ПІДТВЕРДЖУВАЛЬНЕ ПОВІДОМЛЕННЯ
Наказом Міністерства економічного розвитку і торгівлі України
від 30.12.2014 № 1494
CLC/TS 50136-9:2013
en: Alarm systems - Alarm transmission systems and equipment - Part 9:
Requirements for common protocol for alarm transmission using the Internet
protocol
прийнято як національний стандарт
методом підтвердження за позначенням
ДСТУ CLC/TS 50136-9:2014
uk: Системи тривожної сигналізації. Системи передавання тривожних
сповіщень та устатковання. Частина 9. Вимоги до загального протоколу для
передавання тривожних сповіщень з використанням Інтернет протоколу
(CLC/TS 50136-9:2013, IDT)
З наданням чинності від 2016-01-01T
CLC/TS 50136-9
ECHNICAL SPECIFICATION SPECIFICATION TECHNIQUETECHNISCHE SPEZIFIKATION January 2013
ICS 13.320; 33.040.40
English version
Alarm systems -
Alarm transmission systems and equipment -
Part 9: Requirements for common protocol for alarm transmission using
the Internet protocol
Systemes d’alarmes -
Systemes et equipements de transmission d’alarme -
Partie 9 : Exigences pour Ie protocole commun de transmission d’alarme utilisant Ie protocole Internet
Alarmanlagen -
Alarmubertragungsanlagen und - einrichtungen -
Teil 9: Anforderungen an standardisierte Protokolle zur Alarmubertragung unter Nutzung des Internetprotokoll
s
This Technical Specification was approved by CENELEC on 2012-11-12.
CENELEC members are required to announce the existence of this TS in the same way as for an EN and to make the TS available promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom.
CENELEC
European Committee for Electrotechnical Standardization
Comite Europeen de Normalisation Electrotechnique
Europaisches Komitee fur Elektrotechnische Normung
Management Centre: Avenue Mamix 17, В -1000 Brussels
© 2013 CENELEC - All rights of exploitation in any form and by any means reserved worldwide for CENELEC members
.Contents
Foreword 4
Scope 5
Normative references 5
Terms, definitions and abbreviations 5
Terms and definitions 5
Abbreviations 5
Objective 6
Messaging 6
General 6
Message format overview 7
Padding and message length 11
Hashing 12
Encryption 12
Timeouts and retries 13
Version number 13
Reverse commands 13
Initial values 14
Message types 14
General 14
Path supervision 14
Event reporting 15
Configuration messages 19
Commissioning and connection setup 27
.1 Commissioning 27
Connection setup 31
(normative) Result codes 32
(normative) Protocol Identifiers 33
(normative) Shared secret 34
C.1 Formatting of the shared secret 34
C.2 Checksum for Shared Secret Formatting 34
C.3 Example of Secret Encoding and Formatting 34
(informative) Examples of messaging sequences 35
D.1 Commissioning 35
D.2 Connection setup 38
(informative) Examples of application protocols 41
E.1 SIA 41
E.2 Ademco Contact ID 41
E.3 Scancom Fast Format 42
E.4 VdS 2465 42
(informative) Design principles 44
F.1 General 44
F.2 Information Security 44
F.3 Use of UDP signalling 44
Bibliography 45
- Identifiers 7
Basic unencrypted format of messages 7
- Basic encrypted format of messages 8
- Message ID overview 10
- Flags 11
- Hashing ID’s 12
- Encryption ID’s 12
- Reverse commands 14
- Initial values 14
Poll message SPT <- RCT 15
- Poll response RCT <- -> SPT 15
- Event message format - SPT -> RCT 16
- Event message format - Fields 16
- Event field 16
- Time event field 17
- Time message field 17
- Link field - IP Address 17
- Link field - IP Port number 18
Table 19-Link field-URL 18
- Link field - Filename 18
- Event response message format 18
- Connection handle request message format 19
- Connection handle response message format 20
- Device ID request message format 20
- Device ID request flags 20
- Device ID response message format 21
- Encryption selection request message format 21
‘Master Encryption Selection request’ flag 21
- Encryption selection response message format 22
- Encryption key exchange request message format 22
- ‘Master Key request’ flag 22
- Encryption key exchange response message format 23
- Hash selection request message format 23
- Hash selection response message format 23
- Path supervision request message format 24
- Path supervision response message format 24
- Set time command message format 24
- Set time response message format 25
- Protocol version request message format 25
Protocol version response message format 25
- Transparent message format 25
- Transparent response format 26
- DTLS completed request message format 26
- DTLS completed response message format 26
- RCT IP parameter request message format 27
- RCT IP parameter response message format 27
- Message flow during the commissioning of a new SPT 28
- Message flow during connection setup 31
1 - Result codes 32
1 - Protocol identifiers 33CLC/TS 50136-9:2013
-4-
Foreword
This document (CLC/TS 50136-9:2013) has been prepared by CLC/TC 79 "Alarm systems".
