CN108471444A - A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi - Google Patents

A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi Download PDF

Info

Publication number
CN108471444A
CN108471444A CN201810238923.9A CN201810238923A CN108471444A CN 108471444 A CN108471444 A CN 108471444A CN 201810238923 A CN201810238923 A CN 201810238923A CN 108471444 A CN108471444 A CN 108471444A
Authority
CN
China
Prior art keywords
raspberry
data
encryption
highly effective
industrial internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810238923.9A
Other languages
Chinese (zh)
Inventor
徐余
张方舟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Bo Mcool Mdt Infotech Ltd
Original Assignee
Jiangsu Bo Mcool Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Bo Mcool Mdt Infotech Ltd filed Critical Jiangsu Bo Mcool Mdt Infotech Ltd
Priority to CN201810238923.9A priority Critical patent/CN108471444A/en
Publication of CN108471444A publication Critical patent/CN108471444A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Multimedia (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of industrial Internet of Things data exchange methods of highly effective and safe based on Raspberry Pi, belong to information technology field, the main connection for including PLC and Raspberry Pi, the connection of sensor and Raspberry Pi, the connection of camera and Raspberry Pi, the data of acquisition are collected, the collected data of encrypted transmission receive data and data deciphering.The present invention is that the connection of PLC and Raspberry Pi turn the connection of TTL chips by RS485, and the connection of camera and sensor helps stick line using common, encryption and decryption is carried out using DES algorithms in encryption process.The present invention uses equipment of the Raspberry Pi as information transfer, can store the data of large capacity;It can receive the data of PLC, sensor, video simultaneously, it is powerful;Stablized by network cable transmission, transmission between host computer and Raspberry Pi, transmission cost is low, and can work in the presence of a harsh environment;The data received are write as the form of dynamic link library, are convenient for the writing of host computer, upper computer software is made to have better flexibility.

