[go: up one dir, main page]

CN117240610B - PLC module operation data transmission method and system based on data encryption - Google Patents

PLC module operation data transmission method and system based on data encryption Download PDF

Info

Publication number
CN117240610B
CN117240610B CN202311498749.9A CN202311498749A CN117240610B CN 117240610 B CN117240610 B CN 117240610B CN 202311498749 A CN202311498749 A CN 202311498749A CN 117240610 B CN117240610 B CN 117240610B
Authority
CN
China
Prior art keywords
plc module
operation data
data
transmission
module operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311498749.9A
Other languages
Chinese (zh)
Other versions
CN117240610A (en
Inventor
张博
黄赛伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aotuo Technology Co ltd
Original Assignee
Aotuo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aotuo Technology Co ltd filed Critical Aotuo Technology Co ltd
Priority to CN202311498749.9A priority Critical patent/CN117240610B/en
Publication of CN117240610A publication Critical patent/CN117240610A/en
Application granted granted Critical
Publication of CN117240610B publication Critical patent/CN117240610B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Programmable Controllers (AREA)

Abstract

The invention discloses a PLC module operation data transmission method and system based on data encryption, which belongs to the technical field of encrypted data transmission, and specifically comprises the following steps: the method comprises the steps of obtaining PLC module operation data, preprocessing the PLC module operation data, encrypting the preprocessed PLC module operation data, establishing a secure tunnel, transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy, decrypting the received PLC module operation data by using the same secret key and encryption algorithm on the receiving equipment, checking the integrity of the received PLC module operation data by using a hash function after decrypting the data, completing the transmission of the encrypted PLC module operation data, encrypting the PLC module data by utilizing the encryption algorithm, improving the safety of the data, selecting an optimal communication channel by utilizing the secure transmission strategy, and improving the transmission efficiency of the encrypted PLC module data.

