A kind of LoRaWAN Internet of Things application cut-in method
Technical field
The present invention relates to internet of things field, specifically, being related to a kind of LoRaWAN Internet of Things application cut-in method.
Background technique
LoRa is a kind of low-power consumption technology of Internet of things that Semtech company proposes, is widely used in the fields such as radio meter register.
LoRaWAN interconnects wide area network using LoRa technology building low-consumption wireless.Internet of Things needs specifically when practice
Application access LoRaWAN server.Currently without the scheme of more mature application access Internet of Things, concrete application, object are left
Networking will be empty talk of paper.
Summary of the invention
The purpose of the present invention is to provide a kind of LoRaWAN Internet of Things application cut-in methods, exist first using access side
It applies for the registration of in LoRaWAN cloud platform, creation application after the completion of registration, LoRaWAN cloud platform can generate unique application for it
id(appEUI).After creation, for application application terminal number section, terminal number section application obtains the id and code key of terminal after passing through
Terminal is written, data can be passed to LoRaWAN server by base station by terminal.Then application passes through LoRaWAN cloud platform
The API of offer can obtain terminal upload data immediately, and can carry out handling, and further, can lead to after treatment
The API of LoRaWAN cloud platform offer is crossed to user equipment downlink instruction and data.
To realize above-mentioned technical purpose and the technique effect, its technical solution specifically:
A kind of LoRaWAN Internet of Things application cut-in method, comprising the following steps:
Step 1, first application access side submit details to apply for the registration of in LoRaWAN cloud platform, by cloud platform management
It after member's examination & approval pass through, succeeds in registration, LoRaWAN cloud platform can generate user unique id and userSec for API Calls safety
Verifying, and in userSec leakage, user can log in cloud platform and be updated manually;
Step 2, succeed in registration after user create application, LoRaWAN cloud platform can generate unique for each application
appEUI;
After application creates successfully, the terminal number accessed required for submitting for the application carries out number section Shen by step 3, user
Please, LoRaWAN cloud platform administrator examination & approval can be sent to user number segment information after passing through, number section information include the unique id of terminal and
Code key;
The information such as devEUI and code key are written in step 4, user in the terminal, pass through the electric wave and base of 470M to 510M frequency range
It stands communication, base station is connected to LoRaWAN server by Ethernet, and terminal has just accessed LoRaWAN;
Step 5, user pass through the user id and userSec and appEUI when registration, pass through LoRaWAN cloud platform
API can obtain terminal data;
Step 6, user pass through the user id and userSec and appEUI when registration, pass through LoRaWAN cloud platform
API is to user equipment downlink data.
Further, after terminal uploads data by base station, server passes through a transparent transmission pipeline while saving data
Data penetration transmission is applied user to access.It can guarantee the real-time of data in this way, and to the user for having demand, receiving number
Energy summary responses achieve the purpose that real-time control than sending instructions as follows after.
The invention has the following advantages:
1, the process of Internet of Things application access LoRaWAN is completely realized.
2, it ensure that the safety of uplink and downlink data using userSec.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention
It is further elaborated.
A kind of LoRaWAN Internet of Things application cut-in method, comprising the following steps:
1 application access side (user) first is applied for the registration of in LoRaWAN cloud platform submission details, by cloud platform management
It after member's examination & approval pass through, succeeds in registration, LoRaWAN cloud platform can generate user unique id and userSec for API Calls safety
Verifying, and in userSec leakage, user can log in cloud platform and be updated manually.
2 succeed in registration after user create application, LoRaWAN cloud platform can generate unique appEUI for each application.
For 3 users after application creates successfully, the terminal number accessed required for submitting for the application carries out number section application.
LoRaWAN cloud platform administrator examination & approval can be sent to user number segment information after passing through, and number section information includes the unique id of terminal
(devEUI) and code key.
The information such as devEUI and code key are written in 4 users in the terminal, logical by 470M to the electric wave of 510M frequency range and base station
Letter, base station are connected to LoRaWAN server by Ethernet (fiber optic network, 4G network etc.).In this way, terminal just accesses
LoRaWAN。
5 users pass through the user id and userSec and appEUI when registration, can be with by the API of LoRaWAN cloud platform
Obtain terminal data.
6 users pass through the user id and userSec and appEUI when registration, can be with by the API of LoRaWAN cloud platform
To user equipment downlink data.
It is that some real time datas of user are sent to by transparent transmission pipeline after user's application access below:
{"time_s":"2017-02-17
17:41:22.362131214","devEUI":"00000000000042ce","data":"\\x31"}
{"time_s":"2017-02-17
17:41:32.387447252","devEUI":"00000000000042ce","data":"\\x31"}
{"time_s":"2017-02-17
17:41:47.402075104","devEUI":"00000000000042ce","data":"\\x31"}
The foregoing is only a preferred embodiment of the present invention, the scope of protection of the present invention is not limited to this, it is any ripe
Know those skilled in the art within the technical scope of the present disclosure, the letter for the technical solution that can be become apparent to
Altered or equivalence replacement are fallen within the protection scope of the present invention.