CN114189854A - Tower footing safety monitoring terminal based on Beidou communication and 4G communication and data transmission method - Google Patents

Tower footing safety monitoring terminal based on Beidou communication and 4G communication and data transmission method Download PDF

Info

Publication number
CN114189854A
CN114189854A CN202110395214.3A CN202110395214A CN114189854A CN 114189854 A CN114189854 A CN 114189854A CN 202110395214 A CN202110395214 A CN 202110395214A CN 114189854 A CN114189854 A CN 114189854A
Authority
CN
China
Prior art keywords
communication
data
beidou
character
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110395214.3A
Other languages
Chinese (zh)
Other versions
CN114189854B (en
Inventor
肖礼军
鲁亚洲
向秋林
年维
蒙贵荣
张辉
余容
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PowerChina Guizhou Electric Power Engineering Co Ltd
Guiyang Yongqing Instruments and Electronic Science and Technology Co Ltd
Original Assignee
PowerChina Guizhou Electric Power Engineering Co Ltd
Guiyang Yongqing Instruments and Electronic Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PowerChina Guizhou Electric Power Engineering Co Ltd, Guiyang Yongqing Instruments and Electronic Science and Technology Co Ltd filed Critical PowerChina Guizhou Electric Power Engineering Co Ltd
Priority to CN202110395214.3A priority Critical patent/CN114189854B/en
Publication of CN114189854A publication Critical patent/CN114189854A/en
Application granted granted Critical
Publication of CN114189854B publication Critical patent/CN114189854B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01DMEASURING NOT SPECIALLY ADAPTED FOR A SPECIFIC VARIABLE; ARRANGEMENTS FOR MEASURING TWO OR MORE VARIABLES NOT COVERED IN A SINGLE OTHER SUBCLASS; TARIFF METERING APPARATUS; MEASURING OR TESTING NOT OTHERWISE PROVIDED FOR
    • G01D21/00Measuring or testing not otherwise provided for
    • G01D21/02Measuring two or more variables by means not covered by a single other subclass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/1851Systems using a satellite or space-based relay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a tower footing safety monitoring terminal based on Beidou communication and 4G communication and a data transmission method, wherein the terminal comprises a microprocessor, the microprocessor is respectively in communication connection with a 4G module, a Beidou communication module, a man-machine interaction module and a sensor module, the microprocessor module is used for collecting sensor data, compressing and encrypting the data and then selecting the data to be transmitted through the 4G module or the Beidou module according to the current signal condition. According to the Beidou satellite communication system, Beidou short message communication, a radio station and communication network information are integrated into the multi-channel emergency communication module, the sub-packaging, compression, decompression, data encryption and decryption of multi-channel data are studied, Beidou data transmission can be achieved in remote areas where 4G signals cannot cover, and the problem of data transmission in the remote areas is solved.