Description

PLC module operation data transmission method and system based on data encryption
Technical Field
The invention belongs to the technical field of encrypted data transmission, and particularly relates to a PLC (programmable logic controller) module operation data transmission method and system based on data encryption.
Background
Under the intelligent trend, the operation data of the PLC module are continuously increased every day, the total amount of collected data explodes, new challenges are brought to information transmission and information security, the response signals of the PLC module have the characteristics of rich information characteristics, the periodicity is strong, the distribution is sparse, a large amount of data related to key core technologies of equipment are generated at the moment of the collection port, the data are easy to be attacked maliciously in the transmission process of flowing on the Internet and being transmitted to an analysis end and the like, particularly under some special analysis scenes, the underlying information sensing equipment does not support a traditional password system with high energy consumption, the transmission encryption algorithm is not perfect, potential transmission security threats and hidden hazards cannot be identified in a quick time, the data transmission is possibly tampered maliciously, the data transmission throughput is reduced, and the data security problem is particularly prominent.
For example, chinese patent with the grant publication number CN116032624B discloses a data transmission method based on fusion encryption, which includes the following steps: s1, setting an original signal x to have a plurality of different solutions under the condition that the original signal x is equal to the multiplication of a determined transformation matrix ψ and a coefficient vector s to be determined; s2, the transmitting end carries out linear measurement on the original signal x to obtain a measurement result y, and calculates a sensing matrix A and a transformation matrix ψ to be synchronized into the receiving end; s3, the sending end takes the measurement result y as a plaintext, and encrypts the plaintext through a fence password to obtain a ciphertext; s4, the sending end transmits the ciphertext to the receiving end, and the receiving end receives the ciphertext and then decrypts the ciphertext through the fence password to obtain the plaintext, so that a measurement result y is recovered; s5, the receiving end reconstructs an original signal according to the sensing matrix A, the transformation matrix psi and the recovered measurement result y, and stores the original signal. The invention ensures the integrity of the information characteristics and simultaneously considers the high efficiency and the safety of transmission.
For example, china patent with the publication number CN111490980B discloses an industrial Internet data transmission encryption method, which specifically comprises the following steps: s1, carrying out data identification on all data to be transmitted from an industrial Internet data transmission center by a data identification module, acquiring transmission data with key importance by a key data acquisition module, and acquiring other remained transmission data by other data acquisition modules; s2, according to the step S1, the acquired key transmission data are integrated through a data integration module, and the invention relates to the technical field of data security. The industrial Internet data transmission encryption method can divide data to be transmitted by an industrial Internet data transmission center, adopts encryption methods of different grades and modes aiming at key importance data and other common data, combines the two different encryption modes, ensures that the transmitted data has high safety and timeliness, and avoids the problems of data analysis and slow transmission speed.
The disadvantages of the above patents: when network fluctuation or a jam occurs in a time period with frequent network usage, a better communication channel cannot be selected, and the efficiency of data transmission cannot be improved.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a PLC module operation data transmission method and system based on data encryption, which are used for acquiring PLC module operation data, preprocessing the PLC module operation data, encrypting the preprocessed PLC module operation data, establishing a secure tunnel, transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy, decrypting the received PLC module operation data by using the same secret key and encryption algorithm on the receiving equipment, checking the integrity of the received PLC module operation data by using a hash function after decrypting the data, completing the transmission of the encrypted PLC module operation data, encrypting the PLC module data by using an encryption algorithm, improving the safety of the data, selecting an optimal communication channel by utilizing the secure transmission strategy, and improving the transmission efficiency of the encrypted PLC module data.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a PLC module operation data transmission method based on data encryption comprises the following steps:
step S1: acquiring PLC module operation data, and preprocessing the PLC module operation data;
step S2: encrypting the preprocessed PLC module operation data;
step S3: establishing a secure tunnel, and transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy;
step S4: on the receiving device, decrypting the received PLC module operating data using the same key and encryption algorithm;
step S5: after decrypting the data, the integrity of the received PLC module operation data is checked by using a hash function, and the transmission of the encrypted PLC module operation data is completed.
Specifically, the preprocessing in step S1 includes data cleaning, abnormal value removal and missing value correction.
Specifically, the specific steps of the step S2 are as follows:
step S201: setting the operation data set of the pretreated PLC module as A,wherein->Representing the running data of the nth PLC module, and generating a public key and a private key;
step S202: encrypting the PLC module operation data set A by using the public key to obtain an encrypted PLC module operation data set
Step S203: operating data set of encrypted PLC moduleFrom the kth position, truncating the m-bit value and randomly generating +.>Transforming the truncated m-bit value;
step 204: the transformed formula is:wherein->Representing the transformed encrypted PLC module operating data set.
Specifically, the method for generating the public key and the private key in step S201 is as follows: either of the key generation algorithms is utilized.
Specifically, the random function in the step S203 is gen_key ().
Specifically, the secure transmission policy in step S3 specifically includes the following steps:
step S301: the transmission rate of a communication channel between a transmitting device and a receiving device is calculated by the following formula:wherein->Representing the transmission rate of the ith communication channel, < >>Representing the bandwidth of the transmitting device->Represents the noise power of the ith communication channel, < >>Indicating the cumulative interference power of the ith communication channel and all communication channels connected thereto except for the ith communication channel,/or->Representing the transmission power of the transmission device, < >>Representing the channel gain of the ith communication channel;
step S302: the time delay from the transmitting device to the receiving device is calculated by the following formula:wherein->Representing the delay from the transmitting device to the receiving device, C representing the load of the transmitting device, +.>Representing the load of the operation data set of the encrypted PLC module after the transformation, and j represents the operation capability of the transmitting equipment;
step S303: the transmission efficiency of the optimal communication channel is calculated, and the calculation formula is as follows:,/>representing the transmission efficiency of an optimal communication channel, +.>Influence weight representing the transmission rate of a communication channel from a transmitting device to a receiving device +.>Influence weight representing time delay from transmitting device to receiving device, and +.>
Step S304: when the transmission efficiency of the same optimal communication channel exists, the communication channel with the largest transmission rate and the smallest time delay in the same optimal communication channel is selected as the optimal communication channel.
Specifically, the accumulated interference power of the ith communication channel and all the communication channels except the ith communication channel connected in step S301The calculation formula of (2) is as follows: />Wherein (1)>Indicating the interference power of all devices except the transmitting device to the communication channel i +.>Indicating the interference power of all communication channels except the ith communication channel to communication channel i.
The method for decrypting the data in the step S5 is as follows: and reversely decrypting the received transformed encrypted PLC module operation data set by using the private key.
A PLC module operation data transmission system based on data encryption, comprising: the PLC module operates the data acquisition module, the PLC module operates the data preprocessing module, the encryption security transmission module, the decryption module and the data integrity checking module;
the PLC module operation data acquisition module is used for acquiring PLC module operation data;
the PLC module operation data preprocessing module is used for preprocessing the acquired PLC module operation data, including data cleaning, abnormal value removal and missing value correction;
the encryption security transmission module is used for encrypting the preprocessed PLC module operation data and sending the encrypted PLC module operation data to the receiving equipment through a security transmission strategy;
the decryption module is used for decrypting the received encrypted PLC module operation data;
the data integrity checking module is used for checking the integrity condition of the decrypted PLC module operation data.
Specifically, the encryption security transmission module includes: an encryption unit and a secure transmission unit;
the encryption unit is used for encrypting the operation data of the PLC module;
the safe transmission unit is used for safely transmitting the encrypted PLC module operation data to the receiving equipment.
An electronic device comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of a PLC module operation data transmission method based on data encryption when executing the computer program.
A computer readable storage medium having stored thereon computer instructions which when executed perform the steps of a method for operating a data transmission of a PLC module based on data encryption.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention provides a PLC module operation data transmission system based on data encryption, which is optimized and improved in architecture, operation steps and flow, and has the advantages of simple flow, low investment and operation cost and low production and working costs.