Description

A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi
Technical field
The invention belongs to information technology field, more particularly to the industrial Internet of Things netting index of a kind of highly effective and safe based on Raspberry Pi According to exchange method.
Background technology
The data acquisition of SIEMENS PLC is mainly by the special line program of Siemens Company or on PLC at present Additional communication module, then host computer realized using the specific software of Siemens Company.Whole process can not be suitable for length Apart from operation.And some special situations, such as environment in the industry, can be usually encountered, many uncertain factors such as weather, This often causes prodigious overhead, and in addition software can only use the specific software of Siemens, be unfavorable for later stage function mould The addition of block.
The product BC-Net of Wuxi North Star company is the communication module of an ethernet data communication, and the data of PLC are passed through After this module, specific conversion is carried out by the chip in protocol module and becomes TCP/IP data, and this data is passed Give host computer.Host computer can be by programming the acquisition realized to plc data, and modification.But this method be primarily present with Lower problem:
(1)Data in transmission process not into cross encryption, data be confidential data, if attacker intercepts and captures these Data can cause prodigious harm;
(2)Product function is single, is used only to for specific one hardware, such as the only corresponding SIEMENS PLC of PPI S-200 types;
(3)Some modules are not reserved, the extension of product is unfavorable for.
Invention content
Goal of the invention:In order to overcome the above deficiency, the object of the present invention is to provide a kind of industrial datas based on Raspberry Pi Exchange method, solving data may be trapped in transmission process, the problems such as product function is single.
Technical solution:A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi, including PLC, tree Certain kind of berries group, camera, sensor and host computer, host computer receive data in real time by Ethernet, it is characterised in that:Including following Step:
(1)SIEMENS PLC S-200 is connected to by the RS485 lines for turning TTL signal in Raspberry Pi;
(2)By sensor and camera by helping stick line to be connected in Raspberry Pi;
(3)Program is write by python language in Raspberry Pi and receives different data, between Raspberry Pi and PLC S-200 It is write using PPI agreements;
(4)Raspberry Pi is connect by cable with host computer;
(5)The data received are encapsulated as TCP message, and encrypted transmission by Raspberry Pi using python language;
(6)It calls the dynamic link library write, host computer to receive the data of Raspberry Pi, the advanced row of data is decrypted, is then solved again Analysis, finally shows.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the PLC and The company of the connection of the connection of the connection of Raspberry Pi, camera and Raspberry Pi, sensor and Raspberry Pi and host computer and Raspberry Pi It connects and includes the following steps:
(1)The RS485 heads that RS485 is turned to TTL chips are connected on PLC, the ends TTL respectively with the power end of Raspberry Pi serial ports and The ends GND connect, and receive data terminal and are connected with transmission data end;
(2)One pin of camera module is connected on the GPIO mouths of Raspberry Pi, the power supply of camera is connected to the electricity of Raspberry Pi On source;
(3)The pin of each sensor is connected in Raspberry Pi, switching value is connected to GPIO port, and analog quantity first meets MCP3008 Chip connects SPI port again, and then the power supply of sensor is connected on the power supply of Raspberry Pi;
(4)The network interface of Raspberry Pi is connected with the network interface of host computer by common cable.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the step (3)Include the following steps:
(1)Configure Raspberry Pi:
(a)Raspberrypi operating systems are installed to Raspberry Pi;
(b)System file is changed, the bluetooth module given tacit consent in closing system opens corresponding serial port module;
(c)Open SPI host drivens;
(2)Download library file to be used;
(3)Using multi-threading, program is write using python language, while receiving serial data, SPI mouthfuls of data and GPIO Mouth data;
(4)Data are encrypted using DES algorithms, waiting host computer sends out order, to respond.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the step (6)Include the following steps:
(1)Write upper computer software:
(a)Write the code being connect with Raspberry Pi;
(b)It writes and is connect with PLC, read data and write the code of data;
(c)Write the code of receiving sensor and camera data;
(2)The data received are subjected to DES decryption processings;
(3)It writes code to show data, host computer sends order and obtains corresponding data.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the step (5)In further include following data encrypting step:
(1)Establish the database containing multiple encryption algorithms;
(2)Data encryption rating database is established, the safety of a plurality of different security levels is contained in data encryption registered database Strategy;
(3)Generate cryptographic keys, you can random number obtains cryptographic keys, can also be set by selection, the encryption of generation is close Contain security strategy in spoon;
(4)Security strategy is determined by cryptographic keys, further selects the Encryption Algorithm in the database of Encryption Algorithm.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the data It encrypts further comprising the steps of:
(5)Cryptographic keys produce one group of sub- secret key, and it is close that one group of sub- secret key can form encryption by fixed permutation and combination method Spoon.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the data It encrypts further comprising the steps of:
(6)Before or after being encrypted using the cryptographic keys, need to judge the cryptographic keys whether in having In the effect phase, and then judge whether the cryptographic keys use.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the step (6)In further include following data decryption step:
(1)Obtain identification code;
(2)Judge the identification code whether before the deadline;
(3)When judging the identification code before the deadline, the encryption type of the identification code is judged;
(4)Key is obtained according to the encryption type;
(5)It is decrypted using the encrypted content of identification code described in the key pair.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the data It decrypts further comprising the steps of:
(1)Public key is obtained according to the encryption type of the identification code;
(2)According to the public key match private key;
(3)The encrypted content of the identification code is decrypted using the private key.
Further, the industrial Internet of Things data exchange method of the above-mentioned highly effective and safe based on Raspberry Pi, the secret key Generation includes the following steps:
(1)It pre-sets a verification instruction and deciphering and is stored;
(2)The code-bar being made of character string is generated in advance;
(3)Any one character is extracted from the code-bar of generation, combines the verification of storage to instruct reconciliation the character extracted Password obtains key.
Above-mentioned technical proposal can be seen that the present invention and have the advantages that:It is of the present invention based on Raspberry Pi The industrial Internet of Things data exchange method of highly effective and safe, ensures the real-time transmission of information in the whole process, safe transmission, and existing Have technology compared to the advantages of be:
(1)Equipment using oneself Raspberry Pi as information transfer, it is quality-high and inexpensive, and store the data of large capacity;
(2)Information is encrypted in transmission process using Encryption Algorithm, ensure that the safety of information transmission;
(3)The information of Raspberry Pi can be received simultaneously, the information of sensor, the information of video is powerful;
(4)By TCP transmission between host computer and Raspberry Pi, transmission is stablized, and can be worked in the presence of a harsh environment, and cable at This is cheap, can be cost-effective;
(5)The data received write out library, are convenient for the writing of host computer.
Description of the drawings
Fig. 1 is the flow of the industrial Internet of Things data exchange method of the highly effective and safe of the present invention based on Raspberry Pi Figure.
Specific implementation mode
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
In the description of the present invention, it is to be understood that, term "center", " longitudinal direction ", " transverse direction ", " length ", " width ", " thickness ", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom" "inner", " clockwise ", " inverse The orientation or positional relationship of the instructions such as hour hands " is to be based on the orientation or positional relationship shown in the drawings, and is merely for convenience of description originally Invention and simplified description, do not indicate or imply the indicated device or element must have a particular orientation, with specific side Position construction and operation, therefore be not considered as limiting the invention.
In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include one or more this feature.In the description of the present invention, unless otherwise indicated, the meaning of " plurality " is two It is a or more than two, unless otherwise restricted clearly.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc. Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can be machine Tool connects, and can also be electrical connection;It can be directly connected, can also can be indirectly connected through an intermediary two members Connection inside part.For the ordinary skill in the art, above-mentioned term can be understood in this hair as the case may be Concrete meaning in bright.
In the present invention unless specifically defined or limited otherwise, fisrt feature the "upper" of second feature or "lower" It may include that the first and second features are in direct contact, can also not be to be in direct contact but pass through it including the first and second features Between other characterisation contact.Moreover, fisrt feature second feature " on ", " top " and " above " include first special Sign is right over second feature and oblique upper, or is merely representative of fisrt feature level height and is higher than second feature.Fisrt feature exists Second feature " under ", " lower section " and " following " include fisrt feature immediately below second feature and obliquely downward, or be merely representative of Fisrt feature level height is less than second feature.
Embodiment
The industrial Internet of Things data exchange method of highly effective and safe based on Raspberry Pi as shown in Figure 1, including PLC, raspberry Group, camera, sensor and host computer, host computer receive data in real time by Ethernet, it is characterised in that:Including following step Suddenly:
(1)SIEMENS PLC S-200 is connected to by the RS485 lines for turning TTL signal in Raspberry Pi;
(2)By sensor and camera by helping stick line to be connected in Raspberry Pi;
(3)Program is write by python language in Raspberry Pi and receives different data, between Raspberry Pi and PLC S-200 It is write using PPI agreements;
(4)Raspberry Pi is connect by cable with host computer;
(5)The data received are encapsulated as TCP message, and encrypted transmission by Raspberry Pi using python language;
(6)It calls the dynamic link library write, host computer to receive the data of Raspberry Pi, the advanced row of data is decrypted, is then solved again Analysis, finally shows.
