IEC 104 may be the extension of IEC 101. The only real exception is variations within the link layer, network layer, transport layer and physical layer services. IEC 60870-5-104 utilizes a router to connect with the Wide Area Network and Transmission Control Protocol/Ip Address network to connect with the Lan. The IEC 60870-5-104 application level is maintained like this of IEC 60870-5-101, where some data types and facilities remain out. With regards to change in data through serial line and ethernet, two distinctive link layers are appropriate for your purpose and therefore are defined within the IEC 60870-5-104. Different types of mechanisms for effective control over network data synchronisation exist within the control field data of IEC 60870-5-104.

The issue using the IEC 60870-5-104 is the fact that it isn’t secure by design. A burglar standard known as IEC 62351 was printed through the Worldwide Electrotechnical Commission Technical Committee, that performs finish-to-finish file encryption. The IEC 62351 prevents playback attack, forging packets and man-in-the-middle attack. But vendors are reluctant for doing things on their own systems, due to the increase in complexity.

Short timestamps aren’t based on IEC 60870-5-104, IEC61850 SCL Engineering and also the address element’s length is adjusted to particular value. But both IEC 60870-5-104(transport profile) and IEC 60870-5-101(application layer) are combined without thinking about this restriction. When the standard is used with a device, then it may cause problems.

An interoperability list can be used to determine the interoperability among devices. Within the interoperability list, the relevant functions is going to be marked. This signifies the part range.

There’s a concurrent transmission of information among several devices and services because the standard facilitates communication via a standard network. This is recognized as the finest advantage of IEC 60870-5-104.

The pros and cons of IEC 60870-5-104 and IEC 60870-5-101 offer a similar experience. Problems that should be emphasised are generally using data file encryption and internet along with the meaning of communication of redundant systems.


The interoperability document specifies the accessible application functions and it is choices. Additionally, it distinguishes the reason for transmission and also the supported application service data unit. The control center knows the technique to configure the communication using the device by utilizing the interoperability document. While on an interoperability document the control center can understand if the RTU works with its necessary functions or otherwise. Pick the compatible choices contrasting the remote station and control center interoperability documents.


The profiles are some documented needs that select a particular number of options in the ones available in the conventional IEC 60870-5-101 or IEC 60870-5-104(IEC 61850). The utility profiles specify distinct points configured with certain uses within their system and addresses ranges for that various data types. The motivation for that profiles would be to obvious up any concern of inaccurate standards as well as the limitation from the available choices to find the most appropriate one with respect to the utility needs. While another profile may be asking to transmit them while using floating-point Application service data unit and spontaneous transmission. The RTU manufacturer should examine when the device meets the profile needs as mentioned through the utility just before their devices could be set up in their system. To make sure whether their profile is implemented or otherwise, the utility will request an RTU testing. The utility supplies a test specs. The conformance test is going to be conducted with this particular.

The Worldwide Electrotechnical Commission defines documents for IEC 60870-5-601 or IEC 60870-5-604 combined with the test procedures to ratify the stations that utilize these standards. The exam cases to become transported out is depending on the unit abilities described within their interoperability.

Security Inclusion With IEC 60870 5-104

Both IEC 60870-5-101 and IEC 60870-5-104 are vulnerable to data modification through hijack attack because these two standards don’t include data authentication. Inside a security measure, you will find tables having a complete listing of private systems , authorised IP addresses and firewalls within the remote station. But nowadays these safety measures are thought poor. The TC 57 WG15 experts are developing extra time for that safety of handheld remote control communications. The technical specs IEC 62351-5 gives a free account from the important topics associated with the security of IEC 60870-5-101 and IEC 60870-5-104. The most recent application service data unit messages are described within the technical specs IEC 60870-5-7. IEC 62351-100-1 specifies the exam procedures to ratify secure implementations.

Leave a Reply

Your email address will not be published. Required fields are marked *