2. The invention provides a data encryption-based PLC module operation data transmission method, which comprises the steps of obtaining PLC module operation data, preprocessing the PLC module operation data, encrypting the preprocessed PLC module operation data, establishing a secure tunnel, transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy, decrypting the received PLC module operation data by using the same secret key and encryption algorithm on the receiving equipment, checking the integrity of the received PLC module operation data by using a hash function after decrypting the data, completing the transmission of the encrypted PLC module operation data, encrypting the PLC module data by using the encryption algorithm, improving the safety of the data, selecting an optimal communication channel by using the secure transmission strategy, and improving the transmission efficiency of the encrypted PLC module data.
Drawings
FIG. 1 is a flow chart of a method for transmitting data by operating a PLC module based on data encryption;
FIG. 2 is a schematic diagram of a data transmission system for operating a PLC module based on data encryption;
fig. 3 is a diagram of an electronic device of a PLC module operation data transmission method based on data encryption according to the present invention.
Detailed Description
Example 1
Referring to fig. 1, an embodiment of the present invention is provided:
a PLC module operation data transmission method based on data encryption comprises the following steps:
step S1: acquiring PLC module operation data, and preprocessing the PLC module operation data;
step S2: encrypting the preprocessed PLC module operation data;
step S3: establishing a secure tunnel, and transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy;
step S4: on the receiving device, decrypting the received PLC module operating data using the same key and encryption algorithm;
step S5: after decrypting the data, the integrity of the received PLC module operation data is checked by using a hash function, and the transmission of the encrypted PLC module operation data is completed.
Adding an error and abnormal condition processing mechanism, adopting a security log mechanism, recording security events and abnormal behaviors exposed in the communication process between the sending equipment and the receiving equipment, monitoring and analyzing various emergency events, timely processing security holes by counting the number, frequency and type of the events, and setting an emergency plan. (1) enhanced authentication: the security log records the entire process of the user's authentication event, wherein the user's login and logout, user name/password verification, token use, key use, etc. are recorded in detail. The actions are monitored, tracked and rechecked, so that access marks of unauthorized illegal clients can be detected, and corresponding measures such as interrupting the connection of the clients or adding to a blacklist can be taken. (2) authorized access monitoring: the log may record the access request of the receiving device, and the security log may audit unauthorized access requests or user access actions exceeding the authority range of the user through a preset security mechanism. (3) security event troubleshooting: the log records security events of the receiving equipment, including DDos attack, malicious attack and theft of data, and defects of protocols in different equipment, communication modes and application scenes. Corresponding measures are taken in the process of checking, so that the safety event is prevented from affecting the safety of the whole system. (4) integrity and availability of data. The security log may record the transmission and processing processes of the message between the sending device and the receiving device, including encryption, decryption, authentication processes, and reassembly of data. Therefore, the integrity and the availability of the data in the whole communication process are ensured, the data is prevented from being tampered or lost, even if hardware or network suddenly breaks down, the data loss can be reduced to the greatest extent.
The basic idea of the hash function in step S5 is: a certain correspondence H is established between the recorded storage location and its key such that each key corresponds to a unique storage location H (key). Design principle: 1) The calculation is simple, the hash function has no great calculated amount, and the searching efficiency can be greatly improved; 2) The function value is distributed uniformly, i.e. the hash addresses are distributed uniformly, and the hash function can hash the data record into all address spaces of the hash table with the same probability, so that the effective utilization of the storage space can be ensured, and the conflict is reduced.
The preprocessing in step S1 includes data cleansing, abnormal value removal and missing value correction.
The specific steps of the step S2 are as follows:
step S201: setting the operation data set of the pretreated PLC module as A,wherein->Representing the running data of the nth PLC module, and generating a public key and a private key;
step S202: encrypting the PLC module operation data set A by using the public key to obtain an encrypted PLC module operation data set
Step S203: operating data set of encrypted PLC moduleFrom the kth position, truncating the m-bit value and randomly generating +.>Transforming the truncated m-bit value;
step 204: the transformed formula is:wherein->Representing the transformed encrypted PLC module operating data set.
The method for generating the public key and the private key in step S201 is as follows: either of the key generation algorithms is utilized.
The random function in step S203 is gen_key ().
