CN115412923A - Multi-source sensor data credible fusion method, system, equipment and storage medium - Google Patents

Multi-source sensor data credible fusion method, system, equipment and storage medium Download PDF

Info

Publication number
CN115412923A
CN115412923A CN202211330586.9A CN202211330586A CN115412923A CN 115412923 A CN115412923 A CN 115412923A CN 202211330586 A CN202211330586 A CN 202211330586A CN 115412923 A CN115412923 A CN 115412923A
Authority
CN
China
Prior art keywords
data
sensor
sensor data
fusion
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211330586.9A
Other languages
Chinese (zh)
Other versions
CN115412923B (en
Inventor
唐松
王志强
崔彦军
董佳
盖素丽
檀改芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Guochuang Kexing Technology Co ltd
Original Assignee
Institute Of Applied Mathematics Hebei Academy Of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute Of Applied Mathematics Hebei Academy Of Sciences filed Critical Institute Of Applied Mathematics Hebei Academy Of Sciences
Priority to CN202211330586.9A priority Critical patent/CN115412923B/en
Publication of CN115412923A publication Critical patent/CN115412923A/en
Application granted granted Critical
Publication of CN115412923B publication Critical patent/CN115412923B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The application provides a method, a system, equipment and a storage medium for credible fusion of multi-source sensor data. The method comprises the following steps: receiving sensor data; sorting the sensor data according to the acquisition time, and sequentially selecting sliding window data from the sorted sensor data based on a preset sliding window step length; calculating density estimation of the sliding window data based on a Gaussian kernel function aiming at the sliding window data selected each time, and screening candidate abnormal data from the sliding window data based on the density estimation; screening candidate abnormal data and marking abnormal values; determining predicted sensor data based on the prediction model and the sorted sensor data, and performing bit filling on abnormal values and missing values based on the predicted sensor data; and based on a Kalman filtering algorithm, performing state updating and data fusion on the position-supplemented sensor data to obtain sensor fusion data. The reliability of the multi-source sensor data fusion result can be improved.

Description

Multi-source sensor data credible fusion method, system, equipment and storage medium
Technical Field
The application relates to the technical field of trusted fusion of multi-source sensor data, in particular to a trusted fusion method, a system, equipment and a storage medium for the multi-source sensor data.
Background
With the rapid development of science and technology, people enter a new era of everything interconnection, and increasingly become an important research subject by researching how to effectively and comprehensively utilize multi-sensor information to overcome the defects and uncertainty of the information.
In the existing internet-of-things multi-source sensor data fusion technology, a plurality of similar or different sensors are often used for providing accurate sensing information from different angles, and external environment information is accurately sensed from different dimensions through an integrated data fusion algorithm. However, the following disadvantages exist: the internet of things equipment for mounting the sensor is usually limited in resources and is easily affected by the environment and attacked maliciously, and the sensor data inevitably has errors, which may cause false report and even serious misjudgment of the existing data fusion method; moreover, the current sensor data fusion usually uses a kalman filtering algorithm, but since the kalman filtering algorithm can only be used for a linear system, when raw data detected by sensors is incomplete and uncertain, many defects occur in the aspects of nonlinear correlation, collaborative errors and the like of a plurality of sensors.
Disclosure of Invention
The application provides a method, a system, equipment and a storage medium for credible fusion of multisource sensor data, and aims to solve the problem that in the prior art, the credibility of a data fusion result of an internet-of-things multisource sensor is low.
In a first aspect, the application provides a trusted fusion method for multi-source sensor data, including:
receiving sensor data, wherein the sensor data is collected by a plurality of sensor devices in a network;
sorting the sensor data according to the acquisition time, and sequentially selecting sliding window data from the sorted sensor data based on a preset sliding window step length;
calculating density estimation of the sliding window data based on a Gaussian kernel function aiming at the sliding window data selected each time, and screening candidate abnormal data from the sliding window data based on the density estimation;
screening the candidate abnormal data and marking abnormal values;
determining predicted sensor data based on a prediction model and the sorted sensor data, and performing bit filling on the abnormal value and the missing value based on the predicted sensor data;
and based on a Kalman filtering algorithm, performing state updating and data fusion on the sensor data after position compensation to obtain sensor fusion data, and outputting the sensor fusion data.
In a second aspect, the present application provides a multi-source sensor data trusted fusion device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the method according to the first aspect or any one of the possible implementations of the first aspect when executing the computer program.
In a third aspect, the application provides a multi-source sensor data trusted fusion system, which includes multiple sensor devices, a coordinator, a bus control transmission system, and the multi-source sensor data trusted fusion device described in the second aspect, where the coordinator is connected to the sensor devices and the bus control transmission system, respectively, and the multi-source sensor data trusted fusion device is connected to the bus control transmission system and the sensor devices, respectively;
the sensor equipment is used for acquiring sensor data and packaging and sending the sensor data to the coordinator;
the coordinator is used for sending the sensor data to the bus control transmission system;
and the bus control transmission system is used for sending the sensor data to the multi-source sensor data credible fusion equipment.
In a fourth aspect, the present application provides a computer-readable storage medium, which stores a computer program that, when executed by a processor, implements the steps of the method according to the first aspect or any one of the possible implementation manners of the first aspect.
The application provides a method, a system, equipment and a storage medium for credible fusion of multi-source sensor data, which receive sensor data; sorting the sensor data according to the acquisition time, and sequentially selecting sliding window data from the sorted sensor data based on a preset sliding window step length; calculating density estimation of the sliding window data based on a Gaussian kernel function aiming at the sliding window data selected each time, and screening candidate abnormal data from the sliding window data based on the density estimation; screening candidate abnormal data and marking abnormal values; determining predicted sensor data based on the prediction model and the sorted sensor data, and performing bit filling on abnormal values and missing values based on the predicted sensor data; and based on a Kalman filtering algorithm, performing state updating and data fusion on the sensor data after position compensation to obtain sensor fusion data, and outputting the sensor fusion data. According to the method and the device, the sensor data are sorted according to time, the abnormal values in the sensor data are screened according to the sliding window, the abnormal values and the missing values are subjected to bit supplementing after the abnormal values are obtained, the Kalman filtering algorithm is used for state updating and data fusion, sensor fusion data are obtained, and the reliability of the multi-source sensor data fusion result is improved on the basis of guaranteeing the normal operation of a system.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flowchart of an implementation of a trusted fusion method for multi-source sensor data provided by an embodiment of the present application;
FIG. 2 is a schematic structural diagram of a multi-source sensor data credible fusion system provided by an embodiment of the application;
FIG. 3 is a block flow diagram of a trusted fusion system for multi-source sensor data provided by an embodiment of the present application;
FIG. 4 is a flowchart illustrating an implementation of a method for trusted fusion of multi-source sensor data according to an embodiment of the present application;
FIG. 5 is a schematic structural diagram of a multi-source sensor data credible fusion device provided in an embodiment of the present application;
fig. 6 is a schematic diagram of a multi-source sensor data credible fusion device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
To make the objects, technical solutions and advantages of the present application more clear, the following description is made by way of specific embodiments with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating an implementation of a trusted fusion method for multi-source sensor data according to an embodiment of the present disclosure. In this embodiment, the execution subject of the trusted fusion method for multi-source sensor data is the trusted fusion equipment for multi-source sensor data. For example, the multi-source sensor data trusted fusion device may be a server deployed in a cloud, may also be a local computing device, and may also be a computing system composed of the server and the local computing device, which is not limited herein. The server may be a single server or a server cluster formed by a plurality of servers. In some embodiments, the multi-source sensor data trusted fusion device belongs to a device in a multi-source sensor data trusted fusion system, and the system may further include a bus control transmission system, a coordinator, a plurality of sensor devices connected to the coordinator, and the like. The number of the coordinators can be one or more, and each coordinator can be connected with one or more sensor devices in a communication mode. It should be noted that the components of the above-mentioned system are exemplary, and the system may include more or less devices, and is not limited herein. The method is detailed as follows:
in S101, sensor data is received, wherein the sensor data is collected by a plurality of sensor devices in a network.
Illustratively, sensor data CAN be received from a bus control transmission system, wherein the bus control transmission system supports the CAN/RS485 communication protocol.
In one possible implementation, before receiving the sensor data from the bus control transmission system, the method may further include:
after the sensor equipment which is accessed for the first time is found, distributing a public and private key pair to the sensor equipment which is accessed for the first time based on a SM2 algorithm, and distributing a corresponding unique identifier to the sensor equipment which is accessed for the first time based on a snowflake algorithm;
after receiving a joining application from certain sensor equipment, judging whether the digital signature of the sensor equipment passes authentication or not based on a digital signature method, wherein the digital signature consists of a public and private key pair and a unique identifier;
if the digital signature of the sensor equipment is not authenticated, adding the sensor equipment into a monitoring list of an abnormal sensor equipment monitoring system;
and if the digital signature authentication of the sensor device passes, allowing the sensor device to join the network.
Because the sensor equipment comprises the sensor, the controller, the single chip microcomputer and the like, when the sensor equipment is found to be accessed for the first time, public and private key pairs are distributed to the sensor equipment accessed for the first time by utilizing the SM2 algorithm, meanwhile, in order to ensure that IDs in a distributed system do not conflict, the characteristics of small and many sensors are combined, a SnowFlake algorithm (SnowFlake) is used for producing a unique identifier containing a 64Bit integer of 'timestamp + machine code + serial number', the unique identifier is distributed to the sensor equipment accessed for the first time, and reverse retrospective binding of the sensor equipment and sensor data in the whole life cycle is realized.
And then after a controller in the sensor equipment puts forward an adding application to the network, judging whether the digital signature of the sensor equipment passes the authentication based on a digital signature method for the sensor equipment which applies to add to the network and passes the SM2 algorithm and the snowflake algorithm: if the authentication is not passed, the sensor equipment is listed in a list of an abnormal sensor equipment monitoring system, and the information of the sensor equipment is monitored in real time through the abnormal sensor equipment monitoring system; and if the authentication is passed, allowing the sensor equipment to join the network, and executing the next operation.
The SM2 cryptographic algorithm is an elliptic curve public key cryptographic algorithm issued by the national crypto-authority on 12, month and 17 of 2010.
SnowFlake algorithm (SnowFlake) refers to an algorithm that uses a 64Bit number of type long as the globally unique ID. The application in distributed systems is quite extensive and the ID introduces a timestamp. For the embodiments of the present application, the cryptographic SM2 algorithm and the snowflake algorithm belong to the prior art, and are not described in detail.
In S102, the sensor data are sorted according to the acquisition time, and sliding window data are sequentially selected from the sorted sensor data based on a preset sliding window step length.
Sequencing the sensor data according to the acquisition time of the sensor equipment according to the sensor data received in S101 to obtain a sensor data time sequence, setting a sliding window step length for the sensor data time sequence according to a preset sliding window step length, and sequentially selecting sliding window data from the sensor data time sequence according to the sliding window step length, wherein for example, m sensor data is a sliding step length, m is not more than the sensor data time sequence, and when the sensor data time sequence is n, sequentially obtaining n-m +1 windows, n-m +1 windows according to the sliding window step length mEach window is respectively
Figure DEST_PATH_IMAGE001
In S103, for each selected sliding window data, a density estimation of the sliding window data is calculated based on the gaussian kernel function, and candidate abnormal data is obtained by screening from the sliding window data based on the density estimation.
In order to make the calculated density estimation of the sliding window data smoother, the density estimation of the sliding window data is calculated based on a Gaussian kernel function, and in order to determine whether the sensor data is a candidate abnormal value, the candidate abnormal data is screened from the sliding window data according to the density estimation and a preset screening threshold value.
In one possible implementation, computing a density estimate for the sliding window data based on a gaussian kernel function includes:
calculating a density estimate of the sliding window data by a first formula, wherein the first formula is:
Figure 160517DEST_PATH_IMAGE002
wherein,
Figure 241605DEST_PATH_IMAGE003
for the purpose of the density estimation,
Figure 388553DEST_PATH_IMAGE004
in order to be able to acquire the sensor data,
Figure 947710DEST_PATH_IMAGE005
for the number of data points in the sliding window,
Figure 863714DEST_PATH_IMAGE006
is the dimension of the sensor data and,
Figure 318966DEST_PATH_IMAGE007
in order to be a bandwidth matrix, the bandwidth matrix,
Figure 15526DEST_PATH_IMAGE008
current sensor data;
screening candidate abnormal data from the sliding window data based on density estimation, wherein the screening candidate abnormal data comprises the following steps:
and screening candidate abnormal data from the sliding window data based on the density estimation and a second formula, wherein the second formula is as follows:
Figure 316058DEST_PATH_IMAGE009
wherein,
Figure 148884DEST_PATH_IMAGE010
in order to preset the screening threshold value,
Figure 509459DEST_PATH_IMAGE011
to screen the weight coefficients.
To compute a density estimate of the sliding window data, a kernel density estimator that outputs a more smoothly estimated gaussian kernel function may be utilized
Figure 693315DEST_PATH_IMAGE012
The kernel density estimator is dynamically updated with newly added sensor data since the gaussian kernel function is a point-based estimate
Figure 531958DEST_PATH_IMAGE012
With reference to equation (1):
Figure 484871DEST_PATH_IMAGE013
(1)
wherein,
Figure 16346DEST_PATH_IMAGE012
in order to be a nuclear density estimator,
Figure 920455DEST_PATH_IMAGE006
for sensor data dimensionThe number of the first and second groups is,
Figure 828368DEST_PATH_IMAGE004
in order to be able to acquire the sensor data,
Figure 635787DEST_PATH_IMAGE008
in order to be able to obtain the current sensor data,
Figure 338164DEST_PATH_IMAGE007
is a bandwidth matrix.
Wherein for each dimension
Figure 231034DEST_PATH_IMAGE014
Bandwidth of (2)
Figure 411479DEST_PATH_IMAGE015
The bandwidth per dimension can be calculated according to equation (2) using Scott (Scott) rules
Figure 542246DEST_PATH_IMAGE015
Figure 477841DEST_PATH_IMAGE016
(2)
Wherein,
Figure 795690DEST_PATH_IMAGE015
for each dimension
Figure 842144DEST_PATH_IMAGE014
The bandwidth of (a) is determined,
Figure 561838DEST_PATH_IMAGE017
is dimension of
Figure 668334DEST_PATH_IMAGE014
The standard deviation of the sensor data is measured,
Figure 473479DEST_PATH_IMAGE005
the number of steps in the sliding window.
Bandwidth matrix
Figure 323623DEST_PATH_IMAGE007
For indicating data far from the current sensor
Figure 897824DEST_PATH_IMAGE008
The influence degree is a diagonal matrix of the kernel function bandwidth, and the specific reference is given to formula (3):
Figure 175222DEST_PATH_IMAGE018
(3)
wherein,
Figure 202084DEST_PATH_IMAGE007
is a bandwidth matrix.
In the embodiment of the present application, the most recent sensor data may be stored at regular time intervals, the density estimation in the current sliding window is calculated, and all the sensor data in the current sliding window is substituted into the first formula to obtain the density estimation of the sliding window data based on the gaussian kernel function
Figure 357384DEST_PATH_IMAGE003
For determining sensor data
Figure 786091DEST_PATH_IMAGE004
Whether the abnormal data is candidate abnormal data or not can be estimated according to the density of the sliding window data
Figure 234390DEST_PATH_IMAGE003
Setting a predetermined screening threshold
Figure 14127DEST_PATH_IMAGE010
Screening candidate abnormal data from the sliding window data, and presetting a screening threshold value
Figure 409336DEST_PATH_IMAGE010
The calculation formula of (2) refers to the second formula.
In a possible implementation manner, for each selected sliding window data, after the candidate abnormal data is screened from the sliding window data based on the density estimation, the method may further include:
for each candidate abnormal data, if the candidate abnormal data is not allocated with a corresponding abnormal identifier, allocating a corresponding abnormal identifier to the candidate abnormal data; if the candidate abnormal data is distributed with the corresponding abnormal identifier, the value of the abnormal identifier is increased by one.
Since the detected candidate abnormal data is not removed when being detected for the first time, in the embodiment of the present application, a corresponding abnormal identifier may be assigned to each detected candidate abnormal data that is not assigned with a corresponding abnormal identifier
Figure 754867DEST_PATH_IMAGE019
Adding one to the value of the anomaly flag of the detected candidate anomaly data to which the corresponding anomaly flag has been assigned, i.e. adding one to the value of the anomaly flag
Figure 577330DEST_PATH_IMAGE020
In S104, candidate abnormal data is screened and an abnormal value is marked.
In one possible implementation, the screening of candidate abnormal data and the marking of abnormal values includes:
for each candidate anomaly data, performing the steps of:
judging whether the abnormal identification of the candidate abnormal data reaches the preset identification times;
if yes, marking the candidate abnormal data as an abnormal value;
if not, determining the candidate abnormal data as normal data.
Based on the number of times of presetting identification
Figure 641100DEST_PATH_IMAGE021
According toException identification assigned to each candidate exception data in S104
Figure 308842DEST_PATH_IMAGE019
If the number of times of the abnormal mark of the candidate abnormal data in the sliding window period reaches the preset mark number of times, that is to say
Figure 774459DEST_PATH_IMAGE022
If yes, marking the candidate abnormal data as an abnormal value; if the number of times of the abnormal identification of the candidate abnormal data in the sliding window period does not reach the preset identification number of times, namely
Figure 767822DEST_PATH_IMAGE023
Then the candidate abnormal data is determined as normal data.
In S105, predicted sensor data is determined based on the prediction model and the sorted sensor data, and the abnormal value and the missing value are subjected to bit padding based on the predicted sensor data.
Since there may be inconsistent outliers in the collected sensor data, which may have a negative impact on the sensor data fusion and subsequent decision making systems, and the outliers in the sensor data are usually very different from the rest of the data, they form a small population in the sensor data, and at different time points, the outliers may exist on different scales, so it is necessary to mark the outliers in the sensor data and to complement the outliers and the missing values.
The abnormal value is the abnormal value obtained from the candidate abnormal data in S104.
The missing value is that when the sensor data is collected, the sensor equipment does not collect the data in the current time period or the collected data is omitted in the time period due to other reasons, the data is used as the missing value, and when the sensor data is sorted according to time, the time period is vacated and is used as the position of the missing value.
In one possible implementation manner, after S104 and before S105, the method may further include:
performing stability inspection on the sorted sensor data based on the stability inspection KPSS, and judging whether an inspection result passes or not;
and if the inspection result does not pass, performing n-order differential calculation on the sorted sensor data until the inspection result passes.
Because the prediction model requires that the time sequence must be stable, the stability test is performed on the sorted sensor data in the embodiment of the application, the stability test KPSS is adopted, and the test result, namely, the jingning, is judged whether to pass the test, if the test is passed, the step S106 can be performed, and if the test is not passed, the n-order differential calculation needs to be performed on the sorted sensor data until the test result is passed, namely, the signal becomes stable.
And carrying out n-order differential calculation on the sorted sensor data, wherein the n order can be a second order or even a third order but cannot exceed the third order, and the value of n is related to the stability test KPSS and is required to be not more than the third order at most.
In one possible implementation, the predictive model is an ARMA model;
the method may further comprise:
the ARMA model is scaled based on the autocorrelation function ACF and the partial autocorrelation function PACF and a residual check is performed to determine if the order is appropriate.
Inputting the sorted sensor data passing through the stability checking KPSS into an ARMA model based on an autocorrelation function ACF and a partial autocorrelation function PACF, determining predicted sensor data, and performing bit filling on abnormal values and missing values according to the predicted sensor data.
In S106, based on the kalman filter algorithm, the state update and the data fusion are performed on the position-supplemented sensor data to obtain sensor fusion data, and the sensor fusion data is output.
The Kalman filtering is an algorithm that performs optimal estimation on the system state by inputting and outputting observation data through a system using a linear system state equation. The optimal estimation can also be seen as a filtering process, since the observed data includes the effects of noise and interference in the system.
And according to the sensor data subjected to position compensation obtained in the step S105, performing state updating and data fusion by using a Kalman filtering algorithm to obtain sensor data fusion data, and outputting the sensor fusion data to a decision execution mechanism.
The application provides a multi-source sensor data credible fusion method, which comprises the steps of receiving sensor data; sorting the sensor data according to the acquisition time, and sequentially selecting sliding window data from the sorted sensor data based on a preset sliding window step length; calculating density estimation of the sliding window data based on a Gaussian kernel function aiming at the sliding window data selected each time, and screening candidate abnormal data from the sliding window data based on the density estimation; screening candidate abnormal data and marking abnormal values; determining predicted sensor data based on the prediction model and the sorted sensor data, and performing bit filling on abnormal values and missing values based on the predicted sensor data; and based on a Kalman filtering algorithm, performing state updating and data fusion on the position-supplemented sensor data to obtain sensor fusion data, and outputting the sensor fusion data. According to the method and the device, the sensor data are sorted according to time, the abnormal values in the sensor data are screened according to the sliding window, the abnormal values and the missing values are subjected to bit supplementing after the abnormal values are obtained, the Kalman filtering algorithm is used for state updating and data fusion, sensor fusion data are obtained, and the reliability of the multi-source sensor data fusion result is improved on the basis of guaranteeing the normal operation of a system.
Fig. 2 shows a schematic structural diagram of a multi-source sensor data credible fusion system provided in an embodiment of the present application, which is detailed as follows:
as shown in fig. 2, the multi-source sensor data trusted fusion system 2 includes a plurality of sensor devices 21, a coordinator 22, a bus control transmission system 23, and a multi-source sensor data trusted fusion device 24, where the coordinator 22 is connected to the sensor devices 21 and the bus control transmission system 23, respectively, and the multi-source sensor data trusted fusion device 24 is connected to the bus control transmission system 23 and the sensor devices 21, respectively;
the sensor device 21 is used for acquiring sensor data and packaging and sending the sensor data to the coordinator 22;
a coordinator 22 for transmitting the sensor data to the bus control transmission system 23;
and the bus control transmission system 23 is used for transmitting the sensor data to the multi-source sensor data credible fusion equipment 24.
The specific flow block diagram of the multi-source sensor data credible fusion system refers to fig. 3:
in one possible implementation, the sensor device 21 is configured to initialize sensor hardware and a protocol stack in the sensor device.
The Protocol stack (also called Protocol stack) is a specific software implementation of a computer network Protocol suite. One protocol in a suite of protocols is typically designed for only one purpose, which may make the design easier. Since each protocol module usually has to communicate with two other protocol modules above and below, they can usually be imagined as layers in a protocol stack. The lowest level of protocols always describes the physical interaction with the hardware. Each advanced level adds more features. The user application is only handling the top-most protocol.
In a possible implementation manner, the sensor device 21 may be further configured to determine, for the initialized sensor device, whether the sensor device is a first-time-accessed sensor device.
Whether the sensor equipment is accessed for the first time is judged, so that a public and private key pair and a unique identifier are distributed to the sensor equipment accessed for the first time, and the sensor data are conveniently sequenced according to the acquisition time during subsequent sensor data fusion.
In addition, whether the sensor equipment is firstly accessed or not is judged, the judgment can be carried out through a control server of the peripheral equipment, and when the sensor equipment is firstly accessed, the information of the sensor equipment is sent to a distribution server, wherein the distribution server can be multi-source sensor data credible fusion equipment or an independent distribution server of the peripheral equipment.
In a possible implementation manner, the multi-source sensor data trusted fusion device 24 may be further configured to, after discovering the sensor device that is accessed for the first time, allocate a public-private key pair to the sensor device that is accessed for the first time based on a secret SM2 algorithm, and allocate a corresponding unique identifier to the sensor device that is accessed for the first time based on a snowflake algorithm.
Public and private key pairs are distributed to the sensor equipment by using the SM2 cryptographic algorithm, so that the IDs in a distributed system are not in conflict, and then due to the characteristics of small and many sensors, a snowflake algorithm is adopted to produce a unique identifier containing a 64Bit integer of 'timestamp + machine code + serial number', and reverse tracing binding of the sensor equipment and the sensor number in the whole life cycle is realized.
In addition, a separate distribution server of the peripheral equipment can be used for distributing public and private key pairs and unique identifiers to the sensor equipment which is accessed for the first time.
In a possible implementation manner, the sensor device 21 may be further configured to send a join application to the multi-source sensor data trusted fusion device, where the join application carries a digital signature.
And searching and applying for joining the network through a controller in the sensor equipment, and sending the joining application to the multi-source sensor data credible fusion equipment.
In a possible implementation manner, the multi-source sensor data trusted fusion device 24 may be further configured to determine whether a digital signature of a certain sensor device passes authentication based on a digital signature method after receiving a join application from the sensor device, where the digital signature is composed of a public and private key pair and a unique identifier; if the digital signature of the sensor equipment is not authenticated, adding the sensor equipment into a monitoring list of an abnormal sensor equipment monitoring system; and if the digital signature authentication of the sensor device passes, allowing the sensor device to join the network.
The sensor equipment added into the monitoring list of the abnormal sensor equipment monitoring system still performs data acquisition work, and the abnormal sensor equipment monitoring system is only used for monitoring the sensor equipment.
The abnormal sensor equipment monitoring system can be realized in the multi-source sensor data credible fusion equipment, and can also be monitored by depending on a peripheral server.
In a possible implementation manner, the sensor device 21 may also be configured to determine whether a preconfigured sampling interval time is reached, and if yes, automatically sample the sensor device that passes the digital signature authentication, wake up the sensor device, and package and send sensor data to the coordinator 22 through the sensor device; if not, continuing to wait until the preset sampling interval time is reached, automatically sampling the sensor equipment passing the digital signature authentication, waking up the sensor equipment, and packaging and sending the sensor data to the coordinator 22 through the sensor equipment.
Whether the sampling interval time which is configured in advance is reached or not can be judged by adopting the sensor equipment, and can also be judged by peripheral judgment equipment, and the judgment result is sent to the sensor equipment.
In one possible implementation, the coordinator 22 may be configured to send the collected sensor data to the bus control transmission system 23.
In one possible implementation, the bus control transmission system 23 may be configured to send the sensor data from the coordinator to the multi-source sensor data trusted fusion device, where the bus control transmission system supports CAN and RS485 communication protocols.
In a possible implementation manner, the multi-source sensor data trusted fusion device 24 may be configured to perform preprocessing and data fusion on sensor data from the bus control transmission system to obtain sensor fusion data, and output the sensor fusion data to the decision making execution mechanism.
The preprocessing process comprises the implementation processes of S101, S102, S103, S104 and S105, and the data fusion comprises the implementation process of S106.
After preprocessing and data fusion of the multi-source sensor data credible fusion equipment, the multi-source sensor data credible fusion equipment can also be used for adding abnormal sensor equipment into a monitoring list of an abnormal sensor equipment monitoring system, so that monitoring of the abnormal sensor is realized.
The application provides a multi-source sensor data credible fusion party system, which receives sensor data; sorting the sensor data according to the acquisition time, and sequentially selecting sliding window data from the sorted sensor data based on a preset sliding window step length; calculating density estimation of the sliding window data based on a Gaussian kernel function aiming at the sliding window data selected each time, and screening candidate abnormal data from the sliding window data based on the density estimation; screening candidate abnormal data and marking abnormal values; determining predicted sensor data based on the prediction model and the sorted sensor data, and performing bit filling on abnormal values and missing values based on the predicted sensor data; and based on a Kalman filtering algorithm, performing state updating and data fusion on the position-supplemented sensor data to obtain sensor fusion data, and outputting the sensor fusion data. According to the method and the device, the sensor data are sorted according to time, the abnormal values in the sensor data are screened according to the sliding window, the abnormal values and the missing values are subjected to bit supplementing after the abnormal values are obtained, the Kalman filtering algorithm is used for state updating and data fusion, sensor fusion data are obtained, and the reliability of the multi-source sensor data fusion result is improved on the basis of guaranteeing the normal operation of a system.
The above-mentioned trusted fusion system and method for multi-source sensor data is described below with an implementation example.
Referring to fig. 3, if there are n sensor devices, after the system is powered on, first, the sensor devices initialize the sensor hardware and the protocol stack.
Secondly, the sensor equipment judges whether the initialized sensor equipment is firstly accessed sensor equipment, if so, the firstly accessed sensor equipment is distributed with a public and private key pair based on a state secret SM2 algorithm through multi-source sensor data credible fusion equipment, and the firstly accessed sensor equipment is distributed with a corresponding unique identifier based on a snowflake algorithm to obtain n sensor equipment with the public and private key pair and the unique identifier, which are recorded as sensor equipment ID1, sensor equipment ID2, \ 8230and sensor equipment IDn.
Thirdly, the sensor equipment sends a joining application to the multi-source sensor data credible fusion equipment, wherein the sensor equipment is initialized and is distributed with a public and private key pair and a unique identifier.
Fourthly, the multi-source sensor data credible fusion equipment receives the data from the first network
Figure 53310DEST_PATH_IMAGE024
After the adding application of the sensor equipment, judging whether the digital signature of the sensor equipment passes the authentication or not based on a digital signature method, if the digital signature does not pass the authentication, adding the sensor equipment into a monitoring list of an abnormal sensor equipment monitoring system, if the digital signature passes the authentication, allowing the sensor equipment to be added into a network, and sequentially judging the n sensor equipment according to the steps.
And fifthly, judging whether the preset sampling interval time is reached or not through the sensor equipment authenticated by the digital signature, if so, controlling the sensor equipment to automatically sample, awakening the sensor equipment, and packaging and sending the sensor data to the coordinator according to the sensor equipment.
And sixthly, sending the sensor data from the coordinator to the multi-source sensor data credible fusion equipment through a bus control transmission system supporting CAN and RS485 communication protocols.
Referring to fig. 4, fig. 4 is a flowchart of an implementation of the trusted fusion method for multi-source sensor data, and all workflows in the flowchart are executed by the trusted fusion device for multi-source sensor data.
Seventhly, after the sensor data are sent to the multi-source sensor data credible fusion equipment through the bus control transmission system, sequencing adjustment is carried out according to the ID of the sensor equipment and the acquisition time, a preset sliding window step length is set for the sequenced sensor data and is recorded as m, namely n-m +1 windows are sequentially obtained through the sliding window m, and the n-m +1 windows are respectively n-m +1 windows
Figure 790322DEST_PATH_IMAGE001
Eighthly, calculating density estimation of sliding window data based on a Gaussian kernel function according to the set sliding window
Figure 110445DEST_PATH_IMAGE003
The method comprises the following steps:
kernel density estimator for calculating Gaussian kernel function by referring to formula (1)
Figure 9131DEST_PATH_IMAGE012
Then, referring to the formula (2), calculating the bandwidth of each dimension
Figure 47494DEST_PATH_IMAGE015
Then, the bandwidth matrix is calculated with reference to the formula (3)
Figure 322618DEST_PATH_IMAGE007
And finally, estimating according to the nuclear density
Figure 730203DEST_PATH_IMAGE012
Bandwidth, bandwidth
Figure 127686DEST_PATH_IMAGE015
Sum bandwidth matrix
Figure 325449DEST_PATH_IMAGE007
Obtaining a density estimate of sliding window data based on a Gaussian kernel function
Figure 466581DEST_PATH_IMAGE003
Formula (1):
Figure 964558DEST_PATH_IMAGE013
(1)
wherein,
Figure 205047DEST_PATH_IMAGE012
in order to provide a kernel density estimator,
Figure 218002DEST_PATH_IMAGE006
in order to be the dimension of the sensor data,
Figure 834928DEST_PATH_IMAGE004
in order to be able to acquire the sensor data,
Figure 984150DEST_PATH_IMAGE008
in order to be able to obtain the current sensor data,
Figure 395539DEST_PATH_IMAGE007
is a bandwidth matrix.
Formula (2):
Figure 630212DEST_PATH_IMAGE016
(2)
wherein,
Figure 316408DEST_PATH_IMAGE015
for each dimension
Figure 257819DEST_PATH_IMAGE014
The bandwidth of (a) is determined,
Figure 168006DEST_PATH_IMAGE017
is dimension of
Figure 827658DEST_PATH_IMAGE014
The standard deviation of the sensor data is measured,
Figure 848703DEST_PATH_IMAGE005
the number of steps in the sliding window.
Formula (3):
Figure 910200DEST_PATH_IMAGE018
(3)
wherein,
Figure 194551DEST_PATH_IMAGE007
is a bandwidth matrix.
The first formula is:
Figure 639701DEST_PATH_IMAGE002
wherein,
Figure 402121DEST_PATH_IMAGE003
in order to be an estimate of the density,
Figure 380441DEST_PATH_IMAGE004
in order to be able to acquire the sensor data,
Figure 570114DEST_PATH_IMAGE005
for the number of data points in the sliding window,
Figure 266675DEST_PATH_IMAGE006
is the dimension of the sensor data and,
Figure 832785DEST_PATH_IMAGE007
in order to be a bandwidth matrix, the bandwidth matrix,
Figure 603295DEST_PATH_IMAGE008
is the current sensor data.
Ninth, to determine sensor data
Figure 26186DEST_PATH_IMAGE004
Whether it is a candidate anomaly data, based on density estimation
Figure 882147DEST_PATH_IMAGE003
And a preset screening threshold
Figure 48686DEST_PATH_IMAGE010
Screening candidate abnormal data from the sliding window data, wherein a screening threshold value is preset
Figure 939281DEST_PATH_IMAGE010
The calculation formula of (2) refers to the second formula. The second formula is:
Figure 736336DEST_PATH_IMAGE009
wherein,
Figure 141910DEST_PATH_IMAGE010
in order to preset the screening threshold value,
Figure 784244DEST_PATH_IMAGE011
to screen the weighting factors.
Tenth, for each candidate abnormal data, for each detected candidate abnormal data not assigned with the corresponding abnormal mark, assigning a corresponding abnormal mark
Figure 591663DEST_PATH_IMAGE019
Adding one to the value of the anomaly flag of the detected candidate anomaly data to which the corresponding anomaly flag has been assigned, i.e. adding one to the value of the anomaly flag
Figure 294039DEST_PATH_IMAGE020
Eleventh, judging whether the abnormal mark of each candidate abnormal data reaches the preset mark times
Figure 186909DEST_PATH_IMAGE021
If yes, marking the candidate abnormal data as an abnormal value, and if not, determining the candidate abnormal data as normal data, specifically as follows:
when the temperature is higher than the set temperature
Figure 632934DEST_PATH_IMAGE022
If yes, marking the candidate abnormal data as an abnormal value;
when the temperature is higher than the set temperature
Figure 58974DEST_PATH_IMAGE023
The candidate outlier is determined to be normal data.
Twelfth, based on the stability check KPSS, performing stability check on the sorted sensor data, and judging whether the check result passes or not, if not, performing second-order or even third-order differential calculation on the sorted sensor data until the signal becomes stable.
Thirteenth, the ARMA model is ranked based on the sensor data after stationarity check based on the ACF and PACF, and residual error check is performed to determine whether the rank is appropriate.
Fourteenth, after the order is determined and verified to be proper, the predicted sensor data is determined according to the ARMA model, the future trend of the sorted sensor data is predicted according to the predicted sensor data, and the abnormal value and the missing value are complemented.
And fifthly, based on a Kalman filtering algorithm, performing state updating and data fusion on the position-supplemented sensor data, and finally outputting the sensor fusion data and sending the data to a decision-making executing mechanism.
The sensor for judging whether the sensor is accessed for the first time, the digital signature verification and the abnormal sensor equipment monitoring system can be uniformly realized by the multi-source sensor data credible fusion equipment, and can also be respectively executed by peripheral equipment such as a server.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In the following, embodiments of the apparatus of the present application are provided, and for details which are not described in detail therein, reference may be made to the corresponding method embodiments described above.
Fig. 5 shows a schematic structural diagram of a multi-source sensor data credible fusion device provided in an embodiment of the present application, and for convenience of description, only parts related to the embodiment of the present application are shown, which are detailed as follows:
as shown in fig. 5, the multi-source sensor data credible fusion device 5 includes: a receiving module 51, a sorting module 52, a calculating module 53, a marking module 54, a bit complementing module 55 and a fusing module 56;
a receiving module 51, configured to receive sensor data, where the sensor data is collected by a plurality of sensor devices in a network;
the sorting module 52 is configured to sort the sensor data according to the acquisition time, and sequentially select sliding window data from the sorted sensor data based on a preset sliding window step length;
the calculation module 53 is configured to calculate, for each selected sliding window data, a density estimation of the sliding window data based on a gaussian kernel function, and filter candidate abnormal data from the sliding window data based on the density estimation;
a marking module 54, configured to filter candidate abnormal data and mark an abnormal value;
a bit filling module 55, configured to determine predicted sensor data based on the prediction model and the sorted sensor data, and fill in bits for the abnormal values and the missing values based on the predicted sensor data;
and the fusion module 56 is configured to perform state updating and data fusion on the position-supplemented sensor data based on a kalman filtering algorithm to obtain sensor fusion data, and output the sensor fusion data.
The application provides a multi-source sensor data credible fusion device, which receives sensor data; sorting the sensor data according to the acquisition time, and sequentially selecting sliding window data from the sorted sensor data based on a preset sliding window step length; calculating density estimation of the sliding window data based on a Gaussian kernel function aiming at the sliding window data selected each time, and screening candidate abnormal data from the sliding window data based on the density estimation; screening candidate abnormal data, and marking abnormal values; determining predicted sensor data based on the prediction model and the sorted sensor data, and performing bit filling on abnormal values and missing values based on the predicted sensor data; and based on a Kalman filtering algorithm, performing state updating and data fusion on the position-supplemented sensor data to obtain sensor fusion data, and outputting the sensor fusion data. According to the method and the device, the sensor data are sorted according to time, the abnormal values in the sensor data are screened according to the sliding window, the abnormal values and the missing values are subjected to bit supplementing after the abnormal values are obtained, the Kalman filtering algorithm is used for state updating and data fusion, sensor fusion data are obtained, and the reliability of the multi-source sensor data fusion result is improved on the basis of guaranteeing the normal operation of a system.
In one possible implementation, after the calculating module, the apparatus may further include an identification assignment module configured to:
for each candidate abnormal data, if the candidate abnormal data is not distributed with a corresponding abnormal identifier, distributing a corresponding abnormal identifier to the candidate abnormal data; if the candidate abnormal data is distributed with a corresponding abnormal identifier, adding one to the value of the abnormal identifier;
the marking module may specifically be configured to:
for each candidate anomaly data, performing the steps of:
judging whether the abnormal identification of the candidate abnormal data reaches the preset identification times;
if yes, marking the candidate abnormal data as an abnormal value;
if not, determining the candidate abnormal data as normal data.
In one possible implementation, the calculation module may be configured to:
calculating a density estimate of the sliding window data by a first formula, wherein the first formula is:
Figure 932252DEST_PATH_IMAGE002
wherein,
Figure 46838DEST_PATH_IMAGE003
for the purpose of the density estimation,
Figure 296554DEST_PATH_IMAGE004
in order to be able to acquire the sensor data,
Figure 281828DEST_PATH_IMAGE005
for the number of data points in the sliding window,
Figure 388324DEST_PATH_IMAGE006
is a dimension of the sensor data and,
Figure 927890DEST_PATH_IMAGE007
in order to be a bandwidth matrix, the bandwidth matrix,
Figure 778034DEST_PATH_IMAGE008
current sensor data;
screening candidate abnormal data from the sliding window data based on density estimation, wherein the screening candidate abnormal data comprises the following steps:
and screening candidate abnormal data from the sliding window data based on the density estimation and a second formula, wherein the second formula is as follows:
Figure 352235DEST_PATH_IMAGE009
wherein,
Figure 629632DEST_PATH_IMAGE010
in order to preset the screening threshold value,
Figure 922073DEST_PATH_IMAGE011
to screen the weighting factors.
In one possible implementation, after the marking module and before the bit-filling module, the apparatus may further include a stationarity checking module configured to:
performing stability inspection on the sorted sensor data based on the stability inspection KPSS, and judging whether the inspection result passes or not;
and if the detection result does not pass, performing n-order differential calculation on the sorted sensor data until the detection result passes.
In one possible implementation, the predictive model is an ARMA model;
the ARMA model is scaled based on the autocorrelation function ACF and the partial autocorrelation function PACF and a residual check is performed to determine if the order is appropriate.
In a possible implementation manner, before the receiving module, the apparatus may be further configured to:
after the sensor equipment which is accessed for the first time is found, distributing a public and private key pair to the sensor equipment which is accessed for the first time based on a SM2 algorithm, and distributing a corresponding unique identifier to the sensor equipment which is accessed for the first time based on a snowflake algorithm;
after receiving a joining application from certain sensor equipment, judging whether the digital signature of the sensor equipment passes authentication or not based on a digital signature method, wherein the digital signature consists of a public and private key pair and a unique identifier;
if the digital signature of the sensor equipment does not pass the authentication, adding the sensor equipment into a monitoring list of an abnormal sensor equipment monitoring system;
and if the digital signature authentication of the sensor equipment passes, allowing the sensor equipment to join the network.
Fig. 6 is a schematic diagram of a multi-source sensor data credible fusion device provided in an embodiment of the present application. As shown in fig. 6, the multi-source sensor data credible fusion device 6 of this embodiment includes: a processor 60, a memory 61 and a computer program 62 stored in said memory 61 and executable on said processor 60. The processor 60, when executing the computer program 62, implements the steps in each of the above-described embodiments of the trusted fusing method for multisource sensor data, such as S01 to S106 shown in fig. 1. Alternatively, the processor 60, when executing the computer program 62, implements the functions of the modules/units in the above-mentioned device embodiments, such as the functions of the modules 51 to 56 shown in fig. 5.
Illustratively, the computer program 62 may be partitioned into one or more modules/units that are stored in the memory 61 and executed by the processor 60 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 62 in the trusted fusion device 6 for multi-source sensor data. For example, the computer program 62 may be divided into the modules 51 to 56 shown in fig. 5.
The multi-source sensor data trusted fusion device 6 can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The multi-source sensor data trusted fusion device 6 may include, but is not limited to, a processor 60, a memory 61. Those skilled in the art will appreciate that fig. 6 is merely an example of the trusted fusion device 6 of multi-source sensor data, and does not constitute a limitation on the trusted fusion device 6 of multi-source sensor data, and may include more or fewer components than those shown, or combine certain components, or different components, for example, the terminal may also include input-output devices, network access devices, buses, etc.
The Processor 60 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 61 may be an internal storage unit of the multi-source sensor data trusted fusion device 6, for example, a hard disk or a memory of the multi-source sensor data trusted fusion device 6. The memory 61 may also be an external storage device of the multi-source sensor data trusted fusing device 6, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are equipped on the multi-source sensor data trusted fusing device 6. Further, the memory 61 may also include both an internal storage unit and an external storage device of the multi-source sensor data trusted fusion device 6. The memory 61 is used for storing the computer program and other programs and data required by the terminal. The memory 61 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal and method may be implemented in other ways. For example, the above-described apparatus/terminal embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the method according to the embodiments may be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the above-described embodiments of the trusted fusion method for multi-source sensor data may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U.S. disk, removable hard disk, magnetic diskette, optical disk, computer Memory, read-Only Memory (ROM), random Access Memory (RAM), electrical carrier wave signal, telecommunications signal, and software distribution medium, etc.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A multi-source sensor data credible fusion method is characterized by comprising the following steps:
receiving sensor data, wherein the sensor data is collected by a plurality of sensor devices in a network;
sorting the sensor data according to the acquisition time, and sequentially selecting sliding window data from the sorted sensor data based on a preset sliding window step length;
calculating density estimation of the sliding window data based on a Gaussian kernel function aiming at the sliding window data selected each time, and screening the sliding window data based on the density estimation to obtain candidate abnormal data;
screening the candidate abnormal data and marking abnormal values;
determining predicted sensor data based on a prediction model and the sorted sensor data, and performing bit filling on the abnormal value and the missing value based on the predicted sensor data;
and based on a Kalman filtering algorithm, performing state updating and data fusion on the position-supplemented sensor data to obtain sensor fusion data, and outputting the sensor fusion data.
2. The method of claim 1, wherein for each selected sliding window data, after screening candidate anomaly data from the sliding window data based on the density estimate, the method further comprises:
for each candidate abnormal data, if the candidate abnormal data is not allocated with a corresponding abnormal identifier, allocating a corresponding abnormal identifier to the candidate abnormal data; if the candidate abnormal data is distributed with a corresponding abnormal identifier, adding one to the value of the abnormal identifier;
the screening of the candidate abnormal data, and the marking of the abnormal value comprises:
for each candidate anomaly data, performing the steps of:
judging whether the abnormal identification of the candidate abnormal data reaches the preset identification times;
if yes, marking the candidate abnormal data as an abnormal value;
if not, determining the candidate abnormal data as normal data.
3. The method of claim 1, wherein computing the density estimate of the sliding window data based on a gaussian kernel function comprises:
calculating a density estimate of the sliding window data by a first formula, wherein the first formula is:
Figure 268047DEST_PATH_IMAGE001
wherein,
Figure 24651DEST_PATH_IMAGE002
for the purpose of the density estimation,
Figure 410633DEST_PATH_IMAGE003
in order to be able to provide said sensor data,
Figure 190370DEST_PATH_IMAGE004
for the number of data points in the sliding window,
Figure 880852DEST_PATH_IMAGE005
is the dimension of the sensor data and,
Figure 429645DEST_PATH_IMAGE006
in order to be a bandwidth matrix, the bandwidth matrix,
Figure 48845DEST_PATH_IMAGE007
is the current sensor data;
screening candidate abnormal data from the sliding window data based on the density estimation, wherein the candidate abnormal data comprises:
and screening candidate abnormal data from the sliding window data based on the density estimation and a second formula, wherein the second formula is as follows:
Figure 50299DEST_PATH_IMAGE008
wherein,
Figure 45937DEST_PATH_IMAGE009
in order to preset the screening threshold value,
Figure 449237DEST_PATH_IMAGE010
to screen the weighting factors.
4. The method of claim 1, wherein after screening the candidate outliers and labeling outliers, prior to determining predicted sensor data based on the estimated model and the ranked sensor data, the method further comprises:
performing stability inspection on the sorted sensor data based on the stability inspection KPSS, and judging whether the inspection result passes or not;
and if the inspection result does not pass, performing n-order differential calculation on the sorted sensor data until the inspection result passes.
5. The method for the trusted fusion of multisource sensor data of claim 1, wherein the predictive model is an ARMA model;
the method further comprises the following steps:
the ARMA model is scaled based on the autocorrelation function ACF and the partial autocorrelation function PACF and a residual check is performed to determine if the order is appropriate.
6. The method for trusted fusing of multi-source sensor data according to claim 1, wherein prior to receiving sensor data from a bus control transmission system, the method further comprises:
after the sensor equipment which is accessed for the first time is found, distributing a public and private key pair to the sensor equipment which is accessed for the first time based on a SM2 algorithm of the state secret, and distributing a corresponding unique identifier to the sensor equipment which is accessed for the first time based on a snowflake algorithm;
after receiving a joining application from certain sensor equipment, judging whether the digital signature of the sensor equipment passes authentication based on a digital signature method, wherein the digital signature consists of the public and private key pair and the unique identifier;
if the digital signature of the sensor equipment is not authenticated, adding the sensor equipment into a monitoring list of an abnormal sensor equipment monitoring system;
and if the digital signature authentication of the sensor device passes, allowing the sensor device to join the network.
7. A multi-source sensor data trust fusion apparatus comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the multi-source sensor data trust fusion method of any one of the above claims 1 to 6 when executing the computer program.
8. A multi-source sensor data credible fusion system is characterized by comprising a plurality of sensor devices, a coordinator, a bus control transmission system and the multi-source sensor data credible fusion device as claimed in claim 7, wherein the coordinator is respectively connected with the sensor devices and the bus control transmission system, and the multi-source sensor data credible fusion device is respectively connected with the bus control transmission system and the sensor devices;
the sensor equipment is used for acquiring sensor data and packaging and sending the sensor data to the coordinator;
the coordinator is used for sending the sensor data to the bus control transmission system;
and the bus control transmission system is used for sending the sensor data to the multi-source sensor data credible fusion equipment.
9. The multi-source sensor data trusted fusing system of claim 8, wherein the multi-source sensor data trusted fusing device is further configured to, after discovering the first-accessed sensor device, assign a public-private key pair to the first-accessed sensor device based on a SM2 algorithm, and assign a corresponding unique identifier to the first-accessed sensor device based on a snowflake algorithm;
the sensor equipment is also used for sending a joining application to the multi-source sensor data credible fusion equipment, wherein the joining application carries a digital signature;
the multi-source sensor data credible fusion equipment is also used for judging whether a digital signature of certain sensor equipment passes authentication or not based on a digital signature method after receiving a joining application from the sensor equipment, wherein the digital signature consists of the public and private key pair and the unique identifier; if the digital signature of the sensor equipment is not authenticated, adding the sensor equipment into a monitoring list of an abnormal sensor equipment monitoring system; and if the digital signature authentication of the sensor device passes, allowing the sensor device to join the network.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for the trusted fusion of multisource sensor data according to any one of claims 1 to 6 above.
CN202211330586.9A 2022-10-28 2022-10-28 Multi-source sensor data credible fusion method, system, equipment and storage medium Active CN115412923B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211330586.9A CN115412923B (en) 2022-10-28 2022-10-28 Multi-source sensor data credible fusion method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211330586.9A CN115412923B (en) 2022-10-28 2022-10-28 Multi-source sensor data credible fusion method, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115412923A true CN115412923A (en) 2022-11-29
CN115412923B CN115412923B (en) 2023-02-03

Family

ID=84168127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211330586.9A Active CN115412923B (en) 2022-10-28 2022-10-28 Multi-source sensor data credible fusion method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115412923B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104766129A (en) * 2014-12-31 2015-07-08 华中科技大学 Subway shield construction surface deformation warning method based on temporal and spatial information fusion
US20160226901A1 (en) * 2015-01-30 2016-08-04 Securonix, Inc. Anomaly Detection Using Adaptive Behavioral Profiles
CN108491861A (en) * 2018-02-24 2018-09-04 全球能源互联网研究院有限公司 Power transmission and transformation equipment state abnormal patterns recognition methods based on multi-source multi-parameter fusion and device
CN108933659A (en) * 2017-05-26 2018-12-04 全球能源互联网研究院 A kind of authentication system and verification method of smart grid
CN110720096A (en) * 2019-07-03 2020-01-21 深圳市速腾聚创科技有限公司 Multi-sensor state estimation method and device and terminal equipment
WO2021072887A1 (en) * 2019-10-18 2021-04-22 平安科技(深圳)有限公司 Abnormal traffic monitoring method and apparatus, and device and storage medium
CN113112077A (en) * 2021-04-14 2021-07-13 太原理工大学 HVAC control system based on multi-step prediction deep reinforcement learning algorithm
CN113181660A (en) * 2021-04-20 2021-07-30 杭州电魂网络科技股份有限公司 Method and system for predicting number of active people in real time in game, electronic equipment and storage medium
CN113962364A (en) * 2021-10-22 2022-01-21 四川大学 Multi-factor power load prediction method based on deep learning
CN114528934A (en) * 2022-02-18 2022-05-24 中国平安人寿保险股份有限公司 Time series data abnormity detection method, device, equipment and medium
CN114757413A (en) * 2022-04-11 2022-07-15 重庆远达烟气治理特许经营有限公司 Bad data identification method based on time sequence series analysis coupling neural network prediction
CN115130600A (en) * 2022-07-07 2022-09-30 福建师范大学 High-dimensional dynamic data stream anomaly detection method based on stacking habituation self-encoder

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104766129A (en) * 2014-12-31 2015-07-08 华中科技大学 Subway shield construction surface deformation warning method based on temporal and spatial information fusion
US20160226901A1 (en) * 2015-01-30 2016-08-04 Securonix, Inc. Anomaly Detection Using Adaptive Behavioral Profiles
CN108933659A (en) * 2017-05-26 2018-12-04 全球能源互联网研究院 A kind of authentication system and verification method of smart grid
CN108491861A (en) * 2018-02-24 2018-09-04 全球能源互联网研究院有限公司 Power transmission and transformation equipment state abnormal patterns recognition methods based on multi-source multi-parameter fusion and device
CN110720096A (en) * 2019-07-03 2020-01-21 深圳市速腾聚创科技有限公司 Multi-sensor state estimation method and device and terminal equipment
WO2021072887A1 (en) * 2019-10-18 2021-04-22 平安科技(深圳)有限公司 Abnormal traffic monitoring method and apparatus, and device and storage medium
CN113112077A (en) * 2021-04-14 2021-07-13 太原理工大学 HVAC control system based on multi-step prediction deep reinforcement learning algorithm
CN113181660A (en) * 2021-04-20 2021-07-30 杭州电魂网络科技股份有限公司 Method and system for predicting number of active people in real time in game, electronic equipment and storage medium
CN113962364A (en) * 2021-10-22 2022-01-21 四川大学 Multi-factor power load prediction method based on deep learning
CN114528934A (en) * 2022-02-18 2022-05-24 中国平安人寿保险股份有限公司 Time series data abnormity detection method, device, equipment and medium
CN114757413A (en) * 2022-04-11 2022-07-15 重庆远达烟气治理特许经营有限公司 Bad data identification method based on time sequence series analysis coupling neural network prediction
CN115130600A (en) * 2022-07-07 2022-09-30 福建师范大学 High-dimensional dynamic data stream anomaly detection method based on stacking habituation self-encoder

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖艳等: "基于亲信度的过程信号与报警信号相关性分析", 《科学技术与工程》 *

Also Published As

Publication number Publication date
CN115412923B (en) 2023-02-03

Similar Documents

Publication Publication Date Title
CN110120936B (en) Block chain-based distributed network attack detection and safety measurement system and method
CN111357242B (en) Abnormal communication detection device and method, computer readable recording medium
CN110462713A (en) The unclonable function of the physics of synthesis
CN108352998A (en) Telemetering adjusts
CN112131274B (en) Method, device, equipment and readable storage medium for detecting abnormal points of time sequence
CN108805174A (en) clustering method and device
CN110099074A (en) A kind of method for detecting abnormality of internet of things equipment, system and electronic equipment
WO2019107149A1 (en) Bit assignment assessment device, bit assignment assessment method, and program
CN112328731A (en) Vehicle lane level positioning method and device, electronic equipment and computer readable medium
CN117580046A (en) Deep learning-based 5G network dynamic security capability scheduling method
CN115412923B (en) Multi-source sensor data credible fusion method, system, equipment and storage medium
CN109462514A (en) XDR Data Quality Assessment Methodology, device and computer readable storage medium
CN115086172B (en) Data gateway plug-in updating method and device, electronic equipment and storage medium
CN111189533A (en) External force invasion monitoring method and device, computer equipment and storage medium
CN107688878B (en) Air Quality Forecast method and device
CN105812204A (en) Recursion domain name server online identification method based on connectivity estimation
CN115811487A (en) Method, device, medium and electronic equipment for detecting abnormality of system flow data
CN107948989A (en) A kind of computational methods and device of mobile terminal networking duration
CN113902230A (en) Electric quantity deviation control method, system, storage medium and electronic equipment
WO2021095044A1 (en) Apparatuses, methods, and computer programs for detecting an impostor system
US20140258332A1 (en) Fast distributed database frequency summarization
CN110209470A (en) Heartbeat detecting method, system, equipment and the medium of virtual machine
CN110399803A (en) A kind of vehicle checking method and device
CN116340427B (en) Method for environmental protection data early warning system
Mirkovic et al. Cybersecurity datasets: A mirage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240416

Address after: Room 107, 1st Floor, Building 4, Hebei Academy of Sciences, No. 46 Youyi South Street, Shijiazhuang City, Hebei Province, 050051

Patentee after: Hebei Guochuang Kexing Technology Co.,Ltd.

Country or region after: China

Address before: 050081 Building 1, 46 Youyi South Street, Shijiazhuang City, Hebei Province

Patentee before: INSTITUTE OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCIENCES

Country or region before: China

TR01 Transfer of patent right