IEEE 2857-2021
$95.88
IEEE Standard for Wireless Smart Utility Network Field Area Network (FAN)
Published By | Publication Date | Number of Pages |
IEEE | 2021 | 182 |
New IEEE Standard – Active. This document describes a complete communications specification, encompassing layers 1 to 4 of the Open Systems Integration (OSI) network model, for a secure, wireless mesh communications network, using open standards communications and cybersecurity standards from standards organizations including Institute of Electrical and Electronics Engineers (IEEE) and Internet Engineering Task Force (IETF). The specification describes the functionality of the physical (PHY layer), medium access control (MAC layer), the network layer, transport layer and security parameters including certificate format for a highly scaleable and secure wireless mesh network for critical infrastructure ipv6 wireless communications networks.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 2857-2021 Front Cover |
2 | Title page |
4 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
8 | Participants |
9 | Introduction |
10 | Field Area Network Working Group Field Area Network Technical Profile Specification |
12 | Table of Contents |
19 | 1 Introduction 1.1 Scope 1.2 Requirements Language 1.3 Structure of This Document |
20 | 1.4 Acknowledgements |
22 | 2 References 2.1 Wi-SUN |
23 | 2.2 IEEE 2.3 ANSI/TIA 2.4 IETF |
25 | 3 Definitions and Acronyms 3.1 Definitions 3.2 Acronyms |
28 | 4 Technical Requirements 4.1 General 4.2 Reliability Targets 4.3 Adjacent Node Time Synchronization 4.4 PHY Layer 4.4.1 Regional Requirements 4.4.2 Data Rates 4.5 Data Link Layer 4.5.1 Frequency Hopping |
29 | 4.5.2 Routing and Forwarding 4.6 Network Layer 4.7 Transport Layer 4.8 Security |
31 | 5 Architecture 5.1 Overview |
33 | 5.2 Upper Layer Considerations 5.3 Transport Service 5.3.1 General Principles 5.3.2 Node Behavior 5.4 Network Service 5.4.1 General Principles |
34 | 5.4.2 Node Behavior 5.4.2.1 Neighbor Discovery 5.4.2.2 RPL 5.5 Data Link Service 5.5.1 General Principles 5.5.2 Node Behavior 5.5.2.1 LLC sub-layer |
37 | 5.5.2.2 MAC Sub-layer The MAC sub-layer supports PAN discovery and joining functions with two mechanisms: |
40 | 5.6 PHY Service 5.6.1 General Principles |
41 | 5.6.2 Node Behavior 5.7 Security |
42 | 6 Specification 6.1 Transport Layer 6.1.1 Operation 6.1.1.1 UDP 6.1.1.2 TCP 6.2 Network Layer 6.2.1 Constants 6.2.2 Data Structures. 6.2.2.1 EAPOL Relay Datagram. |
43 | 6.2.3 Operation 6.2.3.1 L3 Routing Network Layer |
50 | 6.2.3.2 L2 Mesh Network Layer |
52 | 6.3 Data Link Layer 6.3.1 Constants 6.3.1.1 Configuration Parameters |
55 | 6.3.2 Data Structures 6.3.2.1 Frame Formats |
61 | 6.3.2.2 Key Data Cryptographic Encapsulations (KDEs) |
62 | 6.3.2.3 Information Elements |
74 | 6.3.2.4 L2 Mesh Frame Formats |
76 | 6.3.3 LLC Operation 6.3.3.1 Protocol Dispatch operation 6.3.3.2 L2 MESH Operation |
80 | 6.3.4 MAC Operation 6.3.4.1 Channel Access 6.3.4.2 Frame Exchange Patterns |
81 | 6.3.4.3 Unicast Frame Exchange (UFE) |