Description

Tower footing safety monitoring terminal based on Beidou communication and 4G communication and data transmission method
Technical Field
The invention belongs to the field of power system communication.
Background
At present, data communication in the power industry mainly depends on a radio station and a communication network, and full coverage is difficult to realize in remote or complex terrain positions. The Beidou Satellite Navigation System (BeiDou Navigation Satellite System, Beidou S) is a global Satellite Navigation System which is established in China and has completely independent property rights, has multiple functions of Navigation positioning, data message communication, standard time service and the like, and is one of the only four Satellite Navigation systems [1] at present. The Beidou satellite navigation system fundamentally changes the situation that navigation and positioning in China are restricted by people, and has remarkable significance for the economic development and the modernization construction of national defense of China. Therefore, the Beidou short message communication can be considered to replace the existing power data transmission.
In the Beidou short message transmission process, data which needs to be transmitted by a user is directly transmitted by a terminal without safety encryption measures, the data transmitted by the user is transmitted among the user, the terminal and a satellite without any safety encryption measures, and under the condition that basic information such as the modulation frequency of a Beidou system and an information transmission format is public, the transmission mode causes the risk of leakage, tampering and stealing of the data transmitted by the user, and has potential safety hazards.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the problem that data transmission in the power industry is difficult to realize in remote areas, the data acquisition terminal and the corresponding data transmission method are provided, wherein the Beidou can be used for transmitting power data without 4G communication signals.
The technical scheme of the invention is as follows:
the utility model provides a tower footing safety monitoring terminal based on big dipper communication and 4G communication, includes microprocessor, microprocessor treater respectively with 4G module, big dipper communication module, human-computer interaction module, sensor module communication connection.
The microprocessor module collects sensor data, compresses and encrypts the data and sends the data through the 4G module or the Beidou module.
The sensor module comprises a displacement signal acquisition module, a settlement signal acquisition module, a stress signal acquisition module and an osmotic pressure signal acquisition module, each sensing signal is transmitted to the data packaging module, the communication control module selects 4G communication or Beidou communication, and if the 4G communication is selected, the packaged data is transmitted through the 4G communication data encryption module, the 4G communication data control frame insertion module and the TCP packaging module in sequence and then is subjected to 4G communication transmission; if Beidou communication is selected, the packed data sequentially pass through the Beidou communication data encryption module, the Beidou communication data subpackaging module and the Beidou communication data control word inserting module and then are transmitted in the Beidou communication mode.
The data packing module packs the data into a 4G communication available data packet and a Beidou communication available data packet, and packs the received displacement data, settlement data, stress data and osmotic pressure data into a 4G data packet and a BD data packet;
the 4G communication data encryption module encrypts the obtained 4G data packet to obtain an encrypted 4G data packet, wherein the encrypted 4G data packet changes original information data by using a symmetric encryption algorithm, and a plaintext is changed into a ciphertext;
the 4G communication data control frame inserting module adds a 4G communication message control frame to an encrypted 4G data packet to form a 4G communication message, wherein the 4G communication message is formed by inserting a 2-byte fixed frame header and a 4-byte load length before the encrypted 4G data packet;
the TCP data packaging module packages the received 4G communication message into a standard TCP communication message frame and sends the standard TCP communication message frame to the Internet for transmission;
the Beidou communication data encryption module encrypts the acquired BD data packet into an encrypted BD data packet, and changes original information data into a ciphertext from a plaintext by using a symmetric encryption algorithm;
the Beidou communication data packet module divides the received encrypted BD data packets into encrypted BD data packet groups with the size of 200 bytes, and each encrypted BD data packet group comprises a plurality of encrypted packets;
the Beidou communication data control word insertion module inserts control words into a plurality of encrypted packets in the encrypted BD data packet group to form a plurality of BD communication messages, and the BD communication messages are transmitted to a Beidou network;
the communication control module selects 4G communication or Beidou communication according to a control signal, the control signal is from a preset program design, and the program can judge whether the current 4G network is normal.
The 4G data packets are ASCII character strings with the size of less than 1500 bytes and meeting JSON standard, and the BD data packets are 16-system byte streams represented by the ASCII character strings with the size of less than 1500 bytes.
The tower footing safety monitoring terminal is adopted for data transmission, 4G communication is selected firstly during data transmission, and if the transmission of the 4G communication fails, Beidou communication is selected for transmission.
Encrypting each byte in the Beidou short message plaintext by using a sequence cipher algorithm, wherein the encrypting step comprises the following steps: obtaining a Beidou short message plaintext PT; acquiring a key stream KS according to a sequence cipher algorithm; extracting a sub-key KS from a stream of keys KSiTaking out the plaintext character PT from the short message plaintext PTi(ii) a Using PTiAnd KSiGenerating encrypted ciphertext CTi(ii) a Judging CTiIf it belongs to encrypted valid character, otherwise, the PT is reusediAnd KSiGenerating a new encrypted ciphertext CTi(ii) a All PTiAll encrypted are obtained by CTiAnd forming an encrypted ciphertext CT.
PTi is encrypted using the following encryption loop:
(1) obtaining a divisor K, wherein the divisor K meets 1< (256/K) <96 and is an integer, and when K meets (256/K) <96, the smaller the K, the better the K is;
(2) performing operation on the sub-key KSi to obtain an encrypted sub-key NKSi, wherein the NKSi and the KSi are integers, and the operation is performed by dividing the KSi by a divisor K;
(3) the method comprises the steps of generating a tentative encrypted character TCTi by using an acquired ith bit encryption sub-key NKSi and an ith bit Beidou short message plaintext character PTi, and specifically, adding the I code value of the ith bit encryption sub-key NKSi and the I code value of the ith bit character PTi of the Beidou short message plaintext to obtain an encrypted ASCII code value TCTiA, if the TCTiA is larger than C96A, the TCTiA is KSi + PTiA-C96A + C1A-1, and if the value of the TCTiA is smaller than or equal to C96A, the TCTiA uses the result value, a query code table acquires the tentative encrypted character TCTi according to the TCTiA value, wherein a subscript A represents that the parameter is the ASCII code value of the character;
(4) judging whether the temporary encryption character TCTi belongs to the effective character set of the Beidou short message, namely the TCTi meets the condition that the TCTi belongs to the C and
Figure BDA0003018284510000031
(5) if the tentative cryptographic character TCTi satisfies TCTi ∈ C and
Figure BDA0003018284510000032
judging that the character is an encrypted character CTi of the ith plaintext character PTi of the Beidou short message plaintext;
(6) if the tentative crypt character TCTi does not satisfy TCTi ∈ C and
Figure BDA0003018284510000033
adding NKSi to the ASCII code value TCTiA of the temporary encrypted character TCTi to obtain a new value, and assigning the new value to TCTiA if TCTiA is not the same>At C96A, TCTiA is TCTiA-C96A + C1A-1, and if the value of TCTiA is less than or equal to C96A, TCTiA uses the result value to obtain a new tentative encrypted character TCTi by querying an ASCII code table for new TACiA, and then step (4) is repeated.
The CTi is decrypted using the following encryption loop: obtaining a Beidou short message secret CT; acquiring a key stream KS according to a sequence cipher algorithm, taking a sub-key KSi from the key stream KS, and taking a plaintext character CTi from a short message plaintext CT; generating a decryption ciphertext PTi by using the CTi and the KSi; judging whether each PTi belongs to the decrypted effective character, if not, obtaining a new decrypted ciphertext PTi by using the CTi and the KSi until all the CTi are decrypted; the PTi is composed into a decrypted ciphertext PT.
The CTi is decrypted using the following encryption cycle:
(1) acquiring a K value of a divisor K used in encryption;
(2) obtaining an encryption sub-key NKSi by sub-key KSi operation, wherein the NKSi and the KSi are integers, and the operation is carried out by dividing the KSi by a divisor K;
(3) generating a tentative decryption character TPTi by using the acquired ith bit encryption sub-key NKSi and the ith bit Beidou short message ciphertext character CTi, wherein the specific mode is that the ith bit encryption sub-key NKSi is subtracted from the ith bit encryption character CTiA of the Beidou short message ciphertext to obtain a decryption TPTiA, if the TPTiA is smaller than the value of C1A, the TPTiA is C96- (C1- (CTI-NKSI)) +1, if the TPTiA is larger than C1A, the TPTiA uses the result value, and an ASCII code table is inquired to acquire the tentative decryption character TPTi according to the TPTiA value;
(4) judging whether the temporary decryption character TPTi belongs to the effective character set of the Beidou short message, namely the TPTi meets the condition that the TPTi belongs to the element C and
Figure BDA0003018284510000044
(5) if the tentative decrypted character TPTi satisfies TPTi ∈ C and
Figure BDA0003018284510000045
judging that the character is a decryption character PTi of the ith ciphertext character CTi of the Beidou short message ciphertext;
(6) if the tentative decrypted character TPTi satisfies TPTi ∈ C and
Figure BDA0003018284510000046
the new value obtained by subtracting NKSi from the tentative decrypted character TPTIa is assigned to TPTi, TPTIa ═ C96- (C1-TPTIa) +1 if TPTIa is less than the value of C1A, TPTIa ═ C96- (C1-TPTIa) +1, TPTIa is used if TPTIa is greater than C1A, and the resulting value is used according to the new valueAnd (5) the TPTiA queries an ASCII code table to obtain a new tentative decrypted character TPTi, and then the step (4) is repeated.
The invention has the beneficial effects that:
according to the Beidou satellite communication system, Beidou short message communication, a radio station and communication network information are integrated into the multi-channel emergency communication module, the sub-packaging, compression, decompression, data encryption and decryption of multi-channel data are studied, Beidou data transmission can be achieved in remote areas where 4G signals cannot cover, and the problem of data transmission in the remote areas is solved.
According to the Beidou short message encryption and decryption method based on the Beidou, the data encryption is carried out on the Beidou short message by using the sequence cipher algorithm, the encrypted ciphertext data can be guaranteed to be contained in the effective character set (not containing reserved characters) of the Beidou short message, meanwhile, the method does not increase the length of the encrypted data, does not have the possibility of encryption failure, and has high reliability and encryption efficiency. .
Drawings
Fig. 1 is a schematic configuration diagram of a terminal.
Fig. 2 is an operational schematic diagram of the terminal.
Fig. 3 is a logic diagram of data transfer.
Fig. 4 is an encryption flow diagram.
Fig. 5 is a decryption flow chart.
Detailed Description
Example (b): as shown in the figure 1, the tower footing safety monitoring terminal comprises a microprocessor, a 4G module, a Beidou communication module, a sensor module, a storage module and a man-machine interaction module. The microprocessor is in communication connection with the 4G module, the Beidou communication module, the human-computer interaction module and the sensor module respectively. The processor module collects sensor data, compresses and encrypts the data and sends the data through the 4G module or the Beidou module.
