CN117240610B - PLC module operation data transmission method and system based on data encryption - Google Patents
PLC module operation data transmission method and system based on data encryption Download PDFInfo
- Publication number
- CN117240610B CN117240610B CN202311498749.9A CN202311498749A CN117240610B CN 117240610 B CN117240610 B CN 117240610B CN 202311498749 A CN202311498749 A CN 202311498749A CN 117240610 B CN117240610 B CN 117240610B
- Authority
- CN
- China
- Prior art keywords
- plc module
- operation data
- data
- transmission
- module operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 109
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000006854 communication Effects 0.000 claims abstract description 69
- 238000004891 communication Methods 0.000 claims abstract description 67
- 238000007781 pre-processing Methods 0.000 claims abstract description 18
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 17
- 230000006870 function Effects 0.000 claims description 18
- 238000004590 computer program Methods 0.000 claims description 13
- 238000003860 storage Methods 0.000 claims description 9
- 230000002159 abnormal effect Effects 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 7
- 238000012937 correction Methods 0.000 claims description 6
- 230000009466 transformation Effects 0.000 claims description 6
- 238000004140 cleaning Methods 0.000 claims description 5
- 230000001186 cumulative effect Effects 0.000 claims description 3
- 230000001131 transforming effect Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 239000011159 matrix material Substances 0.000 description 5
- 238000005259 measurement Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Programmable Controllers (AREA)
Abstract
The invention discloses a PLC module operation data transmission method and system based on data encryption, which belongs to the technical field of encrypted data transmission, and specifically comprises the following steps: the method comprises the steps of obtaining PLC module operation data, preprocessing the PLC module operation data, encrypting the preprocessed PLC module operation data, establishing a secure tunnel, transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy, decrypting the received PLC module operation data by using the same secret key and encryption algorithm on the receiving equipment, checking the integrity of the received PLC module operation data by using a hash function after decrypting the data, completing the transmission of the encrypted PLC module operation data, encrypting the PLC module data by utilizing the encryption algorithm, improving the safety of the data, selecting an optimal communication channel by utilizing the secure transmission strategy, and improving the transmission efficiency of the encrypted PLC module data.
Description
Technical Field
The invention belongs to the technical field of encrypted data transmission, and particularly relates to a PLC (programmable logic controller) module operation data transmission method and system based on data encryption.
Background
Under the intelligent trend, the operation data of the PLC module are continuously increased every day, the total amount of collected data explodes, new challenges are brought to information transmission and information security, the response signals of the PLC module have the characteristics of rich information characteristics, the periodicity is strong, the distribution is sparse, a large amount of data related to key core technologies of equipment are generated at the moment of the collection port, the data are easy to be attacked maliciously in the transmission process of flowing on the Internet and being transmitted to an analysis end and the like, particularly under some special analysis scenes, the underlying information sensing equipment does not support a traditional password system with high energy consumption, the transmission encryption algorithm is not perfect, potential transmission security threats and hidden hazards cannot be identified in a quick time, the data transmission is possibly tampered maliciously, the data transmission throughput is reduced, and the data security problem is particularly prominent.
For example, chinese patent with the grant publication number CN116032624B discloses a data transmission method based on fusion encryption, which includes the following steps: s1, setting an original signal x to have a plurality of different solutions under the condition that the original signal x is equal to the multiplication of a determined transformation matrix ψ and a coefficient vector s to be determined; s2, the transmitting end carries out linear measurement on the original signal x to obtain a measurement result y, and calculates a sensing matrix A and a transformation matrix ψ to be synchronized into the receiving end; s3, the sending end takes the measurement result y as a plaintext, and encrypts the plaintext through a fence password to obtain a ciphertext; s4, the sending end transmits the ciphertext to the receiving end, and the receiving end receives the ciphertext and then decrypts the ciphertext through the fence password to obtain the plaintext, so that a measurement result y is recovered; s5, the receiving end reconstructs an original signal according to the sensing matrix A, the transformation matrix psi and the recovered measurement result y, and stores the original signal. The invention ensures the integrity of the information characteristics and simultaneously considers the high efficiency and the safety of transmission.
For example, china patent with the publication number CN111490980B discloses an industrial Internet data transmission encryption method, which specifically comprises the following steps: s1, carrying out data identification on all data to be transmitted from an industrial Internet data transmission center by a data identification module, acquiring transmission data with key importance by a key data acquisition module, and acquiring other remained transmission data by other data acquisition modules; s2, according to the step S1, the acquired key transmission data are integrated through a data integration module, and the invention relates to the technical field of data security. The industrial Internet data transmission encryption method can divide data to be transmitted by an industrial Internet data transmission center, adopts encryption methods of different grades and modes aiming at key importance data and other common data, combines the two different encryption modes, ensures that the transmitted data has high safety and timeliness, and avoids the problems of data analysis and slow transmission speed.
The disadvantages of the above patents: when network fluctuation or a jam occurs in a time period with frequent network usage, a better communication channel cannot be selected, and the efficiency of data transmission cannot be improved.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a PLC module operation data transmission method and system based on data encryption, which are used for acquiring PLC module operation data, preprocessing the PLC module operation data, encrypting the preprocessed PLC module operation data, establishing a secure tunnel, transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy, decrypting the received PLC module operation data by using the same secret key and encryption algorithm on the receiving equipment, checking the integrity of the received PLC module operation data by using a hash function after decrypting the data, completing the transmission of the encrypted PLC module operation data, encrypting the PLC module data by using an encryption algorithm, improving the safety of the data, selecting an optimal communication channel by utilizing the secure transmission strategy, and improving the transmission efficiency of the encrypted PLC module data.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a PLC module operation data transmission method based on data encryption comprises the following steps:
step S1: acquiring PLC module operation data, and preprocessing the PLC module operation data;
step S2: encrypting the preprocessed PLC module operation data;
step S3: establishing a secure tunnel, and transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy;
step S4: on the receiving device, decrypting the received PLC module operating data using the same key and encryption algorithm;
step S5: after decrypting the data, the integrity of the received PLC module operation data is checked by using a hash function, and the transmission of the encrypted PLC module operation data is completed.
Specifically, the preprocessing in step S1 includes data cleaning, abnormal value removal and missing value correction.
Specifically, the specific steps of the step S2 are as follows:
step S201: setting the operation data set of the pretreated PLC module as A,wherein->Representing the running data of the nth PLC module, and generating a public key and a private key;
step S202: encrypting the PLC module operation data set A by using the public key to obtain an encrypted PLC module operation data set;
Step S203: operating data set of encrypted PLC moduleFrom the kth position, truncating the m-bit value and randomly generating +.>Transforming the truncated m-bit value;
step 204: the transformed formula is:wherein->Representing the transformed encrypted PLC module operating data set.
Specifically, the method for generating the public key and the private key in step S201 is as follows: either of the key generation algorithms is utilized.
Specifically, the random function in the step S203 is gen_key ().
Specifically, the secure transmission policy in step S3 specifically includes the following steps:
step S301: the transmission rate of a communication channel between a transmitting device and a receiving device is calculated by the following formula:wherein->Representing the transmission rate of the ith communication channel, < >>Representing the bandwidth of the transmitting device->Represents the noise power of the ith communication channel, < >>Indicating the cumulative interference power of the ith communication channel and all communication channels connected thereto except for the ith communication channel,/or->Representing the transmission power of the transmission device, < >>Representing the channel gain of the ith communication channel;
step S302: the time delay from the transmitting device to the receiving device is calculated by the following formula:wherein->Representing the delay from the transmitting device to the receiving device, C representing the load of the transmitting device, +.>Representing the load of the operation data set of the encrypted PLC module after the transformation, and j represents the operation capability of the transmitting equipment;
step S303: the transmission efficiency of the optimal communication channel is calculated, and the calculation formula is as follows:,/>representing the transmission efficiency of an optimal communication channel, +.>Influence weight representing the transmission rate of a communication channel from a transmitting device to a receiving device +.>Influence weight representing time delay from transmitting device to receiving device, and +.>;
Step S304: when the transmission efficiency of the same optimal communication channel exists, the communication channel with the largest transmission rate and the smallest time delay in the same optimal communication channel is selected as the optimal communication channel.
Specifically, the accumulated interference power of the ith communication channel and all the communication channels except the ith communication channel connected in step S301The calculation formula of (2) is as follows: />Wherein (1)>Indicating the interference power of all devices except the transmitting device to the communication channel i +.>Indicating the interference power of all communication channels except the ith communication channel to communication channel i.
The method for decrypting the data in the step S5 is as follows: and reversely decrypting the received transformed encrypted PLC module operation data set by using the private key.
A PLC module operation data transmission system based on data encryption, comprising: the PLC module operates the data acquisition module, the PLC module operates the data preprocessing module, the encryption security transmission module, the decryption module and the data integrity checking module;
the PLC module operation data acquisition module is used for acquiring PLC module operation data;
the PLC module operation data preprocessing module is used for preprocessing the acquired PLC module operation data, including data cleaning, abnormal value removal and missing value correction;
the encryption security transmission module is used for encrypting the preprocessed PLC module operation data and sending the encrypted PLC module operation data to the receiving equipment through a security transmission strategy;
the decryption module is used for decrypting the received encrypted PLC module operation data;
the data integrity checking module is used for checking the integrity condition of the decrypted PLC module operation data.
Specifically, the encryption security transmission module includes: an encryption unit and a secure transmission unit;
the encryption unit is used for encrypting the operation data of the PLC module;
the safe transmission unit is used for safely transmitting the encrypted PLC module operation data to the receiving equipment.
An electronic device comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of a PLC module operation data transmission method based on data encryption when executing the computer program.
A computer readable storage medium having stored thereon computer instructions which when executed perform the steps of a method for operating a data transmission of a PLC module based on data encryption.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention provides a PLC module operation data transmission system based on data encryption, which is optimized and improved in architecture, operation steps and flow, and has the advantages of simple flow, low investment and operation cost and low production and working costs.
2. The invention provides a data encryption-based PLC module operation data transmission method, which comprises the steps of obtaining PLC module operation data, preprocessing the PLC module operation data, encrypting the preprocessed PLC module operation data, establishing a secure tunnel, transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy, decrypting the received PLC module operation data by using the same secret key and encryption algorithm on the receiving equipment, checking the integrity of the received PLC module operation data by using a hash function after decrypting the data, completing the transmission of the encrypted PLC module operation data, encrypting the PLC module data by using the encryption algorithm, improving the safety of the data, selecting an optimal communication channel by using the secure transmission strategy, and improving the transmission efficiency of the encrypted PLC module data.
Drawings
FIG. 1 is a flow chart of a method for transmitting data by operating a PLC module based on data encryption;
FIG. 2 is a schematic diagram of a data transmission system for operating a PLC module based on data encryption;
fig. 3 is a diagram of an electronic device of a PLC module operation data transmission method based on data encryption according to the present invention.
Detailed Description
Example 1
Referring to fig. 1, an embodiment of the present invention is provided:
a PLC module operation data transmission method based on data encryption comprises the following steps:
step S1: acquiring PLC module operation data, and preprocessing the PLC module operation data;
step S2: encrypting the preprocessed PLC module operation data;
step S3: establishing a secure tunnel, and transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy;
step S4: on the receiving device, decrypting the received PLC module operating data using the same key and encryption algorithm;
step S5: after decrypting the data, the integrity of the received PLC module operation data is checked by using a hash function, and the transmission of the encrypted PLC module operation data is completed.
Adding an error and abnormal condition processing mechanism, adopting a security log mechanism, recording security events and abnormal behaviors exposed in the communication process between the sending equipment and the receiving equipment, monitoring and analyzing various emergency events, timely processing security holes by counting the number, frequency and type of the events, and setting an emergency plan. (1) enhanced authentication: the security log records the entire process of the user's authentication event, wherein the user's login and logout, user name/password verification, token use, key use, etc. are recorded in detail. The actions are monitored, tracked and rechecked, so that access marks of unauthorized illegal clients can be detected, and corresponding measures such as interrupting the connection of the clients or adding to a blacklist can be taken. (2) authorized access monitoring: the log may record the access request of the receiving device, and the security log may audit unauthorized access requests or user access actions exceeding the authority range of the user through a preset security mechanism. (3) security event troubleshooting: the log records security events of the receiving equipment, including DDos attack, malicious attack and theft of data, and defects of protocols in different equipment, communication modes and application scenes. Corresponding measures are taken in the process of checking, so that the safety event is prevented from affecting the safety of the whole system. (4) integrity and availability of data. The security log may record the transmission and processing processes of the message between the sending device and the receiving device, including encryption, decryption, authentication processes, and reassembly of data. Therefore, the integrity and the availability of the data in the whole communication process are ensured, the data is prevented from being tampered or lost, even if hardware or network suddenly breaks down, the data loss can be reduced to the greatest extent.
The basic idea of the hash function in step S5 is: a certain correspondence H is established between the recorded storage location and its key such that each key corresponds to a unique storage location H (key). Design principle: 1) The calculation is simple, the hash function has no great calculated amount, and the searching efficiency can be greatly improved; 2) The function value is distributed uniformly, i.e. the hash addresses are distributed uniformly, and the hash function can hash the data record into all address spaces of the hash table with the same probability, so that the effective utilization of the storage space can be ensured, and the conflict is reduced.
The preprocessing in step S1 includes data cleansing, abnormal value removal and missing value correction.
The specific steps of the step S2 are as follows:
step S201: setting the operation data set of the pretreated PLC module as A,wherein->Representing the running data of the nth PLC module, and generating a public key and a private key;
step S202: encrypting the PLC module operation data set A by using the public key to obtain an encrypted PLC module operation data set;
Step S203: operating data set of encrypted PLC moduleFrom the kth position, truncating the m-bit value and randomly generating +.>Transforming the truncated m-bit value;
step 204: the transformed formula is:wherein->Representing the transformed encrypted PLC module operating data set.
The method for generating the public key and the private key in step S201 is as follows: either of the key generation algorithms is utilized.
The random function in step S203 is gen_key ().
In the prior art, other methods of encryption: 1) With a Cloud computing framework of full homomorphic encryption, the process of processing data by a transmitting device in a homomorphic encryption manner through Cloud is as follows: (1) The sending equipment generates a public key pk and a private key sk through a key generation algorithm, and then encrypts data by utilizing the public key pk through an encryption algorithm Enc; (2) The sending equipment sends the encrypted ciphertext and a function F for processing data to the Cloud; (3) Cloud processes the data through the received F function, and feeds back the processed result c' to the receiving equipment; (4) The receiving equipment decrypts the obtained data by using a decryption algorithm Dec and a private key sk to obtain a result; 2) The step of federal learning and encryption model training is as follows: (1) Generating a key pair using a key generation algorithm, and transmitting the public key and the private key to the transmitting device and the receiving device; (2) The sending equipment encrypts and exchanges intermediate parameters required by calculating gradient and loss values; (3) Calculating the encrypted gradient and loss value, adding random confusion value, and transmitting to receiving equipment; (4) The receiving device sends the decrypted gradient and the loss value to the sending device, and the sending device removes the confusion value added by the sending device to obtain the real model parameters.
Comparison of this scheme with the prior art: in the prior art, more resources are required to be consumed, too much resources are not required to be occupied in the scheme, and the encryption effect can be improved.
The secure transmission policy in step S3 specifically includes the following steps:
step S301: the transmission rate of a communication channel between a transmitting device and a receiving device is calculated by the following formula:wherein->Representing the transmission rate of the ith communication channel, < >>Representing the bandwidth of the transmitting device->Represents the noise power of the ith communication channel, < >>Indicating the cumulative interference power of the ith communication channel and all communication channels connected thereto except for the ith communication channel,/or->Representing the transmission power of the transmission device, < >>Representing the channel gain of the ith communication channel;
step S302: the time delay from the transmitting device to the receiving device is calculated by the following formula:wherein->Representing the delay from the transmitting device to the receiving device, C representing the load of the transmitting device, +.>Representing the load of the operation data set of the encrypted PLC module after the transformation, and j represents the operation capability of the transmitting equipment;
step S303: the transmission efficiency of the optimal communication channel is calculated, and the calculation formula is as follows:,/>representing the transmission efficiency of an optimal communication channel, +.>Influence weight representing the transmission rate of a communication channel from a transmitting device to a receiving device +.>Influence weight representing time delay from transmitting device to receiving device, and +.>;
Step S304: when the transmission efficiency of the same optimal communication channel exists, the communication channel with the largest transmission rate and the smallest time delay in the same optimal communication channel is selected as the optimal communication channel.
Accumulated interference power of the ith communication channel and all communication channels connected except the ith in step S301The calculation formula of (2) is as follows: />Wherein (1)>Indicating the interference power of all devices except the transmitting device to the communication channel i,indicating the interference power of all communication channels except the ith communication channel to communication channel i.
The method for decrypting the data in the step S5 comprises the following steps: and reversely decrypting the received transformed encrypted PLC module operation data set by using the private key.
Example 2
Referring to fig. 2, another embodiment of the present invention is provided: a PLC module operation data transmission system based on data encryption, comprising: the PLC module operates the data acquisition module, the PLC module operates the data preprocessing module, the encryption security transmission module, the decryption module and the data integrity checking module;
the PLC module operation data acquisition module is used for acquiring PLC module operation data;
the PLC module operation data preprocessing module is used for preprocessing the acquired PLC module operation data, including data cleaning, abnormal value removal and missing value correction;
the encryption security transmission module is used for encrypting the preprocessed PLC module operation data and sending the encrypted PLC module operation data to the receiving equipment through a security transmission strategy;
the decryption module is used for decrypting the received encrypted PLC module operation data;
the data integrity checking module is used for checking the integrity condition of the decrypted PLC module operation data.
The encryption security transmission module comprises: an encryption unit and a secure transmission unit;
the encryption unit is used for encrypting the operation data of the PLC module;
the safe transmission unit is used for safely transmitting the encrypted PLC module operation data to the receiving equipment.
Example 3
Referring to fig. 3, an electronic device includes a memory and a processor, where the memory stores a computer program, and the processor implements a step of a PLC module running data transmission method based on data encryption when executing the computer program.
A computer readable storage medium having stored thereon computer instructions which when executed perform the steps of a method for operating a data transmission of a PLC module based on data encryption.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are all within the protection of the present invention.
Claims (5)
1. The PLC module operation data transmission method based on data encryption is characterized by comprising the following steps of:
step S1: acquiring PLC module operation data, and preprocessing the PLC module operation data;
step S2: encrypting the preprocessed PLC module operation data;
step S3: establishing a secure tunnel, and transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy;
step S4: on the receiving device, decrypting the received PLC module operating data using the same key and encryption algorithm;
step S5: after decrypting the data, checking the integrity of the received PLC module operation data by using a hash function, and completing the transmission of the encrypted PLC module operation data;
the preprocessing in the step S1 comprises data cleaning, abnormal value removal and missing value correction;
the specific steps of the step S2 are as follows:
step S201: setting the operation data set of the pretreated PLC module as A,wherein->Representing the running data of the nth PLC module, and generating a public key and a private key;
step S202: encrypting the PLC module operation data set A by using the public key to obtain an encrypted PLC module operation data set;
Step S203: operating data set of encrypted PLC moduleFrom the kth position, truncating the m-bit value and randomly generating +.>Transforming the truncated m-bit value;
step 204: the transformed formula is:wherein->Representing the transformed encrypted PLC module operation data set;
the method for generating the public key and the private key in the step S201 is as follows: using any one of key generation algorithms;
the random function in the step S203 is gen_key ();
the secure transmission policy in step S3 specifically includes the following steps:
step S301: the transmission rate of a communication channel between a transmitting device and a receiving device is calculated by the following formula:wherein->Representing the transmission rate of the ith communication channel, < >>Representing the bandwidth of the transmitting device->Represents the noise power of the ith communication channel, < >>Indicating the cumulative interference power of the ith communication channel and all communication channels connected thereto except for the ith communication channel,/or->Representing the transmission power of the transmission device, < >>Representing the channel gain of the ith communication channel;
step S302: the time delay from the transmitting device to the receiving device is calculated by the following formula:wherein->Representing the delay from the transmitting device to the receiving device, C representing the load of the transmitting device, +.>Representing the load of the operation data set of the encrypted PLC module after the transformation, and j represents the operation capability of the transmitting equipment;
step S303: the transmission efficiency of the optimal communication channel is calculated, and the calculation formula is as follows:,/>representing the transmission efficiency of an optimal communication channel, +.>Influence weight representing the transmission rate of a communication channel from a transmitting device to a receiving device +.>Influence weight representing time delay from transmitting device to receiving device, and +.>;
Step S304: when the transmission efficiency of the same optimal communication channel exists, selecting the communication channel with the largest transmission rate and the smallest time delay in the same optimal communication channel as the optimal communication channel;
the accumulated interference power of the ith communication channel and all the communication channels except the ith communication channel connected in the step S301The calculation formula of (2) is as follows: />Wherein (1)>Indicating the interference power of all devices except the transmitting device to the communication channel i,representing interference power of all communication channels except the ith communication channel to the communication channel i;
the method for decrypting the data in the step S5 is as follows: and reversely decrypting the received transformed encrypted PLC module operation data set by using the private key.
2. A data encryption-based PLC module operation data transmission system, which is implemented based on the data encryption-based PLC module operation data transmission method of claim 1, comprising: the PLC module operates the data acquisition module, the PLC module operates the data preprocessing module, the encryption security transmission module, the decryption module and the data integrity checking module;
the PLC module operation data acquisition module is used for acquiring PLC module operation data;
the PLC module operation data preprocessing module is used for preprocessing the acquired PLC module operation data, including data cleaning, abnormal value removal and missing value correction;
the encryption security transmission module is used for encrypting the preprocessed PLC module operation data and sending the encrypted PLC module operation data to the receiving equipment through a security transmission strategy;
the decryption module is used for decrypting the received encrypted PLC module operation data;
the data integrity checking module is used for checking the integrity condition of the decrypted PLC module operation data.
3. The PLC module operation data transmission system based on data encryption of claim 2, wherein the encryption security transmission module comprises: an encryption unit and a secure transmission unit;
the encryption unit is used for encrypting the operation data of the PLC module;
the safe transmission unit is used for safely transmitting the encrypted PLC module operation data to the receiving equipment.
4. An electronic device comprising a memory and a processor, said memory storing a computer program, characterized in that said processor, when executing said computer program, implements the steps of a data encryption based PLC module operation data transmission method of claim 1.
5. A computer readable storage medium having stored thereon computer instructions which when executed perform the steps of a data encryption based PLC module operation data transmission method of claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311498749.9A CN117240610B (en) | 2023-11-13 | 2023-11-13 | PLC module operation data transmission method and system based on data encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311498749.9A CN117240610B (en) | 2023-11-13 | 2023-11-13 | PLC module operation data transmission method and system based on data encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117240610A CN117240610A (en) | 2023-12-15 |
CN117240610B true CN117240610B (en) | 2024-01-23 |
Family
ID=89091568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311498749.9A Active CN117240610B (en) | 2023-11-13 | 2023-11-13 | PLC module operation data transmission method and system based on data encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117240610B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118972919A (en) * | 2024-07-30 | 2024-11-15 | 国网江苏省电力有限公司南京供电分公司 | Data communication method and system between distributed sensors in distribution network and IoT terminals |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217362A (en) * | 2007-12-29 | 2008-07-09 | 中山大学 | An RFID Communication Security Mechanism Based on Dynamic Randomized DRNTRU Public Key Encryption System |
KR20120031370A (en) * | 2010-09-24 | 2012-04-03 | 에스케이 텔레콤주식회사 | Data communication scheduling system and method thereof |
CN106971115A (en) * | 2017-05-16 | 2017-07-21 | 成都环磊科技有限公司 | A kind of power carrier communication system applied to Internet of Things |
CN109921966A (en) * | 2019-03-01 | 2019-06-21 | 苏州华盖信息科技有限公司 | Smart home device matches network method and smart home system |
CN110300183A (en) * | 2019-07-09 | 2019-10-01 | 佳源科技有限公司 | A kind of intelligence edge Internet of Things agent apparatus |
CN110832951A (en) * | 2017-06-30 | 2020-02-21 | 英特尔公司 | V2X communication using multiple radio access technologies (multi-RAT) |
CN111372268A (en) * | 2019-12-24 | 2020-07-03 | 中国石油大学(华东) | Method for optimizing joint wireless resource management and task unloading in ultra-dense network |
CN114025321A (en) * | 2021-11-05 | 2022-02-08 | 华北电力大学 | Massive power internet of things terminal access control method based on rapid uplink authorization |
CN114626306A (en) * | 2022-03-22 | 2022-06-14 | 华北电力大学 | Method and system for guaranteeing freshness of regulation and control information of park distributed energy |
CN114880046A (en) * | 2022-06-09 | 2022-08-09 | 哈尔滨工业大学 | Low-orbit satellite edge computing unloading method combining unloading decision and bandwidth allocation |
CN114928379A (en) * | 2021-12-18 | 2022-08-19 | 联桥科技有限公司 | Hybrid high-speed power line carrier communication and wireless communication network resource scheduling method |
CN115134779A (en) * | 2022-06-28 | 2022-09-30 | 东南大学深圳研究院 | Internet of vehicles resource allocation method based on information age perception |
CN115378658A (en) * | 2022-07-27 | 2022-11-22 | 咚咚数字科技有限公司 | Park communication data transmission method based on Internet of things cloud edge collaboration |
CN115909560A (en) * | 2022-11-28 | 2023-04-04 | 奥比中光科技集团股份有限公司 | Data encryption method, data decryption method and door lock system |
CN116367310A (en) * | 2023-04-21 | 2023-06-30 | 东南大学 | Maximum Gain-Oriented Channel Allocation Method for Mobile Edge Computing |
CN116760771A (en) * | 2023-07-17 | 2023-09-15 | 甘肃送变电工程有限公司 | On-line monitoring data multichannel transmission control strategy processing method |
US20230315346A1 (en) * | 2017-06-12 | 2023-10-05 | Pure Storage, Inc. | Utilizing Multiple Redundancy Schemes Within A Unified Storage Element |
CN117042050A (en) * | 2023-08-17 | 2023-11-10 | 中国人民解放军陆军工程大学 | Multi-user intelligent data unloading method based on distributed hybrid heterogeneous decision |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7570656B2 (en) * | 2001-06-18 | 2009-08-04 | Yitran Communications Ltd. | Channel access method for powerline carrier based media access control protocol |
JP5121054B2 (en) * | 2007-06-01 | 2013-01-16 | パナソニック株式会社 | COMMUNICATION METHOD, COMMUNICATION DEVICE, AND COMMUNICATION SYSTEM |
-
2023
- 2023-11-13 CN CN202311498749.9A patent/CN117240610B/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217362A (en) * | 2007-12-29 | 2008-07-09 | 中山大学 | An RFID Communication Security Mechanism Based on Dynamic Randomized DRNTRU Public Key Encryption System |
KR20120031370A (en) * | 2010-09-24 | 2012-04-03 | 에스케이 텔레콤주식회사 | Data communication scheduling system and method thereof |
CN106971115A (en) * | 2017-05-16 | 2017-07-21 | 成都环磊科技有限公司 | A kind of power carrier communication system applied to Internet of Things |
US20230315346A1 (en) * | 2017-06-12 | 2023-10-05 | Pure Storage, Inc. | Utilizing Multiple Redundancy Schemes Within A Unified Storage Element |
CN110832951A (en) * | 2017-06-30 | 2020-02-21 | 英特尔公司 | V2X communication using multiple radio access technologies (multi-RAT) |
CN109921966A (en) * | 2019-03-01 | 2019-06-21 | 苏州华盖信息科技有限公司 | Smart home device matches network method and smart home system |
CN110300183A (en) * | 2019-07-09 | 2019-10-01 | 佳源科技有限公司 | A kind of intelligence edge Internet of Things agent apparatus |
CN111372268A (en) * | 2019-12-24 | 2020-07-03 | 中国石油大学(华东) | Method for optimizing joint wireless resource management and task unloading in ultra-dense network |
CN114025321A (en) * | 2021-11-05 | 2022-02-08 | 华北电力大学 | Massive power internet of things terminal access control method based on rapid uplink authorization |
CN114928379A (en) * | 2021-12-18 | 2022-08-19 | 联桥科技有限公司 | Hybrid high-speed power line carrier communication and wireless communication network resource scheduling method |
CN114626306A (en) * | 2022-03-22 | 2022-06-14 | 华北电力大学 | Method and system for guaranteeing freshness of regulation and control information of park distributed energy |
CN114880046A (en) * | 2022-06-09 | 2022-08-09 | 哈尔滨工业大学 | Low-orbit satellite edge computing unloading method combining unloading decision and bandwidth allocation |
CN115134779A (en) * | 2022-06-28 | 2022-09-30 | 东南大学深圳研究院 | Internet of vehicles resource allocation method based on information age perception |
CN115378658A (en) * | 2022-07-27 | 2022-11-22 | 咚咚数字科技有限公司 | Park communication data transmission method based on Internet of things cloud edge collaboration |
CN115909560A (en) * | 2022-11-28 | 2023-04-04 | 奥比中光科技集团股份有限公司 | Data encryption method, data decryption method and door lock system |
CN116367310A (en) * | 2023-04-21 | 2023-06-30 | 东南大学 | Maximum Gain-Oriented Channel Allocation Method for Mobile Edge Computing |
CN116760771A (en) * | 2023-07-17 | 2023-09-15 | 甘肃送变电工程有限公司 | On-line monitoring data multichannel transmission control strategy processing method |
CN117042050A (en) * | 2023-08-17 | 2023-11-10 | 中国人民解放军陆军工程大学 | Multi-user intelligent data unloading method based on distributed hybrid heterogeneous decision |
Non-Patent Citations (1)
Title |
---|
基于GPRS和PLC的远程抄表系统可靠性设计与研究;任工昌;王党席;;机械设计与制造(12);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN117240610A (en) | 2023-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103414690B (en) | One can openly be verified the high in the clouds data property held method of calibration | |
CN116074123B (en) | Method for safely transmitting digital information of Internet of things | |
CN116886276B (en) | Data transmission method and system based on dynamic key | |
CN113312608A (en) | Electric power metering terminal identity authentication method and system based on timestamp | |
CN112182616A (en) | Cipher technology safety control method and system for core table data | |
CN117240610B (en) | PLC module operation data transmission method and system based on data encryption | |
CN119272290A (en) | A method and system for optimizing operation data of a virtual power plant | |
Feng et al. | Autonomous vehicles' forensics in smart cities | |
CN118018180A (en) | Data transmission safety protection method based on encryption algorithm | |
US7920705B1 (en) | System and method for convert channel detection | |
CN119324781B (en) | Power data acquisition terminal and method with encryption function | |
CN111464549A (en) | Computer network information security event processing method | |
Venkatesan et al. | Analysis of accounting models for the detection of duplicate requests in web services | |
CN119513926A (en) | A blockchain-based method for secure sharing of intelligent video surveillance data in steel plants | |
CN118611877A (en) | A device identification access control method and system | |
CN117439799A (en) | Anti-tampering method for http request data | |
CN114172710B (en) | Data decryption method, device, equipment and storage medium | |
CN102355375A (en) | Distributed abnormal flow detection method with privacy protection function and system | |
Vanja et al. | Blockchain-based Data Security and Integrity Management Framework for Cyber-Physical Systems Using Hyperledger and Storj | |
CN117850700B (en) | Method for controlling read-write of mobile storage medium file | |
CN120151083B (en) | Intelligent money box encryption method, system and storage medium based on digital certificate | |
CN118054926A (en) | Power system data monitoring and sharing method and system based on batch verification ring signature | |
CN120017365A (en) | Terminal intelligent control system based on commercial secret algorithm | |
CN118713817A (en) | A smart parking data security protection method | |
CN120017349A (en) | Remote security monitoring system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |