{"id":398160,"date":"2024-10-20T04:34:12","date_gmt":"2024-10-20T04:34:12","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1711-2-2019\/"},"modified":"2024-10-26T08:22:38","modified_gmt":"2024-10-26T08:22:38","slug":"ieee-1711-2-2019","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1711-2-2019\/","title":{"rendered":"IEEE 1711.2-2019"},"content":{"rendered":"
New IEEE Standard – Active. A cryptographic protocol to provide integrity with optional confidentiality for cyber security of substation serial links is defined in this standard. It does not address specific applications or hardware implementations and is independent of the underlying communications protocol.The elevated concern of cyber security throughout the power industry has created a need to protect communications to and from substations. This standard defines a cryptographic protocol known as Secure SCADA Communications Protocol (SSCP) that protects the integrity and, optionally, the confidentiality of asynchronous serial communications typically used by control system equipment. SSCP is primarily intended to protect serial SCADA communications, but can be applied to other serial communications, such as the maintenance ports of intelligent electronic devices. SSCP is independent of the underlying communications link and protocol (e.g., Modbus, DNP3, IEC 60870- 5), and is appropriate for serial communications over leased lines, dial-up lines, multi-drop links, radio, power line carrier, fiber optic, etc. SSCP is suitable for implementation in new equipment or for deployment in bump-in-the-wire devices retrofitting protection to existing systems.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 1711.2\u2122-2019 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Conventions 1.3\u2002Word usage <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 2.\u2002Normative references <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 3.2\u2002Acronyms and abbreviations 4.\u2002SSCP frame structures 4.1\u2002Frame headers <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.2\u2002Session establish request frame 4.3\u2002Authentication challenge frame 4.4\u2002Authentication response frame <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.5\u2002Key exchange frame <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4.6\u2002Data frames <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.7\u2002Close frame 5.\u2002State information 5.1\u2002State definitions 5.2\u2002Messages <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.\u2002SSCP frame validation 6.1\u2002Cryptographic key material <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.2\u2002Addressing 6.3\u2002Field validation 6.4\u2002Sequence numbering <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.5\u2002Hashed Message Authentication Code (HMAC) 6.6\u2002Authentication response RCV 6.7\u2002Cryptographic algorithm 6.8\u2002Key exchange timeout <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.9\u2002Status reporting interval <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Annex\u00a0A (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Secure SCADA Communications Protocol (SSCP)<\/b><\/p>\n |