Such as a data transmission process diagram in the tower footing safety monitoring terminal and method shown in fig. 2. Wherein the data transmission process comprises: displacement signal acquisition module 1, subside signal acquisition module 2, stress signal acquisition module 3, osmotic pressure signal acquisition module 4, data packing module 5, 4G communication data encryption module 6, 4G communication data control frame inserts module 7, TCP data packing module 8, big dipper communication data encryption module 9, big dipper communication branch data subpackage module 10, big dipper communication data control word inserts module 11, communication switching module 12. Displacement signal acquisition module 1 is connected to data packing module 5, subside signal acquisition module 2, stress signal acquisition module 3, osmotic pressure signal acquisition module 4, in order to receive displacement data respectively, subside data, stress data and osmotic pressure data, data packing module becomes the available data package of 4G communication and the available data package of big dipper communication with data packing, the available data package of 4G communication sends for 4G data encryption module 6 in proper order, 4G communication data control frame inserts the module, TCP data packing module 8, in order to obtain 4G transmission message, or send big dipper communication data package for big dipper data encryption module 9 in proper order, big dipper communication data control word inserts module 10, in order to obtain big dipper transmission message. Further, the data transmission in the tower footing safety monitoring terminal and method for Beidou communication and 4G communication further comprises a displacement signal acquisition module 1 for acquiring a tower footing geological displacement signal and performing analog-to-digital conversion, sending 16-system byte stream data containing the displacement signal, a settlement signal acquisition module 2 for acquiring a tower footing geological settlement signal and performing analog-to-digital conversion, sending 16-system byte stream data containing the settlement signal, a stress signal acquisition module 3 for acquiring a reinforcement stress signal in the tower footing reinforced concrete and performing analog-to-digital conversion, sending 16-system byte stream data containing the stress signal, a osmotic pressure signal acquisition module for acquiring a tower footing geological groundwater osmotic pressure signal and performing analog-to-digital conversion, and sending 16-system byte stream data containing the osmotic pressure signal. The data packing module 5 is connected with the displacement signal acquisition module 1, the settlement signal acquisition module 2, the stress signal acquisition module 3 and the osmotic pressure signal acquisition module 4, and packs the received displacement data, settlement data, stress data and osmotic pressure data into a 4G data packet and a BD data packet,
the 4G data packets are ASCII character strings with the size of less than 1500 bytes and meeting JSON standard, and the BD data packets are 16-system byte streams represented by the ASCII character strings with the size of less than 1500 bytes.
The 4G communication data encryption module 6 is connected to the data packaging module 5 to obtain a packaged 4G data packet, and encrypts the obtained 4G data packet to obtain an encrypted 4G data packet, wherein the encrypted 4G data packet uses a symmetric encryption algorithm to change original information data from a plaintext to a ciphertext.
The 4G communication data control frame inserting module 7 is connected with the 4G communication data encryption module 6 to receive an encrypted 4G data packet, and adds a 4G communication message control frame on the basis of the encrypted 4G data packet to form a 4G communication message to ensure that a receiving end can normally receive the 4G encrypted data packet, wherein the 4G communication message is formed by inserting a 2-byte fixed frame header before the encrypted 4G data packet and a 4-byte load length, the load length refers to the number of bytes of the 4G encrypted data packet, and the TCP data packing module 8 is connected with the 4G communication data control frame inserting module 7 to receive the 4G communication message and pack the received 4G communication message into a standard TCP communication message frame to be transmitted to the Internet; what is needed is
The Beidou communication data encryption module 9 is connected with the data packaging module 5 to obtain the BD data packet, and encrypts the obtained BD data packet into an encrypted BD data packet, wherein the encrypted BD data packet changes original information data from a plaintext into a ciphertext by using a symmetric encryption algorithm,
the Beidou communication sub-packaging module 10 is connected with the Beidou data encryption module 9 so as to receive the encrypted BD data package, the Beidou communication packet module 10 packetizes the received encrypted BD packets into encrypted BD packet groups of 200 bytes in size, the encrypted BD data packet group comprises a plurality of encrypted packets, the Beidou communication data control word insertion module 11 is connected with the Beidou data packet module 10 and receives the encrypted BD data packet group from the Beidou data packet module 10, control words are inserted into a plurality of encrypted packets in the encrypted BD data packet group to form a plurality of BD communication messages which are sent to the Beidou network for transmission, the BD communication message is inserted with a fixed frame header, an ID of a sender, an address of a receiver, a security requirement, a receipt mark and a message length before a small packet is encrypted, adding a checksum after the encryption packet, wherein the message length refers to the number of data bytes of the encryption packet; the communication switching module 12 is connected with the 4G communication data encryption module 6, the 4G communication data control frame inserting module 7, the TCP data packaging module 8, the Beidou data communication data encryption module 9, the Beidou data sub-packaging module 10 and the Beidou communication data control word inserting module 11, the communication control module 12 determines to send the 4G data packet generated by the data packaging module into the 4G communication data encryption module 6 according to the control signal, the 4G communication data control frame inserting module 7, the TCP data packaging module 8 processes the data packet in sequence and sends the data packet through the 4G network, or sends the BD data packet into the Beidou communication encryption module 9, the Beidou communication sub-packaging module 10 and the Beidou data control word inserting module 11 process the data packet in sequence and send the data packet through the Beidou network. The control signal is from predetermined programming, the procedure can judge whether current 4G network is normal, 4G network normal use 4G network sends the data package, 4G network abnormal use big dipper network sends the data package.
Fig. 3 shows a transmission method of tower footing safety monitoring data based on Beidou communication and 4G communication: the data transmission is started, firstly 4G transmission is used, and if the 4G transmission is successful, the data transmission is ended; if the 4G transmission fails, continuing to try 4G transmission, and adopting Beidou transmission after 3 times of failure; if the Beidou transmission is successful, the data transmission is finished; and if the Beidou transmission fails, the Beidou transmission is continuously tried, and the data transmission is finished by storing the data after 3 times of failure.
Data are encrypted when Beidou transmission is adopted:
1. obtaining unencrypted Beidou short message plain text, wherein the Beidou short message is a plain text readable ASCII character string and can be represented as PT1, PT2, PT3, … … and PTn, wherein n represents that the character length of the Beidou short message is n bytes, wherein the ith plaintext character is represented by PTi, and the parameter 1 is not less than i and not more than n. In the Beidou short message plaintext, all characters are in a Beidou short message protocol effective character set but do not belong to a reserved character set, wherein the effective character set can be expressed as C (C1, C2, … … and Ce), wherein e is the number of characters in the effective character set, the ASCII code values of C1 to Ce are sequentially increased, the ASCII code value of C1 is minimum, and the ASCII code value of Ce is maximum; CR { CR1, CR2, …, CRf }, where f is the number of reserved character sets, PTi ∈ C, and
Figure BDA0003018284510000081
the second part of the road transport vehicle satellite positioning system Beidou compatible satellite positioning module issued by 2017-09-29 specifies that 96 Beidou short message communication effective characters are provided, wherein 8 characters are reserved, namely e is 96, f is 8, and the standard JT/T1159.2-2017 can be seen.
2. According to the Beidou short message plaintext in the step 1, acquiring the plaintext length n of the Beidou short message to be encrypted, and generating a key stream with the length larger than or equal to the byte length of the Beidou short message according to a sequence cipher algorithm, wherein KS is KS1, KS2, … … and KSJ; j is the byte length of the encryption key stream, J is more than or equal to n, wherein the ith bit of key data is represented by KSi, and the I is called as a sub key; the sequential Cipher, also known as Stream Cipher (Stream Cipher), is one of symmetric Cipher algorithms. The sequence cipher has the characteristics of simple realization, convenient hardware implementation, high encryption and decryption processing speed, no or limited error propagation and the like, so the sequence cipher has advantages in practical application, particularly in special or confidential institutions, and typical application fields comprise wireless communication and external communication.
3. Encrypting each byte in the Beidou short message plaintext PT by using the key stream, and encrypting the optional character PTi of the ith bit in the Beidou short message plaintext character string PT by using the following encryption cycle
(1) A divisor K is obtained, and 1< (256/K) <96 is satisfied, wherein K is an integer, and when K satisfies (256/K) <96, the smaller K is better.
(2) And obtaining an encryption sub-key NKSi by sub-key KSi operation, wherein the NKSi and the KSi are integers, and the operation divides the KSi by the divisor K to carry out rounding operation.
(3) The method includes the steps that an obtained ith bit encryption sub-key NKSi and an ith bit Beidou short message plaintext character PTi are used for generating a tentative encryption character TCTi, the specific mode is that the I CII code values of the ith bit encryption sub-key NKSi and the ith bit Beidou short message plaintext character PTi are added to obtain an encrypted ASCII code value TCTiA, if the TCTiA is larger than C96A, the TCTiA is KSi + PTiA-C96A + C1A-1, and if the value of the TCTiA is smaller than or equal to C96A, the TCTiA uses the result value, a query code table obtains the tentative encryption character TCTi according to the TCTiA value, wherein subscript A represents that the parameter is the ASCII code value of the character.
(4) Judging whether the temporary encryption character TCTi belongs to the effective character set of the Beidou short message, namely the TCTi meets the condition that the TCTi belongs to the C and
Figure BDA0003018284510000091
(5) if the tentative cryptographic character TCTi satisfies TCTi ∈ C and
Figure BDA0003018284510000096
and judging that the character is the encrypted character CTi of the ith plaintext character PTi of the Beidou short message plaintext.
(6) If the tentative crypt character TCTi does not satisfy TCTi ∈ C and
Figure BDA0003018284510000097
adding NKSi to the ASCII code value TCTiA of the temporary encrypted character TCTi to obtain a new value, and assigning the new value to TCTiA if TCTiA is not the same>At C96A, TCTiA is TCTiA-C96A + C1A-1, and if the value of TCTiA is less than or equal to C96A, TCTiA uses the result value to obtain a new tentative encrypted character TCTi by querying an ASCII code table for new TACiA, and then step (4) is repeated.
In the above encryption process, the condition that NKSi is less than 96 and the valid character is 96, so the operation must obtain an encrypted character TCTi satisfying the condition TCTi ∈ C and the valid character TCTi ∈ C
Figure BDA0003018284510000098
There is no case of encryption failure. Through the steps 1-6, ciphertext characters CTi corresponding to any ith Beidou short message plaintext character PTi can be obtained, and n-bit Beidou short message plaintext PT can be converted into n-bit Beidou short message ciphertext CT through n times of circulation.
The Beidou short message decryption is the reverse operation of Beidou short message encryption, wherein the meaning of parameters is consistent with the encryption parameters, and the decryption process refers to the following steps:
1. obtaining the cipher text of the Beidou short message, wherein the Beidou short message is a plaintextReadable ASCII strings can be represented as CT1, CT2, CT3, … …, CTn, where the ith ciphertext character is represented by CTi. For any CTi there is a CTi ∈ C and
Figure BDA0003018284510000092
}。
2. obtaining the length n of the Beidou short message ciphertext to be decrypted according to the Beidou short message ciphertext, generating a key stream with the length larger than or equal to the byte length of the Beidou short message according to a sequence cipher algorithm, and expressing the key stream by using KS and the I-th bit key data by using KSi as the encryption parameters.
3. Encrypting each byte in the Beidou short message ciphertext CT by using the key stream, and decrypting the ith bit of any character CTi in the Beidou short message ciphertext character string CT by using the following encryption cycle
(1) Obtaining divisor K, K is the same as K value used in encryption
(2) And obtaining an encryption sub-key NKSi by sub-key KSi operation, wherein the NKSi and the KSi are integers, and the operation divides the KSi by the divisor K to carry out rounding operation.
(3) The method comprises the following steps of generating a tentative decryption character TPTi by using an obtained ith bit encryption sub-key NKSi and an ith bit Beidou short message ciphertext character CTi, subtracting the ith bit encryption sub-key NKSi from the ith bit encryption character CTiA of the Beidou short message ciphertext to obtain a decrypted TPTiA, if the TPTiA is smaller than a value of C1A, using the result value of the TPTiA as C96- (C1- (CTI-NKSI)) +1, if the TPTiA is larger than C1A, and inquiring an ASCII code table to obtain the tentative decryption character TPTi according to the TPTiA value.
(4) Judging whether the temporary decryption character TPTi belongs to the effective character set of the Beidou short message, namely the TPTi meets the condition that the TPTi belongs to the element C and
Figure BDA0003018284510000101
(5) if the tentative decrypted character TPTi satisfies TPTi ∈ C and
Figure BDA0003018284510000102
then the character is judged to be the Beidou short message ciphertextAnd a decryption character PTi of the ith bit ciphertext character CTi.
(6) If the tentative decrypted character TPTi satisfies TPTi ∈ C and
Figure BDA0003018284510000103
and (3) subtracting NKSi from the tentative decrypted character TPTIA to obtain a new value, assigning the new value to TPTi, if TPTiA is smaller than the value of C1A, TPTiA is C96- (C1-TPTiA) +1, if TPTiA is larger than C1A, TPTiA uses the result value, queries an ASCII code table according to the new TPTiA to obtain a new tentative decrypted character TPTi, and then repeats the step (4).
Through the steps 1-6, the plain characters PTi corresponding to any ith Beidou short message ciphertext character CTi can be obtained, and through n times of circulation, the Beidou short message ciphertext CT with the n-bit length can be converted into the Beidou short message plaintext CT with the n-bit length.
Implementation example for encryption of plaintext of short message with length of 3 Beidou
1. Obtaining Beidou short message plaintext PT with the length of n, wherein all characters in the Beidou short message plaintext meet the relation { x | x ∈ C and
Figure BDA0003018284510000104
}; if the beidou short message plaintext to be encrypted is PT ═ 0, a, o, the short message plaintext does not contain the reserved character CR and all characters belong to C, wherein n ═ 3;
2. acquiring an encryption key stream, in this embodiment, an RC4 algorithm is selected to acquire the key stream, and RC4 is a symmetric cryptographic algorithm, and belongs to a sequential cipher (also called a stream cipher) in the symmetric cryptographic algorithm, and is a stream cipher with variable key length and byte-oriented operation. Firstly initializing a state vector S by the RC4 algorithm, then initializing the state vector S with any key length, and performing replacement operation on the state vector S to generate a key stream KS ═ KS1, KS2, … … and Kn with the length of the Beidou short message PT being n; generating a key stream KS with the length of 3 as 03h,46h and 3Fh according to the Beidou short message plaintext in the embodiment 1; where h represents the data as 16-ary.
3. Encrypting each byte in Beidou short message plaintext PT by using key stream KS
(1) Obtaining the value of K, in this example 3
(2) And obtaining an encryption sub-key NKSi by sub-key KSi operation, wherein the NKSi and the KSi are integers, and the operation divides the KSi by the divisor K to carry out rounding operation. If the key is used as in step 2, NKS2 is 23, and NKS3 is 21;
(3) in the present embodiment, if the plaintext character PT2 is calculated to obtain TCT2A ═ 71, the encrypted candidate character TCT2 ═ X 'is obtained by the encryption method, the plaintext character PT3 is calculated to obtain TCT3A ═ 36, and the encrypted candidate character TCT3 ═' $ 'is obtained by the encryption method'
(4) The tentative cryptographic character TCT2 satisfies TCT2 ∈ C in the above example and
Figure BDA0003018284510000111
the ciphertext character corresponding to the Beidou plaintext character PT2 is 'X'
(5) The tentative cryptographic character TCT3 does not satisfy TCT3 ∈ C and
Figure BDA0003018284510000112
the encrypted character is regenerated as described in the encryption method, TCT3 ═ 9'.
According to the encryption method, the beidou short message plaintext PT is 0, and the ciphertext corresponding to a, n is CT1, X, 9.
Beidou short message encryption and decryption method based on sequence cipher, and implementation example of decryption on Beidou short message ciphertext with length of 3
4. Obtaining a Beidou short message ciphertext CT with the length of n, wherein all characters in the Beidou short message plaintext meet the relation { x | x ∈ C and
Figure BDA0003018284510000113
}; if the beidou short message ciphertext to be decrypted is PT1, X, 9, the short message ciphertext does not contain the reserved character CR and all characters belong to C, wherein n is 3;
5. acquiring a decryption key stream, in this embodiment, an RC4 algorithm is selected to acquire the key stream, and RC4 is a symmetric cryptographic algorithm, and belongs to a sequential cipher (also called a stream cipher) in the symmetric cryptographic algorithm, and is a stream cipher with variable key length and byte-oriented operation. Firstly initializing a state vector S by the RC4 algorithm, then initializing the state vector S with any key length, and performing replacement operation on the state vector S to generate a key stream KS ═ KS1, KS2, … … and Kn with the length of the Beidou short message PT being n; generating a key stream KS of length 3 as 03h,46h, and 3Fh according to the beidou short message ciphertext in embodiment 1; where h represents that the data is 16-ary, the decryption key stream with length 3 is the same key as the encryption key stream, and RC4 belongs to symmetric encryption, the same decryption key stream is generated.
6. Decrypting each word in Beidou short message plaintext CT by using key stream KS
(6) Obtaining K value, according to convention, keeping the K value same with the encrypted K value, and taking 3
(7) And obtaining an encryption sub-key NKSi by sub-key KSi operation, wherein the NKSi and the KSi are integers, and the operation divides the KSi by the divisor K to carry out rounding operation. If the key is used as in step 2, NKS2 is 23, and NKS3 is 21;
(8) in the present embodiment, if TPT2A ═ 65 is obtained by calculating ciphertext character CT2, TPT2 ═ a 'is obtained by the decryption method, TPT3A ═ 36 is obtained by calculating ciphertext character CT3, and decrypted candidate character TCT3 ═ $ is obtained by the encryption method'
(9) The tentative decryption character TPT2 in the above example satisfies TCT2 ∈ C and
Figure BDA0003018284510000123
the ciphertext character corresponding to the Beidou plaintext character PT2 is 'A'
(10) The tentative decryption character TPT3 does not satisfy TCT3 ∈ C and
Figure BDA0003018284510000122
the decrypted character is regenerated as described in the decryption method, TCT3 ═ 0'.
According to the encryption method, the beidou short message ciphertext CT is 1, and the plaintext corresponding to X, 9 is PT is 0, a, o.

