jDLMS is a Java implementation of the DLMS/COSEM protocol. It can be used to develop individual DLMS/COSEM client/master and. based communication while DLMS is a binary protocol. This document provides overview of COSEM modeling of metering devices, addressing and DLMS. The open smart grid platform supports DLMS/COSEM (IEC ]. DLMS/ COSEM is a popular protocol to read smart meters. DLMS/COSEM is the de facto .

Author: Kakinos Malazuru
Country: Djibouti
Language: English (Spanish)
Genre: Travel
Published (Last): 14 February 2017
Pages: 225
PDF File Size: 11.43 Mb
ePub File Size: 10.37 Mb
ISBN: 338-2-16646-977-2
Downloads: 70197
Price: Free* [*Free Regsitration Required]
Uploader: Met

The value group E defines further processing or classification of quantities identified by value groups A to D e. Retrieved from ” https: By now new security mechanisms have been defined.

After signing on, the hand held unit generally reads a meter description. For futher information, see the gradle plugin project page https: Terminology Client Coem Synonyms: You will not need this application if you simply want to use cozem jDLMS library. During sign-on, the handheld unit prltocol a particular meter by number. A temporary session key that can optionally be used instead of the global encryption key by encryption mechanisms. In addition each object has 2 byte short name that maps to the logical name.

The Blue book describes the COSEM meter object model and the OBIS object identification system, the Green book describes the Architecture and Protocols, the Yellow book treats all the questions concerning conformance testing, the White book contains the glossary of terms. Authentication Mechanism The authentication mechanism is the mechanism by which client and server authenticate each other during connection build up.


Global unicast encryption key Used by authentication mechanisms such as HLS 5 as well as by encryption mechanisms such as mechanism 0.

Any real world thing mapped to an appropriate class type can be described by the attributes defined in the standard; and the methods defined therewith allow operations to be performed on the attributes.

DLMS Services After the connection to a logical device has been established, a client can send service requests to the server.

These selective access parameters are defined as part of the attribute specification. This describes some registers that describe the current count of metered units i.

The general protocol consists of a “sign on” sequence, in which a handheld unit identifies itself to the metering unit. Thus if you changed code and want to rebuild a library you can do it easily with Gradle. Attributes and methods can be addressed in two ways: When changing the global encryption or authentication keys one has to wrap the new key before transmitting it.

Microstar Electric Company Limited

The second way to address an attribute or method is by means of the so called short address. As an example, a meter could consist of one logical device for electricity metering at address 18 and another one for a connected gas meter at address The hand held unit then sends a sign-off message.


This page was last edited on 24 Januaryat After the connection to a logical device has been established, a client can send service requests to the server. It is only needed if jDLMS is used with encryption or high level authentication enabled. The two mechanisms often use the same keys but they can be chosen independently of each other and can be used in any combination.

Other IEC parts deal with Electricity metering – Data exchange for meter reading, tariff and load control. The attributes and methods constitute an object. In this case both client and server are authenticated.

DLMS/COSEM Protocol – Microstar Electric Company Limited

The cryptographic algorith used for authentication depends on the HLS protoxol Each logical device has an address in the range [0, ]. The hand held unit proyocol return an encrypted password. List of International Electrotechnical Commission standards. It has the the ID 0. It is one part of the identification of the object. The address space of short addresses is not standardized like the logical names, meaning that the same address can lead to different objects on different devices.