{"id":574597,"date":"2024-11-05T19:44:55","date_gmt":"2024-11-05T19:44:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/iec-62351-62020\/"},"modified":"2024-11-05T19:44:55","modified_gmt":"2024-11-05T19:44:55","slug":"iec-62351-62020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/iec\/iec-62351-62020\/","title":{"rendered":"IEC 62351-6:2020"},"content":{"rendered":"
IEC 62351-6:2020 specifies messages, procedures, and algorithms for securing the operation of all protocols based on or derived from the IEC 61850 series. This document applies to at least those protocols listed below:
\nIEC 61850-8-1 Communication networks and systems for power utility automation \u2013 Part 8-1: Specific communication service mapping (SCSM) \u2013 Mappings to MMS (ISO\/IEC 9506-1 and ISO\/IEC 9506-2) and to ISO\/IEC 8802-3
\nIEC 61850-8-2 Communication networks and systems for power utility automation \u2013 Part 8-2: Specific communication service mapping (SCSM) \u2013 Mapping to Extensible Messaging Presence Protocol (XMPP)
\nIEC 61850-9-2 Communication networks and systems for power utility automation \u2013 Part 9-2: Specific communication service mapping (SCSM) \u2013 Sampled values over ISO\/IEC 8802-3
\nIEC 61850-6 Communication networks and systems for power utility automation \u2013 Part 6: Configuration description language for communication in power utility automation systems related to IEDs
\nThe initial audience for this document is intended to be the members of the working groups developing or making use of the protocols listed in Table 1. For the measures described in this specification to take effect, they must be accepted and referenced by the specifications for the protocols themselves. This document is written to enable that process.
\nThe subsequent audience for this document is intended to be the developers of products that implement these protocols.
\nPortions of this document may also be of use to managers and executives in order to understand the purpose and requirements of the work.<\/p>\n","protected":false},"excerpt":{"rendered":"
Power systems management and associated information exchange – Data and communications security – Part 6: Security for IEC 61850<\/b><\/p>\n\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n IEC<\/b><\/a><\/td>\n 2020-10-20<\/td>\n 72<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":574613,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[653,2636],"product_tag":[],"class_list":{"0":"post-574597","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-33-200","7":"product_cat-iec","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/574597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/574613"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=574597"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=574597"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=574597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}