IEC 61850-80-6:2026, which is a technical specification, provides a comprehensive overview of the various aspects that need to be considered while using IEC 61850 for information exchange between power system automation equipment and control or maintenance centres or other system level applications. This document:
defines use cases and communication requirements that require an information exchange between power system automation equipment and control or maintenance centres;
describes the usage of the configuration language of IEC 61850‑6;
gives guidelines for the selection of communication services and architectures compatible with IEC 61850;
describes the engineering workflow;
introduces the use of a Proxy/Gateway concept;
describes the links regarding the Specific Communication Service Mapping (SCSM);
defines the abstract conformance test cases that build the basis for the conformance test procedures elaborated by the UCAIug Testing Sub Committee.
This document does not define constraints or limitations for specific device implementations. There is no specific clause for cyber security, which is tackled when it is necessary. The model for IEC TS 61850-80-6 provides security functions based upon the security threats and security functions found in IEC TS 62351-1 and IEC TS 62351-2. This document touches on several security aspects with the following basic assumptions:
Information authentication and integrity (e.g., the ability to provide tamper detection) is needed.
In case of operational issues, encryption (to achieve confidentiality) is optional. This typically applies for GOOSE and SV messages in the power utility automation system LAN.
End-to-end information authentication and integrity methods, regardless of information hierarchies, need to be provided. The typical method to provide this security function is through some type of information/message authentication code. IEC 62351-4 and IEC 62351-9 describe how authentication and integrity is achieved for IEC 61850-8-1. IEC 62351-4 provides means to ensure end-to-end data integrity through Proxy/Gateways.
Beneath information authentication and integrity, information availability is an important aspect for telecontrol. This document provides redundancy architectures to enhance the availability of information in control and maintenance centres
ПРОЈЕКАТ
IEC TS 61850-80-6 ED1
50.20
Почетак поступка одобравања дефинитивног текста нацрта стандарда
17. 4. 2026.
Да бисте видели цео садржај, морате се регистровати или пријавити помоћу корисничког имена које већ имате.