CN109087489A - perimeter alarm system based on lorawan - Google Patents
perimeter alarm system based on lorawan Download PDFInfo
- Publication number
- CN109087489A CN109087489A CN201810803887.6A CN201810803887A CN109087489A CN 109087489 A CN109087489 A CN 109087489A CN 201810803887 A CN201810803887 A CN 201810803887A CN 109087489 A CN109087489 A CN 109087489A
- Authority
- CN
- China
- Prior art keywords
- lorawan
- alarm
- gateway
- node
- perimeter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/10—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention discloses a kind of perimeter alarm systems based on lorawan, comprising: lorawan server;At least one Lorawan gateway is used to be communicated with lorawan server;Several lorawan alarm nodes, each lorawan alarm node is used to access the sensor of bottom, the sensor of bottom is used to acquire the status data in defence area, each lorawan alarm node is sent to lorawan gateway after being packaged the states of defense zones data of acquisition by lorawan protocol stack, and received states of defense zones data are sent to Lorawan server by lorawan gateway;And alarm host machine, it is used to preset the alarm rule in defence area, alarm host machine is used to receive the states of defense zones data of lorawan server transmission and responds according to alarm condition of the pre-set alarm rule to defence area.The perimeter alarm system have the characteristics that standardization, it is scalable, highly safe.
Description
Technical field
The present invention relates to safety-security area, in particular to a kind of perimeter alarm system based on lorawan.
Background technique
Currently, common perimeter alarm system is with the total of the wired field bus such as RS485, CAN bus building on the market
Line communication system realizes the communication between alarm host machine and address module, and radio address module be intended only as one it is wired
The supplement of communication and exist.With popularizing for technology of Internet of things, there is the realization of the relevant alarm system based on lora, than
It is public if " a kind of automatic fire alarm system and method based on LORA wireless communication " application No. is 201711037613.2
A kind of alarm system of lora wireless communication technique networking with proprietary communications protocol is opened.But lora wireless telecommunications are general
It is a kind of proprietary protocol, does not have compatibility, capacity is small, and security performance is low.
Summary of the invention
The purpose of the present invention is to provide a kind of perimeter alarm system based on lorawan, the networking side based on lorawan
Case, can construct it is a kind of standardization, scalable, highly safe perimeter alarm system.
To achieve the above object, the present invention provides a kind of perimeter alarm systems based on lorawan, comprising: lorawan
Server;At least one Lorawan gateway is used to be communicated with lorawan server;Several lorawan alarm nodes,
Each lorawan alarm node is used to access the sensor of bottom, and the sensor of bottom is used to acquire the status data in defence area, often
A lorawan alarm node is sent to lorawan net after being packaged the states of defense zones data of acquisition by lorawan protocol stack
It closes, received states of defense zones data are sent to Lorawan server by lorawan gateway;And alarm host machine, it is used to preparatory
The alarm rule in defence area is set, and alarm host machine is used to receive the states of defense zones data of lorawan server transmission and according to preparatory
The alarm rule of setting responds the alarm condition in defence area.
Preferably, each lorawan alarm intra-node has a Micro-processor MCV, and Micro-processor MCV is by the defence area of acquisition
Status data carries out the packing of lorawan protocol stack.
Preferably, each lorawan alarm intra-node has lora wireless transceiver chip, each lorawan alarm
States of defense zones data are sent to lorawan gateway by lora wireless transceiver chip by node.
Preferably, lorawan gateway gives corresponding lorawan alarm node transmission ACK number after receiving states of defense zones data
According to verifying whether lorawan gateway normally receives data, if lorawan alarm node is not received by lorawan gateway
Confirm that ACK, lorawan alarm node then continue status data.
Preferably, alarm host machine is connected with backup power source management module.
Preferably, alarm host machine is connected with mainframe box state monitoring module.
Preferably, alarm host machine is additionally provided with communication interface.
Preferably, lorawan server is arranged in alarm host machine, and lorawan server and Lorawan gateway pass through nothing
Line wired is communicated.
Compared with prior art, the invention has the following beneficial effects: the networking plan based on lorawan, have very strong
Compatibility, different sensors node can access the same lorawan network, shorten the R&D cycle of sensor, reduce and grind
Cost is sent out, can quickly be delivered.Using the lorawan agreement of standard, pass through multiple channels access, frequency error factor, adaptation rate
Lorawan network is bigger relative to the point-to-point or point-to-multipoint application data capacity based on LoRa physical layer, can access section
Point is more, and scalability is strong.Lorawan network design node access authentication, the security mechanisms such as data encryption.
