ Use of the Variable_Access_Specification variants |
83 | 6.17 Client side layer management services: the SetMapperTable.request 6.18 Summary of services and LN/SN data transfer service mapping Table 32 โ Service parameters of the InformationReport service Table 33 โ Service parameters of the SetMapperTable.request service primitives |
84 | 7 DLMS/COSEM application layer protocol specification 7.1 The control function 7.1.1 State definitions of the client side control function Table 34 โ Summary of ACSE services Table 35 โ Summary of xDLMS services for LN referencing Table 36 โ Summary of xDLMS services for SN referencing |
85 | Figure 10 โ Partial state machine for the client side control function |
86 | 7.1.2 State definitions of the server side control function Figure 11 โ Partial state machine for the server side control function |
87 | 7.2 The ACSE services and APDUs 7.2.1 ACSE functional units, services and service parameters |
88 | Table 37 โ ACSE functional units, services and service parameters |
90 | 7.2.2 Registered COSEM names |
91 | Table 38 โ Use of ciphered / unciphered APDUs |
92 | 7.2.3 APDU encoding rules 7.2.4 Protocol for application association establishment |
93 | Figure 12 โ MSC for successful AA establishment preceded by a successful lower layer connection establishment |
97 | 7.2.5 Protocol for application association release |
98 | Figure 13 โ Graceful AA release using the A-RELEASE service |
99 | Figure 14 โ Graceful AA release by disconnecting the supporting layer |
100 | 7.3 Protocol for the data transfer services 7.3.1 Negotiation of services and options โ the conformance block Figure 15 โ Aborting an AA following a PH-ABORT.indication |
101 | 7.3.2 Confirmed and unconfirmed service invocations Table 39 โ xDLMS Conformance block |
103 | 7.3.3 Protocol for the GET service Figure 16 โ MSC of the GET service Table 40 โ GET service types and APDUs |
104 | Figure 17 โ MSC of the GET service with block transfer |
106 | 7.3.4 Protocol for the SET service Figure 18 โ MSC of the GET service with block transfer, long GET aborted Table 41 โ SET service types and APDUs |
107 | Figure 19 โ MSC of the SET service Figure 20 โ MSC of the SET service with block transfer |
109 | 7.3.5 Protocol for the ACTION service Figure 21 โ MSC of the ACTION service Table 42 โ ACTION service types and APDUs |
110 | Figure 22 โ MSC of the ACTION service with block transfer |
111 | 7.3.6 Protocol of the DataNotification service 7.3.7 Protocol for the EventNotification service 7.3.8 Protocol for the Read service |
112 | Table 43 โ Mapping between the GET and the Read services |
113 | Table 44 โ Mapping between the ACTION and the Read services |
114 | Figure 23 โ MSC of the Read service used for reading an attribute Figure 24 โ MSC of the Read service used for invoking a method |
115 | 7.3.9 Protocol for the Write service Figure 25 โ MSC of the Read Service used for reading an attribute, with block transfer |
116 | Table 45 โ Mapping between the SET and the Write services |
117 | Table 46 โ Mapping between the ACTION and the Write service |
118 | Figure 26 โ MSC of the Write service used for writing an attribute Figure 27 โ MSC of the Write service used for invoking a method |
119 | 7.3.10 Protocol for the UnconfirmedWrite service Figure 28 โ MSC of the Write service used for writing an attribute, with block transfer |
120 | 7.3.11 Protocol for the InformationReport service Figure 29 โ MSC of the Unconfirmed Write service used for writing an attribute Table 47 โ Mapping between the SET and the UnconfirmedWrite services Table 48 โ Mapping between the ACTION and the UnconfirmedWrite services |
121 | 7.3.12 Protocol of general block transfer mechanism Table 49 โ Mapping between the EventNotification and InformationReport services |
123 | Figure 30 โ Partial service invocations and GBT APDUs |
125 | Figure 31 โ GET service with GBT, switching to streaming |
126 | Figure 32 โ GET service with partial invocations, GBT and streaming,recovery of 4th block sent in the 2nd stream |
127 | Figure 33 โ GET service with partial invocations, GBT and streaming,recovery of 4th and 5th blocks |
128 | Figure 34 โ GET service with partial invocations, GBT and streaming,recovery of last block |
129 | Figure 35 โ SET service with GBT, with server not supporting streaming,recovery of 3rd block |
130 | Figure 36 โ ACTION-WITH-LIST service with bi-directional GBT and block recovery |
131 | Figure 37 โ DataNotification service with GBT with partial invocation |
132 | 8 Abstract syntax of ACSE and COSEM APDUs |
147 | Annexes Annex A (normative) Using the COSEM application layer in various communications profiles A.1 General A.2 Targeted communication environments A.3 The structure of the profile A.4 Identification and addressing schemes |
148 | A.5 Supporting layer services and service mapping A.6 Communication profile specific parameters of the COSEM AL services A.7 Specific considerations / constraints using certain services within a given profile A.8 The 3-layer, connection-oriented, HDLC based communication profile A.9 The TCP-UDP/IP based communication profiles (COSEM_on_IP) A.10 The S-FSK PLC profile |
149 | Annex B (normative) SMS short wrapper Figure B.1 โ Short wrapper Table B.1 โ Reserved Application Processes |
150 | Annex C (informative) AARQ and AARE encoding examples C.1 General C.2 Encoding of the xDLMS InitiateRequest / InitiateResponse APDUs |
151 | Table C.1 โ Conformance block |
152 | Table C.2 โ A-XDR encoding of the xDLMS InitiateRequest APDU |
153 | C.3 Specification of the AARQ and AARE APDUs Table C.3 โ A-XDR encoding of the xDLMS InitiateResponse APDU |
154 | C.4 Data for the examples |
155 | C.5 Encoding of the AARQ APDU |
156 | Table C.4 โ BER encoding of the AARQ APDU |
158 | C.6 Encoding of the AARE APDU Table C.5 โ Complete AARQ APDU |
159 | Table C.6 โ BER encoding of the AARE APDU |
163 | Table C.7 โ The complete AARE APDU |
164 | Annex D (informative) Encoding examples: AARQ and AARE APDUs usinga ciphered application context D.1 A-XDR encoding of the xDLMS InitiateRequest APDU, carrying a dedicated key Table D.1 โ A-XDR encoding of the xDLMS InitiateRequest APDU |
165 | D.2 Authenticated encryption of the xDLMS InitiateRequest APDU Table D.2 โ Authenticated encryption of the xDLMS InitiateRequest APDU |
166 | D.3 The AARQ APDU Table D.3 โ BER encoding of the AARQ APDU |
167 | D.4 A-XDR encoding of the xDLMS InitiateResponse APDU |
168 | D.5 Authenticated encryption of the xDLMS InitiateResponse APDU Table D.4 โ A-XDR encoding of the xDLMS InitiateResponse APDU Table D.5 โ Authenticated encryption of the xDLMS InitiateResponse APDU |
169 | D.6 The AARE APDU Table D.6 โ BER encoding of the AARE APDU |
170 | D.7 The RLRQ APDU (carrying a ciphered xDLMS InitiateRequest APDU) |
171 | D.8 The RLRE APDU (carrying a ciphered xDLMS InitiateResponse APDU) Table D.7 โ BER encoding of the RLRQ APDU Table D.8 โ BER encoding of the RLRE APDU |
172 | Annex E (informative) Data transfer service examples Table E.1 โ Objects used in the examples |
173 | Table E.2 โ Example: Reading the value of a single attribute without block transfer |
174 | Table E.3 โ Example: Reading the value of a list of attributes without block transfer |
176 | Table E.4 โ Example: Reading the value of a single attribute with block transfer |
178 | Table E.5 โ Example: Reading the value of a list of attributes with block transfer |
181 | Table E.6 โ Example: Writing the value of a single attribute without block transfer |
182 | Table E.7 โ Example: Writing the value of a list of attributes without block transfer |
183 | Table E.8 โ Example: Writing the value of a single attribute with block transfer |
185 | Table E.9 โ Example: Writing the value of a list of attributes with block transfer |
188 | Annex F (informative) Overview of cryptography F.1 General F.2 Hash functions |
189 | F.3 Symmetric key algorithms F.3.1 General F.3.2 Encryption and decryption Figure F.1 โ Hash function |
190 | F.3.3 Advanced Encryption Standard (AES) F.3.4 Encryption Modes of Operation Figure F.2 โ Encryption and decryption |
191 | F.3.5 Message Authentication Code Figure F.3 โ Message Authentication Codes (MACs) |
192 | F.3.6 Key establishment F.4 Asymmetric key algorithms F.4.1 General |
193 | F.4.2 Digital signatures F.4.3 Key establishment |
194 | Annex G (informative) Significant technical changes with respect to IEC 62056-5-3 Ed.1.0:2013 |
196 | Bibliography |
199 | Index |