CN105072636A - Wireless testing and data transmission system - Google Patents

Wireless testing and data transmission system Download PDF

Info

Publication number
CN105072636A
CN105072636A CN201510586878.2A CN201510586878A CN105072636A CN 105072636 A CN105072636 A CN 105072636A CN 201510586878 A CN201510586878 A CN 201510586878A CN 105072636 A CN105072636 A CN 105072636A
Authority
CN
China
Prior art keywords
data
wireless
acquisition terminal
wireless data
data acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510586878.2A
Other languages
Chinese (zh)
Other versions
CN105072636B (en
Inventor
严发宝
苏艳蕊
李川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Huaxing Zhizao Technology Co Ltd
Original Assignee
Chengdu Huaxing Zhizao Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Huaxing Zhizao Technology Co Ltd filed Critical Chengdu Huaxing Zhizao Technology Co Ltd
Priority to CN201510586878.2A priority Critical patent/CN105072636B/en
Publication of CN105072636A publication Critical patent/CN105072636A/en
Application granted granted Critical
Publication of CN105072636B publication Critical patent/CN105072636B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a wireless testing and data transmission system, which comprises a wireless sensor network node, a monitoring device and a wireless data transmission module, wherein the wireless sensor network node is used for detecting and acquiring user side information of an intelligent power grid, and comprises a plurality of sensor nodes and a wireless data acquisition terminal; the monitoring device is used for controlling operation and data processing of the whole system; and a wireless data acquisition terminal of the wireless sensor network node is connected with the monitoring device through the wireless data transmission module in a wireless mode. The wireless testing and data transmission system can achieve the wireless testing and transmission of electricity utilization information of users of the intelligent power grid, can ensure the detection continuity and accuracy of electricity utilization of the users, and can ensure the confidentiality and security of transmission of the electricity utilization information greatly.

Description

A kind of wireless test and data transmission system
Technical field
The present invention relates to data test and collection field, is specifically related to a kind of wireless test and data transmission system of smart power grid user end.
Background technology
Intelligent grid, is also called knowledge type electrical network or modern power network, is by modern advanced sensing and the integrated and novel power grid that formed of measuring technique, ICT (information and communication technology), control technology and original power transmission and distribution infrastructure height.The opening of intelligent distribution network makes a large amount of collecting terminal and mobile terminal extensive use and access, and this is just to the integrality of transfer of data in intelligent distribution network, and confidentiality, the problem such as attack tolerant and secret protection proposes new challenge.Intelligent electric energy meter is the intelligent terminal of intelligent grid, it has not been traditional electric energy meter, intelligent electric energy meter is except possessing the function of measuring of traditional electric energy meter basic electricity amount, in order to adapt to intelligent grid and new forms of energy use it also there is the intelligentized function such as bidirectional data communication function, anti-stealing electricity function of two-way multiple rate function of measuring, user side controlling functions, plurality of data transmission modes, intelligent electric energy meter represents the developing direction of following energy-conserving intelligent electrical network end user intelligent terminal.
In recent years, along with transducer, computer, radio communication and the technology such as micro electronmechanical development and mutually merge, create wireless sensor network (WSN).Wireless sensor network, by the information of all kinds of integrated the microsensor various environment of Real-Time Monitoring, perception and collection or monitored object collaboratively, is widely used in the every field such as environmental monitoring, health care, military defense, the anti-terrorism disaster relief.Wireless sensor network is considered to one of 21 century most important technology, is the focus of current built-in field research, has the boundless market space and researching value.Wireless sensor network also becomes topmost user side data acquisition system in intelligent distribution network gradually.
At present, both at home and abroad to the integrality of wireless sensor network data transmission, confidentiality, the problems such as attack tolerant have carried out certain research, propose various different Broadcast authentication protocols.One is μ TESLA Broadcast authentication protocols, and this agreement, when distributing the initiation parameter of broadcast authentication, is the shared key utilized between base station and node, has been come by the mode of clean culture.By delayed delivery authenticate key and the integrality judging delay duration to determine sent packet.Program fail safe is better, but message authentication has time delay, and this time delay can cause the generation of dos attack.Researcher had carried out a series of improvement to μ TESLA afterwards, propose multistage μ TESLA scheme, many base stations μ TESLA scheme, for certification drift μ TESLA prioritization scheme and Effect-based operation drive μ TESLA certificate scheme etc.These prioritization schemes are all the improvement carried out on basic μ TESLA basis, and its essential idea does not change, and therefore time delay is Problems existing always, and they still can not resist dos attack.Other researchers propose a kind of certificate scheme of once signed in intelligent grid, but the program wants to reach good fail safe will consume very large signature and certification expense.Researcher proposed again the Broadcast authentication protocols based on Merkle tree afterwards, and this agreement adopts the method for direct certification, did not postpone, efficiently solved the problem of dos attack, achieve the certification together of multiple node, the function of mutual certification simultaneously.But the problem that node storage overhead and communication-cost are all excessive will be caused when number of nodes is excessive.Therefore researcher proposes again the broadcast strategy that a kind of classification Merkle sets on the basis that basic Merkle sets, and the method designs for great deal of nodes, substantially reduces storage and the communication overhead of node.Recent study persons propose scheme Merkle authentication tree agreement being applied to intelligent grid, this agreement are applied to the fail safe improving communication in the secure communication of user and community portal.But do not carry out effective secret protection to user data, the information that assailant intercepts user's transmission also can separate the useful data of reading.The leakage of the privacies such as the power information of user and electricity consumption rule occurs causing the event of the harm people's lives safety such as burglary.
Summary of the invention
The invention provides a kind of wireless test and data transmission system, this system can realize radio detection to the power information of smart power grid user and transmission, detection continuity and the accuracy of user power utilization data can be ensured, and the confidentiality that power information is transmitted and fail safe can greatly be ensured.
To achieve these goals, the invention provides a kind of wireless test and data transmission system, this system comprises:
Wireless sensor network node, for detecting and gathering smart power grid user client information;
Supervising device, for controlling operation and the data processing of whole system;
Wireless data transfer module, the user data for wireless sensor network node collection radios to supervising device;
Described wireless sensor network node comprises multiple sensor node and wireless data acquisition terminal;
Wherein, the wireless data acquisition terminal of described wireless sensor network node and supervising device are by wireless data transfer module wireless connections.
Preferably, described wireless data acquisition terminal is provided with FWSM, an encrypting module is respectively provided with in wireless data acquisition terminal and Wireless data transmission module, also be provided with an authentication module in Wireless data transmission module, between data transmitting module and FWSM, be provided with separate binary channels link block.
Preferably, described wireless data acquisition terminal comprises: comprise MCU, analog input unit, On-off signal unit, relay output unit, digital output unit, sram cell, RTC unit, watchdog unit, RS232/RS485/RS422 unit, radio-cell and power subsystem;
Wherein analog input unit, On-off signal unit are connected with MCU, MCU and relay output unit, digital output modular unit, simultaneously MCU also with sram cell, RTC unit, watchdog unit, RS232/RS485/RS422 unit, radio-cell and LED light unit; RS232/RS485/RS422 unit is connected with user interface circuit, and radio-cell connects ZigBee transmit antenna and adapter circuit.
Preferably, described wireless data transfer module comprises ZigBee reception antenna, adapter circuit and data/address bus, for receiving data collection station wireless signal, and gives described data processing module via data bus transmission.
Preferably, described sensor node can comprise: draw together one or both and the above combination in air temperature sensor, air humidity sensor, voltage sensor, current sensor, meritorious transducer, idle transducer.
Preferably, described supervising device comprises: data monitoring and processing module, control centre, client control module and display terminal.
Preferably, described control centre is low-power scm, preferably adopts MSP430F149 single-chip microcomputer, certainly can also adopt other single-chip microcomputer, such as ARM single-chip microcomputer or AVR single chip.
Preferably, described data monitoring and processing module and wireless data transfer module can build secured communication channel jointly, and be bi-directionally connected wireless data acquisition terminal and control centre, control centre processes the described data entering supervising device and controls.
Preferably, control centre completes the safety verification to wireless data acquisition terminal by secured communication channel, if acquisition terminal is dangerous, then stop this acquisition terminal to enter supervising device to carry out data storage and exchange, if acquisition terminal safety, then allow this wireless data acquisition terminal to carry out data and store and exchange.
Preferably, control centre to the storage of data all in system and exchange process, can be encrypted.
Preferably, described client control module, by the control command of control centre, can send to wireless data acquisition terminal by the form of wireless transmission, to control the data acquisition of wireless data acquisition terminal.
The present invention has the following advantages and beneficial effect: (1) wireless sensor network node can realize in real time to the collection of the ambient temperature of smart power grid user, humidity, voltage, electric current, the information such as meritorious and idle; (2) use wireless mode to carry out networking, greatly reduce the stock number of occupying in data transmission procedure, reduce implementation cost, and be convenient to install, safeguard, carry out the power information of the multiple smart power grid user of unified monitoring in control room, improve monitoring efficiency, save human cost; (3) data collection station improved and data processing module can ensure monitoring continuity and the accuracy of climatic data, accurate guiding agricultural production; (4) by setting up secured communication channel, intrasystem data being stored and exchange process, is all encrypted, the safety and reliability of system communication can be ensured, avoid user power utilization information leakage.
Accompanying drawing explanation
Fig. 1 shows the block diagram of a kind of wireless test of the present invention and data transmission system.
Fig. 2 shows the method for supervising of a kind of wireless test of the present invention and data transmission system.
Embodiment
Fig. 1 shows a kind of wireless test of the present invention and data transmission system.This system comprises: wireless sensor network node 1, for detecting and gathering smart power grid user client information; Supervising device 3, for controlling operation and the data processing of whole system; Wireless data transfer module 2, the user data for wireless sensor network node collection radios to supervising device; Described wireless sensor network node 1 comprises multiple sensor node 11 and wireless data acquisition terminal 12; Wherein, the wireless data acquisition terminal 12 of described wireless sensor network node 1 crosses wireless data transfer module 2 wireless connections with supervising device logical 3.
Described supervising device 3 comprises: data monitoring and processing module 31, control centre 32, client control module 33 and display terminal 34.Preferably, described control centre 32 is low-power scm, preferably adopts MSP430F149 single-chip microcomputer, certainly can also adopt other single-chip microcomputer, such as ARM single-chip microcomputer or AVR single chip.
Described data monitoring and processing module 31 and wireless data transfer module 2 can build secured communication channel jointly, and be bi-directionally connected wireless data acquisition terminal 12 and control centre 32, control centre 32 processes the described data entering supervising device 3 and controls.
Control centre 32 completes the safety verification to wireless data acquisition terminal by secured communication channel, if acquisition terminal is dangerous, then stop this acquisition terminal 12 to enter supervising device 3 to carry out data storage and exchange, if acquisition terminal 12 safety, then allow this wireless data acquisition terminal 12 to carry out data and store and exchange.
Control centre 32 to the storage of data all in system and exchange process, can be encrypted.
Described client control module 34, by the control command of control centre 32, can send to wireless data acquisition terminal 12 by the form of wireless transmission, to control the data acquisition of wireless data acquisition terminal 12.
Control centre 32 is provided with monitoring software and is configured with backstage real-time data base, and described monitoring software has monitoring function and data can be stored as software format.Middle control module installs the monitoring software of customized development, realizes the continuous acquisition to monitor data, checks and preserve.This software has multiple monitoring function, as monitoring, real-time curve display, history curve display, warning etc. in real time.Software merit rating backstage real-time data base, can store gathered data according to the actual requirements, as timing stores, changes storage etc.; Data are stored as the popular software forms such as Excel by software support simultaneously, are convenient to the follow-up use to data.
Described wireless data acquisition terminal 12 is provided with FWSM, an encrypting module is respectively provided with in wireless data acquisition terminal 12 and Wireless data transmission module 2, also be provided with an authentication module in Wireless data transmission module, between data transmitting module and FWSM, be provided with separate binary channels link block.
Described wireless data acquisition terminal 12 comprises: comprise MCU, analog input unit, On-off signal unit, relay output unit, digital output unit, sram cell, RTC unit, watchdog unit, RS232/RS485/RS422 unit, radio-cell and power subsystem; Wherein analog input unit, On-off signal unit are connected with MCU, MCU and relay output unit, digital output modular unit, simultaneously MCU also with sram cell, RTC unit, watchdog unit, RS232/RS485/RS422 unit, radio-cell and LED light unit; RS232/RS485/RS422 unit is connected with user interface circuit, and radio-cell connects ZigBee transmit antenna and adapter circuit.
Described wireless data transfer module 2 comprises ZigBee reception antenna, adapter circuit and data/address bus, for receiving data collection station wireless signal, and gives described data processing module via data bus transmission.
Described sensor node 11 can comprise: draw together one or both and the above combination in air temperature sensor, air humidity sensor, voltage sensor, current sensor, meritorious transducer, idle transducer.
Described wireless data acquisition terminal 12 adopts High performance industrial level wireless module, High performance industrial level 32 bit walk processor, supports multistage dormancy and awakening mode, reduces power consumption to greatest extent, built-in real-time clock (RTC), supports timed power on/off.Preferred employing metal shell, protection class IP30, metal shell and system safety isolation, be particularly suitable for the application at industry control scene.Described wireless data acquisition terminal adopts the design of WDT house dog, ensures system stability, adopts the complete anti-mechanism that goes offline, and ensures that data terminal is always online, the built-in 15KVESD protection of S232/RS485 interface, antennal interface lightning protection.
Fig. 2 shows the method for supervising of a kind of wireless test of the present invention and data transmission system.The method specifically comprises the steps:
S1. build the communication system that comprises control centre, wireless data acquisition terminal and wireless data transfer module, wireless data acquisition terminal can transmit and receive data to described wireless data transfer module;
S2. set up secured communication channel, be bi-directionally connected wireless data acquisition terminal and control centre, control centre processes the described data entering the wireless data acquisition terminal of system and controls;
S3. control centre completes the safety verification of wireless data acquisition terminal by secured communication channel, if acquisition terminal is dangerous, then stop this wireless data acquisition terminal system of entering to carry out data encryption to store and exchange, if acquisition terminal safety, then allow this acquisition terminal to carry out data encryption and store and exchange.
In S2, adopt following steps to complete the foundation of secured communication channel:
S21. when wireless data acquisition terminal sends connection application to control centre, whether first wireless data acquisition terminal inquire about the session connection information of buffer memory and control centre, use the digest algorithm of buffer memory in session connection information to carry out digest calculations to session key, by session number with the summary result session id that writes connection application bag and session cipher key digest field; Inquire about whether buffer control center certificate again, then by control centre's certificate serial number field of the certificate serial number of control centre write connection application bag, then by the sequence number of wireless data acquisition terminal certificate write wireless data acquisition terminal certificate serial number field; Fill in asymmetric encryption and Digital Signature Algorithm Assembly Listing, and send connection application to control centre;
S22. after control centre receives the connection application packet of wireless data acquisition terminal transmission, corresponding session connection information whether is cached with according to session number inquiry, be use the digest algorithm of buffer memory in session connection information to carry out digest calculations to session key, the summary data of session key result of calculation and wireless data acquisition terminal sent is compared; If comparing result is consistent, then using session key and symmetry algorithm as the key of data protection in secured communication channel and algorithm, and enter next step;
S23. control centre sends to terminal and consults the finish command, and after terminal receives negotiation the finish command of control centre's transmission, escape way is set up and terminated.
In S22, if comparing result is inconsistent, then perform following steps flow chart:
S221. control centre reads the sequence number of control centre's certificate that wireless data acquisition terminal sends, if consistent with the certificate serial number that local terminal uses, then do not send the certificate of control centre to wireless data acquisition terminal, and performs next step flow process;
S222. whether control centre reads the sequence number of the wireless data acquisition terminal certificate that wireless data acquisition terminal sends, according to this sequence number inquiry buffer memory wireless data acquisition terminal certificate; Do not need wireless data acquisition terminal to send the certificate of wireless data acquisition terminal to control centre, and perform following workflow:
S2221. control centre reads the algorithm combination list that wireless data acquisition terminal sends, and selects the highest algorithm combination of a group encryption intensity as the cryptographic algorithm combination used in following flow process, is sent to wireless data acquisition terminal, and performs next step flow process;
S2222. control centre generates one group of interim unsymmetrical key pair, the asymmetric arithmetic in the private key of control centre and the algorithm combination selected in described step S2221 is used to carry out digital signature to temporary public key, result of signing and temporary public key group bag, send cipher key interaction packet to terminal;
S2223. connection application end data packet is sent to wireless data acquisition terminal;
S2224. wireless data acquisition terminal receives the connection application response data packet that control centre sends, the combination of cache key negotiation algorithm and session number; If wireless data acquisition terminal receives control centre's certificate data bag that control centre sends, legitimate verification is carried out to control centre's certificate, is proved to be successful, then use sequence number in certificate as mark, the digital certificate at buffer control center; Authentication failed, then exit this flow process, disconnects; If wireless data acquisition terminal receives the request for data bag of the application wireless data acquisition terminal certificate that control centre sends, then the certificate group of local terminal is bundled into certificate data bag, sends to control centre; Wireless data acquisition terminal receives the key agreement packet that control centre sends, asymmetric arithmetic in then using the cipher key agreement algorithm of the PKI in control centre's certificate of buffer memory and described buffer memory to combine, the temporary public key signing messages of control centre is verified, if unsuccessful, exit flow process, and break link; If success, performs next step;
S2225. wireless data acquisition terminal stochastic generation session key, as the key of data protection in escape way, the symmetry algorithm in use algorithm combination is as protection algorism; Use session number as mark, session key, symmetry algorithm and digest algorithm are carried out buffer memory; Use asymmetric arithmetic to be encrypted session key, and use asymmetric arithmetic to carry out numeral label to the session key after encryption; By the session key after encryption and digital signature group bag, send key agreement packet to control centre;
S2226. send to control centre and consult the finish command;
If S2227. control centre receives wireless data acquisition terminal certificate data bag, legitimate verification is carried out to wireless data acquisition terminal certificate, if be proved to be successful, use sequence number in certificate as mark, the digital certificate at buffer control center; If authentication failed, then exit this flow process, disconnect;
S2228. after control centre receives the key agreement packet of wireless data acquisition terminal transmission, the asymmetric arithmetic in the PKI in wireless data acquisition terminal certificate and the algorithm combination selected in step S22 is used to carry out signature verification to signed data, if unsuccessful, exit flow process, and break link; If success, use local terminal private key and asymmetric arithmetic decrypted session key, and use the session number produced in step S22 as mark, session key, symmetry algorithm and digest algorithm are carried out buffer memory; And using session key and symmetry algorithm name as the key of data protection in secured communication channel and algorithm; Perform step S23.
Preferably, in described step S221, if there is no buffer memory wireless data acquisition terminal certificate, then between described step S2221 and described step S2222, increase following flow process: control centre sends control centre's certificate to wireless data acquisition terminal; Control centre sends the request of acquisition wireless data acquisition terminal certificate to wireless data acquisition terminal.
Preferably, in step s3, described control centre to through safety certification and the detailed process of carrying out data encryption storage and exchange entering the wireless data acquisition terminal of system imports source data by S31, S32 data intercept, S33 system is changed, S34 character transcoding, S35 data recombination, S36 character string substitutes and the step such as S37 shortage of data storage has formed, and except step S31 and step S32, other procedural order can change.
Preferably, in step S32, in the function intercepting character, need three elements, i.e. character to be intercepted, the figure place intercepted and the original position of intercepting, source data is character to be intercepted, and the length intercepted is specified, the original position value intercepted is password user inputted, machine code, or the Data Division that returns of server end become several after all add 1, the number of fractionation needs identical with the group number of the source data that plan imports.
With MID (text, start_num, num_chars) function intercepts as example by bank card password, wherein text represents character to be intercepted i.e. source data, num_chars represents the figure place of intercepting, namely start_num represents the original position of intercepting, num_chars can specify, when needing upgrading, source data figure place is only needed to change, and reassign num_chars value, such as num_chars value is designated as 20 by 10, the character then intercepted becomes 20 by 10, Here it is expands algorithm, and 6 numerals that bank card can be inputted password by start_num value break, the value split adds 1, character is intercepted as start_num value, method for splitting is many, example MID (password, 1, 1), MID (password, 2, 1), MID (password, 3, 1), MID (password, 4, 1), MID (password, 5, 1), MID (password, 6, 1), 6 independent characters are become by 6 password values, such as, in 6 groups of source data, first group is designated as text1, utilize MID (text1, MID (password, 1, 1)+1, 20), the position that just can add 1 with first bit digital of password password starts to intercept text1, intercept 20, the object intercepting character is mingled in complex data by simple data, such as, in the design process of bank card password, by this step, password is mingled in source data, after introducing 6 groups of source datas, text value is exactly source data, and start_num value is exactly MID (password, A, 1)+1 value, A is the position of code characters, like this, just can obtain 6 groups of new datas, they be intercepted from the 1st to the units in the 10th the data of num_chars value length, such as, data after password splits are 6, just represent intercepting from the 7th, num_chars value is 20, just represent that the figure place intercepted is 20, in a simple password 000000 and complicated password 658973, the meaning of the two represents that the former intercepts from the 1st of 6 source datas respectively, and the latter represents the 7th from 6 source datas, 6th, 9th, 10th, 8th, 4th starts to intercept, have nothing to do with the complexity of password, as long as hardware is not supplied to others by Password Input personnel, and allow others see Password Input action simultaneously, when only cracking from the password of storage, the difficulty that cracks of the two is as broad as long, in this one-step process, there are 10 subdatas in each source data, namely password combination number adds 1,000,000 times.
Preferably, in the conversion of step S33 system, if necessary, any one data transaction can be become the data of another kind of system, convert in the process of high binary data at low binary data, because high binary data needs more basic element to represent, here basic element is exactly 0 to 9 these 10 numerals of similar 10 systems, fairly simple data can be become complicated data, shorten data length simultaneously, for example pure digi-tal data become the data of numeral and letter mixing, sometimes, need complex data become simple data or convert non-numeric data to numerical data.
For example machine code is generally numeral and alphabetical blended data, and Chinese character is non-numeric data, in GB2312 standard, directly can quote the region-position code of Chinese character, convert thereof into numerical data, or GB2312 normative text is understood as the numeral (7445 comprise non-chinese symbol) of 7445 systems, accordingly Chinese document be encrypted or be applied to digital certificate, Chinese text is understood as 7445 systems, convert 10 systems to, its data are surprisingly huge, for 5 figure places, convert 10 systems to, figure place reaches 20, peak is 2.2873E+19, convert 62 binary data again to, namely convert numeral and alphabetical blended data to, encryption does not use negative data, therefore, carry is the same with 10 binary data, also be the first power of system number, quadratic power, cube etc. increase progressively successively, when data bits after conversion does not reach the figure place of programming needs, seniority top digit is supplied with 0, such as, 10 binary data after changing are 123, and the figure place needed is 5, in a high position, just add 0 is 00123 supply 5, most people contact English alphabet and numeral is many, example is 62 systems and the conversion of 10 systems, 0 to 9 are represented with Arabic numerals 0 to 9, small letter a to the z of letter represents 10 to 35, capitalization A to the Z of letter represents 36 to 61, other specified scheme can also be had, this bit code of the numeral that aft section is told about or letter, transcoding algorithm also follows same rule, such as converting 62 binary data A6bJ9 to 10 binary data is 36*62 4+ 6*62 3+ 11*62 2+ 45*6 2+ 9=533423147 is 9 figure places.
Preferably, character transcoding in step S34 utilizes character transcoding algorithm to realize, be exactly character transcoding by the method that a character or one group of character obtain another character or one group of character by transcoding algorithm, no matter be single character or one group of character, transcoding is all transcoding one by one, and just the latter changes several character simultaneously, and the transcoding meaning of single character is little, so be that character group carries out transcoding, character group transcoding needs transcoding algorithm instruction set and transcoding table jointly to realize.
Example is design four kinds of numerals and alphabetical transcoding algorithm, called after ABCD algorithm, and transcoding algorithm follows following rule:
1: after the algorithm conversion that different source codes is identical, result can not be identical;
2: the transformation result of several algorithms of same source code mutually can not be identical;
3: the result of transcoding can not be identical with source code;
4: transcoding will arrange several transcoding algorithm, to strengthen the combinatorial complexity of password,
Example is that condition carries out changing based on this bit code of numeral and letter, and this bit code of numeral 0 to 9 is this bit code of numeral 0 to 9, lowercase a to z is respectively digital 10 to 35 respectively; This bit code of capitalization A to Z is numeral 36 to 61 respectively.