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CENELEC [and/or CEN] shall not be held responsible for identifying any or all such patent rights.Scope
This Technical Specification specifies a protocol for point-to-point transmission of alarms and faults, as well as communications monitoring, between a Supervised Premises Transceiver and a Receiving Centre Transceiver using the Internet protocol (IP).
The protocol is intended for use over any network that supports the transmission of IP data. These include Ethernet, xDSL, GPRS, WiFi, UMTS and WIMAX.
The system performance characteristics for alarm transmission are specified in EN 50136-1.
The performance characteristics of the supervised premises equipment should comply with the requirements of its associated alarm system standard and shall apply for transmission of all types of alarms including, but not limited to, fire, intrusion, access control and social alarms.
Compliance with this Technical Specification is voluntary.
Normative references
The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
EN 50136-1:2012, Alarm systems — Alarm transmission systems and equipment — Part 1: General requirements for alarm transmission systems
Terms, definitions and abbreviations
Terms and definitions
For the purposes of this document, the terms and definitions given in EN 50136-1:2012 apply.
Abbreviations
For the purposes of this document, the following abbreviations apply.
AES |
Advanced Encryption Standard |
ARC |
Alarm Receiving Centre |
ATS |
Alarm Transmission System |
CA |
X.509 Certificate Authority |
CBC |
Cipher Block Chaining |
CRC |
Cyclic redundancy check |
DNS |
Domain Name System |
DTLS |
Datagram Transport Layer Security |
HL |
Header Length |
IP |
Internet Protocol |
IV |
Initialization Vector |
MAC |
Media Access Control |
MTU |
Maximum Transmission Unit |
NAT |
Network Address Translation |
NIST |
National Institute of Standards and Technology |
NTP |
Network Time Protocol |
NVM |
Non-Volatile Memory |
P-MTU |
Path Maximum Transmission Unit |
RCT Receiver Centre Tranceiver
RX Receive
SCTP Stream Control Transmission Protocol
SNTP Simple Network Time Protocol
SPT Supervised Premises Transceiver
TFTP Trivial File Transfer Protocol
TX Transmit
UDP User Datagram Protocol
URI Uniform Resource Identifier
URL Uniform Resource Locator
UTC Coordinated Universal Time
WS Window Size
Objective
The object of this Technical Specification is to specify the protocol details (transport and application layers) for alarm transmission systems using Internet Protocol (IP), to ensure interoperability between SPTs and RCTs supplied by different manufacturers. Mechanisms to commission SPT and RCT and build mutual trust between the communicating parties are also described.
As compliance with this Technical Specification is voluntary, any other alarm transmission protocol or equipment not covered by this Technical Specification may be used, provided that the requirements of EN 50136-1 are met.
This protocol is designed to run on top of UDP and is designed to support both IPv4 and IPv6.
NOTE For further discussion of IP and UDP in alarm transmission please see F.3.
Messaging
General
This clause defines the messaging layer, on top of which the alarm event data is transmitted using the existing reporting formats like for example Sia and Contact ID. Clause 7 defines the initial commissioning of an SPT, as well as how SPTs connect to the RCT.
The functionality of the alarm messaging and polling protocol includes:
exchanging master and session parameters;
(alarm) event reporting (including linking to out-of-band additional data related to events, like audio/video);
line monitoring;
transparent message transmission, e.g. vendor specific messages that, for example, can be used for remote commands from RCT to SPT.
It fulfils the following requirements:
encryption, fulfilling requirements for most demanding category of EN 50136-1;
authentication, fulfilling requirements for most demanding category of EN 50136-1;
SPT: allows a broad range of hardware (limited demands on memory footprint as well as CPU power);
RCT: allows support for at least 10 000 SPTs in compliance with any category in EN 50136-1, using modern general purpose server hardware;
allow Dynamic IP addresses of the SPTs;
allow one or more SPTs to be placed behind a NAT firewall.
Message format overview
General
This subclause describes the basic outline of all messages.
Each message shall be explicitly acknowledged, including line supervision messages.
Backwards compatibility is achieved by the implementation of the RESP_CMD_NOT_SUPPORTED result value, which the receiving party can send as answer to unsupported messages.
Multi-byte values will be transmitted using network byte order (big-endian).
Identifiers
The following identifiers exist:
Table 1 - Identifiers
Description |
Purpose |
Present in |
Encrypted |
See |
Connection Handle |
Look up the current symmetric encryption key |
All messages |
No |
5.2.4 |
Device ID |
Uniquely identify the hardware |
Contributing to hashes in all messages |
N/A |
5.2.5 |
The Connection Handle is unencrypted. It is a unique number, initialized during the setup of the connection. Its sole purpose is to be able to look up the encryption key. It is valid for the communication session only.
