WO2023216424A1 - 一种网络化加密传输的数据链业务处理系统及方法 - Google Patents

一种网络化加密传输的数据链业务处理系统及方法 Download PDF

Info

Publication number
WO2023216424A1
WO2023216424A1 PCT/CN2022/107956 CN2022107956W WO2023216424A1 WO 2023216424 A1 WO2023216424 A1 WO 2023216424A1 CN 2022107956 W CN2022107956 W CN 2022107956W WO 2023216424 A1 WO2023216424 A1 WO 2023216424A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
transmission
protocol
business
network
Prior art date
Application number
PCT/CN2022/107956
Other languages
English (en)
French (fr)
Inventor
张捷
黄静
王学琨
王梁
牛立新
Original Assignee
天津航天中为数据系统科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 天津航天中为数据系统科技有限公司 filed Critical 天津航天中为数据系统科技有限公司
Publication of WO2023216424A1 publication Critical patent/WO2023216424A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5083Techniques for rebalancing the load in a distributed system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the invention belongs to the field of unmanned aerial vehicle system communication technology, and in particular relates to a data link business processing system and method for networked encrypted transmission.
  • the data link is mainly responsible for the two-way business communication function between the UAV and the ground.
  • the data link may connect to a variety of business equipment including flight control, mission pods, payload services, networking terminals and other link end systems.
  • Adopt a network interface communication method that integrates business transmission, command control, status monitoring, collaborative sharing and heterogeneous communication.
  • the UAV system needs to adjust the business terminal combination in a timely manner, which introduces the problem of link system adaptation to multiple types of network communication protocols.
  • Link modification not only increases the workload, but also causes the problem of multiple link versions under the same communication system architecture.
  • the coupling degree between links and devices increases significantly, which is not conducive to dynamic expansion under temporary task adjustment and makes later maintenance and management difficult.
  • wireless signals are easy to be captured and deciphered, and flight data faces the risk of leakage.
  • the present invention aims to propose a data link business processing system and method for networked encrypted transmission to solve the problems of poor information transmission compatibility, low security, and low efficiency during two-way communication between drones and the ground.
  • this application proposes a data link business processing method for networked encrypted transmission, which is used for data transmission between drones and the ground.
  • the specific method is as follows:
  • the sending-end business processing system determines the transmission method for information data transmission based on the parsing position of the five-layer protocol stack that receives the information data of the sending-end business equipment.
  • the transmission method includes network protocol analysis and transmission of information data obtained from the application layer, from the network Network layer data transmission to obtain information data from the physical layer, and Ethernet frame protocol transmission to obtain information data from the physical layer;
  • the transmitted information data is divided into business data and network data
  • the business data is formed into fixed-length framing data according to the framing transmission mode set by the business data
  • the network data is formed into fixed-length framing data according to the network data.
  • the framing transmission mode set by the data forms variable length framing data
  • the data transmitted by the wireless link in step S3 completes the reverse sequence protocol decryption and deframe processing, and sends it to the receiving end business device through the network stack of the receiving end business processing system to complete the information data transmission.
  • step S1 the network protocol analysis and transmission of information data is obtained from the application layer.
  • the specific method is as follows:
  • the external business device packages the information data in the protocol stack using the specified network protocol, and transmits it to the business processing system through the Ethernet interface; the transmission process parses the protocol stack, obtains the original information data at the network application layer, and pushes the information data to Each interface buffers the first-in first-out buffer FIFO and waits for protocol framing;
  • the peer business processing system Through wireless link transmission, signal demodulation and decoding and internal interface communication, the peer business processing system obtains the dense state protocol frame; according to the data framing rules, completes the protocol frame synchronization, decryption, and parsing processes, and restores the original multi-channel Information data is pushed to the interface cache FIFO and waits for the protocol to be sent;
  • step S1 the network layer data transmission of information data is obtained from the network layer.
  • the specific method is as follows:
  • S121 According to the differentiated needs of external business equipment, modify the system configuration file to perform network layer data transmission functions; create internal network bridges and multiple virtual network devices, complete bridge binding of actual physical network cards, and configure the addresses of each network device;
  • S122 According to the forward and return service transmission direction, configure the system default gateway and multiple sets of static routing information to ensure effective routing and addressing of information data; at the same time, in order to realize routing transmission, activate the system network layer IP packet forwarding function;
  • the system performs variable length protocol framing and data encryption processing on unequal length network layer IP packets; the dense state protocol frame completes the internal data through the business processing system and the transceiver interface. Communication, after signal coding and modulation processing, wireless link transmission is enabled;
  • the peer business processing system Through wireless link transmission, signal demodulation and decoding and internal interface communication, the peer business processing system obtains the dense protocol frame; according to the data framing rules, completes the protocol frame synchronization, decryption, and parsing processes, and restores the original network layer data pack;
  • the transmission process sends the network layer data packet to the virtual network device, and pushes the data packet into the network layer of the protocol stack; according to the routing configuration and default gateway information, the network layer data packet containing the business information is addressed and delivered through routing, and finally transmitted to the target.
  • step S1 the Ethernet frame protocol transmission of information data is obtained from the physical layer.
  • the specific method is as follows:
  • the system network card In order to ensure the effective reception of the bottom layer data frames of the protocol stack, the system network card is configured in a hybrid working mode; according to the information data type, transmission protocol and link bandwidth information in the configuration file, set the filtering rules and traffic limits for the bottom layer Ethernet frame transmission;
  • the transmission process captures the underlying Ethernet frame protocol data containing business information through the original socket; in order to ensure single frame transmission delay, the system performs variable-length protocol framing and data encryption on unequal-length Ethernet frames; encryption The static protocol frame completes internal data communication through the business processing system and the transceiver interface, and then undergoes signal coding and modulation processing to start wireless link transmission;
  • the peer business processing system Through wireless link transmission, signal demodulation and decoding and internal interface communication, the peer business processing system obtains the dense protocol frame; according to the data framing rules, completes the protocol frame synchronization, decryption, and parsing processes, and restores the original Ethernet Frame protocol data;
  • the transmission process sends the Ethernet frame protocol data to the physical layer of the protocol stack.
  • the target MAC address information in the Ethernet frame Through the target MAC address information in the Ethernet frame, the self-addressed transmission of the protocol data to the service receiving equipment is completed, and the MAC layer of airborne and ground service equipment is realized. Penetrate.
  • step S2 based on the difference in transmission methods when transmitting information data, the transmitted information data is divided into business data and network data.
  • the specific classification method is:
  • the data transmitted through network protocol analysis is business data
  • Data transmitted through network layer data transmission or Ethernet frame protocol is network data.
  • step S2 the service data is formed into fixed-length framing data according to the framing transmission mode set by the service data.
  • the specific method is as follows:
  • Protocol frame FHA cache channel defines protocol frame FHA framing content including synchronization word, type number, identification code, data area, count/check;
  • the data area is divided into two sections: low-speed FHA frame and high-speed business data.
  • the effective data length is used to distinguish the criticality of the frame business;
  • the business data related information includes data type, transmission rate, priority, cache status, and waiting time;
  • the fixed-length composite protocol frame FHB enters the system encryption channel to complete the encryption of the data area outside the asynchronous words and key areas; the business data is framed at a variable speed at the actual transmission rate, and the FHB frame enters the ring storage interface cache in variable speed transmission mode. ;
  • the system According to the interface transmission rate between the system and the link transceiver, extract the FHB frame data from the ring storage at a fixed rate periodically, and frame it with a 1664-byte fixed-length interface protocol; the interface frame IFA content includes the synchronization word , type, effective length, frame count and data area, the system will enter the link transmission system in the form of fixed-speed interface frame IFA through the internal communication interface at a transmission rate greater than the actual total service bandwidth.
  • the network data is formed into variable-length framing data according to the framing transmission mode set by the network data.
  • the specific method is as follows:
  • TRA framing In network data transmission, whether it is network layer data packets or underlying Ethernet protocol frames, the lengths of the preceding and following data packets are not equal.
  • the business processing system performs variable-length protocol frames on the accessed network data.
  • TRA framing, variable length protocol frame TRA framing content includes frame header/frame tail, key area, data area and count/check. Each TRA frame only contains a complete network layer data packet or a complete Ethernet protocol frame.
  • Protocol escape is performed on data with frame header/frame tail information in the data area to ensure the uniqueness of the synchronization word; after the completion of the variable length protocol frame TRA framing, the process of encryption and transmission and the FHB frame processing method in steps S213-S214, After data encryption and cache code processing, it enters the link transmission system in the form of fixed-speed interface frame IFA through the internal communication interface.
  • step S3 both the fixed-length framing data and the variable-length framing data are encrypted.
  • step S4 the data transmitted by the wireless link in step S3 is decrypted using the reverse sequence protocol.
  • the specific encryption and decryption methods are as follows:
  • Both the UAV and the ground are equipped with encryption and decryption modules. Before the encryption and decryption module is used for the first time, the key information library needs to be injected into the business processing system through the key injector, and the key information between the UAV and the ground must be guaranteed.
  • the libraries are the same; the key information library consists of the initial vector IV library and the key Key;
  • the system s built-in encryption and decryption module adopts the standard AES encryption and decryption algorithm and supports two stream processing working modes: ciphertext feedback CFB and output feedback OFB;
  • the synchronization word and key area part are retained during the encryption process of the protocol frame.
  • the system fills the initial vector and key data address used for encryption in the key area part of the frame. It is transmitted to the opposite end business processing system along with the dense protocol frame;
  • the peer business processing system receives the key agreement frame transmitted by the link, and loads the relevant initial vector and key data according to the key area address information after the frame is synchronized by the protocol. Use the same algorithm working mode as the encryption process to complete the decryption of the protocol frame number and clear the protocol frame key area information.
  • this application also applies the above-mentioned data link business processing method for networked encrypted transmission to propose a data link business processing system for networked encrypted transmission.
  • the drone and the ground are connected in sequence and equipped with business equipment, business processing System and transceiver.
  • the transceiver of the drone is connected to the transceiver on the ground for data transmission.
  • the business processing system of the drone and the business processing system on the ground are both equipped with encryption and decryption modules.
  • the business processing system includes Business processing application layer, business processing service layer, business processing protocol layer, business processing logic layer, business processing data layer, and business processing interface layer;
  • the business processing application layer is equipped with a background monitoring service program module.
  • the background monitoring service program module performs background monitoring services and asynchronous communication mechanisms, and performs corresponding business processes according to business function settings; through signal set shielding and signal monitoring processing thread mechanisms, it ensures Signal monitoring sigwait independently manages signal notifications; when the business process exits abnormally, the background service captures and restarts the abnormal process, and records the abnormal information process in the system log syslog; when the background monitoring service is launched abnormally, the business sub-process is synchronously recycled to the system Script service mode restarts the background monitoring service and each business process to ensure full life cycle management and control;
  • the business processing application layer is also equipped with a network protocol analysis and transmission module, a network layer data transmission module, an Ethernet frame protocol transmission module, and a network protocol analysis and transmission module. , The network layer data transmission module and the Ethernet frame protocol transmission module are used to receive information data;
  • the business processing service layer includes a system parameter configuration module, an interface resource service module, an instruction control and system monitoring module, a log management module, a process management service module, a thread management service module, an IPC communication and data caching module, and a key management module;
  • the business processing logic layer includes network protocol stack layering module, protocol framing queuing module, channel selection and timeout judgment module, instruction parsing control module, multi-thread task collaboration module, status extraction and reporting module, priority and real-time scheduling module, and multi-core load Balance module;
  • the business processing protocol layer is used to store communication protocols for data transmission, including network communication protocols, data interface protocols, hybrid framing transmission protocols, and system control reporting protocols;
  • the business processing data layer is used to store data generated during the data business process, including an external business data module, a protocol framing data module, a link transmission data module, and an internal interface data module;
  • the business processing interface layer includes a communication interface with external business equipment and a communication interface with internal data link transceiver components;
  • the business processing service layer and the business processing logic layer cooperate to perform multi-threaded task collaboration, network services, and improve operation and processing efficiency, specifically as follows:
  • the default parameter configuration of the system parameter configuration module is used to implement initial instruction loading and multi-task thread creation; the thread management service module and the multi-thread task collaboration module are used to use condition variables, mutex locks and multi-level
  • the caching mechanism realizes the sequential operation of business processing logic between threads; uses the instruction parsing control module and key management module, and obtains real-time instruction control through the IO operation blocking monitoring and timeout judgment mechanism, and executes the working mode, processing logic and key data.
  • Management control function adopts the status extraction and reporting module to realize system status extraction, operation information collection and regular protocol reporting functions through shared memory and semaphore mechanism; adopts the process management service module, IPC communication and data caching module to bind the local through socket
  • the loopback address method ensures cross-process data communication on the basis of preventing data outsourcing;
  • the thread management service module and the multi-thread task collaboration module are used to dynamically create and recycle task threads related to the network connection service through the thread pool method;
  • the channel selection and timeout decision module is used to dynamically manage and transmit the linked list. Timeout decision, maintain each network connection Socket port information; use thread management service module, multi-thread task collaboration module, through the famous pipe FIFO communication mechanism to realize the data transmission process between each network service thread and synchronous framing logic processing; use system parameters
  • the configuration module, command control and system detection module, and network protocol stack hierarchical module realize business enablement of the protocol stack hierarchical processing logic through default parameter configuration and system command control, and are compatible with the data transmission process of multiple combined protocol processing methods;
  • the interface resource service module and system parameter configuration module protocol framing and queuing module are used to implement differentiated framing and transmission strategies based on factors such as interface protocols, business rates, data types, processing logic, and transmission timeliness to ensure multiple Protocol interface adaptation and multi-type data framing transmission functions; using priority and real-time scheduling modules to ensure real-time business transmission of important data through priority adjustment and scheduling strategy optimization, removing interface cache overhead and reducing time slot jitter; using multi-core
  • the load balancing module through the business load monitoring module, thread management service module, and multi-threaded task system module, confirms the CPU's high-overhead business processing threads, and uses the static binding relationship between the business threads and the processor's multi-cores to specify the load balancing method to avoid single-core It can self-determine the balancing situation after overload operation to ensure continuous low-load operation of the entire system.
  • the data link business processing system and method for networked encrypted transmission according to the present invention have the following beneficial effects:
  • a data link business processing method for networked encrypted transmission according to the present invention.
  • the transmitted information data is divided into business data and network data, and business data and network data are respectively used.
  • the framing transmission mode corresponding to the network data performs protocol frame combination communication; in the receiving end business processing system, the transmitted information data is decrypted, deframed, and forwarded in reverse order to complete the information data transmission; to achieve multi-service type compatibility and
  • the data priority management function reduces the impact of instantaneous rate overshoot on wireless link transmission, solves interface caching problems caused by low-speed or small packet data communication, and realizes optimized transmission of business data protocols.
  • a data link business processing method for networked encrypted transmission adopts a unified composite data frame format compatible with multi-service framing internally to connect different link transmission systems to avoid the consequences of differentiated service access.
  • the link system is modified to improve the versatility of the transmission link; the network protocol stack layered processing method is adopted externally, and the service access link system form is adjusted according to the task requirements. According to the data differences, a combination of fixed-length and variable-length mixed applications is adopted.
  • the frame transmission protocol implements networked service transmission functions and meets the system's performance requirements for multi-protocol adaptation, dynamic business expansion, and real-time link transmission.
  • a networked encrypted transmission data link business processing system adopts a background service program and an asynchronous signal communication mechanism to create a background monitoring service program module to monitor the business processing process.
  • the background service When a certain business process abnormally exits , the background service will capture the abnormal status and complete the log recording, restart the relevant business process; the system implements initial instruction loading through default parameter configuration, creates multi-task execution threads, and ensures multi-threading through condition variables, mutex locks and multi-type storage mechanisms Task coordination avoids out-of-order processing and data overflow problems; through I/O operation blocking monitoring, real-time command control of business working modes, data processing logic, and key data information is realized; through coordinated application of semaphores and shared memory, system status is realized Extract, run information collection and regular protocol reporting functions; finally, adjust each thread priority, scheduling strategy and processor multi-core binding relationship based on business data differences and thread load overhead to meet real-time business low-latency transmission requirements and reduce time It eliminates gap jitter and balances the system load to ensure smooth and reliable system operation
  • a data link business processing system for networked encrypted transmission adds a business processing system between the UAV data link and business equipment.
  • the business processing system has an embedded encryption and decryption module, which can effectively shield
  • the differences in communication interface protocols at both ends improve the link system access efficiency and transmission information security.
  • Figure 1 is a schematic diagram of network protocol analysis and transmission data transmission according to an embodiment of the present invention
  • Figure 2 is a schematic diagram of network layer data transmission according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of Ethernet frame protocol transmission data according to the embodiment of the present invention.
  • Figure 4 is a schematic diagram of the protocol frame combination communication principle according to the embodiment of the present invention.
  • Figure 5 is a schematic diagram of the protocol frame data encryption process according to the embodiment of the present invention.
  • FIG. 6 is a block diagram of the UAV data link to ground business processing system according to the embodiment of the present invention.
  • Figure 7 is an overall framework diagram of the business processing system software according to the embodiment of the present invention.
  • Figure 8 is a schematic diagram of the transmission results of using Iperf to test the return 8Mb/s dense state service according to the embodiment of the present invention.
  • Figure 9 is a schematic diagram of the forward 4Mb/s dense state service transmission test results using Iperf according to the embodiment of the present invention.
  • connection should be understood in a broad sense.
  • connection or integral connection; it can be a mechanical connection or an electrical connection; it can be a direct connection or an indirect connection through an intermediate medium; it can be an internal connection between two components.
  • this application proposes a data link business processing method for networked encrypted transmission, which is used for data transmission between drones and the ground.
  • the specific method is as follows:
  • the sending-end business processing system determines the transmission method for information data transmission based on the parsing position of the five-layer protocol stack that receives the information data of the sending-end business equipment.
  • the transmission method includes network protocol analysis and transmission of information data obtained from the application layer, from the network Network layer data transmission for obtaining information data from the physical layer, and Ethernet frame protocol transmission for obtaining information data from the physical layer;
  • the transmitted information data is divided into business data and network data
  • the business data is formed into fixed-length framing data according to the framing transmission mode set by the business data
  • the network data is formed into fixed-length framing data according to the network data.
  • the framing transmission mode set by the data forms variable length framing data
  • the data transmitted by the wireless link in step S3 completes the reverse sequence protocol decryption and deframe processing, and sends it to the receiving end business device through the network stack of the receiving end business processing system to complete the information data transmission.
  • step S1 the network protocol analysis and transmission of information data is obtained from the application layer.
  • the specific method is as follows:
  • the external business device packages the information data in the protocol stack using the specified network protocol, and transmits it to the business processing system through the Ethernet interface; the transmission process parses the protocol stack, obtains the original information data at the network application layer, and pushes the information data to Each interface buffers the first-in first-out buffer FIFO and waits for protocol framing;
  • the dense-state protocol frame interfaces with the transceiver through the business processing system , complete internal data communication, and then start wireless link transmission through signal coding and modulation processing;
  • the transceiver interface includes PCIe, Ethernet, LVDS, SPI, and RS422;
  • the peer business processing system Through wireless link transmission, signal demodulation and decoding and internal interface communication, the peer business processing system obtains the dense state protocol frame; according to the data framing rules, completes the protocol frame synchronization, decryption, and parsing processes, and restores the original multi-channel Information data is pushed to the interface cache FIFO and waits for the protocol to be sent;
  • step S1 the network layer data transmission of information data is obtained from the network layer.
  • the specific method is as follows:
  • S121 According to the differentiated needs of external business equipment, modify the system configuration file to perform network layer data transmission functions; create internal network bridges and multiple virtual network devices, complete bridge binding of actual physical network cards, and configure the addresses of each network device;
  • S122 According to the forward and return service transmission direction, configure the system default gateway and multiple sets of static routing information to ensure effective routing and addressing of information data; at the same time, in order to realize routing transmission, activate the system network layer IP packet forwarding function;
  • the system performs variable length protocol framing and data encryption processing on unequal length network layer IP packets; the dense state protocol frame completes the internal data through the business processing system and the transceiver interface. Communication, after signal coding and modulation processing, wireless link transmission is enabled;
  • the transceiver interface includes PCIe, Ethernet, LVDS, SPI, and RS422;
  • the peer business processing system Through wireless link transmission, signal demodulation and decoding and internal interface communication, the peer business processing system obtains the dense protocol frame; according to the data framing rules, completes the protocol frame synchronization, decryption, and parsing processes, and restores the original network layer data pack;
  • the transmission process sends the network layer data packet to the virtual network device, and pushes the data packet into the network layer of the protocol stack; according to the routing configuration and default gateway information, the network layer data packet containing the business information is addressed and delivered through routing, and finally transmitted to the target.
  • step S1 the Ethernet frame protocol transmission of information data is obtained from the physical layer.
  • the specific method is as follows:
  • the system network card In order to ensure the effective reception of the bottom layer data frames of the protocol stack, the system network card is configured in a hybrid working mode; according to the information data type, transmission protocol and link bandwidth information in the configuration file, set the filtering rules and traffic limits for the bottom layer Ethernet frame transmission;
  • the transmission process captures the underlying Ethernet frame protocol data containing business information through the original socket; in order to ensure single frame transmission delay, the system performs variable-length protocol framing and data encryption on unequal-length Ethernet frames; encryption The static protocol frame completes internal data communication through the business processing system and the transceiver interface, and then undergoes signal coding and modulation processing to start wireless link transmission;
  • the transceiver interface includes PCIe, Ethernet, LVDS, SPI, and RS422;
  • the peer business processing system Through wireless link transmission, signal demodulation and decoding and internal interface communication, the peer business processing system obtains the dense protocol frame; according to the data framing rules, completes the protocol frame synchronization, decryption, and parsing processes, and restores the original Ethernet Frame protocol data;
  • the transmission process sends the Ethernet frame protocol data to the physical layer of the protocol stack.
  • the target MAC address information in the Ethernet frame Through the target MAC address information in the Ethernet frame, the self-addressed transmission of the protocol data to the service receiving equipment is completed, and the MAC layer of airborne and ground service equipment is realized. Penetrate.
  • the sending end business equipment transmits data A:
  • the Ethernet frame is output through the hardware network interface of the business equipment and enters the hardware network interface of the business processing system;
  • Ethernet frames containing A are analyzed layer by layer
  • the parsing level of Ethernet frames containing A is modified through default parameter configuration or command control:
  • the five-layer protocol stack is fully parsed, and the business processing system process gets the original data A, which is used as a link to transmit data.
  • the five-layer protocol stack parses to the network layer, and the business processing system process gets the network layer data packet containing data A, and uses this as a link to transmit data.
  • the business processing system process gets the Ethernet frame containing data A and uses it as a link to transmit data.
  • the receiving end switches to the same transmission mode configuration as the sending segment business processing system.
  • the link transmission data is only data A.
  • A is packaged layer by layer in the network protocol stack of the business processing system.
  • the Ethernet frame protocol is used to complete the transmission of the hardware network interface from the business processing system to the business equipment.
  • the business equipment is in The Ethernet frame is parsed layer by layer in its own network protocol stack, data A is restored, and the entire transmission process is completed;
  • the link transmission data is a network layer data packet containing A.
  • the transmission process will push the data directly to the network layer of the network protocol stack of the business processing system, and package the protocols below the link layer, using Ethernet frames.
  • the protocol completes the transmission of the hardware network interface from the business processing system to the business equipment.
  • the business equipment parses the Ethernet frames layer by layer in its own network protocol stack, restores data A, and completes the entire transmission process;
  • the link transmission data is an Ethernet frame containing A.
  • the transmission process directly pushes the data to the physical layer of the network protocol stack of the business processing system without any protocol packaging, and directly completes the business using the Ethernet frame protocol.
  • step S2 based on the difference in transmission methods when transmitting information data, the transmitted information data is divided into business data and network data.
  • the specific classification method is:
  • the data transmitted through network protocol analysis is business data
  • Data transmitted through network layer data transmission or Ethernet frame protocol is network data.
  • step S2 the service data is formed into fixed-length framing data according to the framing transmission mode set by the service data.
  • the specific method is as follows:
  • Protocol frame FHA cache channel defines protocol frame FHA framing content including synchronization word, type number, identification code, data area, count/check;
  • the data area is divided into two sections: low-speed FHA frame and high-speed business data.
  • the effective data length is used to distinguish the frame business criticality
  • the business data related information includes data type, transmission rate, priority, cache status, and waiting time;
  • the fixed-length composite protocol frame FHB enters the system encryption channel to complete the encryption of the data area outside the asynchronous words and key areas; the business data is framed at a variable speed at the actual transmission rate, and the FHB frame enters the ring storage interface cache in variable speed transmission mode. ;
  • the system According to the interface transmission rate between the system and the link transceiver, extract the FHB frame data from the ring storage at a fixed rate periodically, and frame it with a 1664-byte fixed-length interface protocol; the interface frame IFA content includes the synchronization word , type, effective length, frame count and data area, the system will enter the link transmission system in the form of fixed-speed interface frame IFA through the internal communication interface at a transmission rate greater than the actual total service bandwidth (cumulative calculation of framing efficiency).
  • the network data is formed into variable length framing data according to the framing transmission mode set by the network data.
  • the specific method is as follows:
  • TRA framing In network data transmission, whether it is a network layer data packet or an underlying Ethernet protocol frame, the lengths of the preceding and following data packets are not equal.
  • the business processing system performs variable length protocol frames on the accessed network data.
  • TRA framing, variable length protocol frame TRA framing content includes frame header/frame tail, key area, data area and count/check. Each TRA frame only contains a complete network layer data packet or a complete Ethernet protocol frame.
  • step S3 both the fixed-length framing data and the variable-length framing data are encrypted.
  • step S4 the data transmitted from the wireless link in step S3 is decrypted using the reverse sequence protocol.
  • the details of encryption and decryption are Methods as below:
  • Both the UAV and the ground are equipped with encryption and decryption modules.
  • the key information library needs to be injected into the business processing system through the key injector, and the key information between the UAV and the ground must be guaranteed.
  • the library is the same; the key information library is composed of the initial vector IV library and the key Key.
  • the length of a single set of initial vectors is 128 bits.
  • Each set of initial vector libraries contains 65535 sets of initial vector data, occupying a total of 1MB of storage space; the length of a single set of keys is 256 bits.
  • each keystore contains 65535 sets of key data, occupying a total of 2MB of storage space;
  • the system’s built-in encryption and decryption module adopts the standard AES encryption and decryption algorithm and supports two stream processing working modes: ciphertext feedback CFB and output feedback OFB.
  • ciphertext feedback CFB As shown in Figure 5, taking the AES encryption process in CFB working mode as an example, each encryption When, the previous ciphertext group is sent back to the input end of the cryptographic algorithm to perform the ciphertext feedback calculation process. Because plaintext data can be encrypted bit by bit, when generating the first ciphertext block, since there is no previous output data, an initialization vector needs to be used to replace the first feedback ciphertext.
  • the synchronization word and key area part are retained during the encryption process of the protocol frame.
  • the system fills the initial vector and key data address used for encryption in the key area part of the frame. It is transmitted to the opposite end business processing system along with the dense protocol frame;
  • the peer business processing system receives the key agreement frame transmitted by the link, and loads the relevant initial vector and key data according to the key area address information after the frame is synchronized by the protocol. Use the same algorithm working mode as the encryption process to complete the decryption of the protocol frame number and clear the protocol frame key area information.
  • a data link business processing system for networked encrypted transmission using the above-mentioned data link business processing method for networked encrypted transmission the drone and the ground are connected in sequence
  • the drone's transceiver is connected to the ground transceiver for data transmission.
  • the drone's business processing system and the ground business processing system are both equipped with encryption and decryption modules.
  • the business processing system includes a business processing application layer, a business processing service layer, a business processing protocol layer, a business processing logic layer, a business processing data layer, and a business processing interface layer;
  • the business processing application layer is equipped with a background monitoring service program module.
  • the background monitoring service program module performs background monitoring services and asynchronous communication mechanisms, and performs corresponding business processes according to business function settings; through signal set shielding and signal monitoring processing thread mechanisms, it ensures Signal monitoring sigwait independently manages signal notifications; when the business process exits abnormally, the background service captures and restarts the abnormal process, and records the abnormal information process in the system log syslog; when the background monitoring service is launched abnormally, the business sub-process is synchronously recycled to the system Script service mode restarts the background monitoring service and each business process to ensure full life cycle management and control;
  • the business processing application layer is also equipped with a network protocol analysis and transmission module, a network layer data transmission module, an Ethernet frame protocol transmission module, and a network protocol analysis and transmission module. , The network layer data transmission module and the Ethernet frame protocol transmission module are used to receive information data;
  • the business processing service layer includes a system parameter configuration module, an interface resource service module, an instruction control and system monitoring module, a log management module, a process management service module, a thread management service module, an IPC communication and data caching module, and a key management module;
  • the business processing logic layer includes network protocol stack layering module, protocol framing queuing module, channel selection and timeout judgment module, instruction parsing control module, multi-thread task collaboration module, status extraction and reporting module, priority and real-time scheduling module, and multi-core load Balance module;
  • the business processing protocol layer is used to store communication protocols for data transmission, including network communication protocols, data interface protocols, hybrid framing transmission protocols, and system control reporting protocols;
  • the business processing data layer is used to store data generated during the data business process, including an external business data module, a protocol framing data module, a link transmission data module, and an internal interface data module;
  • the business processing interface layer includes a communication interface with external business equipment and a communication interface with internal data link transceiver components;
  • the business processing service layer and the business processing logic layer cooperate to perform multi-threaded task collaboration, network services, and improve operation and processing efficiency, specifically as follows:
  • the default parameter configuration of the system parameter configuration module is used to implement initial instruction loading and multi-task thread creation; the thread management service module and the multi-thread task collaboration module are used to use condition variables, mutex locks and multi-level
  • the caching mechanism realizes the sequential operation of business processing logic between threads; uses the instruction parsing control module and key management module to obtain real-time instruction control through the IO operation blocking monitoring and timeout judgment mechanism, and execute the working mode, processing logic and key data Management control function; adopts the status extraction and reporting module to realize system status extraction, operation information collection and regular protocol reporting functions through shared memory and semaphore mechanism; adopts the process management service module, IPC communication and data caching module to bind the local through socket
  • the loopback address method ensures cross-process data communication on the basis of preventing data outsourcing;
  • the thread management service module and the multi-thread task collaboration module are used to dynamically create and recycle task threads related to the network connection service through the thread pool method;
  • the channel selection and timeout decision module is used to dynamically manage and transmit the linked list. Timeout decision, maintain each network connection Socket port information; use thread management service module, multi-thread task collaboration module, through the famous pipe FIFO communication mechanism to realize the data transmission process between each network service thread and synchronous framing logic processing; use system parameters
  • the configuration module, command control and system detection module, and network protocol stack hierarchical module realize business enablement of the protocol stack hierarchical processing logic through default parameter configuration and system command control, and are compatible with the data transmission process of multiple combined protocol processing methods;
  • the interface resource service module and system parameter configuration module protocol framing and queuing module are used to implement differentiated framing and transmission strategies based on factors such as interface protocols, business rates, data types, processing logic, and transmission timeliness to ensure multiple Protocol interface adaptation and multi-type data framing transmission functions; using priority and real-time scheduling modules to ensure real-time business transmission of important data through priority adjustment and scheduling strategy optimization, removing interface cache overhead and reducing time slot jitter; using multi-core
  • the load balancing module through the business load monitoring module, thread management service module, and multi-threaded task system module, confirms the CPU's high-overhead business processing threads, and uses the static binding relationship between the business threads and the processor's multi-cores to specify the load balancing method to avoid single-core It can self-determine the balancing situation after overload operation to ensure continuous low-load operation of the entire system.
  • the business processing system operates stably and normally, and business data is transmitted synchronously in the forward and return directions without packet loss or large delay jitter, which satisfies the universal adaptation of the UAV data link to multiple protocols, dynamic business expansion, real-time link communication and Realistic needs in aspects such as transmission information security.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Astronomy & Astrophysics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种网络化加密传输的数据链业务处理系统及方法,将传输的信息数据分为业务数据与网络数据,将业务数据根据业务数据设定的组帧传输模式形成定长组帧数据,将网络数据根据网络数据设定的组帧传输模式形成变长组帧数据;定长组帧数据与变长组帧数据均通过数据加密后,变速传输到环形存储中,进一步通过等长接口协议帧匀速传输到无线链路中进行数据传输;在接收端业务处理系统中,将步骤S3中无线链路传输来的数据完成逆序协议解密、解帧、转发处理,完成信息数据传输。本发明所述的一种网络化加密传输的数据链业务处理系统及方法,实现网络化业务传输功能,满足系统对多协议适配、业务动态扩展与实时链路传输的性能需求。

Description

[根据细则26改正 25.11.2022]一种网络化加密传输的数据链业务处理系统及方法
(相关申请)
本申请要求申请号: 202210500340.5,发明名称:《 一种网络化加密传输的 数据链业务处理系统及方法》作为优先权。
技术领域
本发明属于无人机系统通信技术领域,尤其是涉及一种网络化加密传输的数据链业务处理系统及方法。
背景技术
数据链作为无人机系统关键部件,主要承担无人机与地面间双向业务通信功能。在业务传输方面,数据链可能对接包括飞管控制、任务吊舱、载荷业务、组网终端及其它链路终系统等在内的多种业务设备,同时伴随全系统网络化通信升级,设备多采用集业务传输、指令控制、状态监测、协同共享及异构通信于一体的网络接口通信方式。针对不同作业科目,无人机系统需及时调整业务终端组合,从而引入了链路系统适配多类型网络通信协议问题,同时,基于协议组帧逻辑、混合传输方式及业务传输时效等因素考虑,出现链路系统不断因任务差异而产生定制化修改情况。链路修改不仅增加工作量,同时出现相同通信系统架构下的多链路版本问题,链路与设备间耦合度大幅增加,不利于临时任务调整下的动态性扩展,后期维护管理困难。同时,无线信号易被捕获破译,飞行数据面临外泄风险,特别是卫星通信与公网通信往往要求业务数据以密态形式传输,故链路需额外配备数据加解密单元,而加解密单元的接入不仅增加系统复杂度,同样带来了链路系统与加解密单元的接口适配问题。考虑到数据帧差异、链路传输时效、数据加解密及多任务处理等因素,单一的接口协议修改很难兼容各方面性能要求,而复杂的系统功能升级又易导致重复功能与冗余模块设计增多,致使链路系统稳定性与业务传输效率大打折扣。
发明内容
有鉴于此,本发明旨在提出一种网络化加密传输的数据链业务处理系统及方法,以解决无人机与地面进行双向通信时,信息传输兼容差,安全性底、效率低的问题。
为达到上述目的,本发明的技术方案是这样实现的:
一方面,本申请提出一种网络化加密传输的数据链业务处理方法,用于无人机与地面之间的数据传输,具体方法如下:
S1、发送端业务处理系统根据接收发送端业务设备信息数据的五层协议栈解析位置,确定传输方法进行信息数据传输,所述传输方法包括从应用层获取信息数据的网络协议解析传输、从网络层获取信息数据的网络层数据传输、从物理层获取信息数据的以太网帧协议传输;
S2、根据信息数据传输时传输方法的差异,将传输的信息数据分为业务数据与网络数据,将业务数据根据业务数据设定的组帧传输模式形成定长组帧数据,将网络数据根据网络数据设定的组帧传输模式形成变长组帧数据;
S3、定长组帧数据与变长组帧数据均通过数据加密后,变速传输到环形存储中,进一步通过等长接口协议帧匀速传输到无线链路中并向接收端传输数据;
S4、在接收端业务处理系统中,将步骤S3中无线链路传输来的数据完成逆序协议解密、解帧处理,并通过接收端业务处理系统的网络栈发送到接收端业务设备中,完成信息数据传输。
进一步的,步骤S1中,从应用层获取信息数据的网络协议解析传输,具体方法如下:
S111、根据外接业务设备差异化需求,确认外接业务设备网络通道个数、通信协议与地址端口信息,修改系统配置文件;业务处理系统加载默认配置文件,动态创建对应网络通信服务,启动访问监听与业务收发功能,以链表形式管理各网络套接字Socket端口;
S112、外接业务设备将信息数据以指定网络协议进行协议栈打包,通过以太网接口,传输至业务处理系统;传输进程通过协议栈解析,在网络应用层获取原始信息数据,并将信息数据推送至各接口缓存进先入先出缓存器FIFO,等待协议组帧;
S113、根据数据类型、传输速率、优先级、缓存情况及等待时间,对信息数据进行定长协议组帧与数据加密处理形成密态协议帧;密态协议帧通过业务处理系统与收发信机接口,完成内部数据通信,后经信号编码调制处理,开启无线链路传输;
S114、经无线链路传输、信号解调译码与内部接口通信,对端业务处理系统获取密态协议帧;根据数据组帧规则,完成协议帧同步、解密、解析处理过程,还原多路原始信息数据,推送至接口缓存FIFO,等待协议发送;
S115、根据配置信息,事先创建好与本地业务设备对应的网络通信服务;当信息数据进入接口缓存FIFO,传输进程捕获数据接入信号,开始执行数据提取与协议栈打包;最终,信息数据经对应网络通信服务,传输至目标接收设备。
进一步的,步骤S1中,从网络层获取信息数据的网络层数据传输,具体方法如下:
S121、根据外接业务设备差异化需求,修改系统配置文件,进行网络层数据传输功能;创建内部网桥与多种虚拟网络设备,完成实际物理网卡的网桥绑定,配置各网络设备地址;
S122、根据前返向业务传输方向,配置系统默认网关与多组静态路由信息,保障信息数据有效路由寻址;同时,为实现路由传输,启动系统网络层IP包转发功能;
S123、修改动态主机配置协议DHCP服务配置加载脚本,启动本地动态主机配置协议服务DHCP Server,为主机配置协议服务客户端DHCP Client的外接业务 设备提供网络地址分配与默认网关信息;传输进程通过网络路由转发,在虚拟网络设备接口处,获得包含信息数据的网络层数据包;
S124、为保障单个网络层数据包传输延时,系统对不等长网络层IP包进行变长协议组帧与数据加密处理;密态协议帧通过业务处理系统与收发信机接口,完成内部数据通信,后经信号编码调制处理,开启无线链路传输;
S125、经无线链路传输、信号解调译码与内部接口通信,对端业务处理系统获取密态协议帧;根据数据组帧规则,完成协议帧同步、解密、解析处理过程,还原原始网络层数据包;
S126、传输进程将网络层数据包发送给虚拟网络设备,推送数据包进入协议栈网络层;根据路由配置与默认网关信息,包含业务信息的网络层数据包经路由寻址传递,最终传输至目标接收设备,实现机载与地面业务设备的网络层路由通信。
进一步的,步骤S1中,从物理层获取信息数据的以太网帧协议传输,具体方法如下:
S131、根据外接业务设备差异化需求,修改系统配置文件,进行以太网帧协议传输功能;在传输进程中创建基于底层网络数据处理的原始套接字接口;
S132、为保证协议栈底层数据帧的有效接收,系统网卡配置为混杂工作模式;根据配置文件中信息数据类型、传输协议及链路带宽信息,设置底层以太网帧传输的过滤规则与流量限额;
S133、传输进程通过原始套接字,捕获包含业务信息的底层以太网帧协议数据;为保障单帧传输延时,系统对不等长以太网帧进行变长协议组帧与数据加密处理;密态协议帧通过业务处理系统与收发信机接口,完成内部数据通信,后经信号编码调制处理,开启无线链路传输;
S134、经无线链路传输、信号解调译码与内部接口通信,对端业务处理系统获取密态协议帧;根据数据组帧规则,完成协议帧同步、解密、解析处理过程,还原原始以太网帧协议数据;
S135、传输进程将以太网帧协议数据发包至协议栈物理层,通过以太网帧内目标MAC地址信息,完成协议数据到业务接收设备的自行寻址传输,实现机载与地面业务设备的MAC层透传。
进一步的,步骤S2中,根据信息数据传输时传输方法的差异,将传输的信息数据分为业务数据与网络数据,具体分类方法为:
通过网络协议解析传输的数据为业务数据;
通过网络层数据传输或以太网帧协议传输的数据为网络数据。
进一步的,步骤S2中,将业务数据根据业务数据设定的组帧传输模式形成定长组帧数据,具体方法如下:
S211、系统参考业务数据相关信息,对低速业务数据进行32字节定长协议组帧,单次组帧传输仅包含一种低速业务,多业务数据按照定长协议帧FHA组帧排队进入定长协议帧FHA缓存通道,定义协议帧FHA组帧内容包括同步字、类型编 号、识别码、数据区、计数/校验;
S212、对多路高速业务与FHA帧数据进行1024字节定长复合协议帧组帧,定义复合协议帧FHB组帧内容包括同步字、密钥区、类型编号、FHA长度、业务类型/长度、计数/校验、数据区;
数据区分为低速FHA帧与高速业务数据两段空间,以有效数据长度区分组帧业务临界;
所述业务数据相关信息包括数据类型、传输速率、优先级、缓存情况、等待时间;
S213、定长复合协议帧FHB进入系统加密通道,完成非同步字与密钥区以外的数据区域加密;业务数据以实际传输速率进行变速组帧,FHB帧以变速传输模式进入环状存储接口缓存;
S214、根据系统与链路收发信机间接口传输速率,以固定速率周期在环状存储中提取FHB帧数据,并对其进行1664字节定长接口协议组帧;接口帧IFA内容包括同步字、类型、有效长度、帧计数及数据区,系统将以大于实际业务总带宽的传输速率,通过内部通信接口,以定速接口帧IFA形式进入链路传输系统。
进一步的,将网络数据根据网络数据设定的组帧传输模式形成变长组帧数据,具体方法如下:
在网络数据传输中,无论是网络层数据包还是底层以太网协议帧,均存在前后数据包不等长情况,为保证网络数据传输时效,业务处理系统对接入的网络数据进行变长协议帧TRA组帧,变长协议帧TRA组帧内容包含帧头/帧尾、密钥区、数据区及计数/校验,每个TRA帧仅包含一个完整网络层数据包或完整以太网协议帧,对数据区出现帧头/帧尾信息的数据进行协议转义,保障同步字唯一性;变长协议帧TRA组帧完成后,进行加密与传输的过程与步骤S213-S214中FHB帧处理方法,经数据加密与缓存码处理,通过内部通信接口,以定速接口帧IFA形式进入链路传输系统。
进一步的,步骤S3中,定长组帧数据与变长组帧数据均通过数据加密,步骤S4中,将步骤S3中无线链路传输来的数据完成逆序协议解密,加密解密的具体方法如下:
S31、无人机与地面均对应设置加解密模块,加解密模块首次使用前,需通过密钥注入器,向业务处理系统内注密钥信息库,且保证无人机与地面的密钥信息库相同;密钥信息库由初始向量IV库和密钥Key组成;
S32、数据加密时,通过内置随机数产生单元,获得两组16bit随机数据,将其分别作为该协议帧加密所需初始向量与密钥数据在信息库中的匹配地址;系统加载地址对应数据,对协议帧进行初始向量与密钥数据随机组合的数据加密处理;
S33、系统内置加解密模块采用标准AES加解密算法,支持密文反馈CFB与输出反馈OFB两种流处理工作模式;
S34、为保证接收端开展有效协议同步与数据解密,协议帧加密过程中保留了同步字与密钥区部分,系统将加密使用的初始向量与密钥数据地址填充在帧内 密钥区部分,随密态协议帧一同传输到对端业务处理系统中;
S35、经过无线链路传输与数据接口通信,对端业务处理系统接收到链路传输的密钥协议帧,根据协议同步挑帧后的密钥区地址信息,加载相关初始向量与密钥数据,使用与加密处理过程相同的算法工作模式,完成协议帧数解密,并清空协议帧密钥区信息。
另一方面,本申请还应用上述一种网络化加密传输的数据链业务处理方法提出一种网络化加密传输的数据链业务处理系统,无人机与地面均依次连接设置有业务设备、业务处理系统、收发信机,无人机的收发信机与地面的收发信机连接进行数据传输,无人机的业务处理系统与地面的业务处理系统均配置有加解密模块,所述业务处理系统包括业务处理应用层、业务处理服务层、业务处理协议层、业务处理逻辑层、业务处理数据层、业务处理接口层;
所述业务处理应用层设置有后台监控服务程序模块,后台监控服务程序模块进行后台监控服务与异步通信机制,根据业务功能设置,进行对应业务进程;通过信号集屏蔽与信号监听处理线程机制,保障信号监听sigwait对信号通知的独立管理;在业务进程异常退出时,后台服务捕获并重启异常进程,在系统日志syslog中记录异常信息过程;当后台监控服务异常推出,同步回收业务子进程,以系统脚本服务方式,重启后台监控服务与各业务进程,保障全生命周期管控;业务处理应用层还设置有网络协议解析传输模块、网络层数据传输模块、以太网帧协议传输模块,网络协议解析传输模块、网络层数据传输模块、以太网帧协议传输模块用于接收信息数据;
所述业务处理服务层包括系统参数配置模块、接口资源服务模块、指令控制与系统监测模块、日志管理模块、进程管理服务模块、线程管理服务模块、IPC通信与数据缓存模块、密钥管理模块;
业务处理逻辑层包括网络协议栈分层模块、协议组帧排队模块、通道选择与超时判断模块、指令解析控制模块、多线程任务协同模块、状态提取回报模块、优先级与实时调度模块、多核负载均衡模块;
所述业务处理协议层用于存储数据传输的通信协议,包括网络通信协议、-数据接口协议、混合组帧传输协议、系统控制回报协议;
所述业务处理数据层用于存储数据业务进程时产生的数据,包括外部业务数据模块、协议组帧数据模块、链路传输数据模块、内部接口数据模块;
所述业务处理接口层包括与外部业务设备间通信接口、与内部数据链收发信机件通信接口;
所述业务处理服务层与业务处理逻辑层配合进行多线程任务协作、进行网络服务、提高运行处理效率,具体如下:
在多线程任务协作方面,采用系统参数配置模块的默认参数配置,实现初始指令加载,执行多任务线程创建;采用线程管理服务模块与多线程任务协同模块,通过条件变量、互斥锁与多级缓存机制,实现线程间前后业务处理逻辑依次运行;采用指令解析控制模块、密钥管理模块,通过IO操作阻塞监听与超时判断机制, 获取实时指令控制,执行工作模式、处理逻辑及密钥数据的管理控制功能;采用状态提取回报模块,通过共享内存与信号量机制,实现系统状态提取、运行信息收集与定期协议回报功能;采用进程管理服务模块、IPC通信与数据缓存模块,通过socket绑定本地回环地址方式,在防止数据外协的基础上,保障跨进程数据通信;
在网络服务方面,采用线程管理服务模块、多线程任务协同模块,通过线程池方式,动态创建、回收与网络连接服务相关的任务线程;采用通道选择与超时判决模块,进行链表的动态管理与传输超时判决,维护各网络连接Socket端口信息;采用线程管理服务模块、多线程任务协同模块,通过有名管道FIFO通信机制,实现各网络服务线程与同步组帧逻辑处理间的数据传输过程;采用系统参数配置模块、指令控制与系统检测模块、网络协议栈分层模块,通过默认参数配置与系统指令控制,实现协议栈分层处理逻辑的业务使能,兼容多种组合协议处理方式的数据传输过程;
在运行处理效率方面,采用接口资源服务模块、系统参数配置模块协议组帧排队模块,根据接口协议、业务速率、数据类型、处理逻辑及传输时效等因素,执行差异化组帧传输策略,保障多协议接口适配与多类型数据组帧传输功能;采用优先级与实时调度模块,通过优先级调整与调度策略优化,保障重要数据的实时业务传输,去除接口缓存开销,降低时隙抖动;采用多核负载均衡模块,通过业务负载监控模块、线程管理服务模块、多线程任务系统模块,确认CPU高开销业务处理线程,通过业务线程与处理器多核静态绑定关系,以指定负载均衡方式,避免单核超负载运行后的自行判决均衡情况,保障全系统持续低负载运行状态。
相对于现有技术,本发明所述的一种网络化加密传输的数据链业务处理系统及方法具有以下有益效果:
(1)本发明所述的一种网络化加密传输的数据链业务处理方法,根据信息数据传输时传输方法的差异,将传输的信息数据分为业务数据与网络数据,并分别采用业务数据与网络数据对应的组帧传输模式进行协议帧组合通信;在接收端业务处理系统中,将传输来的信息数据完成逆序协议解密、解帧、转发处理,完成信息数据传输;实现多业务类型兼容与数据优先管理功能,降低瞬时速率过冲对无线链路传输带来的冲击影响,解决低速或小包数据通信引发接口缓存问题,实现业务数据协议优化传输。
(2)本发明所述的一种网络化加密传输的数据链业务处理方法,对内采用兼容多业务组帧的统一复合数据帧形式,对接不同链路传输系统,避免差异化业务接入导致的链路系统修改,提高传输链路通用性;对外采用网络协议栈分层处理方式,根据任务需求,调整业务接入链路系统形式,根据数据差异,采用定长与变长混合应用的组帧传输协议,实现网络化业务传输功能,满足系统对多协议适配、业务动态扩展与实时链路传输的性能需求。
(3)本发明所述的一种网络化加密传输的数据链业务处理系统,采用后台服务程序与异步信号通信机制,创建后台监控服务程序模块,监听业务处理进程, 当某业务进程发生异常退出,后台服务将捕获异常状态并完成日志记录,重启相关业务进程;系统通过默认参数配置,实现初始指令加载,创建多任务执行线程,通过条件变量、互斥锁及多类型存储机制,保障多线程任务协同,避免乱序处理与数据溢出问题;通过I/O操作阻塞监听,实现业务工作模式、数据处理逻辑及密钥数据信息的实时指令控制,通过信号量与共享内存协同应用,实现系统状态提取、运行信息收集与定期协议回报功能;最后,根据业务数据差异与线程负载开销,调整各线程优先级、调度策略及处理器多核绑定关系,以满足实时业务低时延传输需求,降低时隙抖动,均衡系统负载,保障系统运行平稳可靠。
(4)本发明所述的一种网络化加密传输的数据链业务处理系统,在无人机数据链与业务设备之间增加一个业务处理系统,业务处理系统内嵌加解密模块,可有效屏蔽两端通信接口协议差异,提升链路系统接入效率与传输信息安全。
附图说明
构成本发明的一部分的附图用来提供对本发明的进一步理解,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1为本发明实施例所述的网络协议解析传输数据传输示意图;
图2为本发明实施例所述的网络层数据传输数据传输示意图;
图3为本发明实施例所述的以太网帧协议传输数据传输示意图;
图4为本发明实施例所述的协议帧组合通信原理示意图;
图5为本发明实施例所述的协议帧数据加密处理示意图;
图6为本发明实施例所述的无人机数据链于地面业务处理系统框图;
图7为本发明实施例所述的业务处理系统软件总体框架图;
图8为本发明实施例所述的利用Iperf测试返向8Mb/s密态业务传输结果示意图;
图9为本发明实施例所述的利用Iperf测试前向4Mb/s密态业务传输结果示意图。
具体实施方式
需要说明的是,在不冲突的情况下,本发明中的实施例及实施例中的特征可以相互组合。
在本发明的描述中,需要理解的是,术语“中心”、“纵向”、“横向”、“上”、“下”、“前”、“后”、“左”、“右”、“竖直”、“水平”、“顶”、“底”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明的限制。此外,术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”等的特征可以明示或者隐含地包括一个或者更多个该特征。在本发明的描述中,除非另有说明,“多个”的含义是两个或两个以上。
在本发明的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可 拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通。对于本领域的普通技术人员而言,可以通过具体情况理解上述术语在本发明中的具体含义。
下面将参考附图并结合实施例来详细说明本发明。
如图1至图4所示,一方面,本申请提出一种网络化加密传输的数据链业务处理方法,用于无人机与地面之间的数据传输,具体方法如下:
S1、发送端业务处理系统根据接收发送端业务设备信息数据的五层协议栈解析位置,确定传输方法进行信息数据传输,所述传输方法包括从应用层获取信息数据的网络协议解析传输、从网络层获取信息数据的网络层数据传输、从物理层获取信息数据的以太网帧协议传输;
S2、根据信息数据传输时传输方法的差异,将传输的信息数据分为业务数据与网络数据,将业务数据根据业务数据设定的组帧传输模式形成定长组帧数据,将网络数据根据网络数据设定的组帧传输模式形成变长组帧数据;
S3、定长组帧数据与变长组帧数据均通过数据加密后,变速传输到环形存储中,进一步通过等长接口协议帧匀速传输到无线链路中并向接收端传输数据;
S4、在接收端业务处理系统中,将步骤S3中无线链路传输来的数据完成逆序协议解密、解帧处理,并通过接收端业务处理系统的网络栈发送到接收端业务设备中,完成信息数据传输。
如图1所示,步骤S1中,从应用层获取信息数据的网络协议解析传输,具体方法如下:
S111、根据外接业务设备差异化需求,确认外接业务设备网络通道个数、通信协议与地址端口信息,修改系统配置文件;业务处理系统加载默认配置文件,动态创建对应网络通信服务,启动访问监听与业务收发功能,以链表形式管理各网络套接字Socket端口;
S112、外接业务设备将信息数据以指定网络协议进行协议栈打包,通过以太网接口,传输至业务处理系统;传输进程通过协议栈解析,在网络应用层获取原始信息数据,并将信息数据推送至各接口缓存进先入先出缓存器FIFO,等待协议组帧;
S113、根据数据类型、传输速率、优先级、缓存情况及等待时间,对信息数据进行定长协议组帧与数据加密处理形成密态协议帧;密态协议帧通过业务处理系统与收发信机接口,完成内部数据通信,后经信号编码调制处理,开启无线链路传输;所述收发信机接口包括PCIe、Ethernet、LVDS、SPI、RS422;
S114、经无线链路传输、信号解调译码与内部接口通信,对端业务处理系统获取密态协议帧;根据数据组帧规则,完成协议帧同步、解密、解析处理过程,还原多路原始信息数据,推送至接口缓存FIFO,等待协议发送;
S115、根据配置信息,事先创建好与本地业务设备对应的网络通信服务;当信息数据进入接口缓存FIFO,传输进程捕获数据接入信号,开始执行数据提取与协议栈打包;最终,信息数据经对应网络通信服务,传输至目标接收设备。
如图2所示,步骤S1中,从网络层获取信息数据的网络层数据传输,具体方法如下:
S121、根据外接业务设备差异化需求,修改系统配置文件,进行网络层数据 传输功能;创建内部网桥与多种虚拟网络设备,完成实际物理网卡的网桥绑定,配置各网络设备地址;
S122、根据前返向业务传输方向,配置系统默认网关与多组静态路由信息,保障信息数据有效路由寻址;同时,为实现路由传输,启动系统网络层IP包转发功能;
S123、修改动态主机配置协议DHCP服务配置加载脚本,启动本地动态主机配置协议服务DHCP Server,为主机配置协议服务客户端DHCP Client的外接业务设备提供网络地址分配与默认网关信息;传输进程通过网络路由转发,在虚拟网络设备接口处,获得包含信息数据的网络层数据包;
S124、为保障单个网络层数据包传输延时,系统对不等长网络层IP包进行变长协议组帧与数据加密处理;密态协议帧通过业务处理系统与收发信机接口,完成内部数据通信,后经信号编码调制处理,开启无线链路传输;
所述收发信机接口包括PCIe、Ethernet、LVDS、SPI、RS422;
S125、经无线链路传输、信号解调译码与内部接口通信,对端业务处理系统获取密态协议帧;根据数据组帧规则,完成协议帧同步、解密、解析处理过程,还原原始网络层数据包;
S126、传输进程将网络层数据包发送给虚拟网络设备,推送数据包进入协议栈网络层;根据路由配置与默认网关信息,包含业务信息的网络层数据包经路由寻址传递,最终传输至目标接收设备,实现机载与地面业务设备的网络层路由通信。
如图3所示,步骤S1中,从物理层获取信息数据的以太网帧协议传输,具体方法如下:
S131、根据外接业务设备差异化需求,修改系统配置文件,进行以太网帧协议传输功能;在传输进程中创建基于底层网络数据处理的原始套接字接口;
S132、为保证协议栈底层数据帧的有效接收,系统网卡配置为混杂工作模式;根据配置文件中信息数据类型、传输协议及链路带宽信息,设置底层以太网帧传输的过滤规则与流量限额;
S133、传输进程通过原始套接字,捕获包含业务信息的底层以太网帧协议数据;为保障单帧传输延时,系统对不等长以太网帧进行变长协议组帧与数据加密处理;密态协议帧通过业务处理系统与收发信机接口,完成内部数据通信,后经信号编码调制处理,开启无线链路传输;
所述收发信机接口包括PCIe、Ethernet、LVDS、SPI、RS422;
S134、经无线链路传输、信号解调译码与内部接口通信,对端业务处理系统获取密态协议帧;根据数据组帧规则,完成协议帧同步、解密、解析处理过程,还原原始以太网帧协议数据;
S135、传输进程将以太网帧协议数据发包至协议栈物理层,通过以太网帧内目标MAC地址信息,完成协议数据到业务接收设备的自行寻址传输,实现机载与地面业务设备的MAC层透传。
其中,发送端业务设备到发送端业务传输系统间信息数据传输过程,发送端业务设备传输数据A:
在本地网络协议栈对A进行逐层打包,生成包含A的以太网帧;
以太网帧经业务设备的硬件网络接口输出,进入业务处理系统的硬件网络接口;
在业务处理系统网络协议栈内,对包含A的以太网帧进行逐层解析;
根据本次业务网络传输协议的特点与差异,通过默认参数配置或指令控制方式,修改对包含A的以太网帧的解析层级:
若为应用层传输,五层协议栈完全解析,业务处理系统进程拿到原始数据A,以此为链路传输数据,
若为网络层传输,五层协议栈解析到网络层,业务处理系统进程拿到包含数据A的网络层数据包,以此为链路传输数据,
若为物理层传输,五层协议栈完全不解析,业务处理系统进程拿到包含数据A的以太网帧,以此为链路传输数据,
执行无线链路传输,链路传输数据到达接收端业务处理系统,接收端业务设备从接收端业务处理系统接收数据A过程:
同理,根据本次业务网络传输协议的特点与差异,通过默认参数配置或指令控制方式,接收端切换为与发送段业务处理系统相同的传输方式配置,
若为应用层传输,链路传输数据仅为数据A,在业务处理系统网络协议栈对A进行逐层打包,以以太网帧协议完成业务处理系统到业务设备的硬件网络接口传递,业务设备在自身网络协议栈中对以太网帧逐层解析,还原出数据A,完成全部传输过程;
若为网络层传输,链路传输数据为包含A的网络层数据包,传输进程将该数据直接推送到业务处理系统网络协议栈的网络层,进行链路层以下的协议打包,以以太网帧协议完成业务处理系统到业务设备的硬件网络接口传递,业务设备在自身网络协议栈中对以太网帧逐层解析,还原出数据A,完成全部传输过程;
若为物理层传输,链路传输数据为包含A的以太网帧,传输进程将该数据直接推送到业务处理系统网络协议栈的物理层,不做任何协议打包,直接以以太网帧协议完成业务处理系统到业务设备的硬件网络接口传递,业务设备在自身网络协议栈中对以太网帧逐层解析,还原出数据A,完成全部传输过程。
如1至图4所示,步骤S2中,根据信息数据传输时传输方法的差异,将传输的信息数据分为业务数据与网络数据,具体分类方法为:
通过网络协议解析传输的数据为业务数据;
通过网络层数据传输或以太网帧协议传输的数据为网络数据。
如图4所示,步骤S2中,将业务数据根据业务数据设定的组帧传输模式形成定长组帧数据,具体方法如下:
S211、系统参考业务数据相关信息,对低速业务数据进行32字节定长协议组帧,单次组帧传输仅包含一种低速业务,多业务数据按照定长协议帧FHA组帧排队进入定长协议帧FHA缓存通道,定义协议帧FHA组帧内容包括同步字、类型编号、识别码、数据区、计数/校验;
S212、对多路高速业务与FHA帧数据进行1024字节定长复合协议帧组帧,定义复合协议帧FHB组帧内容包括同步字、密钥区、类型编号、FHA长度、业务类型/长度、计数/校验、数据区;
数据区分为低速FHA帧与高速业务数据两段空间,以有效数据长度区分组帧 业务临界;
所述业务数据相关信息包括数据类型、传输速率、优先级、缓存情况、等待时间;
S213、定长复合协议帧FHB进入系统加密通道,完成非同步字与密钥区以外的数据区域加密;业务数据以实际传输速率进行变速组帧,FHB帧以变速传输模式进入环状存储接口缓存;
S214、根据系统与链路收发信机间接口传输速率,以固定速率周期在环状存储中提取FHB帧数据,并对其进行1664字节定长接口协议组帧;接口帧IFA内容包括同步字、类型、有效长度、帧计数及数据区,系统将以大于实际业务总带宽(累加计算组帧效率)的传输速率,通过内部通信接口,以定速接口帧IFA形式进入链路传输系统。
如图1至图4所示,将网络数据根据网络数据设定的组帧传输模式形成变长组帧数据,具体方法如下:
在网络数据传输中,无论是网络层数据包还是底层以太网协议帧,均存在前后数据包不等长情况,为保证网络数据传输时效,业务处理系统对接入的网络数据进行变长协议帧TRA组帧,变长协议帧TRA组帧内容包含帧头/帧尾、密钥区、数据区及计数/校验,每个TRA帧仅包含一个完整网络层数据包或完整以太网协议帧,对数据区出现帧头/帧尾信息的数据进行协议转义,保障同步字唯一性;变长协议帧TRA组帧完成后,进行加密与传输的过程与步骤S213-S214中FHB帧处理方法,经数据加密与缓存码处理,通过内部通信接口,以定速接口帧IFA形式进入链路传输系统。
如图5所示,步骤S3中,定长组帧数据与变长组帧数据均通过数据加密,步骤S4中,将步骤S3中无线链路传输来的数据完成逆序协议解密,加密解密的具体方法如下:
S31、无人机与地面均对应设置加解密模块,加解密模块首次使用前,需通过密钥注入器,向业务处理系统内注密钥信息库,且保证无人机与地面的密钥信息库相同;密钥信息库由初始向量IV库和密钥Key组成,其中单组初始向量长度128bit,每套初始向量库包含65535组初始向量数据,共占用1MB存储空间;单组密钥长度256bit,每套密钥库包含65535组密钥数据,共占用2MB存储空间;
S32、数据加密时,通过内置随机数产生单元,获得两组16bit随机数据,将其分别作为该协议帧加密所需初始向量与密钥数据在信息库中的匹配地址;系统加载地址对应数据,对协议帧进行初始向量与密钥数据随机组合的数据加密处理;根据密钥信息库内初始向量与密钥数据的存储数量,系统共有42.9亿多种密钥信息组合方式,来保障单帧数据加密安全可靠。
S33、系统内置加解密模块采用标准AES加解密算法,支持密文反馈CFB与输出反馈OFB两种流处理工作模式;如图5所示,以CFB工作模式的AES加密过程为例,每次加密时,将前一个密文分组送回到密码算法的输入端,执行密文反馈计算过程。因为明文数据可以被逐比特加密,在生成第一个密文分组时,由于不存在前一个输出的数据,因此需要使用初始化向量来代替首个反馈密文。
S34、为保证接收端开展有效协议同步与数据解密,协议帧加密过程中保留了同步字与密钥区部分,系统将加密使用的初始向量与密钥数据地址填充在帧内 密钥区部分,随密态协议帧一同传输到对端业务处理系统中;
S35、经过无线链路传输与数据接口通信,对端业务处理系统接收到链路传输的密钥协议帧,根据协议同步挑帧后的密钥区地址信息,加载相关初始向量与密钥数据,使用与加密处理过程相同的算法工作模式,完成协议帧数解密,并清空协议帧密钥区信息。
如图6、图7所示,另一方面,应用上述的一种网络化加密传输的数据链业务处理方法的一种网络化加密传输的数据链业务处理系统,无人机与地面均依次连接设置有业务设备、业务处理系统、收发信机,无人机的收发信机与地面的收发信机连接进行数据传输,无人机的业务处理系统与地面的业务处理系统均配置有加解密模块,所述业务处理系统包括业务处理应用层、业务处理服务层、业务处理协议层、业务处理逻辑层、业务处理数据层、业务处理接口层;
所述业务处理应用层设置有后台监控服务程序模块,后台监控服务程序模块进行后台监控服务与异步通信机制,根据业务功能设置,进行对应业务进程;通过信号集屏蔽与信号监听处理线程机制,保障信号监听sigwait对信号通知的独立管理;在业务进程异常退出时,后台服务捕获并重启异常进程,在系统日志syslog中记录异常信息过程;当后台监控服务异常推出,同步回收业务子进程,以系统脚本服务方式,重启后台监控服务与各业务进程,保障全生命周期管控;业务处理应用层还设置有网络协议解析传输模块、网络层数据传输模块、以太网帧协议传输模块,网络协议解析传输模块、网络层数据传输模块、以太网帧协议传输模块用于接收信息数据;
所述业务处理服务层包括系统参数配置模块、接口资源服务模块、指令控制与系统监测模块、日志管理模块、进程管理服务模块、线程管理服务模块、IPC通信与数据缓存模块、密钥管理模块;
业务处理逻辑层包括网络协议栈分层模块、协议组帧排队模块、通道选择与超时判断模块、指令解析控制模块、多线程任务协同模块、状态提取回报模块、优先级与实时调度模块、多核负载均衡模块;
所述业务处理协议层用于存储数据传输的通信协议,包括网络通信协议、-数据接口协议、混合组帧传输协议、系统控制回报协议;
所述业务处理数据层用于存储数据业务进程时产生的数据,包括外部业务数据模块、协议组帧数据模块、链路传输数据模块、内部接口数据模块;
所述业务处理接口层包括与外部业务设备间通信接口、与内部数据链收发信机件通信接口;
所述业务处理服务层与业务处理逻辑层配合进行多线程任务协作、进行网络服务、提高运行处理效率,具体如下:
在多线程任务协作方面,采用系统参数配置模块的默认参数配置,实现初始指令加载,执行多任务线程创建;采用线程管理服务模块与多线程任务协同模块,通过条件变量、互斥锁与多级缓存机制,实现线程间前后业务处理逻辑依次运行;采用指令解析控制模块、密钥管理模块,通过IO操作阻塞监听与超时判断机制,获取实时指令控制,执行工作模式、处理逻辑及密钥数据的管理控制功能;采用状态提取回报模块,通过共享内存与信号量机制,实现系统状态提取、运行信息收集与定期协议回报功能;采用进程管理服务模块、IPC通信与数据缓存模块, 通过socket绑定本地回环地址方式,在防止数据外协的基础上,保障跨进程数据通信;
在网络服务方面,采用线程管理服务模块、多线程任务协同模块,通过线程池方式,动态创建、回收与网络连接服务相关的任务线程;采用通道选择与超时判决模块,进行链表的动态管理与传输超时判决,维护各网络连接Socket端口信息;采用线程管理服务模块、多线程任务协同模块,通过有名管道FIFO通信机制,实现各网络服务线程与同步组帧逻辑处理间的数据传输过程;采用系统参数配置模块、指令控制与系统检测模块、网络协议栈分层模块,通过默认参数配置与系统指令控制,实现协议栈分层处理逻辑的业务使能,兼容多种组合协议处理方式的数据传输过程;
在运行处理效率方面,采用接口资源服务模块、系统参数配置模块协议组帧排队模块,根据接口协议、业务速率、数据类型、处理逻辑及传输时效等因素,执行差异化组帧传输策略,保障多协议接口适配与多类型数据组帧传输功能;采用优先级与实时调度模块,通过优先级调整与调度策略优化,保障重要数据的实时业务传输,去除接口缓存开销,降低时隙抖动;采用多核负载均衡模块,通过业务负载监控模块、线程管理服务模块、多线程任务系统模块,确认CPU高开销业务处理线程,通过业务线程与处理器多核静态绑定关系,以指定负载均衡方式,避免单核超负载运行后的自行判决均衡情况,保障全系统持续低负载运行状态。
采用如图1所示系统架构,搭载某款视距无人机数据链,使用Iperf网络测试软件(包含TCP协议握手与UDP协议传输),模拟测试返向速率与前向速率8Mb/s、4Mb/s的密态业务数据传输过程,双向数据传输同步运行1小时,统计测试结果如图8、图9所示。经测试,业务处理系统运行稳定正常,前返向同步传输业务数据无丢包与大延时抖动情况,满足无人机数据链对多协议通用化适配、业务动态扩展、实时链路通信与传输信息安全等方面的现实需求。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (9)

  1. 一种网络化加密传输的数据链业务处理方法,其特征在于:用于无人机与地面之间的数据传输,具体方法如下:
    S1、发送端业务处理系统根据接收发送端业务设备信息数据的五层协议栈解析位置,确定传输方法进行信息数据传输,所述传输方法包括从应用层获取信息数据的网络协议解析传输、从网络层获取信息数据的网络层数据传输、从物理层获取信息数据的以太网帧协议传输;
    S2、根据信息数据传输时传输方法的差异,将传输的信息数据分为业务数据与网络数据,将业务数据根据业务数据设定的组帧传输模式形成定长组帧数据,将网络数据根据网络数据设定的组帧传输模式形成变长组帧数据;
    S3、定长组帧数据与变长组帧数据均通过数据加密后,变速传输到环形存储中,进一步通过等长接口协议帧匀速传输到无线链路中并向接收端传输数据;
    S4、在接收端业务处理系统中,将步骤S3中无线链路传输来的数据完成逆序协议解密、解帧处理,并通过接收端业务处理系统的网络栈发送到接收端业务设备中,完成信息数据传输。
  2. 根据权利要求1所述的一种网络化加密传输的数据链业务处理方法,其特征在于:步骤S1中,从应用层获取信息数据的网络协议解析传输,具体方法如下:
    S111、根据外接业务设备差异化需求,确认外接业务设备网络通道个数、通信协议与地址端口信息,修改系统配置文件;业务处理系统加载默认配置文件,动态创建对应网络通信服务,启动访问监听与业务收发功能,以链表形式管理各网络套接字Socket端口;
    S112、外接业务设备将信息数据以指定网络协议进行协议栈打包,通过以太网接口,传输至业务处理系统;传输进程通过协议栈解析,在网络应用层获取原始信息数据,并将信息数据推送至各接口缓存进先入先出缓存器FIFO,等待协议组帧;
    S113、根据数据类型、传输速率、优先级、缓存情况及等待时间,对信息数据进行定长协议组帧与数据加密处理形成密态协议帧;密态协议帧通过业务处理系统与收发信机接口,完成内部数据通信,后经信号编码调制处理,开启无线链路传输;
    S114、经无线链路传输、信号解调译码与内部接口通信,对端业务处理系统获取密态协议帧;根据数据组帧规则,完成协议帧同步、解密、解析处理过程,还原多路原始信息数据,推送至接口缓存FIFO,等待协议发送;
    S115、根据配置信息,事先创建好与本地业务设备对应的网络通信服务;当信息数据进入接口缓存FIFO,传输进程捕获数据接入信号,开始执行数据提取与协议栈打包;最终,信息数据经对应网络通信服务,传输至目标接收设备。
  3. 根据权利要求1所述的一种网络化加密传输的数据链业务处理方法,其特 征在于:步骤S1中,从网络层获取信息数据的网络层数据传输,具体方法如下:
    S121、根据外接业务设备差异化需求,修改系统配置文件,进行网络层数据传输功能;创建内部网桥与多种虚拟网络设备,完成实际物理网卡的网桥绑定,配置各网络设备地址;
    S122、根据前返向业务传输方向,配置系统默认网关与多组静态路由信息,保障信息数据有效路由寻址;同时,为实现路由传输,启动系统网络层IP包转发功能;
    S123、修改动态主机配置协议DHCP服务配置加载脚本,启动本地动态主机配置协议服务DHCP Server,为主机配置协议服务客户端DHCP Client的外接业务设备提供网络地址分配与默认网关信息;传输进程通过网络路由转发,在虚拟网络设备接口处,获得包含信息数据的网络层数据包;
    S124、为保障单个网络层数据包传输延时,系统对不等长网络层IP包进行变长协议组帧与数据加密处理;密态协议帧通过业务处理系统与收发信机接口,完成内部数据通信,后经信号编码调制处理,开启无线链路传输;
    S125、经无线链路传输、信号解调译码与内部接口通信,对端业务处理系统获取密态协议帧;根据数据组帧规则,完成协议帧同步、解密、解析处理过程,还原原始网络层数据包;
    S126、传输进程将网络层数据包发送给虚拟网络设备,推送数据包进入协议栈网络层;根据路由配置与默认网关信息,包含业务信息的网络层数据包经路由寻址传递,最终传输至目标接收设备,实现机载与地面业务设备的网络层路由通信。
  4. 根据权利要求1所述的一种网络化加密传输的数据链业务处理方法,其特征在于:步骤S1中,从物理层获取信息数据的以太网帧协议传输,具体方法如下:
    S131、根据外接业务设备差异化需求,修改系统配置文件,进行以太网帧协议传输功能;在传输进程中创建基于底层网络数据处理的原始套接字接口;
    S132、为保证协议栈底层数据帧的有效接收,系统网卡配置为混杂工作模式;根据配置文件中信息数据类型、传输协议及链路带宽信息,设置底层以太网帧传输的过滤规则与流量限额;
    S133、传输进程通过原始套接字,捕获包含业务信息的底层以太网帧协议数据;为保障单帧传输延时,系统对不等长以太网帧进行变长协议组帧与数据加密处理;密态协议帧通过业务处理系统与收发信机接口,完成内部数据通信,后经信号编码调制处理,开启无线链路传输;
    S134、经无线链路传输、信号解调译码与内部接口通信,对端业务处理系统获取密态协议帧;根据数据组帧规则,完成协议帧同步、解密、解析处理过程,还原原始以太网帧协议数据;
    S135、传输进程将以太网帧协议数据发包至协议栈物理层,通过以太网帧内目标MAC地址信息,完成协议数据到业务接收设备的自行寻址传输,实现机载与地面业务设备的MAC层透传。
  5. 根据权利要求1所述的一种网络化加密传输的数据链业务处理方法,其特征在于:步骤S2中,根据信息数据传输时传输方法的差异,将传输的信息数据分为业务数据与网络数据,具体分类方法为:
    通过网络协议解析传输的数据为业务数据;
    通过网络层数据传输或以太网帧协议传输的数据为网络数据。
  6. 根据权利要求1所述的一种网络化加密传输的数据链业务处理方法,其特征在于:步骤S2中,将业务数据根据业务数据设定的组帧传输模式形成定长组帧数据,具体方法如下:
    S211、系统参考业务数据相关信息,对低速业务数据进行32字节定长协议组帧,单次组帧传输仅包含一种低速业务,多业务数据按照定长协议帧FHA组帧排队进入定长协议帧FHA缓存通道,定义协议帧FHA组帧内容包括同步字、类型编号、识别码、数据区、计数/校验;
    S212、对多路高速业务与FHA帧数据进行1024字节定长复合协议帧组帧,定义复合协议帧FHB组帧内容包括同步字、密钥区、类型编号、FHA长度、业务类型/长度、计数/校验、数据区;
    数据区分为低速FHA帧与高速业务数据两段空间,以有效数据长度区分组帧业务临界;
    所述业务数据相关信息包括数据类型、传输速率、优先级、缓存情况、等待时间;
    S213、定长复合协议帧FHB进入系统加密通道,完成非同步字与密钥区以外的数据区域加密;业务数据以实际传输速率进行变速组帧,FHB帧以变速传输模式进入环状存储接口缓存;
    S214、根据系统与链路收发信机间接口传输速率,以固定速率周期在环状存储中提取FHB帧数据,并对其进行1664字节定长接口协议组帧;接口帧IFA内容包括同步字、类型、有效长度、帧计数及数据区,系统将以大于实际业务总带宽的传输速率,通过内部通信接口,以定速接口帧IFA形式进入链路传输系统。
  7. 根据权利要求6所述的一种网络化加密传输的数据链业务处理方法,其特征在于:步骤S2中,将网络数据根据网络数据设定的组帧传输模式形成变长组帧数据,具体方法如下:
    在网络数据传输中,无论是网络层数据包还是底层以太网协议帧,均存在前后数据包不等长情况,为保证网络数据传输时效,业务处理系统对接入的网络数据进行变长协议帧TRA组帧,变长协议帧TRA组帧内容包含帧头/帧尾、密钥区、数据区及计数/校验,每个TRA帧仅包含一个完整网络层数据包或完整以太网协议帧,对数据区出现帧头/帧尾信息的数据进行协议转义,保障同步字唯一性;变长协议帧TRA组帧完成后,进行加密与传输的过程与步骤S213-S214中FHB帧处理方法,经数据加密与缓存码处理,通过内部通信接口,以定速接口帧IFA形式进入链路传输系统。
  8. 根据权利要求1所述的一种网络化加密传输的数据链业务处理方法,其特 征在于:步骤S3中,定长组帧数据与变长组帧数据均通过数据加密,步骤S4中,将步骤S3中无线链路传输来的数据完成逆序协议解密,加密解密的具体方法如下:
    S31、无人机与地面均对应设置加解密模块,加解密模块首次使用前,需通过密钥注入器,向业务处理系统内注密钥信息库,且保证无人机与地面的密钥信息库相同;密钥信息库由初始向量IV库和密钥Key组成;
    S32、数据加密时,通过内置随机数产生单元,获得两组16bit随机数据,将其分别作为该协议帧加密所需初始向量与密钥数据在信息库中的匹配地址;系统加载地址对应数据,对协议帧进行初始向量与密钥数据随机组合的数据加密处理;
    S33、系统内置加解密模块采用标准AES加解密算法,支持密文反馈CFB与输出反馈OFB两种流处理工作模式;
    S34、为保证接收端开展有效协议同步与数据解密,协议帧加密过程中保留了同步字与密钥区部分,系统将加密使用的初始向量与密钥数据地址填充在帧内密钥区部分,随密态协议帧一同传输到对端业务处理系统中;
    S35、经过无线链路传输与数据接口通信,对端业务处理系统接收到链路传输的密钥协议帧,根据协议同步挑帧后的密钥区地址信息,加载相关初始向量与密钥数据,使用与加密处理过程相同的算法工作模式,完成协议帧数解密,并清空协议帧密钥区信息。
  9. 应用权利要求1-8任一所述的一种网络化加密传输的数据链业务处理方法的一种网络化加密传输的数据链业务处理系统,其特征在于:无人机与地面均依次连接设置有业务设备、业务处理系统、收发信机,无人机的收发信机与地面的收发信机连接进行数据传输,无人机的业务处理系统与地面的业务处理系统均配置有加解密模块,所述业务处理系统包括业务处理应用层、业务处理服务层、业务处理协议层、业务处理逻辑层、业务处理数据层、业务处理接口层;
    所述业务处理应用层设置有后台监控服务程序模块,后台监控服务程序模块进行后台监控服务与异步通信机制,根据业务功能设置,进行对应业务进程;通过信号集屏蔽与信号监听处理线程机制,保障信号监听sigwait对信号通知的独立管理;在业务进程异常退出时,后台服务捕获并重启异常进程,在系统日志syslog中记录异常信息过程;当后台监控服务异常推出,同步回收业务子进程,以系统脚本服务方式,重启后台监控服务与各业务进程,保障全生命周期管控;业务处理应用层还设置有网络协议解析传输模块、网络层数据传输模块、以太网帧协议传输模块,网络协议解析传输模块、网络层数据传输模块、以太网帧协议传输模块用于接收信息数据;
    所述业务处理服务层包括系统参数配置模块、接口资源服务模块、指令控制与系统监测模块、日志管理模块、进程管理服务模块、线程管理服务模块、IPC通信与数据缓存模块、密钥管理模块;
    业务处理逻辑层包括网络协议栈分层模块、协议组帧排队模块、通道选择与超时判断模块、指令解析控制模块、多线程任务协同模块、状态提取回报模块、优先级与实时调度模块、多核负载均衡模块;
    所述业务处理协议层用于存储数据传输的通信协议,包括网络通信协议、-数据接口协议、混合组帧传输协议、系统控制回报协议;
    所述业务处理数据层用于存储数据业务进程时产生的数据,包括外部业务数据模块、协议组帧数据模块、链路传输数据模块、内部接口数据模块;
    所述业务处理接口层包括与外部业务设备间通信接口、与内部数据链收发信机件通信接口;
    所述业务处理服务层与业务处理逻辑层配合进行多线程任务协作、进行网络服务、提高运行处理效率,具体如下:
    在多线程任务协作方面,采用系统参数配置模块的默认参数配置,实现初始指令加载,执行多任务线程创建;采用线程管理服务模块与多线程任务协同模块,通过条件变量、互斥锁与多级缓存机制,实现线程间前后业务处理逻辑依次运行;采用指令解析控制模块、密钥管理模块,通过IO操作阻塞监听与超时判断机制,获取实时指令控制,执行工作模式、处理逻辑及密钥数据的管理控制功能;采用状态提取回报模块,通过共享内存与信号量机制,实现系统状态提取、运行信息收集与定期协议回报功能;采用进程管理服务模块、IPC通信与数据缓存模块,通过socket绑定本地回环地址方式,在防止数据外协的基础上,保障跨进程数据通信;
    在网络服务方面,采用线程管理服务模块、多线程任务协同模块,通过线程池方式,动态创建、回收与网络连接服务相关的任务线程;采用通道选择与超时判决模块,进行链表的动态管理与传输超时判决,维护各网络连接Socket端口信息;采用线程管理服务模块、多线程任务协同模块,通过有名管道FIFO通信机制,实现各网络服务线程与同步组帧逻辑处理间的数据传输过程;采用系统参数配置模块、指令控制与系统检测模块、网络协议栈分层模块,通过默认参数配置与系统指令控制,实现协议栈分层处理逻辑的业务使能,兼容多种组合协议处理方式的数据传输过程;
    在运行处理效率方面,采用接口资源服务模块、系统参数配置模块协议组帧排队模块,根据接口协议、业务速率、数据类型、处理逻辑及传输时效等因素,执行差异化组帧传输策略,保障多协议接口适配与多类型数据组帧传输功能;采用优先级与实时调度模块,通过优先级调整与调度策略优化,保障重要数据的实时业务传输,去除接口缓存开销,降低时隙抖动;采用多核负载均衡模块,通过业务负载监控模块、线程管理服务模块、多线程任务系统模块,确认CPU高开销业务处理线程,通过业务线程与处理器多核静态绑定关系,以指定负载均衡方式,避免单核超负载运行后的自行判决均衡情况,保障全系统持续低负载运行状态。
PCT/CN2022/107956 2022-05-10 2022-07-26 一种网络化加密传输的数据链业务处理系统及方法 WO2023216424A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210500340.5A CN114598384B (zh) 2022-05-10 2022-05-10 一种网络化加密传输的数据链业务处理系统及方法
CN202210500340.5 2022-05-10

Publications (1)

Publication Number Publication Date
WO2023216424A1 true WO2023216424A1 (zh) 2023-11-16

Family

ID=81821635

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/107956 WO2023216424A1 (zh) 2022-05-10 2022-07-26 一种网络化加密传输的数据链业务处理系统及方法

Country Status (2)

Country Link
CN (1) CN114598384B (zh)
WO (1) WO2023216424A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598384B (zh) * 2022-05-10 2022-08-02 天津航天中为数据系统科技有限公司 一种网络化加密传输的数据链业务处理系统及方法
CN115174075B (zh) * 2022-07-22 2023-07-21 上海迅软信息科技有限公司 一种数据传输方法、设备及计算机存储介质
CN115150932B (zh) * 2022-09-01 2022-11-18 深圳慧城智联科技有限公司 一种基于5g的边缘网关通信信息同步方法
CN116346953B (zh) * 2023-03-02 2024-02-13 杭州又拍云科技有限公司 一种用于实时数据传输的加速方法及装置
CN116866015B (zh) * 2023-06-26 2024-04-02 天津航天中为数据系统科技有限公司 一种自适应调整的无人机数据链加密传输系统及方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1543162A (zh) * 2003-11-06 2004-11-03 西安电子科技大学 变长数据分组与定长信元混合传送的方法与适配装置
CN104022844A (zh) * 2014-05-28 2014-09-03 北京迈伦斯科技有限公司 一种匹配多种传输方式的数据封装方法及系统
CN108989286A (zh) * 2018-06-08 2018-12-11 北京开广信息技术有限公司 通用数据流的封装方法、解封装方法及装置
WO2021032956A1 (en) * 2019-08-19 2021-02-25 Drone Evolution Limited Unmanned aerial vehicle for transporting a payload
CN114598384A (zh) * 2022-05-10 2022-06-07 天津航天中为数据系统科技有限公司 一种网络化加密传输的数据链业务处理系统及方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1728720A (zh) * 2004-07-27 2006-02-01 邓里文 一种用于以太网与同步数字体系或者同步光网络融合的适配方法
CN1728680A (zh) * 2004-07-31 2006-02-01 华为技术有限公司 移动通信网络中提高传输控制协议数据传输性能的方法
CN101304342B (zh) * 2008-06-27 2010-11-24 电子科技大学 一种增强型以太网接口装置
CN106535207B (zh) * 2016-11-04 2017-12-08 中国科学院上海微系统与信息技术研究所 一种小型化多业务无线移动自组网网络系统
CN111641583B (zh) * 2020-04-07 2021-09-03 北京邮电大学 一种物联网资源接入系统及资源接入方法
CN112910725B (zh) * 2021-01-18 2022-12-06 卓望数码技术(深圳)有限公司 一种网络流量检测方法及装置、计算机可读存储介质
CN113067799B (zh) * 2021-02-25 2022-01-11 北京航空航天大学 一种兼容以太网通信的ttp/c通信节点实现方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1543162A (zh) * 2003-11-06 2004-11-03 西安电子科技大学 变长数据分组与定长信元混合传送的方法与适配装置
CN104022844A (zh) * 2014-05-28 2014-09-03 北京迈伦斯科技有限公司 一种匹配多种传输方式的数据封装方法及系统
CN108989286A (zh) * 2018-06-08 2018-12-11 北京开广信息技术有限公司 通用数据流的封装方法、解封装方法及装置
WO2021032956A1 (en) * 2019-08-19 2021-02-25 Drone Evolution Limited Unmanned aerial vehicle for transporting a payload
CN114598384A (zh) * 2022-05-10 2022-06-07 天津航天中为数据系统科技有限公司 一种网络化加密传输的数据链业务处理系统及方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUI LIU, WANG HONGMIAO; HU NAN; YAN HUA: "Design and Implementation of Generalized UAV Command and Control Platform", COMPUTER MEASUREMENT & CONTROL, vol. 25, no. 7, 25 July 2017 (2017-07-25), pages 170 - 173, XP093106745 *

Also Published As

Publication number Publication date
CN114598384A (zh) 2022-06-07
CN114598384B (zh) 2022-08-02

Similar Documents

Publication Publication Date Title
WO2023216424A1 (zh) 一种网络化加密传输的数据链业务处理系统及方法
US20200314181A1 (en) Communication with accelerator via RDMA-based network adapter
CN107046542B (zh) 一种在网络级采用硬件实现共识验证的方法
US8111707B2 (en) Compression mechanisms for control plane—data plane processing architectures
US8923322B2 (en) Stateless fibre channel sequence acceleration for fibre channel traffic over Ethernet
US7660264B1 (en) Method for traffic schedulign in intelligent network interface circuitry
US8949578B2 (en) Sharing of internal pipeline resources of a network processor with external devices
JP2016510524A (ja) 通信トラフィック処理アーキテクチャおよび方法
JP2004526218A (ja) 相互接続されたファブリックにおける高度にスケーラブルで高速のコンテンツ・ベース・フィルタリング及び負荷均衡化システム及び方法
US7698541B1 (en) System and method for isochronous task switching via hardware scheduling
Gallo et al. {ClickNF}: a Modular Stack for Custom Network Functions
EP3890279A1 (en) Network information transmission system
US20240069977A1 (en) Data transmission method and data transmission server
US20200099670A1 (en) Secure In-line Received Network Packet Processing
CN102185833A (zh) 一种基于fpga的fc i/o并行处理方法
WO2004040819A2 (en) An apparatus and method for receive transport protocol termination
CN108235379A (zh) 一种数据传输的方法及设备
CN108566390B (zh) 一种卫星消息监听与分发服务系统
US7580410B2 (en) Extensible protocol processing system
Tian et al. Accelerating distributed deep learning using multi-path RDMA in data center networks
US11038856B2 (en) Secure in-line network packet transmittal
WO2008121690A2 (en) Data and control plane architecture for network application traffic management device
CN114189832B (zh) 一种列车无线智能网关系统、数据处理方法、终端和网关
Su et al. Technology trends in large-scale high-efficiency network computing
Ren et al. Middleware support for rdma-based data transfer in cloud computing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22941367

Country of ref document: EP

Kind code of ref document: A1