In ABCD algorithm, wherein the 1st algorithm, the 2nd algorithm, the 3rd algorithm is the mathematical operation carried out based on this bit code, but the 4th algorithm is through artificial adjustment, does not have what algorithm rule,
1st algorithm: the 2nd odd number after this digital or alphabetical bit code adds this this bit code is exactly this numeral or alphabetical transcoding algorithm, result >=62, just subtracts 62, records numeral corresponding to its this bit code or letter;
2nd algorithm: after this digital or alphabetical bit code adds this this bit code, the 13rd odd number is exactly this numeral or alphabetical B transcoding algorithm, result >=62, just subtracts 62, records numeral corresponding to its this bit code or letter;
3rd algorithm: it is exactly this numeral or alphabetical transcoding algorithm that this digital or alphabetical bit code adds 30, result >=62, just subtracts 62, records numeral corresponding to its this bit code or letter;
4th algorithm: the 3rd even number after this bit code that the 4th algorithm part follows numeral or letter adds this this bit code is exactly this numeral or alphabetical transcoding algorithm, result >=62, just subtract 62, in order to prevent the conflict of data homogeny, do portion adjustment, record numeral corresponding to its this bit code or letter, can know from its design principle, each numeral before and after transcoding can not be identical with letter, this is a designing points the most basic, when calling, 1st algorithm, 2nd algorithm, 3rd algorithm can directly call by usage data table, also mathematical operation can be used to convert, but, 4th algorithm have passed through artificial adjustment, usage data table is needed to call, also other transcoding algorithm can be designed, the transcoding algorithm of example make use of the ABCD sequence that similar field carries out algorithm.
Transcoding algorithm instruction set: treat that each character of transcoding is as source code, need instruction transcoding direction could obtain correct result, the data of instruction set and treat that the data of transcoding exist corresponding relation, namely corresponding one an of instruction character treats transcoding character, another one character is converted to through instruction rule, such as, instruction set data are BACC, treat that transcoded data is 1234, exactly 1234 four data are performed B algorithm respectively, A algorithm, C algorithm, C algorithm.
Preferably, in step S36, alternatives string is a kind of encryption technology substituted by other character of the partial character in character, substituting can be single substituting, also can be that character string substitutes, preferably design is that character string substitutes, substituting utilizes character substitution tables to complete, and character substitution tables data are divided into record number and alternatives string, and the character that record number occurs is exactly the character needing to substitute.
Such as record number occurs 5, A, b, 6, in the data that will substitute exactly all 5, A, b, 6 characters all extract, divide into groups, character figure place after grouping needs consistent with record number figure place, when last group does not have a corresponding figure place, can abandon substituting or specifying increasing figure place, such as specify first character to be added to and meet figure place, search record number corresponding with it in character substitution tables, determine alternatives string, because the several character original positions extracted are not identical, need to determine insertion position, more common method is that the several character conversion extracted are become 10 binary data, remainder function is utilized to determine, such as, remainder adds 1 for several, which just insert at the original position of character, the space of other characters is removed, obtain new data, the record number design of character substitution tables should be noted that, record number needs to enumerate the combination likely occurred, otherwise may operation mistake be there is, 3 alternative time, need 27 groups, the namely cube of 3, 4 alternative time, record number just needs 256 groups, 4 powers of 4, if 5 be exactly 55 powers, up to 3125 groups, so the number of characters substituted needs moderate, data table data is too huge and too little imappropriate, alternate data should be not oversize, otherwise likely found character substitution tables by long data, 4 alternative time, alternate data only needs 256 groups, during by English upper and lower case letter and numeral, one and two are just enough, so short data substitute, just have no idea by searching the reverse find of alternatives string to character substitution tables, do not allow to occur ciphering process or the non-existent character of enciphered data, this is also find character substitution tables in order to prevent by alternatives string, reason is very simple, if certain character only occurs in certain tables of data, just can find quickly, as long as the character that ciphering process or enciphered data exist can character as an alternative, even the former data character substituted also can occur, such as, replace 5, A, b, 6 these four characters, so, appearance 5 is still allowed in alternate data, A, b, 6, due to the character figure place that substitutes not etc., so the figure place of final password is uncertain, alternatives can adopt superposition encryption method repeatedly to encrypt, design many parts of character substitution tables, completed by multiple variable connection data and repeatedly encrypt, such as variable data 2356, 6987, 3075, 9837, 8863, 5534, by 6 groups of data respectively divided by the sum of character substitution tables, being connected to corresponding tables of data completes alternative successively, namely first being connected to corresponding tables of data by 2356 completes alternative, again using substitute after data as source data, complete alternative with the 2nd group of data cube computation to corresponding tables of data, the like, character substitution tables and homogeneous data table have a bit to be distinguished, be exactly different table record numbering can be different, refer to that record number figure place also can be different, such as, table 1 is alternative 5, A, b, 6, table 2 is alternative c, 8, H, k, or table 1 completes 3 characters and substitutes, what table 2 completed is that 4 characters substitute, because program designs the figure place and character of being numbered by search records, determine the character substituted and figure place of dividing into groups, in programming, character transcoding, character is changed and intercepted to system to obtain the data of regular length into good, and after character substituted, data length is uncertain, this brings difficulty to the authorized strength work of the character length contingency table resetting this step ciphering process of character position, although the uncertain length value value of character length contingency table is more random, but can not negative value be there is, namely other determine that the sum of length value can not be greater than the figure place of data, for this reason, character substitutes this step to be needed after other steps, before shortage of data is preserved, otherwise be designed with difficulty.
Preferably, disappearance algorithm in step S37, when introducing source data by link variable, link variable often has several groups, link variable is divided into several groups, and the corresponding source data introduced also has several groups, and link variable group number very little, password easily cracks, if link variable fails record completely, so, according to the codomain of these data, namely these data value that may occur, encrypt successively, also can obtain the value consistent with encrypted result, and calculate the value of the number of times that may need and disappearance number relevant, when missing values is more, the calculation times that may need is more.
Such as, lack one group of data ABCD, the span of ABCD is all 0 to 9, so, from 0000 to 9999, all the time matching value can be found, if source data is 6639, then from 0000 computing to 6639, result will be obtained, in this process, 10000 computings of maximum needs, and for the result of encrypting, if data record is incomplete equally, but this infull Data Position can obtain by during computing, when encryption is compared successively, the result of in fact encrypting has been become several sections by these infull Character segmentation, the result of computing needs and this few segment data is all coincide, if the data bits after encryption is very long, so, occur that the possibility of same password is also very little, because data record is incomplete, carry out cracking almost cannot from the password of record, the missing values of disappearance algorithm can not be too complicated, otherwise slowly obtain less than result, the shortcoming of disappearance algorithm is the same with asymmetric arithmetic very consuming time, there is no need, can not adopt.
As mentioned above, although the embodiment limited according to embodiment and accompanying drawing are illustrated, various amendment and distortion can be carried out from above-mentioned record concerning the technical staff that the art has a general knowledge.Such as, carry out according to the order mutually different from method illustrated in the technology illustrated, and/or carry out combining or combining according to the form mutually different from the method illustrated by the inscape such as system, structure, device, circuit illustrated, or carry out replacing or replacing also can reaching suitable effect according to other inscapes or equipollent.For general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, make some equivalent to substitute or obvious modification, and performance or purposes identical, all should be considered as belonging to protection scope of the present invention.

Claims (11)

1. wireless test and a data transmission system, this system comprises:
Wireless sensor network node, for detecting and gathering smart power grid user client information;
Supervising device, for controlling operation and the data processing of whole system;
Wireless data transfer module, the user data for wireless sensor network node collection radios to supervising device;
Described wireless sensor network node comprises multiple sensor node and wireless data acquisition terminal;
Wherein, the wireless data acquisition terminal of described wireless sensor network node and supervising device are by wireless data transfer module wireless connections.
2. the system as claimed in claim 1, it is characterized in that, described wireless data acquisition terminal is provided with FWSM, an encrypting module is respectively provided with in wireless data acquisition terminal and Wireless data transmission module, also be provided with an authentication module in Wireless data transmission module, between data transmitting module and FWSM, be provided with separate binary channels link block.
3. system as claimed in claim 2, it is characterized in that, described wireless data acquisition terminal comprises: comprise MCU, analog input unit, On-off signal unit, relay output unit, digital output unit, sram cell, RTC unit, watchdog unit, RS232/RS485/RS422 unit, radio-cell and power subsystem;
Wherein analog input unit, On-off signal unit are connected with MCU, MCU and relay output unit, digital output modular unit, simultaneously MCU also with sram cell, RTC unit, watchdog unit, RS232/RS485/RS422 unit, radio-cell and LED light unit; RS232/RS485/RS422 unit is connected with user interface circuit, and radio-cell connects ZigBee transmit antenna and adapter circuit.
4. system as claimed in claim 3, it is characterized in that, described wireless data transfer module comprises ZigBee reception antenna, adapter circuit and data/address bus, for receiving data collection station wireless signal, and gives described data processing module via data bus transmission.
5. system as claimed in claim 4, it is characterized in that, described sensor node can comprise: draw together one or both and the above combination in air temperature sensor, air humidity sensor, voltage sensor, current sensor, meritorious transducer, idle transducer.
6. system as claimed in claim 5, it is characterized in that, described supervising device comprises: data monitoring and processing module, control centre, client control module and display terminal.
7. system as claimed in claim 6, it is characterized in that, described control centre is low-power scm, preferably adopts MSP430F149 single-chip microcomputer, certainly can also adopt other single-chip microcomputer, such as ARM single-chip microcomputer or AVR single chip.
8. system as claimed in claim 7, it is characterized in that, described data monitoring and processing module and wireless data transfer module can build secured communication channel jointly, be bi-directionally connected wireless data acquisition terminal and control centre, control centre processes the described data entering supervising device and controls.
9. system as claimed in claim 8, it is characterized in that, control centre completes the safety verification to wireless data acquisition terminal by secured communication channel, if acquisition terminal is dangerous, then stop this acquisition terminal to enter supervising device to carry out data storage and exchange, if acquisition terminal safety, then allow this wireless data acquisition terminal to carry out data and store and exchange.
10. system as claimed in claim 9, it is characterized in that, control centre to the storage of data all in system and exchange process, can be encrypted.
11. systems as claimed in claim 10, is characterized in that, described client control module, by the control command of control centre, can send to wireless data acquisition terminal by the form of wireless transmission, to control the data acquisition of wireless data acquisition terminal.
CN201510586878.2A 2015-09-15 2015-09-15 A kind of wireless test and data transmission system Expired - Fee Related CN105072636B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510586878.2A CN105072636B (en) 2015-09-15 2015-09-15 A kind of wireless test and data transmission system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510586878.2A CN105072636B (en) 2015-09-15 2015-09-15 A kind of wireless test and data transmission system

Publications (2)

Publication Number Publication Date
CN105072636A true CN105072636A (en) 2015-11-18
CN105072636B CN105072636B (en) 2019-02-26

Family

ID=54501885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510586878.2A Expired - Fee Related CN105072636B (en) 2015-09-15 2015-09-15 A kind of wireless test and data transmission system

Country Status (1)

Country Link
CN (1) CN105072636B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357003A (en) * 2015-11-19 2016-02-24 广东小天才科技有限公司 Data encryption method and apparatus
CN105430025A (en) * 2016-01-19 2016-03-23 成都银事达信息技术有限公司 Remote intelligent internet teaching system
CN105491162A (en) * 2016-01-19 2016-04-13 成都银事达信息技术有限公司 Remote internet teaching system operation method
CN105959258A (en) * 2016-04-19 2016-09-21 梅照付 Wireless transmitting device of power grid
CN105704128B (en) * 2016-01-19 2018-09-11 成都银事达信息技术有限公司 A kind of data transmission method of internet teaching system
CN109982309A (en) * 2019-03-19 2019-07-05 湘潭大学 Building microgrid electricity consumption data secure transmission technique based on RFID certification and Hybrid Encryption
CN110940880A (en) * 2019-12-09 2020-03-31 湖南文理学院 Intelligent power transformer monitoring system based on wireless data transmission
CN113295733A (en) * 2021-04-25 2021-08-24 龙广秋 Sewage detection system based on internet of things

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072096A (en) * 2007-05-31 2007-11-14 北京威讯紫晶科技有限公司 Data safety transmission method for wireless sensor network
CN101425219A (en) * 2007-10-29 2009-05-06 吉林市曼博科技有限公司 Intelligent telemetering electric meter based on wireless sensor network
CN101620771A (en) * 2009-07-29 2010-01-06 山东建筑大学 Remote wireless environment real-time data acquisition method and device
CN101814226A (en) * 2010-02-23 2010-08-25 南华大学 Ammeter wireless monitoring interface devices and wireless monitoring system
WO2010111878A1 (en) * 2009-04-03 2010-10-07 西安西电捷通无线网络通信有限公司 Method for broadcasting authentication in node-resource-limited wireless network
CN103152427A (en) * 2013-03-20 2013-06-12 杭州乾程弘泰电力科技有限公司 Remote wireless meter-reading control method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072096A (en) * 2007-05-31 2007-11-14 北京威讯紫晶科技有限公司 Data safety transmission method for wireless sensor network
CN101425219A (en) * 2007-10-29 2009-05-06 吉林市曼博科技有限公司 Intelligent telemetering electric meter based on wireless sensor network
WO2010111878A1 (en) * 2009-04-03 2010-10-07 西安西电捷通无线网络通信有限公司 Method for broadcasting authentication in node-resource-limited wireless network
CN101620771A (en) * 2009-07-29 2010-01-06 山东建筑大学 Remote wireless environment real-time data acquisition method and device
CN101814226A (en) * 2010-02-23 2010-08-25 南华大学 Ammeter wireless monitoring interface devices and wireless monitoring system
CN103152427A (en) * 2013-03-20 2013-06-12 杭州乾程弘泰电力科技有限公司 Remote wireless meter-reading control method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357003A (en) * 2015-11-19 2016-02-24 广东小天才科技有限公司 Data encryption method and apparatus
CN105357003B (en) * 2015-11-19 2018-10-16 广东小天才科技有限公司 A kind of method and device of encryption data
CN105430025A (en) * 2016-01-19 2016-03-23 成都银事达信息技术有限公司 Remote intelligent internet teaching system
CN105491162A (en) * 2016-01-19 2016-04-13 成都银事达信息技术有限公司 Remote internet teaching system operation method
CN105704128B (en) * 2016-01-19 2018-09-11 成都银事达信息技术有限公司 A kind of data transmission method of internet teaching system
CN105430025B (en) * 2016-01-19 2019-02-26 成都银事达信息技术有限公司 A kind of long-distance intelligent internet teaching system
CN105491162B (en) * 2016-01-19 2019-12-03 成都银事达信息技术有限公司 A kind of remote internet tutoring system operation method
CN105959258A (en) * 2016-04-19 2016-09-21 梅照付 Wireless transmitting device of power grid
CN109982309A (en) * 2019-03-19 2019-07-05 湘潭大学 Building microgrid electricity consumption data secure transmission technique based on RFID certification and Hybrid Encryption
CN110940880A (en) * 2019-12-09 2020-03-31 湖南文理学院 Intelligent power transformer monitoring system based on wireless data transmission
CN113295733A (en) * 2021-04-25 2021-08-24 龙广秋 Sewage detection system based on internet of things

Also Published As

Publication number Publication date
CN105072636B (en) 2019-02-26

Similar Documents

Publication Publication Date Title
CN105305615B (en) A kind of monitoring method of wireless test and data transmission system
CN105072636A (en) Wireless testing and data transmission system
CN106205090A (en) A kind of electric power network real-time monitoring system and control method thereof
CN105281432B (en) A kind of supervising device of wireless test and data transmission system
CN110266793B (en) Power distribution network ubiquitous distributed energy edge computing and trading platform
WO2016058259A1 (en) Encryption transmission and verification method for power communication network field operation and maintenance data
CN101753312A (en) Security certification method and security certification device for power grid equipment and negative control terminal
CN105915347A (en) Control method for power electric wireless transmission device
CN113079215B (en) Block chain-based wireless security access method for power distribution Internet of things
CN209265678U (en) Power information acquiring and transmission system based on quantum cryptography
CN109525391A (en) A kind of method that server is synchronous with lockset information security
CN104580246A (en) Dynamic intelligent security key generation, management and control system and method under WiFi environment
CN106817217B (en) A kind of dynamic password Encryption Algorithm of interrupted aging
Tang et al. Information security terminal architecture of power transportation mobile internet of things based on big data analysis
CN113256470A (en) Weapon equipment management system and method based on block chain
CN103929313A (en) Method for channel allocation and bilayer authorization of intelligent electric use networks
CN105959258A (en) Wireless transmitting device of power grid
CN110430207B (en) Multi-point remote cross-network interaction collaborative authentication method for smart power grid
CN104599046A (en) Data security management method for intelligent power grid
CN112311553A (en) Equipment authentication method based on challenge response
CN115277040B (en) Medical health data storage and sharing method and system based on blockchain technology
CN105072609A (en) Internet-of-Things realization method based on intelligent terminal
CN105187454B (en) A kind of power engineering design data transmission and safety protecting method
CN101873213B (en) End-to-end authentication method and system as well as business end intelligent card
CN111065091B (en) Wireless data acquisition system and data transmission method based on lora

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190226

Termination date: 20200915