Claims (10)

1. The utility model provides a tower footing safety monitoring terminal based on big dipper communication and 4G communication, includes microprocessor, its characterized in that: the microprocessor processor is in communication connection with the 4G module, the Beidou communication module, the human-computer interaction module and the sensor module respectively.
2. The tower footing safety monitoring terminal based on Beidou communication and 4G communication of claim 1, characterized in that: the microprocessor module collects sensor data, compresses and encrypts the data and sends the data through the 4G module or the Beidou module.
3. The tower footing safety monitoring terminal based on Beidou communication and 4G communication of claim 2, characterized in that: the sensor module comprises a displacement signal acquisition module, a settlement signal acquisition module, a stress signal acquisition module and an osmotic pressure signal acquisition module, each sensing signal is transmitted to the data packaging module, the communication control module selects 4G communication or Beidou communication, and if the 4G communication is selected, the packaged data is transmitted through the 4G communication data encryption module, the 4G communication data control frame insertion module and the TCP packaging module in sequence and then is subjected to 4G communication transmission; if Beidou communication is selected, the packed data sequentially pass through the Beidou communication data encryption module, the Beidou communication data subpackaging module and the Beidou communication data control word inserting module and then are transmitted in the Beidou communication mode.
4. The tower footing safety monitoring terminal based on Beidou communication and 4G communication of claim 3, characterized in that:
the data packing module packs the data into a 4G communication available data packet and a Beidou communication available data packet, and packs the received displacement data, settlement data, stress data and osmotic pressure data into a 4G data packet and a BD data packet;
the 4G communication data encryption module encrypts the obtained 4G data packet to obtain an encrypted 4G data packet, wherein the encrypted 4G data packet changes original information data by using a symmetric encryption algorithm, and a plaintext is changed into a ciphertext;
the 4G communication data control frame inserting module adds a 4G communication message control frame to an encrypted 4G data packet to form a 4G communication message, wherein the 4G communication message is formed by inserting a 2-byte fixed frame header and a 4-byte load length before the encrypted 4G data packet;
the TCP data packaging module packages the received 4G communication message into a standard TCP communication message frame and sends the standard TCP communication message frame to the Internet for transmission;
the Beidou communication data encryption module encrypts the acquired BD data packet into an encrypted BD data packet, and changes original information data into a ciphertext from a plaintext by using a symmetric encryption algorithm;
the Beidou communication data packet module divides the received encrypted BD data packets into encrypted BD data packet groups with the size of 200 bytes, and each encrypted BD data packet group comprises a plurality of encrypted packets;
the Beidou communication data control word insertion module inserts control words into a plurality of encrypted packets in the encrypted BD data packet group to form a plurality of BD communication messages, and the BD communication messages are transmitted to a Beidou network;
the communication control module selects 4G communication or Beidou communication according to a control signal, the control signal is from a preset program design, and the program can judge whether the current 4G network is normal.
5. The tower footing safety monitoring terminal based on Beidou communication and 4G communication of claim 4, characterized in that: the 4G data packets are ASCII character strings with the size of less than 1500 bytes and meeting JSON standard, and the BD data packets are 16-system byte streams represented by the ASCII character strings with the size of less than 1500 bytes.
6. A tower footing safety monitoring data transmission method based on Beidou communication and 4G communication adopts the tower footing safety monitoring terminal of any one of claims 1-4 to transmit data, and is characterized in that: when data is transmitted, 4G communication is selected firstly, and if the 4G communication transmission fails, Beidou communication is selected for transmission.
7. The tower footing safety monitoring data transmission method based on Beidou communication and 4G communication according to claim 6, is characterized in that: encrypting each byte in the Beidou short message plaintext by using a sequence cipher algorithm, wherein the encrypting step comprises the following steps: obtaining a Beidou short message plaintext PT; acquiring a key stream KS according to a sequence cipher algorithm; extracting a sub-key KS from a stream of keys KSiTaking out the plaintext character PT from the short message plaintext PTi(ii) a Using PTiAnd KSiGenerating encrypted ciphertext CTi(ii) a Judging CTiIf it belongs to encrypted valid character, otherwise, the PT is reusediAnd KSiGenerating a new encrypted ciphertext CTi(ii) a All PTiAll encrypted are obtained by CTiAnd forming an encrypted ciphertext CT.
8. The tower footing safety monitoring data transmission method based on Beidou communication and 4G communication according to claim 7, wherein PTi is encrypted by using the following encryption loop steps:
(1) obtaining a divisor K, wherein the divisor K meets 1< (256/K) <96 and is an integer, and when K meets (256/K) <96, the smaller the K, the better the K is;
(2) performing operation on the sub-key KSi to obtain an encrypted sub-key NKSi, wherein the NKSi and the KSi are integers, and the operation is performed by dividing the KSi by a divisor K;
(3) the method comprises the steps of generating a tentative encrypted character TCTi by using an acquired ith bit encryption sub-key NKSi and an ith bit Beidou short message plaintext character PTi, and specifically, adding the I code value of the ith bit encryption sub-key NKSi and the I code value of the ith bit character PTi of the Beidou short message plaintext to obtain an encrypted ASCII code value TCTiA, if the TCTiA is larger than C96A, the TCTiA is KSi + PTiA-C96A + C1A-1, and if the value of the TCTiA is smaller than or equal to C96A, the TCTiA uses the result value, a query code table acquires the tentative encrypted character TCTi according to the TCTiA value, wherein a subscript A represents that the parameter is the ASCII code value of the character;
(4) judging whether the temporary encryption character TCTi belongs to the effective character set of the Beidou short message, namely the TCTi meets the condition that the TCTi belongs to the C and
Figure FDA0003018284500000031
(5) if the tentative cryptographic character TCTi satisfies TCTi ∈ C and
Figure FDA0003018284500000032
judging that the character is an encrypted character CTi of the ith plaintext character PTi of the Beidou short message plaintext;
(6) if the tentative crypt character TCTi does not satisfy TCTi ∈ C and
Figure FDA0003018284500000033
adding NKSi to the ASCII code value TCTiA of the temporary encrypted character TCTi to obtain a new value, and assigning the new value to TCTiA if TCTiA is not the same>At C96A, TCTiA is TCTiA-C96A + C1A-1, and if the value of TCTiA is less than or equal to C96A, TCTiA uses the result value to obtain a new tentative encrypted character TCTi by querying an ASCII code table for new TACiA, and then step (4) is repeated.
9. The tower footing safety monitoring data transmission method based on Beidou communication and 4G communication according to claim 8, wherein the CTi is decrypted by using the following encryption loop steps: obtaining a Beidou short message secret CT; acquiring a key stream KS according to a sequence cipher algorithm, taking a sub-key KSi from the key stream KS, and taking a plaintext character CTi from a short message plaintext CT; generating a decryption ciphertext PTi by using the CTi and the KSi; judging whether each PTi belongs to the decrypted effective character, if not, obtaining a new decrypted ciphertext PTi by using the CTi and the KSi until all the CTi are decrypted; the PTi is composed into a decrypted ciphertext PT.
10. The tower footing safety monitoring data transmission method based on Beidou communication and 4G communication according to claim 9, wherein the CTi is decrypted using the following encryption cycle:
(1) acquiring a K value of a divisor K used in encryption;
(2) obtaining an encryption sub-key NKSi by sub-key KSi operation, wherein the NKSi and the KSi are integers, and the operation is carried out by dividing the KSi by a divisor K;
(3) generating a tentative decryption character TPTi by using the acquired ith bit encryption sub-key NKSi and the ith bit Beidou short message ciphertext character CTi, wherein the specific mode is that the ith bit encryption sub-key NKSi is subtracted from the ith bit encryption character CTiA of the Beidou short message ciphertext to obtain a decryption TPTiA, if the TPTiA is smaller than the value of C1A, the TPTiA is C96- (C1- (CTI-NKSI)) +1, if the TPTiA is larger than C1A, the TPTiA uses the result value, and an ASCII code table is inquired to acquire the tentative decryption character TPTi according to the TPTiA value;
(4) judging whether the temporary decryption character TPTi belongs to the effective character set of the Beidou short message, namely the TPTi meets the condition that the TPTi belongs to the element C and
Figure FDA0003018284500000041
(5) if the tentative decrypted character TPTi satisfies TPTi ∈ C and
Figure FDA0003018284500000042
judging that the character is a decryption character PTi of the ith ciphertext character CTi of the Beidou short message ciphertext;
(6) if the tentative decrypted character TPTi satisfies TPTi ∈ C and
Figure FDA0003018284500000043
and (3) subtracting NKSi from the tentative decrypted character TPTIA to obtain a new value, assigning the new value to TPTi, if TPTiA is smaller than the value of C1A, TPTiA is C96- (C1-TPTiA) +1, if TPTiA is larger than C1A, TPTiA uses the result value, queries an ASCII code table according to the new TPTiA to obtain a new tentative decrypted character TPTi, and then repeats the step (4).
CN202110395214.3A 2021-04-13 2021-04-13 Tower foundation safety monitoring terminal based on Beidou communication and 4G communication and data transmission method Active CN114189854B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110395214.3A CN114189854B (en) 2021-04-13 2021-04-13 Tower foundation safety monitoring terminal based on Beidou communication and 4G communication and data transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110395214.3A CN114189854B (en) 2021-04-13 2021-04-13 Tower foundation safety monitoring terminal based on Beidou communication and 4G communication and data transmission method

Publications (2)

Publication Number Publication Date
CN114189854A true CN114189854A (en) 2022-03-15
CN114189854B CN114189854B (en) 2024-04-02

Family

ID=80601321

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110395214.3A Active CN114189854B (en) 2021-04-13 2021-04-13 Tower foundation safety monitoring terminal based on Beidou communication and 4G communication and data transmission method

Country Status (1)

Country Link
CN (1) CN114189854B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116074112A (en) * 2023-03-06 2023-05-05 国家海洋技术中心 Data transmission device and method
CN116095123A (en) * 2023-03-03 2023-05-09 中国建材检验认证集团湖南有限公司 Water conservancy monitoring system and method based on Beidou satellite application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205751206U (en) * 2016-05-19 2016-11-30 安徽继远软件有限公司 A kind of electric power tower deformation monitoring device based on Big Dipper technology
CN111465006A (en) * 2020-04-08 2020-07-28 无锡职业技术学院 Beidou short message encryption and decryption method based on ancestor algorithm and communication system
CN112304283A (en) * 2020-10-21 2021-02-02 国网福建省电力有限公司莆田供电公司 Pole tower state intelligent monitoring terminal and method based on Beidou and 4G dual-mode communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205751206U (en) * 2016-05-19 2016-11-30 安徽继远软件有限公司 A kind of electric power tower deformation monitoring device based on Big Dipper technology
CN111465006A (en) * 2020-04-08 2020-07-28 无锡职业技术学院 Beidou short message encryption and decryption method based on ancestor algorithm and communication system
CN112304283A (en) * 2020-10-21 2021-02-02 国网福建省电力有限公司莆田供电公司 Pole tower state intelligent monitoring terminal and method based on Beidou and 4G dual-mode communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张舒黎;石元兵;王雍;: "北斗短报文通信安全研究", 通信技术, no. 11, pages 202 - 206 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116095123A (en) * 2023-03-03 2023-05-09 中国建材检验认证集团湖南有限公司 Water conservancy monitoring system and method based on Beidou satellite application
CN116074112A (en) * 2023-03-06 2023-05-05 国家海洋技术中心 Data transmission device and method

Also Published As

Publication number Publication date
CN114189854B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
CN101061661B (en) Enciphering method
CN102144370B (en) Transmitting device, receiving device, transmitting method and receiving method
US11831764B2 (en) End-to-end double-ratchet encryption with epoch key exchange
CN114189854B (en) Tower foundation safety monitoring terminal based on Beidou communication and 4G communication and data transmission method
CN112073115B (en) Lora-based low-orbit satellite Internet of things registration security verification method, Internet of things terminal, network server and user server
CN108900540B (en) Service data processing method of power distribution terminal based on double encryption
CN111224974A (en) Method, system, electronic device and storage medium for network communication content encryption
CN102469173A (en) IPv6 (Internet Protocol Version 6) network layer credible transmission method and system based on combined public key algorithm
CN1323523C (en) Method of forming dynamic key in radio local network
CN115567207A (en) Method and system for realizing multicast data encryption and decryption by quantum key distribution
CN105847001A (en) Device, system and method for digital microwave communication based on quantum encryption
CN101621376A (en) Method, device and system for multi-level encryption and decryption
CN111385088B (en) Efficient satellite quantum key pairing generation method
CN101621661B (en) Audio-video encryption and decryption transmission system
CN117098123B (en) Quantum key-based Beidou short message encryption communication system
CN112311554B (en) Strong authentication method and system based on quantum symmetric key
CN117098120A (en) Beidou short message data encryption and decryption method, equipment and storage medium
CN101667912B (en) Network information transmission method and system therefor
CN110380848B (en) Method for safely communicating fixed sensor node and mobile sink node in underwater acoustic communication
CN111800784A (en) Block chain cloud service system based on cloud computing
CN104113543A (en) Block cipher based message authentication method
CN107040377A (en) A kind of method for storing cipher key based on quantum secret communication
JP2022519671A (en) How to authenticate messages in resource-constrained systems
CN113015157A (en) Method, device and system for supporting multiple encryption in wireless communication system
WO2013039659A1 (en) Hybrid encryption schemes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: No. 249, Baiyun North Road, Baiyun District, Guiyang City, Guizhou Province

Applicant after: Guiyang Yongqing Intelligent Control Technology Co.,Ltd.

Applicant after: POWERCHINA GUIZHOU ELECTRIC POWER DESIGN & RESEARCH INSTITUTE Co.,Ltd.

Address before: No. 249, Baiyun North Road, Baiyun District, Guiyang City, Guizhou Province

Applicant before: GUIYANG YONGQING INSTRUMENTS & ELECTRONIC SCIENCEAND TECHNOLOGY Co.,Ltd.

Country or region before: China

Applicant before: POWERCHINA GUIZHOU ELECTRIC POWER DESIGN & RESEARCH INSTITUTE Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant