CN116489666A - Wireless sensor network construction method and system for safety monitoring - Google Patents

Wireless sensor network construction method and system for safety monitoring Download PDF

Info

Publication number
CN116489666A
CN116489666A CN202310616843.3A CN202310616843A CN116489666A CN 116489666 A CN116489666 A CN 116489666A CN 202310616843 A CN202310616843 A CN 202310616843A CN 116489666 A CN116489666 A CN 116489666A
Authority
CN
China
Prior art keywords
wireless sensor
monitored
evaluation value
data
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310616843.3A
Other languages
Chinese (zh)
Other versions
CN116489666B (en
Inventor
赵金茹
卢占明
朱颢东
王广民
陈阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Xinanli Safety Technology Co ltd
Original Assignee
Henan Xinanli Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Xinanli Safety Technology Co ltd filed Critical Henan Xinanli Safety Technology Co ltd
Priority to CN202310616843.3A priority Critical patent/CN116489666B/en
Publication of CN116489666A publication Critical patent/CN116489666A/en
Application granted granted Critical
Publication of CN116489666B publication Critical patent/CN116489666B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a wireless sensor network construction method and system for safety monitoring, which belongs to the technical field of Internet of things and specifically comprises the following steps: determining a transmission stability evaluation value through historical network communication data of the wireless sensor, dividing the transmission stability evaluation value into a screening sensor and other sensors according to data quantity and real-time monitoring requirements, and setting a first-level network relay terminal for the screening sensor; dividing the area to be monitored safely to obtain a plurality of areas to be monitored, determining the setting quantity of the secondary network relay terminals in the area to be monitored based on the transmission stability evaluation value of the area to be monitored when the setting of the secondary network relay terminals is required based on the transmission stability evaluation value of the area to be monitored, and determining the setting quantity of the secondary network relay terminals in the area to be monitored by combining the quantity and the area of the primary network relay terminals in the area to be monitored, the quantity of the devices monitored by the wireless sensors and the quantity of the wireless sensors, so that the stability and the safety of data transmission are ensured.