85 | 6.3.4.4 Broadcast Frame Exchange (BFE) 6.3.4.5 Frequency Hopping |
87 | 6.3.4.6 FAN Discovery and Joining |
94 | 6.3.5 Service Access Points |
96 | 6.3.5.2 LLC Layer Management SAP (LLM SAP) |
97 | 6.3.5.3 MAC SAP 6.3.5.4 MAC Layer Management SAP (MLM SAP) |
99 | 6.4 PHY Layer |
100 | 6.4.1 Operating Modes 6.4.2 Preamble Length 6.4.3 Radio Specifications 6.5 Security |
101 | 6.5.1 Public Key Infrastructure 6.5.1.1 Wi-SUN IDevID Construction |
102 | 6.5.2 FAN Access Control and Group Key Placement |
103 | 6.5.2.1 EAPOL Over 802.15.4 |
105 | 6.5.2.2 Authentication and PMK Installation Flow |
106 | 6.5.2.3 PTK and GTK Installation Flow |
109 | 6.5.2.4 Group Key Update Flow |
110 | 6.5.2.5 Revocation of Node Access |
111 | 6.5.3 Node to Node Pairwise (N2NP) Authentication and Key Generation 6.5.3.1 Pairwise Shared Secret Initiation (GTK – Abbreviated) |
112 | 6.5.3.2 Pairwise Shared Secret Establishment (Association) State Machine (certificate based) |
114 | 6.5.3.3 Association (AM) State Machine |
123 | 6.5.3.4 Pairwise Session Management State Machine |
144 | 6.5.4 Frame Security 6.5.4.1 AES-CCM* Key Derivation |
145 | 6.5.4.2 Auxiliary Security Header |
146 | 6.5.4.3 CCM* Nonce and Frame Counter 6.5.4.4 GTK Lifecycle |
148 | 6.5.5 Node Hardening 6.5.6 State Maintenance Through Power Cycling |
149 | 7 Appendix A – TR51 Channel Function 7.1 Random Number Generation 7.2 Channel Table Calculation |
151 | 7.3 Calculating the First Element and Step Size 7.4 Computation of Hopping Sequence Channel Table. |
154 | 8 Appendix B – Unicast Frame Exchange Examples 8.1 Directed Frame Exchange: 8.1.1 Unacknowledged Data 8.1.2 Acknowledged Data |
155 | 8.2 Extended Directed Frame Exchange: 8.2.1 Qualified Frame Exchange |
156 | 8.2.2 Multi-Packet Frame Exchange |
157 | 8.2.3 Frame Exchange with Initial Data |
158 | 8.2.4 Bi Directional Frame Exchange |
159 | 9 Appendix C – Direct Hash Channel Function 9.1 Example Usage of Jenkins Hash |
160 | 9.2 The Jenkins Hash |
164 | 9.3 Examples |
166 | 10 Appendix D – FAN IPv6 Addressing Architecture |
167 | 11 Appendix E – Unicast / Broadcast / Discovery Example |
170 | 12 Appendix F – IPv6 Neighbor Discovery Optimizations. |
171 | 13 Appendix G – Frame Counter, Frame Sequence Number, and MPX-IE Transaction ID |
172 | 14 Appendix H – Unicast Timing Calculation Example 14.1 Node1 Timing Calculations 14.2 Node2 Timing Calculations |
174 | 15 Appendix J – FAN Node Bootstrap Messaging Flow |
175 | 16 Appendix K – EAPOL Target Selection |
176 | 17 Appendix L – Key Reinstallation Attack (KRACK) |
178 | 18 Appendix M –PHYSICAL LAYER 18.1 PHY Specification 18.1.1 PPDU Format 18.1.1.1 Preamble Field 18.1.1.2 SFD 18.1.1.3 PHR 18.1.2 Modulation and Coding 18.1.3 Symbol rate and Modulation Index |
179 | 18.1.4 Frequency Bands and Channel Parameters |
181 | 18.1.5 FEC 18.1.6 Data Whitening 18.2 PHY RF Requirements 18.2.1 Transmit Spectral Mask 18.3 Regional Considerations 18.3.1 Brazil Region 18.4 PHY Test Mode Requirements |
182 | Back Cover |