The Device ID uniquely identifies the hardware once the connection has been established. The Device ID is used when computing the hash value for each message. In combination with the encryption of the hash this is used for substitution detection.
NOTE Device ID is not equivalent to any account code or similar ID specified by application protocol
The Device ID shall be stored in non-volatile memory within the SPT.
The IP address is not used for identification purposes, in order to allow for the use of dynamic or translated IP addresses.
Message format
The basic unencrypted format of all messages is as follows. Message in this format is never transmitted. It is described here only to clarify the hash value calculation.
Table 2- Basic unencrypted format of messages
Byte Index |
Bytes |
Description |
See |
Group |
0 |
4 |
Connection Handle |
5.2.4 |
Header |
4 |
16 |
Device ID |
5.2.5 |
|
20 |
2 |
Tx Sequence number |
5.2.8 |
|
22 |
2 |
Rx Sequence number |
5.2.8 |
|
24 |
2 |
Flags |
5.2.9 |
|
26 |
1 |
Protocol version number |
5.7 |
Byte Index |
Bytes |
Description |
See |
Group |
27 |
1 |
Message ID |
5.2.6 |
Message |
28 |
2 |
Message Length |
5.2.7 |
|
30 |
n |
Message Data |
Clause 6 |
The basic encrypted, transmitted format of all messages is as follows. Note that the Device ID field is not included in the encrypted message, but its value is used to compute the message hash value i.e. the hash is calculated from the unencrypted version of the message described above.
Table 3 - Basic encrypted format of messages
Byte Index |
Bytes |
Description |
See |
Encrypted |
Group |
0 |
4 |
Connection Handle |
5.2.4 |
No |
Header Message |
4 |
2 |
Tx Sequence number |
5.2.8 |
Yes |
|
6 |
2 |
Rx Sequence number |
5.2.8 |
Yes |
|
8 |
2 |
Flags |
5.2.9 |
Yes |
|
10 1 |
Protocol version number |
5.7 |
Yes |
||
11 |
1 |
Message ID |
5.2.6 |
Yes |
|
12 |
2 |
Message Length |
5.2.7 |
Yes |
|
14 |
n |
Message Data |
Clause 6 |
Yes |
|
14 + n |
|
Padding |
5.3.1 |
Yes |
Tail |
|
32 32 |
Hash - SHA-256, or Hash - RIPEMD-256 |
5.4 |
Yes |
The Connection Handle is unencrypted; the remainder of the message is encrypted using the encryption method as negotiated during the commissioning stage.
Message ID’s are defined in pairs: each message has its matching response. For responses the first byte of the Message Data always holds a ‘Result code’ as defined in Annex A.
All fields are described in detail in the following subclauses.
Connection Handle
The Connection Handle is assigned (uniquely for the RCT to which a SPT reports) using the commissioning protocol. The RCT creates a unique Connection Handle and links this to the Device ID of the SPT in its internal database. This translation results in a compact, fixed length Connection Handle.
The purpose of the Connection Handle is to be able to determine the encryption key to be used to decrypt the received message, independent of the IP address of the message.
The Connection Handle is not a (by the installer/operator) configurable parameter, nor made visible on user interfaces. It is generated and used internally by the SPT/RCT equipment only.
Device ID
General
The Device ID uniquely identifies the SPT and RCT. It is used (in combination with the encryption) for substitution detection. Both SPT and RCT can verify the identity of the connected party using this field, and create a substitution alarm in case it has changed.
Within the message header, the Device ID itself is never transmitted. However Device ID is used to contribute to the message hash calculation
Device ID is 16 bytes long.
Б.2.5.2 SPT Device ID
The Device ID of the SPT is an ID that is random to the SPT, but fixed and read-only over the lifetime of the SPT, i.e. A hardware serial number. It is unique within the SPT database in the RCT.
The Device ID is created during manufacturing time of the device; in messaging, it is never transmitted itself in cleartext, but is needed to be known in cleartext for the ARC to configure the RCT accordingly.
Thus, it is only transmitted during initial commissioning phase to the RCT.
Uniqueness is assured by the following principles:
Each SPT manufacturer shall use his 24 bits “Organizationally Unique Identifier” as assigned to him by the IEEE for MAC-address generation
- Each SPT manufacturer not having such a code shall attend for such a code from IEEE.
If an interface in the SPT makes use of a MAC address, the next 24 bits in the device ID shall be the same as the rest of MAC address specified by the manufacturer. If such interface does not exist, the manufacturer shall use another numbering scheme documented by the manufacturer.