Description

Wireless sensor network construction method and system for safety monitoring
Technical Field
The invention relates to the technical field of the Internet of things, in particular to a wireless sensor network construction method and system for safety monitoring.
Background
In order to realize real-time monitoring of the safety state of a factory, in the prior art, the safety state of equipment is often monitored through a wireless sensor, but due to the complexity of the field condition of the factory, the network state of the wireless sensor can be affected to a certain extent, and meanwhile, for some core equipment, the leakage risk of operation information can exist, so that if the factors cannot be considered, the reliable monitoring of the safety state cannot be realized, and meanwhile, the leakage risk of data can also be caused.
In order to solve the problem of real-time monitoring of the safety state of a factory, in an invention patent CN115696094A, an intelligent factory potential safety hazard supervision service system, parameters such as residual current, wire temperature, environmental temperature and the like of a power supply line are monitored in real time and are subjected to data exchange with a sensing data communication base station through a wireless data transmission mechanism, so that the real-time monitoring of the safety state of the power supply is realized, but the network state of a wireless sensor is not considered to be monitored and evaluated, the network transmission mode is determined according to an evaluation result, and meanwhile, screening of core equipment is not considered, so that certain leakage risk exists in operation data of the core equipment, and the safety of the data and the reliability of monitoring of the equipment cannot be ensured.
In order to solve the technical problems, the invention provides a wireless sensor network construction method and system for safety monitoring.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a wireless sensor network construction method and system for safety monitoring.
In a first aspect, the present invention provides a method for constructing a wireless sensor network for security monitoring, which specifically includes the following steps:
s11, acquiring a wireless sensor and equipment monitored by the wireless sensor, determining the risk of data leakage through the data volume of the wireless sensor, the safety requirement of data transmission and the encryption mode of the data transmission, dividing the wireless sensor into a core sensor and a general sensor based on the risk of data leakage, and constructing data encryption measures for the core sensor;
s12, determining a transmission stability evaluation value through historical network communication data of the wireless sensor, dividing the wireless sensor into a screening sensor and other sensors according to the data volume of the wireless sensor and real-time monitoring requirements of monitored equipment, and setting a primary network relay terminal for the screening sensor;
s13, dividing the area to be monitored safely according to the number of the wireless sensors to obtain a plurality of areas to be monitored, obtaining a transmission stability evaluation value of the area to be monitored based on the area of the area to be monitored, the number of the core sensors, the number of the screening sensors and the transmission stability evaluation value of the wireless sensors, and entering step S14 when the need of setting a secondary network relay terminal for the area to be monitored is determined based on the transmission stability evaluation value;
s14, determining the set number of the secondary network relay terminals of the area to be monitored by combining the number, the area and the number of the equipment monitored by the wireless sensor of the primary network relay terminals of the area to be monitored based on the transmission stability evaluation value of the area to be monitored.
A further technical solution consists in that the security requirements of the data transmission are determined according to the type of the device monitored by the wireless sensor.
The further technical scheme is that the specific steps of the data leakage risk construction are as follows:
s21, acquiring an encryption mode of data transmission of the wireless sensor, acquiring a transmission risk evaluation value of the wireless sensor based on the encryption mode of the data transmission, determining whether the wireless sensor has a safety risk based on the transmission risk evaluation value, if so, entering a step S22, if not, determining that the wireless sensor has no safety risk, and taking the transmission risk evaluation value as a data leakage risk of the wireless sensor;
s22, acquiring the security requirement of the data transmission of the wireless sensor, determining whether the wireless sensor has a security risk or not based on the security requirement of the data transmission of the wireless sensor, if so, entering a step S24, and if not, entering a step S23;
s23, acquiring data volume of data transmission of the wireless sensor in a set time, determining a network risk evaluation value of the wireless sensor by combining the data volume of specific data types of the wireless sensor in the preset time and the quantity of different data types of the transmission, determining whether safety risks exist or not based on the network risk evaluation value, if yes, entering a step S24, if not, determining that the safety risks do not exist, and taking the network risk evaluation value as the data leakage risk of the wireless sensor;
s24, determining the risk of data leakage of the wireless sensor based on the transmission risk assessment value, the security requirement and the network risk assessment value of the wireless sensor.
The specific data type is determined according to the equipment monitored by the wireless sensor, and the specific data type is determined according to the data type of the equipment monitored by the wireless sensor, which needs encryption processing.
Further technical solutions include, but are not limited to, WPA-PSK/WPA2-PSK, WPA/WPA2, WEP.
The further technical scheme is that the wireless sensor is divided into a screening sensor and other sensors, and specifically comprises:
s31, acquiring the data volume of the wireless sensor, determining whether the wireless sensor is a screening sensor or not based on the data volume, if so, taking the wireless sensor as the screening sensor, and if not, entering step S32;
s32, acquiring the type of equipment monitored by the wireless sensor, determining a real-time monitoring requirement, determining whether the wireless sensor is a screening sensor or not based on the real-time monitoring requirement, if so, taking the wireless sensor as the screening sensor, and if not, entering step S33;
s33, acquiring historical disconnection times, network interruption times larger than set time and network interruption times of the wireless sensor through historical network communication data of the wireless sensor, determining a transmission stability evaluation value of the wireless sensor by combining network delay and packet loss rate of the wireless sensor, judging whether the transmission stability evaluation value of the wireless sensor is smaller than a first threshold value, if yes, taking the wireless sensor as a screening sensor, and if no, entering step S34;
s34, determining a transmission evaluation value by utilizing the transmission stability evaluation value, the data quantity and the real-time monitoring requirement of the monitored equipment of the wireless sensor, and dividing the wireless sensor into a screening sensor and other sensors based on the transmission evaluation value.
When the transmission stability evaluation value of the wireless sensor is greater than a second threshold value, determining that the wireless sensor is a general sensor, and determining the transmission evaluation value is not performed any more.
The further technical scheme is that when the transmission stability evaluation value of the area to be monitored is smaller than the stability requirement value, it is determined that the setting of the secondary network relay terminal is required for the area to be monitored.
In a second aspect, embodiments of the present application provide a computer system, including: a communicatively coupled memory and processor, and a computer program stored on the memory and capable of running on the processor, characterized by: the processor executes the wireless sensor network construction method for safety monitoring when running the computer program.
In a third aspect, the present invention provides a storage device having a computer program stored thereon, which when executed in a computer causes the computer to perform a wireless sensor network construction method for security monitoring as described above.
The invention has the beneficial effects that:
the data leakage risk is determined through the data volume of the wireless sensor, the safety requirement of data transmission and the encryption mode of the data transmission, so that the screening of the wireless sensor with the data leakage risk is realized, the data safety of the wireless sensor with the data leakage risk is ensured, and the safety and reliability are further ensured.
The wireless sensor is divided into a screening sensor and other sensors according to the transmission stability evaluation value, the data quantity and the real-time monitoring requirement of the wireless sensor, so that the wireless sensor with data transmission defects and the wireless sensor with higher stability of data transmission from the angles of historical data and monitored equipment are screened, and the stability of the data transmission of the wireless sensor is ensured.
The transmission stability evaluation value of the area to be monitored is obtained based on the area of the area to be monitored, and the setting of the secondary network relay terminal is required to be carried out on the area to be monitored based on the transmission stability evaluation value, so that the setting of the secondary network relay terminal is evaluated from the aspect of stability of data transmission, and the reliability and stability of the data transmission are further ensured.
Additional features and advantages will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The above and other features and advantages of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings.
Fig. 1 is a flowchart of a wireless sensor network construction method for security monitoring according to embodiment 1.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments can be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar structures, and thus detailed descriptions thereof will be omitted.
The terms "a," "an," "the," and "said" are used to indicate the presence of one or more elements/components/etc.; the terms "comprising" and "having" are intended to be inclusive and mean that there may be additional elements/components/etc. in addition to the listed elements/components/etc.
Example 1
In order to solve the above problems, according to one aspect of the present invention, as shown in fig. 1, a method for constructing a wireless sensor network for security monitoring is provided, which specifically includes the following steps:
s11, acquiring a wireless sensor and equipment monitored by the wireless sensor, determining the risk of data leakage through the data volume of the wireless sensor, the safety requirement of data transmission and the encryption mode of the data transmission, dividing the wireless sensor into a core sensor and a general sensor based on the risk of data leakage, and constructing data encryption measures for the core sensor;
the security requirement of the data transmission is determined according to the type of the device monitored by the wireless sensor.
The specific steps of the data leakage risk construction are specifically illustrated as follows:
s21, acquiring an encryption mode of data transmission of the wireless sensor, acquiring a transmission risk evaluation value of the wireless sensor based on the encryption mode of the data transmission, determining whether the wireless sensor has a safety risk based on the transmission risk evaluation value, if so, entering a step S22, if not, determining that the wireless sensor has no safety risk, and taking the transmission risk evaluation value as a data leakage risk of the wireless sensor;
s22, acquiring the security requirement of the data transmission of the wireless sensor, determining whether the wireless sensor has a security risk or not based on the security requirement of the data transmission of the wireless sensor, if so, entering a step S24, and if not, entering a step S23;
s23, acquiring data volume of data transmission of the wireless sensor in a set time, determining a network risk evaluation value of the wireless sensor by combining the data volume of specific data types of the wireless sensor in the preset time and the quantity of different data types of the transmission, determining whether safety risks exist or not based on the network risk evaluation value, if yes, entering a step S24, if not, determining that the safety risks do not exist, and taking the network risk evaluation value as the data leakage risk of the wireless sensor;
s24, determining the risk of data leakage of the wireless sensor based on the transmission risk assessment value, the security requirement and the network risk assessment value of the wireless sensor.
It should be further noted that the specific data type is determined according to the device monitored by the wireless sensor, and the specific data type is determined according to the data type that needs to be encrypted by the device monitored by the wireless sensor.
It should be noted that the data encryption measures include, but are not limited to, any encryption mode of WPA-PSK/WPA2-PSK, WPA/WPA2, WEP.
In this embodiment, the data leakage risk is determined through the data volume of the wireless sensor, the security requirement of data transmission and the encryption mode of data transmission, so that the screening of the wireless sensor with the data leakage risk is realized, the security of the data of the wireless sensor with the data leakage risk is ensured, and the security and reliability are further ensured.
S12, determining a transmission stability evaluation value through historical network communication data of the wireless sensor, dividing the wireless sensor into a screening sensor and other sensors according to the data volume of the wireless sensor and real-time monitoring requirements of monitored equipment, and setting a primary network relay terminal for the screening sensor;
specific examples of the classification of the wireless sensor into a screening sensor and other sensors include:
s31, acquiring the data volume of the wireless sensor, determining whether the wireless sensor is a screening sensor or not based on the data volume, if so, taking the wireless sensor as the screening sensor, and if not, entering step S32;
s32, acquiring the type of equipment monitored by the wireless sensor, determining a real-time monitoring requirement, determining whether the wireless sensor is a screening sensor or not based on the real-time monitoring requirement, if so, taking the wireless sensor as the screening sensor, and if not, entering step S33;
s33, acquiring historical disconnection times, network interruption times larger than set time and network interruption times of the wireless sensor through historical network communication data of the wireless sensor, determining a transmission stability evaluation value of the wireless sensor by combining network delay and packet loss rate of the wireless sensor, judging whether the transmission stability evaluation value of the wireless sensor is smaller than a first threshold value, if yes, taking the wireless sensor as a screening sensor, and if no, entering step S34;
s34, determining a transmission evaluation value by utilizing the transmission stability evaluation value, the data quantity and the real-time monitoring requirement of the monitored equipment of the wireless sensor, and dividing the wireless sensor into a screening sensor and other sensors based on the transmission evaluation value.
Specifically, when the transmission stability evaluation value of the wireless sensor is greater than the second threshold value, the wireless sensor is determined to be a general sensor, and the transmission evaluation value is not determined any more.
In this embodiment, the wireless sensor is divided into the screening sensor and other sensors according to the transmission stability evaluation value, the data amount and the real-time monitoring requirement of the monitored device of the wireless sensor, so that the wireless sensor with the data transmission defect and the wireless sensor with higher stability of the data transmission from the perspective of the historical data and the perspective of the monitored device are screened, and the stability of the data transmission of the wireless sensor is ensured.
S13, dividing the area to be monitored safely according to the number of the wireless sensors to obtain a plurality of areas to be monitored, obtaining a transmission stability evaluation value of the area to be monitored based on the area of the area to be monitored, the number of the core sensors, the number of the screening sensors and the transmission stability evaluation value of the wireless sensors, and entering step S14 when the need of setting a secondary network relay terminal for the area to be monitored is determined based on the transmission stability evaluation value;
specifically, the method for evaluating the transmission stability evaluation value of the area to be monitored includes:
s41, acquiring a transmission stability evaluation value of a wireless sensor of the area to be monitored, acquiring the number of wireless sensors with the transmission stability evaluation value larger than a second threshold value and the number of wireless sensors with the transmission stability evaluation value smaller than a first threshold value based on the transmission stability evaluation value of the wireless sensor, carrying out a network stability evaluation value of the area to be monitored by combining the sum and the average value of the transmission stability evaluation values of the wireless sensors, and determining whether the area to be monitored needs to be provided with a secondary network relay terminal based on the network stability evaluation value of the area to be monitored, if yes, taking the network stability of the area to be monitored as the transmission stability evaluation value of the area to be monitored, otherwise, entering step S42;
s42, obtaining a corrected network stability evaluation value of the area to be monitored based on the area of the area to be monitored and the network stability evaluation value of the area to be monitored, judging whether the corrected network stability evaluation value of the area to be monitored meets the requirement, if so, entering step S43, and if not, entering step S44;
s43, based on the number of core sensors and the number of screening sensors in the area to be monitored, combining the network stability evaluation values of the area to be monitored to obtain network stability evaluation values corrected by the number of the area to be monitored, judging whether the network stability evaluation values corrected by the number of the area to be monitored meet the requirements, if yes, entering a step S44, and if not, determining that the setting of a secondary network relay terminal is not needed;
s44, based on the area of the area to be monitored, the number of core sensors and the number of screening sensors, combining the network stability evaluation value of the wireless sensor to obtain a transmission stability evaluation value of the area to be monitored, and determining whether the setting of the secondary network relay terminal is required or not based on the transmission stability evaluation value of the area to be monitored.
It can be understood that when the transmission stability evaluation value of the area to be monitored is smaller than the stability requirement value, it is determined that the setting of the secondary network relay terminal is required for the area to be monitored.
In the embodiment, the transmission stability evaluation value of the area to be monitored is obtained based on the area and the like of the area to be monitored, and the setting of the secondary network relay terminal is required to be performed on the area to be monitored based on the transmission stability evaluation value, so that the setting of the secondary network relay terminal is evaluated from the aspect of data transmission stability, and the reliability and the stability of data transmission are further ensured.
S14, determining the set number of the secondary network relay terminals of the area to be monitored by combining the number, the area and the number of the equipment monitored by the wireless sensor of the primary network relay terminals of the area to be monitored based on the transmission stability evaluation value of the area to be monitored.
Specifically, the method for determining the set number of the secondary network relay terminals in the area to be monitored includes:
s51, determining the basic set number of the secondary network relay terminals of the area to be monitored according to the number of the wireless sensors of the area to be monitored and the number of the primary network relay terminals of the area to be monitored;
s52, acquiring the area of the area to be monitored, determining whether the basic set number of the secondary network relay terminals meets the requirement or not based on the area of the area to be monitored, if so, entering a step S53, and if not, entering a step S54;
s53, acquiring a transmission stability evaluation value of the area to be monitored and the number of devices of the area to be monitored, acquiring the evaluation number of the secondary network relay terminals of the area to be monitored, judging whether the basic set number of the secondary network relay terminals is smaller than the evaluation number, if so, entering a step S54, and if not, taking the basic set number of the secondary network relay terminals of the area to be monitored as the set number of the secondary network relay terminals of the area to be monitored;
s54, obtaining the correction quantity of the secondary network relay terminals of the area to be monitored based on the transmission stability evaluation value of the area to be monitored, the quantity and the area of the equipment of the area to be monitored and combining the quantity of the core sensors of the area to be monitored, and determining the setting quantity of the secondary network relay terminals of the area to be monitored based on the basic setting quantity and the correction quantity.
Example 2
In an embodiment of the present application, a computer system is provided, including: a communicatively coupled memory and processor, and a computer program stored on the memory and capable of running on the processor, characterized by: the processor executes the wireless sensor network construction method for safety monitoring when running the computer program.
Example 3
The invention provides a storage device, on which a computer program is stored, which when executed in a computer causes the computer to execute a wireless sensor network construction method for safety monitoring as described above.
In the several embodiments provided in this application, it should be understood that the disclosed systems and methods may be implemented in other ways as well. The system embodiments described above are merely illustrative, for example, of the flowcharts and block diagrams in the figures that illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present invention may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored on a computer readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a random access memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
With the above-described preferred embodiments according to the present invention as an illustration, the above-described descriptions can be used by persons skilled in the relevant art to make various changes and modifications without departing from the scope of the technical idea of the present invention. The technical scope of the present invention is not limited to the description, but must be determined according to the scope of claims.

Claims (10)

1. The wireless sensor network construction method for safety monitoring is characterized by comprising the following steps of:
acquiring a wireless sensor and equipment monitored by the wireless sensor, determining the risk of data leakage through the data volume of the wireless sensor, the security requirement of data transmission and the encryption mode of the data transmission, dividing the wireless sensor into a core sensor and a general sensor based on the risk of data leakage, and constructing a data encryption measure for the core sensor;
determining a transmission stability evaluation value through historical network communication data of the wireless sensor, dividing the wireless sensor into a screening sensor and other sensors according to the data volume of the wireless sensor and real-time monitoring requirements of monitored equipment, and setting a primary network relay terminal for the screening sensor;
dividing the areas needing to be monitored safely according to the number of the wireless sensors to obtain a plurality of areas to be monitored, obtaining a transmission stability evaluation value of the areas to be monitored based on the areas of the areas to be monitored, the number of the core sensors, the number of the screening sensors and the transmission stability evaluation value of the wireless sensors, and entering the next step when the need of setting a secondary network relay terminal for the areas to be monitored is determined based on the transmission stability evaluation value;
and determining the set number of the secondary network relay terminals of the area to be monitored by combining the number, the area and the number of the wireless sensor monitoring devices of the primary network relay terminals of the area to be monitored based on the transmission stability evaluation value of the area to be monitored.
2. A method of constructing a wireless sensor network for security monitoring as defined in claim 1, wherein the security requirements of the data transmission are determined based on the type of device being monitored by the wireless sensor.
3. The method for constructing a wireless sensor network for safety monitoring according to claim 1, wherein the specific steps of constructing the data leakage risk are as follows:
s21, acquiring an encryption mode of data transmission of the wireless sensor, acquiring a transmission risk evaluation value of the wireless sensor based on the encryption mode of the data transmission, determining whether the wireless sensor has a safety risk based on the transmission risk evaluation value, if so, entering a step S22, if not, determining that the wireless sensor has no safety risk, and taking the transmission risk evaluation value as a data leakage risk of the wireless sensor;
s22, acquiring the security requirement of the data transmission of the wireless sensor, determining whether the wireless sensor has a security risk or not based on the security requirement of the data transmission of the wireless sensor, if so, entering a step S24, and if not, entering a step S23;
s23, acquiring data volume of data transmission of the wireless sensor in a set time, determining a network risk evaluation value of the wireless sensor by combining the data volume of specific data types of the wireless sensor in the preset time and the quantity of different data types of the transmission, determining whether safety risks exist or not based on the network risk evaluation value, if yes, entering a step S24, if not, determining that the safety risks do not exist, and taking the network risk evaluation value as the data leakage risk of the wireless sensor;
s24, determining the risk of data leakage of the wireless sensor based on the transmission risk assessment value, the security requirement and the network risk assessment value of the wireless sensor.
4. A method of constructing a wireless sensor network for security monitoring as claimed in claim 3, wherein the specific data type is determined according to the device monitored by the wireless sensor, and the specific data type is determined according to the data type of the device monitored by the wireless sensor that needs encryption processing.
5. A method of wireless sensor network construction for security monitoring as claimed in claim 1, wherein the data encryption means includes, but is not limited to, WPA-PSK/WPA2-PSK, WPA/WPA2, WEP.
6. The method for constructing a wireless sensor network for safety monitoring according to claim 1, wherein the wireless sensor is divided into a screening sensor and other sensors, and specifically comprises:
acquiring the data volume of the wireless sensor, determining whether the wireless sensor is a screening sensor or not based on the data volume, if so, taking the wireless sensor as the screening sensor, and if not, entering the next step;
acquiring the type of equipment monitored by the wireless sensor, determining a real-time monitoring requirement, determining whether the wireless sensor is a screening sensor or not based on the real-time monitoring requirement, if so, taking the wireless sensor as the screening sensor, and if not, entering the next step;
acquiring historical disconnection times, times of network interruption greater than set time and network interruption times of the wireless sensor through historical network communication data of the wireless sensor, determining a transmission stability evaluation value of the wireless sensor by combining network delay and packet loss rate of the wireless sensor, judging whether the transmission stability evaluation value of the wireless sensor is smaller than a first threshold value, if yes, taking the wireless sensor as a screening sensor, and if no, entering the next step;
and determining a transmission evaluation value by utilizing the transmission stability evaluation value, the data quantity and the real-time monitoring requirement of the monitored equipment of the wireless sensor, and dividing the wireless sensor into a screening sensor and other sensors based on the transmission evaluation value.
7. The method for constructing a wireless sensor network for safety monitoring according to claim 1, wherein when the transmission stability evaluation value of the wireless sensor is greater than a second threshold value, the wireless sensor is determined to be a general sensor, and the determination of the transmission evaluation value is not performed any more.
8. The method for constructing a wireless sensor network for safety monitoring according to claim 1, wherein when the transmission stability evaluation value of the area to be monitored is smaller than the stability requirement value, it is determined that the setting of the secondary network relay terminal is required for the area to be monitored.
9. A computer system, comprising: a communicatively coupled memory and processor, and a computer program stored on the memory and capable of running on the processor, characterized by: the wireless sensor network construction method for safety monitoring according to any one of claims 1-8, when the processor runs the computer program.
10. A storage device having stored thereon a computer program which, when executed in a computer, causes the computer to perform a wireless sensor network construction method for security monitoring as claimed in any one of claims 1 to 8.
CN202310616843.3A 2023-05-29 2023-05-29 Wireless sensor network construction method and system for safety monitoring Active CN116489666B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310616843.3A CN116489666B (en) 2023-05-29 2023-05-29 Wireless sensor network construction method and system for safety monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310616843.3A CN116489666B (en) 2023-05-29 2023-05-29 Wireless sensor network construction method and system for safety monitoring

Publications (2)

Publication Number Publication Date
CN116489666A true CN116489666A (en) 2023-07-25
CN116489666B CN116489666B (en) 2024-06-18

Family

ID=87218013

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310616843.3A Active CN116489666B (en) 2023-05-29 2023-05-29 Wireless sensor network construction method and system for safety monitoring

Country Status (1)

Country Link
CN (1) CN116489666B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117376955A (en) * 2023-11-07 2024-01-09 杭州纵横通信股份有限公司 Intelligent monitoring method for indoor network signal quality

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204371A1 (en) * 2002-04-30 2003-10-30 Chevron U.S.A. Inc. Temporary wireless sensor network system
JP2010233011A (en) * 2009-03-27 2010-10-14 Sumitomo Precision Prod Co Ltd Wireless sensor terminal and wireless sensor network system employing the same
CN104769650A (en) * 2012-10-18 2015-07-08 独立行政法人产业技术总合研究所 Sensor network system
CN106612505A (en) * 2015-10-23 2017-05-03 国网智能电网研究院 Wireless sensor safety communication and anti-leakage positioning method based on region division
CN112183999A (en) * 2020-09-24 2021-01-05 国网山东省电力公司电力科学研究院 Power distribution main equipment sensor reliability evaluation index feature extraction method
CN112533207A (en) * 2021-02-05 2021-03-19 浙江地芯引力科技有限公司 Data verification method, device and system of wireless sensor
CN112614293A (en) * 2020-12-04 2021-04-06 广东电力通信科技有限公司 Electric power Internet of things safety early warning method and system based on edge calculation
CN114760211A (en) * 2022-04-07 2022-07-15 湖北经济学院 Model simulation experiment device based on wireless sensor network
CN114916033A (en) * 2022-05-16 2022-08-16 浙江威固信息技术有限责任公司 Data transmission method, system, electronic equipment and storage medium
CN116074225A (en) * 2023-03-28 2023-05-05 浙江大丰数艺科技有限公司 Cross-media multidimensional sensor signal data interaction method, system and medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204371A1 (en) * 2002-04-30 2003-10-30 Chevron U.S.A. Inc. Temporary wireless sensor network system
JP2010233011A (en) * 2009-03-27 2010-10-14 Sumitomo Precision Prod Co Ltd Wireless sensor terminal and wireless sensor network system employing the same
CN104769650A (en) * 2012-10-18 2015-07-08 独立行政法人产业技术总合研究所 Sensor network system
CN106612505A (en) * 2015-10-23 2017-05-03 国网智能电网研究院 Wireless sensor safety communication and anti-leakage positioning method based on region division
CN112183999A (en) * 2020-09-24 2021-01-05 国网山东省电力公司电力科学研究院 Power distribution main equipment sensor reliability evaluation index feature extraction method
CN112614293A (en) * 2020-12-04 2021-04-06 广东电力通信科技有限公司 Electric power Internet of things safety early warning method and system based on edge calculation
CN112533207A (en) * 2021-02-05 2021-03-19 浙江地芯引力科技有限公司 Data verification method, device and system of wireless sensor
CN114760211A (en) * 2022-04-07 2022-07-15 湖北经济学院 Model simulation experiment device based on wireless sensor network
CN114916033A (en) * 2022-05-16 2022-08-16 浙江威固信息技术有限责任公司 Data transmission method, system, electronic equipment and storage medium
CN116074225A (en) * 2023-03-28 2023-05-05 浙江大丰数艺科技有限公司 Cross-media multidimensional sensor signal data interaction method, system and medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
李倩: "无线体域网的安全认证与密钥协商机制研究", 中国优秀硕士学位论文全文数据库信息科技辑, 15 March 2017 (2017-03-15) *
沈琳: "无线传感器网络结构与数据传输技术的研究", 中国博士学位论文全文数据库信息科技辑, 15 July 2012 (2012-07-15) *
祁义博: "无线网络链路态势感知技术研究", 中国优秀硕士学位论文全文数据库信息科技辑, 15 August 2020 (2020-08-15) *
秦婧文: "无线传感器网络数据隐私保护技术", 山东工业技术, 1 February 2017 (2017-02-01) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117376955A (en) * 2023-11-07 2024-01-09 杭州纵横通信股份有限公司 Intelligent monitoring method for indoor network signal quality

Also Published As

Publication number Publication date
CN116489666B (en) 2024-06-18

Similar Documents

Publication Publication Date Title
CN110505196B (en) Internet of things network card abnormality detection method and device
CN111427336B (en) Vulnerability scanning method, device and equipment for industrial control system
CN116489666B (en) Wireless sensor network construction method and system for safety monitoring
CN110830998B (en) Vehicle networking malicious node identification method based on trust mechanism
US8351357B2 (en) Tactical cognitive-based simulation methods and systems for communication failure management in ad-hoc wireless networks
CN109067763B (en) Safety detection method, equipment and device
US20110215920A1 (en) Alarm processing method, device, and system
CN109150565B (en) Network situation perception method, device and system
JP5152176B2 (en) Wireless cell monitoring method, apparatus and program thereof
CN118070341B (en) Big data management method and big data management system
CN113301600A (en) Abnormal data detection method and device for performance of satellite and wireless communication converged network
CN108738092B (en) Network switching method and related product
CN113129472B (en) Working condition data processing method and device, terminal equipment and readable storage medium
Najafi et al. Decentralized prediction and reputation approach in vehicular networks
Cheung et al. Statistical algorithms in fault detection and prediction: Toward a healthier network
CN112217764B (en) Risk identification method and device and electronic equipment
CN108900488B (en) Decentralization abnormal terminal discovery method and device in scene of Internet of things
CN113709083A (en) Network attack detection control method, device, base station and computer storage medium
CN116596315A (en) Intelligent monitoring and early warning system for production safety of digital factory
KR20180024523A (en) System and method for monitoring fault in mobile communication network
CN113891386B (en) Method, device and equipment for determining hidden faults of base station and readable storage medium
CN108023741B (en) Monitoring resource use method and server
CN115379456A (en) Power 5G network risk assessment method and device, electronic equipment and storage medium
JP7273476B2 (en) Wireless network system and wireless network monitoring method
CN117834540B (en) Communication optimization method based on ultrasonic water meter, internet of things system and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant