ISO ISO/IEC 24767-2 Information technology – Home network security – Part 2: Internal security services – Secure communication protocol for middleware (SCPM) - First Edition
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- 13
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- 13.160
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- 35
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- 35.100
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- 35.100.05
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- IEC 61326-3-1 CORR 1 Electrical equipment for measurement, control and laboratory use – EMC requirements – Part 3-1: Immunity requirements for safety-related systems and for equipment intended to perform safety-related functions (functional safety) – General industrial applications CORRIGENDUM1 - Edition 1.0
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- ISO ISO/IEC 7498-4 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 4: Management Framework - First Edition
- CSA CAN/CSA-ISO/IEC 14543-4-2:12 Information technology — Home electronic system (HES) architecture — Part 4-2: Communication layers — Transport, network and general parts of data link layer for network enhanced control devices of HES Class 1
- Картотека зарубежных и международных стандартов
International Organization for Standardization
Information technology – Home network security – Part 2: Internal security services – Secure communication protocol for middleware (SCPM) - First Edition
N ISO/IEC 24767-2
Annotation
This part of ISO/IEC 24767 specifies security in a home network for equipment with limited IT capability. The Secure Communication Protocol for Middleware (SCPM) is particularly designed to support network security (see 5.2) for equipment not capable of supporting Internet security protocols such as IPSec or SSL/TLS. Although this protocol is designed for unsafe transmissions, it may be used on other types of transmissions. Of course, the quality level of the security services of SCPM is not equal with that of the Internet security protocols but will ensure that such middleware can also be connected securely within a home. It is not the intention that SCPM replace existing security mechanisms of protocols that have already been published.
The SCPM provides the security services at the network layer and the protocol does not rely on any specific media transmission. This part of ISO/IEC 24767 contains detailed specifications of the security services supported, the necessary message formats, the information flows and the processing of these pieces of information necessary for the implementation of this protocol.
Therefore, this standard neither addresses media-dependent issues nor an overall security architecture covering every home-networking technology. The protocol specified in this standard is media-independent and covers the security services for the network layer for protocols that do not have a conflicting network-layer addressing scheme. Network layer security services are provided through the use of a combination of cryptographic and security mechanisms.
Each protocol should specify the details of this security implementation. An HES system supporting more than one protocol needs a gateway in between protocols.