Technical solution of the invention is:The method that industrial data based on Raspberry Pi exchanges includes mainly PLC and tree The connection of certain kind of berries group, the connection of camera and Raspberry Pi, the connection of sensor and Raspberry Pi, the Data Encryption Transmission in Raspberry Pi are given Host computer, host computer receive data in real time by Ethernet.
The method of the present invention, the main connection for including PLC and Raspberry Pi, the connection of sensor and Raspberry Pi, camera and tree The connection of certain kind of berries group, collects the data of acquisition, and the collected data of encrypted transmission receive data and data deciphering.PLC in the present invention Connection with Raspberry Pi fills the connection of TTL chips by RS485, and the connection of camera and sensor helps stick line to connect using common , encryption and decryption is carried out using DES algorithms in communication process, is connected by cable between Raspberry Pi and common host computer, Data by Transmission Control Protocol be transmitted the present invention realization steps are as follows:
1, RS485 heads that RS485 is turned to TTL chips are connected on PLC, that end TTL power end with Raspberry Pi serial ports respectively, The ends GND receive data terminal and are connected with transmission data end.
2, the pin of each sensor is connected in Raspberry Pi, switching value is connected to GPIO port, and analog quantity first connects MCP3008 chips connect SPI port again, and then the power supply of sensor is connected on the power supply of Raspberry Pi.Notice that power supply has 3v and 5v, Different sensors is different.
3, a pin of camera module is connected on the GPIO mouths of Raspberry Pi, the power supply of camera is connected to Raspberry Pi On power supply.
4, the step of data acquire is as follows;
(1)Configure Raspberry Pi;
(a)Raspberrypi operating systems are installed to Raspberry Pi;
(b)System file is changed, the bluetooth module given tacit consent in closing system opens corresponding serial port module;
(c)Open SPI host drivens;
(2)Download library file to be used;
(3)Using multi-threading, program is write using python language, while receiving serial data, SPI mouthfuls of data and GPIO Mouth data;
(4)Data are encrypted using DES algorithms, waiting host computer sends out order, to respond;
5, the network interface of Raspberry Pi is connected with the network interface of host computer by common cable.
6, it is as follows to receive the step of data for host computer:
(1)Write upper computer software;
(a)Write the code being connect with Raspberry Pi;
(b)It writes and is connect with PLC, read data and write the code of data;
(c)Write the code of receiving sensor and camera data;
(2)The data received are subjected to DES decryption processings;
(3)Code is write to show data.
7, host computer sends order and obtains corresponding data.
Wherein, step(5)In further include following data encrypting step:
(1)Establish the database containing multiple encryption algorithms;
(2)Data encryption rating database is established, the safety of a plurality of different security levels is contained in data encryption registered database Strategy;
(3)Generate cryptographic keys, you can random number obtains cryptographic keys, can also be set by selection, the encryption of generation is close Contain security strategy in spoon;
(4)Security strategy is determined by cryptographic keys, further selects the Encryption Algorithm in the database of Encryption Algorithm.
The data encryption is further comprising the steps of:
(5)Cryptographic keys produce one group of sub- secret key, and it is close that one group of sub- secret key can form encryption by fixed permutation and combination method Spoon.
The data encryption is further comprising the steps of:
(6)Before or after being encrypted using the cryptographic keys, need to judge the cryptographic keys whether in having In the effect phase, and then judge whether the cryptographic keys use.
In addition, step(6)In further include following data decryption step:
(1)Obtain identification code;
(2)Judge the identification code whether before the deadline;
(3)When judging the identification code before the deadline, the encryption type of the identification code is judged;
(4)Key is obtained according to the encryption type;
(5)It is decrypted using the encrypted content of identification code described in the key pair.
Again, data deciphering is further comprising the steps of:
(1)Public key is obtained according to the encryption type of the identification code;
(2)According to the public key match private key;
(3)The encrypted content of the identification code is decrypted using the private key.
In addition, secret key generation includes the following steps:
(1)It pre-sets a verification instruction and deciphering and is stored;
(2)The code-bar being made of character string is generated in advance;
(3)Any one character is extracted from the code-bar of generation, combines the verification of storage to instruct reconciliation the character extracted Password obtains key.
A kind of industrial Internet of Things data exchange method of highly effective and safe based on Raspberry Pi of the present invention includes mainly PLC With the connection of Raspberry Pi, the data of acquisition are collected in the connection of sensor and Raspberry Pi, the connection of camera and Raspberry Pi, encryption Collected data are transmitted, data and data deciphering are received.The present invention is that the connection of PLC and Raspberry Pi turn TTL cores by RS485 Piece connects, and the connection of camera and sensor helps stick line using common, in encryption process using DES algorithms come into Row encryption and decryption is connected between Raspberry Pi and common host computer by cable, and common Transmission Control Protocol is used.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the principle of the present invention, several improvement can also be made, these improvement also should be regarded as the present invention's Protection domain.