Detailed description of the invention
Fig. 1 is the schematic illustration of the perimeter alarm system according to the present invention based on lorawan.
Specific embodiment
With reference to the accompanying drawing, specific embodiments of the present invention will be described in detail, it is to be understood that guarantor of the invention
Shield range is not limited by the specific implementation.
Unless otherwise explicitly stated, otherwise in entire disclosure and claims, term " includes " or its change
Changing such as "comprising" or " including " etc. will be understood to comprise stated element or component, and not exclude other members
Part or other component parts.
It, can be with firstly, the perimeter alarm system based on lorawan of the present embodiment, is the networking plan based on lorawan
Construct it is a kind of standardization, scalable, highly safe perimeter alarm system.Lorawan be by international LoRa alliance release
A set of consensus standard based on MAC layer on LoRa physical layer transmission technical foundation.After having this standard,
Lorawan's reforms into a kind of network technology.This corresponding product of set technology includes lorawan node, lorawan gateway and
The agreement and data cloud platform of lorawan.When using lorawan networking products, to there are two the interfaces of user: one is the bottom of at
There is a data-interface between the sensor and lorawan node of layer, sensing data passes to network by this interface;One
It is to there is a data-interface to answer the data transmission of network between the agreement of lorawan and data cloud platform and the application of user
With.
Specifically, as shown in Figure 1, a kind of perimeter alarm system based on lorawan of specific embodiment according to the present invention
System, including lorawan server 2, at least one Lorawan gateway 3, several lorawan alarm node 4 and alarm host machine 1,
Middle Lorawan gateway 3 is used to be communicated with lorawan server 1, and each lorawan alarm node 4 is used to access bottom
Sensor, the sensor of bottom are used to acquire the status data in defence area, and each lorawan alarm node 4 is by the defence area shape of acquisition
State data are sent to lorawan gateway 3 after being packaged by lorawan protocol stack, and lorawan gateway 3 is by received states of defense zones
Data are sent to Lorawan server 2, and alarm host machine 1 is used to preset the alarm rule in defence area, and alarm host machine 1 is used to connect
Receive the states of defense zones data that lorawan server 2 is sent and according to pre-set alarm rule to the alarm condition in defence area into
Row response.
As a preferred embodiment, the inside of each lorawan alarm node 4 has Micro-processor MCV, micro- place
It manages device MCU and the states of defense zones data of acquisition is subjected to the packing of lorawan protocol stack.
As a preferred embodiment, there is lora wireless transceiver core inside each lorawan alarm node 4
States of defense zones data are sent to lorawan gateway by lora wireless transceiver chip by piece, each lorawan alarm node 4
3。
As a preferred embodiment, giving corresponding lorawan after the reception states of defense zones data of lorawan gateway 3
Alarm node 4 sends ack msg to verify whether lorawan gateway 3 normally receives data, if lorawan alarm node 4 does not have
Confirmation ACK, lorawan the alarm node 4 for receiving lorawan gateway 3 then continues status data.
As a preferred embodiment, alarm host machine 1 is connected with backup power source management module 11.
As a preferred embodiment, alarm host machine 1 is connected with mainframe box state monitoring module 12.
As a preferred embodiment, alarm host machine 1 is additionally provided with communication interface, for being led to pneumatic compression devices
News.
As a preferred embodiment, lorawan server 2 and lorawan gateway 3 are arranged at alarm host machine 1
Interior, lorawan server 2 and Lorawan gateway 3 is communicated by wired.
As a preferred embodiment, lorawan gateway 3, outside alarm host machine 1, the setting of lorawan server 2 exists
In alarm host machine 1, lorawan server 2 and Lorawan gateway 3 is by wirelessly or non-wirelessly being communicated.
In above scheme, alarm host machine 1 is generally made of embedded type CPU, can classification to each defence area in entire area under one's jurisdiction,
Behavioral trait etc. is configured, and the states of defense zones that can receive the transmission of lorawan server 2 carries out response or active inquiry
The state in the defence area of the management of lorawan server 2 according to preset rules responds the alarm condition in defence area,
Such as sound-light alarm, superior management system are alarmed.Lorawan server 2 be mainly used to realize Defence areas alarm node networking,
Encrypting and decrypting and the data of the interaction of Defence areas alarm node are updated and record to the state of Defence areas alarm node, can be with
Complete the management to lorawan network 3.Lorawan gateway 3 sends the data for needing to be sent to Defence areas alarm node,
The wireless data of the state change of Defence areas alarm node is received and is transmitted to lorawan server 2.Lorawan alarm
Node 4 is identical as the address module function of conventional alarm system, passes through after the sensor status data in be responsible for defence area is acquired
Internal MCU and lorawan protocol stack is packaged, and is sent to lorawan gateway 3 by lora wireless transceiver chip, then, is connect
The ack msg sent from lorawan gateway 3 is received, whether verifying lorawan gateway 3 normally receives the status number sent just now
According to if confirmation ACK, lorawan the alarm node 4 for being not received by gateway continues status data.
It should be noted that the perimeter alarm system of this example belongs to safety-security area, it is different from the fire-fighting of local space
Field.The scheme of the present embodiment changes the existing solution by proprietary protocol, and the networking plan based on lorawan can
With construct it is a kind of standardization, scalable, highly safe perimeter alarm system, solve existing safety-security area do not have it is simultaneous
Capacitive, capacity is small, the low technical problem of security performance.
To sum up, relative to the transmission mode that LoRa physical layer is used only, the perimeter alarm based on lorawan of the present embodiment
System has the advantage that
1. compatibility caused by standardization.The different sensors node of different manufacturers can access the same lorawan net
Network is unified in the agreement of lorawan and the interface at data cloud platform end.Do not have to customization for application developers to melt
All the sensors are sent out, shortens the R&D cycle, reduce research and development cost, can quickly deliver.
2. network capacity is big.By multiple channels access, frequency error factor, adaptation rate lorawan network relative to being based on
The point-to-point or point-to-multipoint application data capacity of LoRa physical layer is bigger, and energy access node is more, and scalability is strong.Favorably
In the fairly large application of application developers exploitation and continue upgradability application.
3. safety is good.Lorawan network design node access authentication, the security mechanisms such as data encryption.These mechanism
Can be much higher relative to the interim agreement of application developers in safety, it is provided safeguard for the lasting safety of application.
The aforementioned description to specific exemplary embodiment of the invention is in order to illustrate and illustration purpose.These descriptions
It is not wishing to limit the invention to disclosed precise forms, and it will be apparent that according to the above instruction, can much be changed
And variation.The purpose of selecting and describing the exemplary embodiment is that explaining specific principle of the invention and its actually answering
With so that those skilled in the art can be realized and utilize a variety of different exemplary implementation schemes of the invention and
Various chooses and changes.The scope of the present invention is intended to be limited by claims and its equivalents.
Claims (9)
1. a kind of perimeter alarm system based on lorawan characterized by comprising
Lorawan server;
At least one Lorawan gateway is used to be communicated with the lorawan server;
Several lorawan alarm nodes, each lorawan alarm node are used to access the sensor of bottom, and the sensor is used
Acquire the status data in defence area, the states of defense zones data of acquisition pass through lorawan association by each lorawan alarm node
View stack is sent to the lorawan gateway after being packaged, received states of defense zones data are sent to described by the lorawan gateway
Lorawan server;And
Alarm host machine, is used to preset the alarm rule in defence area, and the alarm host machine is used to receive the lorawan service
The states of defense zones data of device transmission are simultaneously responded according to alarm condition of the pre-set alarm rule to defence area.
2. the perimeter alarm system according to claim 1 based on lorawan, which is characterized in that each lorawan alarm
Intra-node has Micro-processor MCV, and the states of defense zones data of acquisition are carried out lorawan protocol stack by the Micro-processor MCV
It is packaged.
3. the perimeter alarm system according to claim 1 based on lorawan, which is characterized in that each lorawan alarm
Intra-node has lora wireless transceiver chip, and each lorawan alarm node passes through the lora wireless transceiver
States of defense zones data are sent to the lorawan gateway by chip.
4. the perimeter alarm system according to claim 3 based on lorawan, which is characterized in that the lorawan gateway
It receives and sends ack msg to corresponding lorawan alarm node to verify the lorawan gateway after the states of defense zones data
Whether data are normally received, it is described if lorawan alarm node is not received by the confirmation ACK of the lorawan gateway
Lorawan alarm node then continues status data.
5. the perimeter alarm system according to claim 1 based on lorawan, which is characterized in that the alarm host machine connects
It is connected to backup power source management module.
6. the perimeter alarm system according to claim 1 based on lorawan, which is characterized in that the alarm host machine connects
It is connected to mainframe box state monitoring module.
7. the perimeter alarm system according to claim 1 based on lorawan, which is characterized in that the alarm host machine is also
Equipped with communication interface.
8. the perimeter alarm system according to claim 1 based on lorawan, which is characterized in that the lorawan service
Device is arranged in the alarm host machine, and the lorawan server is with the Lorawan gateway by wirelessly or non-wirelessly being led to
News.
9. the perimeter alarm system according to claim 1 based on lorawan, which is characterized in that the lorawan gateway
It is arranged in the alarm host machine.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810803887.6A CN109087489A (en) | 2018-07-20 | 2018-07-20 | perimeter alarm system based on lorawan |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810803887.6A CN109087489A (en) | 2018-07-20 | 2018-07-20 | perimeter alarm system based on lorawan |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109087489A true CN109087489A (en) | 2018-12-25 |
Family
ID=64838351
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810803887.6A Pending CN109087489A (en) | 2018-07-20 | 2018-07-20 | perimeter alarm system based on lorawan |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109087489A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104079874A (en) * | 2014-06-12 | 2014-10-01 | 黄河科技学院 | Security and protection integrated system and method based on Internet of Things technology |
CN205909831U (en) * | 2016-07-22 | 2017-01-25 | 深圳市易安生命科技有限公司 | Old man take action locus tracking monitoring devices and system |
CN106657612A (en) * | 2016-11-28 | 2017-05-10 | 深圳市捷隽科技有限公司 | Wireless networking cloud access control system and method for implementing mobile phone talkback door opening |
US20170197583A1 (en) * | 2016-01-10 | 2017-07-13 | Traffilog Ltd. | Car theft prevention using long range wide area network |
CN107507390A (en) * | 2017-07-25 | 2017-12-22 | 安徽大德中电科技发展股份有限公司 | A kind of intelligent console safety-protection system |
-
2018
- 2018-07-20 CN CN201810803887.6A patent/CN109087489A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104079874A (en) * | 2014-06-12 | 2014-10-01 | 黄河科技学院 | Security and protection integrated system and method based on Internet of Things technology |
US20170197583A1 (en) * | 2016-01-10 | 2017-07-13 | Traffilog Ltd. | Car theft prevention using long range wide area network |
CN205909831U (en) * | 2016-07-22 | 2017-01-25 | 深圳市易安生命科技有限公司 | Old man take action locus tracking monitoring devices and system |
CN106657612A (en) * | 2016-11-28 | 2017-05-10 | 深圳市捷隽科技有限公司 | Wireless networking cloud access control system and method for implementing mobile phone talkback door opening |
CN107507390A (en) * | 2017-07-25 | 2017-12-22 | 安徽大德中电科技发展股份有限公司 | A kind of intelligent console safety-protection system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11202228B2 (en) | Connectivity service level orchestrator and arbitrator in internet of things (IOT) platforms | |
CN101820344B (en) | AAA server, home network access method and system | |
CN102904749B (en) | Adopt the method for safety means protecting network device, safety means and data network | |
CN101094056B (en) | Security system of wireless industrial control network, and method for implementing security policy | |
JP7151031B2 (en) | Method and aerosol delivery device for transmitting aerosol delivery device information | |
KR100638030B1 (en) | Network electric device | |
CN103200185B (en) | Data safe transmission method in a kind of body area network system | |
US20110314163A1 (en) | Wireless communication network for smart appliances | |
CN102905396A (en) | Device networking and network-accessing management method for intelligent housing system | |
KR20040103367A (en) | Home network system | |
CN208461850U (en) | Based on the building site lorawan environment parameter monitoring system | |
CN105978851A (en) | System and method for controlling intelligent equipment | |
KR20040104323A (en) | Home network system | |
CN102202302A (en) | Method for joining network combining network and wireless sensor network (WSN) terminal | |
CN107566342B (en) | It is a kind of based on block chain technology cotton spinning production CPS in M2M safety method | |
CN108475317A (en) | System and method for protecting Internet of Things (IoT) device preset | |
CN107909788A (en) | A kind of wireless kilowatt meter reading-out system based on LoRa | |
CN102724175A (en) | Remote communication security management architecture of ubiquitous green community control network and method for constructing the same | |
CN102202298A (en) | Combined network and method for wireless sensor network terminal to join network | |
CN108141369A (en) | The foundation of the mode of operation of machine-to-machine device | |
CN105684460A (en) | System for connecting smart devices in a building | |
JP2021507577A (en) | Context-aware authentication for IoT / M2M service layer data or services | |
CN107360154A (en) | A kind of intranet security cut-in method and system | |
WO2013174349A2 (en) | M2m gateway device and applying method thereof | |
CN102035703A (en) | Family wireless network and implementation method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181225 |