Claims (10)

1. a kind of industrial Internet of Things data exchange method of highly effective and safe based on Raspberry Pi, including PLC, Raspberry Pi, camera, Sensor and host computer, host computer receive data in real time by Ethernet, it is characterised in that:Include the following steps:
(1)SIEMENS PLC S-200 is connected to by the RS485 lines for turning TTL signal in Raspberry Pi;
(2)By sensor and camera by helping stick line to be connected in Raspberry Pi;
(3)Program is write by python language in Raspberry Pi and receives different data, between Raspberry Pi and PLC S-200 It is write using PPI agreements;
(4)Raspberry Pi is connect by cable with host computer;
(5)The data received are encapsulated as TCP message, and encrypted transmission by Raspberry Pi using python language;
(6)It calls the dynamic link library write, host computer to receive the data of Raspberry Pi, the advanced row of data is decrypted, is then solved again Analysis, finally shows.
2. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi, feature It is:The connection of the connection of the connection of the PLC and Raspberry Pi, camera and Raspberry Pi, sensor and Raspberry Pi and upper The connection of machine and Raspberry Pi includes the following steps:
(1)The RS485 heads that RS485 is turned to TTL chips are connected on PLC, the ends TTL respectively with the power end of Raspberry Pi serial ports and The ends GND connect, and receive data terminal and are connected with transmission data end;
(2)One pin of camera module is connected on the GPIO mouths of Raspberry Pi, the power supply of camera is connected to the electricity of Raspberry Pi On source;
(3)The pin of each sensor is connected in Raspberry Pi, switching value is connected to GPIO port, and analog quantity first meets MCP3008 Chip connects SPI port again, and then the power supply of sensor is connected on the power supply of Raspberry Pi;
(4)The network interface of Raspberry Pi is connected with the network interface of host computer by common cable.
3. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi, feature It is:The step(3)Include the following steps:
(1)Configure Raspberry Pi:
(a)Raspberrypi operating systems are installed to Raspberry Pi;
(b)System file is changed, the bluetooth module given tacit consent in closing system opens corresponding serial port module;
(c)Open SPI host drivens;
(2)Download library file to be used;
(3)Using multi-threading, program is write using python language, while receiving serial data, SPI mouthfuls of data and GPIO Mouth data;
(4)Data are encrypted using DES algorithms, waiting host computer sends out order, to respond.
4. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi, feature It is:The step(6)Include the following steps:
(1)Write upper computer software:
(a)Write the code being connect with Raspberry Pi;
(b)It writes and is connect with PLC, read data and write the code of data;
(c)Write the code of receiving sensor and camera data;
(2)The data received are subjected to DES decryption processings;
(3)It writes code to show data, host computer sends order and obtains corresponding data.
5. the work side of the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi Method, it is characterised in that:The step(5)In further include following data encrypting step:
(1)Establish the database containing multiple encryption algorithms;
(2)Data encryption rating database is established, the safety of a plurality of different security levels is contained in data encryption registered database Strategy;
(3)Generate cryptographic keys, you can random number obtains cryptographic keys, can also be set by selection, the encryption of generation is close Contain security strategy in spoon;
(4)Security strategy is determined by cryptographic keys, further selects the Encryption Algorithm in the database of Encryption Algorithm.
6. the work side of the industrial Internet of Things data exchange method of the highly effective and safe according to claim 5 based on Raspberry Pi Method, it is characterised in that:The data encryption is further comprising the steps of:
(5)Cryptographic keys produce one group of sub- secret key, and it is close that one group of sub- secret key can form encryption by fixed permutation and combination method Spoon.
7. the work side of the industrial Internet of Things data exchange method of the highly effective and safe according to claim 6 based on Raspberry Pi Method, it is characterised in that:The data encryption is further comprising the steps of:
(6)Before or after being encrypted using the cryptographic keys, need to judge the cryptographic keys whether in having In the effect phase, and then judge whether the cryptographic keys use.
8. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 1 based on Raspberry Pi, feature It is:The step(6)In further include following data decryption step:
(1)Obtain identification code;
(2)Judge the identification code whether before the deadline;
(3)When judging the identification code before the deadline, the encryption type of the identification code is judged;
(4)Key is obtained according to the encryption type;
(5)It is decrypted using the encrypted content of identification code described in the key pair.
9. the work side of the industrial Internet of Things data exchange method of the highly effective and safe according to claim 8 based on Raspberry Pi Method, it is characterised in that:The data deciphering is further comprising the steps of:
(1)Public key is obtained according to the encryption type of the identification code;
(2)According to the public key match private key;
(3)The encrypted content of the identification code is decrypted using the private key.
10. the industrial Internet of Things data exchange method of the highly effective and safe according to claim 8 based on Raspberry Pi, feature It is:The secret key generation includes the following steps:
(1)It pre-sets a verification instruction and deciphering and is stored;
(2)The code-bar being made of character string is generated in advance;
(3)Any one character is extracted from the code-bar of generation, combines the verification of storage to instruct reconciliation the character extracted Password obtains key.
CN201810238923.9A 2018-03-22 2018-03-22 A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi Pending CN108471444A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810238923.9A CN108471444A (en) 2018-03-22 2018-03-22 A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810238923.9A CN108471444A (en) 2018-03-22 2018-03-22 A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi

Publications (1)

Publication Number Publication Date
CN108471444A true CN108471444A (en) 2018-08-31

Family

ID=63264620

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810238923.9A Pending CN108471444A (en) 2018-03-22 2018-03-22 A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi

Country Status (1)

Country Link
CN (1) CN108471444A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600420A (en) * 2018-11-12 2019-04-09 吴基玄 It is a kind of to realize the method and system remotely controlled online based on raspberry pie technology
CN109698866A (en) * 2019-01-11 2019-04-30 科世达(上海)管理有限公司 A kind of Intelligent control display systems based on raspberry pie
CN111506030A (en) * 2020-04-16 2020-08-07 福州泰全工业有限公司 Quality management system and method for automobile production line
CN112600746A (en) * 2020-12-10 2021-04-02 杭州电子科技大学 Raspberry pie CAN data collection and analysis system
CN112629259A (en) * 2020-12-23 2021-04-09 山东建筑大学 Kiln car identification method and system based on wall material production line
CN116743504A (en) * 2023-08-14 2023-09-12 佳瑛科技有限公司 Safe transmission method and system for digital data in network cable
CN113885446B (en) * 2020-04-16 2024-06-07 福州泰全工业有限公司 Automobile production line quality management method for realizing quality trend prediction

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378198A (en) * 2014-10-16 2015-02-25 南京中科龙脉物联网技术有限公司 Voice encryption method based on block cipher system
CN104753942A (en) * 2015-03-30 2015-07-01 无锡市崇安区科技创业服务中心 Secret key generating and decrypting method used for communication network
CN105763525A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Identification code generation method, device, identification code decryption method and device
CN106789459A (en) * 2016-12-07 2017-05-31 中国人民解放军理工大学 A kind of smart machine control device and control method based on raspberry group
CN206258717U (en) * 2016-11-11 2017-06-16 华中农业大学 Green grass long distance control system based on raspberry group
US20180035479A1 (en) * 2016-07-27 2018-02-01 Hon Hai Precision Industry Co., Ltd. Interconnecting device and iot system using the same

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378198A (en) * 2014-10-16 2015-02-25 南京中科龙脉物联网技术有限公司 Voice encryption method based on block cipher system
CN105763525A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Identification code generation method, device, identification code decryption method and device
CN104753942A (en) * 2015-03-30 2015-07-01 无锡市崇安区科技创业服务中心 Secret key generating and decrypting method used for communication network
US20180035479A1 (en) * 2016-07-27 2018-02-01 Hon Hai Precision Industry Co., Ltd. Interconnecting device and iot system using the same
CN206258717U (en) * 2016-11-11 2017-06-16 华中农业大学 Green grass long distance control system based on raspberry group
CN106789459A (en) * 2016-12-07 2017-05-31 中国人民解放军理工大学 A kind of smart machine control device and control method based on raspberry group

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600420A (en) * 2018-11-12 2019-04-09 吴基玄 It is a kind of to realize the method and system remotely controlled online based on raspberry pie technology
CN109698866A (en) * 2019-01-11 2019-04-30 科世达(上海)管理有限公司 A kind of Intelligent control display systems based on raspberry pie
CN111506030A (en) * 2020-04-16 2020-08-07 福州泰全工业有限公司 Quality management system and method for automobile production line
CN111506030B (en) * 2020-04-16 2021-06-25 福州泰全工业有限公司 Quality management system and method for automobile production line
CN113885446A (en) * 2020-04-16 2022-01-04 福州泰全工业有限公司 Automobile production line quality control method for realizing quality trend prediction
CN113885446B (en) * 2020-04-16 2024-06-07 福州泰全工业有限公司 Automobile production line quality management method for realizing quality trend prediction
CN112600746A (en) * 2020-12-10 2021-04-02 杭州电子科技大学 Raspberry pie CAN data collection and analysis system
CN112629259A (en) * 2020-12-23 2021-04-09 山东建筑大学 Kiln car identification method and system based on wall material production line
CN116743504A (en) * 2023-08-14 2023-09-12 佳瑛科技有限公司 Safe transmission method and system for digital data in network cable
CN116743504B (en) * 2023-08-14 2023-10-17 佳瑛科技有限公司 Safe transmission method and system for digital data in network cable

Similar Documents

Publication Publication Date Title
CN108471444A (en) A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi
CN205490665U (en) Thing networking systems's communication device
CN105162772B (en) A kind of internet of things equipment certifiede-mail protocol method and apparatus
CN102932349B (en) Data transmission method, device and system
CN109218825B (en) Video encryption system
CN105871873A (en) Security encryption authentication module for power distribution terminal communication and method thereof
CN105790927B (en) A kind of bus graded encryption system
JPS63205687A (en) Method and apparatus for protecting secret element in network of cryptograph by handing open key
CN107769912A (en) A kind of quantum key chip and the encipher-decipher method based on quantum key chip
CN103281299B (en) A kind of ciphering and deciphering device and information processing method and system
CN105072025B (en) For the security protection gateway and system of modern industrial control system network service
CN103888444A (en) Distribution safety authentication device and method
JPH0934356A (en) High-bandwidth cryptographic system with low-bandwidth cryptographic module
CN109831311A (en) A kind of server validation method, system, user terminal and readable storage medium storing program for executing
AU2017100662A4 (en) A secure communication method of integrated distributed electric vehicle controller
CN105610837A (en) Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system
CN106209916A (en) Industrial automation produces business data transmission encryption and decryption method and system
CN110336788A (en) A kind of data safety exchange method of internet of things equipment and mobile terminal
CN109543423A (en) Control panel encryption and manner of decryption, terminal device and computer readable storage medium
CN108848107A (en) A kind of method of secure transmission web information
CN113704780A (en) Model-driven-based power distribution network user side information adaptive encryption method
CN103746815A (en) Secure communication method and device
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
US20070076882A1 (en) Network component for a communication network, communication network, and method of providing a data connection
CN107155184B (en) WIFI module with secure encryption chip and communication method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180831

RJ01 Rejection of invention patent application after publication