In the prior art, other methods of encryption: 1) With a Cloud computing framework of full homomorphic encryption, the process of processing data by a transmitting device in a homomorphic encryption manner through Cloud is as follows: (1) The sending equipment generates a public key pk and a private key sk through a key generation algorithm, and then encrypts data by utilizing the public key pk through an encryption algorithm Enc; (2) The sending equipment sends the encrypted ciphertext and a function F for processing data to the Cloud; (3) Cloud processes the data through the received F function, and feeds back the processed result c' to the receiving equipment; (4) The receiving equipment decrypts the obtained data by using a decryption algorithm Dec and a private key sk to obtain a result; 2) The step of federal learning and encryption model training is as follows: (1) Generating a key pair using a key generation algorithm, and transmitting the public key and the private key to the transmitting device and the receiving device; (2) The sending equipment encrypts and exchanges intermediate parameters required by calculating gradient and loss values; (3) Calculating the encrypted gradient and loss value, adding random confusion value, and transmitting to receiving equipment; (4) The receiving device sends the decrypted gradient and the loss value to the sending device, and the sending device removes the confusion value added by the sending device to obtain the real model parameters.
Comparison of this scheme with the prior art: in the prior art, more resources are required to be consumed, too much resources are not required to be occupied in the scheme, and the encryption effect can be improved.
The secure transmission policy in step S3 specifically includes the following steps:
step S301: the transmission rate of a communication channel between a transmitting device and a receiving device is calculated by the following formula:wherein->Representing the transmission rate of the ith communication channel, < >>Representing the bandwidth of the transmitting device->Represents the noise power of the ith communication channel, < >>Indicating the cumulative interference power of the ith communication channel and all communication channels connected thereto except for the ith communication channel,/or->Representing the transmission power of the transmission device, < >>Representing the channel gain of the ith communication channel;
step S302: the time delay from the transmitting device to the receiving device is calculated by the following formula:wherein->Representing the delay from the transmitting device to the receiving device, C representing the load of the transmitting device, +.>Representing the load of the operation data set of the encrypted PLC module after the transformation, and j represents the operation capability of the transmitting equipment;
step S303: the transmission efficiency of the optimal communication channel is calculated, and the calculation formula is as follows:,/>representing the transmission efficiency of an optimal communication channel, +.>Influence weight representing the transmission rate of a communication channel from a transmitting device to a receiving device +.>Influence weight representing time delay from transmitting device to receiving device, and +.>
Step S304: when the transmission efficiency of the same optimal communication channel exists, the communication channel with the largest transmission rate and the smallest time delay in the same optimal communication channel is selected as the optimal communication channel.
Accumulated interference power of the ith communication channel and all communication channels connected except the ith in step S301The calculation formula of (2) is as follows: />Wherein (1)>Indicating the interference power of all devices except the transmitting device to the communication channel i,indicating the interference power of all communication channels except the ith communication channel to communication channel i.
The method for decrypting the data in the step S5 comprises the following steps: and reversely decrypting the received transformed encrypted PLC module operation data set by using the private key.
Example 2
Referring to fig. 2, another embodiment of the present invention is provided: a PLC module operation data transmission system based on data encryption, comprising: the PLC module operates the data acquisition module, the PLC module operates the data preprocessing module, the encryption security transmission module, the decryption module and the data integrity checking module;
the PLC module operation data acquisition module is used for acquiring PLC module operation data;
the PLC module operation data preprocessing module is used for preprocessing the acquired PLC module operation data, including data cleaning, abnormal value removal and missing value correction;
the encryption security transmission module is used for encrypting the preprocessed PLC module operation data and sending the encrypted PLC module operation data to the receiving equipment through a security transmission strategy;
the decryption module is used for decrypting the received encrypted PLC module operation data;
the data integrity checking module is used for checking the integrity condition of the decrypted PLC module operation data.
The encryption security transmission module comprises: an encryption unit and a secure transmission unit;
the encryption unit is used for encrypting the operation data of the PLC module;
the safe transmission unit is used for safely transmitting the encrypted PLC module operation data to the receiving equipment.
Example 3
Referring to fig. 3, an electronic device includes a memory and a processor, where the memory stores a computer program, and the processor implements a step of a PLC module running data transmission method based on data encryption when executing the computer program.
A computer readable storage medium having stored thereon computer instructions which when executed perform the steps of a method for operating a data transmission of a PLC module based on data encryption.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are all within the protection of the present invention.

Claims (5)

1. The PLC module operation data transmission method based on data encryption is characterized by comprising the following steps of:
step S1: acquiring PLC module operation data, and preprocessing the PLC module operation data;
step S2: encrypting the preprocessed PLC module operation data;
step S3: establishing a secure tunnel, and transmitting the encrypted PLC module operation data to receiving equipment by utilizing a secure transmission strategy;
step S4: on the receiving device, decrypting the received PLC module operating data using the same key and encryption algorithm;
step S5: after decrypting the data, checking the integrity of the received PLC module operation data by using a hash function, and completing the transmission of the encrypted PLC module operation data;
the preprocessing in the step S1 comprises data cleaning, abnormal value removal and missing value correction;
the specific steps of the step S2 are as follows:
step S201: setting the operation data set of the pretreated PLC module as A,wherein->Representing the running data of the nth PLC module, and generating a public key and a private key;
step S202: encrypting the PLC module operation data set A by using the public key to obtain an encrypted PLC module operation data set
Step S203: operating data set of encrypted PLC moduleFrom the kth position, truncating the m-bit value and randomly generating +.>Transforming the truncated m-bit value;
step 204: the transformed formula is:wherein->Representing the transformed encrypted PLC module operation data set;
the method for generating the public key and the private key in the step S201 is as follows: using any one of key generation algorithms;
the random function in the step S203 is gen_key ();
the secure transmission policy in step S3 specifically includes the following steps:
step S301: the transmission rate of a communication channel between a transmitting device and a receiving device is calculated by the following formula:wherein->Representing the transmission rate of the ith communication channel, < >>Representing the bandwidth of the transmitting device->Represents the noise power of the ith communication channel, < >>Indicating the cumulative interference power of the ith communication channel and all communication channels connected thereto except for the ith communication channel,/or->Representing the transmission power of the transmission device, < >>Representing the channel gain of the ith communication channel;
step S302: the time delay from the transmitting device to the receiving device is calculated by the following formula:wherein->Representing the delay from the transmitting device to the receiving device, C representing the load of the transmitting device, +.>Representing the load of the operation data set of the encrypted PLC module after the transformation, and j represents the operation capability of the transmitting equipment;
step S303: the transmission efficiency of the optimal communication channel is calculated, and the calculation formula is as follows:,/>representing the transmission efficiency of an optimal communication channel, +.>Influence weight representing the transmission rate of a communication channel from a transmitting device to a receiving device +.>Influence weight representing time delay from transmitting device to receiving device, and +.>
Step S304: when the transmission efficiency of the same optimal communication channel exists, selecting the communication channel with the largest transmission rate and the smallest time delay in the same optimal communication channel as the optimal communication channel;
the accumulated interference power of the ith communication channel and all the communication channels except the ith communication channel connected in the step S301The calculation formula of (2) is as follows: />Wherein (1)>Indicating the interference power of all devices except the transmitting device to the communication channel i,representing interference power of all communication channels except the ith communication channel to the communication channel i;
the method for decrypting the data in the step S5 is as follows: and reversely decrypting the received transformed encrypted PLC module operation data set by using the private key.
2. A data encryption-based PLC module operation data transmission system, which is implemented based on the data encryption-based PLC module operation data transmission method of claim 1, comprising: the PLC module operates the data acquisition module, the PLC module operates the data preprocessing module, the encryption security transmission module, the decryption module and the data integrity checking module;
the PLC module operation data acquisition module is used for acquiring PLC module operation data;
the PLC module operation data preprocessing module is used for preprocessing the acquired PLC module operation data, including data cleaning, abnormal value removal and missing value correction;
the encryption security transmission module is used for encrypting the preprocessed PLC module operation data and sending the encrypted PLC module operation data to the receiving equipment through a security transmission strategy;
the decryption module is used for decrypting the received encrypted PLC module operation data;
the data integrity checking module is used for checking the integrity condition of the decrypted PLC module operation data.
3. The PLC module operation data transmission system based on data encryption of claim 2, wherein the encryption security transmission module comprises: an encryption unit and a secure transmission unit;
the encryption unit is used for encrypting the operation data of the PLC module;
the safe transmission unit is used for safely transmitting the encrypted PLC module operation data to the receiving equipment.
4. An electronic device comprising a memory and a processor, said memory storing a computer program, characterized in that said processor, when executing said computer program, implements the steps of a data encryption based PLC module operation data transmission method of claim 1.
5. A computer readable storage medium having stored thereon computer instructions which when executed perform the steps of a data encryption based PLC module operation data transmission method of claim 1.
CN202311498749.9A 2023-11-13 2023-11-13 PLC module operation data transmission method and system based on data encryption Active CN117240610B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311498749.9A CN117240610B (en) 2023-11-13 2023-11-13 PLC module operation data transmission method and system based on data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311498749.9A CN117240610B (en) 2023-11-13 2023-11-13 PLC module operation data transmission method and system based on data encryption

Publications (2)

Publication Number Publication Date
CN117240610A CN117240610A (en) 2023-12-15
CN117240610B true CN117240610B (en) 2024-01-23

Family

ID=89091568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311498749.9A Active CN117240610B (en) 2023-11-13 2023-11-13 PLC module operation data transmission method and system based on data encryption

Country Status (1)

Country Link
CN (1) CN117240610B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118972919A (en) * 2024-07-30 2024-11-15 国网江苏省电力有限公司南京供电分公司 Data communication method and system between distributed sensors in distribution network and IoT terminals

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217362A (en) * 2007-12-29 2008-07-09 中山大学 An RFID Communication Security Mechanism Based on Dynamic Randomized DRNTRU Public Key Encryption System
KR20120031370A (en) * 2010-09-24 2012-04-03 에스케이 텔레콤주식회사 Data communication scheduling system and method thereof
CN106971115A (en) * 2017-05-16 2017-07-21 成都环磊科技有限公司 A kind of power carrier communication system applied to Internet of Things
CN109921966A (en) * 2019-03-01 2019-06-21 苏州华盖信息科技有限公司 Smart home device matches network method and smart home system
CN110300183A (en) * 2019-07-09 2019-10-01 佳源科技有限公司 A kind of intelligence edge Internet of Things agent apparatus
CN110832951A (en) * 2017-06-30 2020-02-21 英特尔公司 V2X communication using multiple radio access technologies (multi-RAT)
CN111372268A (en) * 2019-12-24 2020-07-03 中国石油大学(华东) Method for optimizing joint wireless resource management and task unloading in ultra-dense network
CN114025321A (en) * 2021-11-05 2022-02-08 华北电力大学 Massive power internet of things terminal access control method based on rapid uplink authorization
CN114626306A (en) * 2022-03-22 2022-06-14 华北电力大学 Method and system for guaranteeing freshness of regulation and control information of park distributed energy
CN114880046A (en) * 2022-06-09 2022-08-09 哈尔滨工业大学 Low-orbit satellite edge computing unloading method combining unloading decision and bandwidth allocation
CN114928379A (en) * 2021-12-18 2022-08-19 联桥科技有限公司 Hybrid high-speed power line carrier communication and wireless communication network resource scheduling method
CN115134779A (en) * 2022-06-28 2022-09-30 东南大学深圳研究院 Internet of vehicles resource allocation method based on information age perception
CN115378658A (en) * 2022-07-27 2022-11-22 咚咚数字科技有限公司 Park communication data transmission method based on Internet of things cloud edge collaboration
CN115909560A (en) * 2022-11-28 2023-04-04 奥比中光科技集团股份有限公司 Data encryption method, data decryption method and door lock system
CN116367310A (en) * 2023-04-21 2023-06-30 东南大学 Maximum Gain-Oriented Channel Allocation Method for Mobile Edge Computing
CN116760771A (en) * 2023-07-17 2023-09-15 甘肃送变电工程有限公司 On-line monitoring data multichannel transmission control strategy processing method
US20230315346A1 (en) * 2017-06-12 2023-10-05 Pure Storage, Inc. Utilizing Multiple Redundancy Schemes Within A Unified Storage Element
CN117042050A (en) * 2023-08-17 2023-11-10 中国人民解放军陆军工程大学 Multi-user intelligent data unloading method based on distributed hybrid heterogeneous decision

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7570656B2 (en) * 2001-06-18 2009-08-04 Yitran Communications Ltd. Channel access method for powerline carrier based media access control protocol
JP5121054B2 (en) * 2007-06-01 2013-01-16 パナソニック株式会社 COMMUNICATION METHOD, COMMUNICATION DEVICE, AND COMMUNICATION SYSTEM

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217362A (en) * 2007-12-29 2008-07-09 中山大学 An RFID Communication Security Mechanism Based on Dynamic Randomized DRNTRU Public Key Encryption System
KR20120031370A (en) * 2010-09-24 2012-04-03 에스케이 텔레콤주식회사 Data communication scheduling system and method thereof
CN106971115A (en) * 2017-05-16 2017-07-21 成都环磊科技有限公司 A kind of power carrier communication system applied to Internet of Things
US20230315346A1 (en) * 2017-06-12 2023-10-05 Pure Storage, Inc. Utilizing Multiple Redundancy Schemes Within A Unified Storage Element
CN110832951A (en) * 2017-06-30 2020-02-21 英特尔公司 V2X communication using multiple radio access technologies (multi-RAT)
CN109921966A (en) * 2019-03-01 2019-06-21 苏州华盖信息科技有限公司 Smart home device matches network method and smart home system
CN110300183A (en) * 2019-07-09 2019-10-01 佳源科技有限公司 A kind of intelligence edge Internet of Things agent apparatus
CN111372268A (en) * 2019-12-24 2020-07-03 中国石油大学(华东) Method for optimizing joint wireless resource management and task unloading in ultra-dense network
CN114025321A (en) * 2021-11-05 2022-02-08 华北电力大学 Massive power internet of things terminal access control method based on rapid uplink authorization
CN114928379A (en) * 2021-12-18 2022-08-19 联桥科技有限公司 Hybrid high-speed power line carrier communication and wireless communication network resource scheduling method
CN114626306A (en) * 2022-03-22 2022-06-14 华北电力大学 Method and system for guaranteeing freshness of regulation and control information of park distributed energy
CN114880046A (en) * 2022-06-09 2022-08-09 哈尔滨工业大学 Low-orbit satellite edge computing unloading method combining unloading decision and bandwidth allocation
CN115134779A (en) * 2022-06-28 2022-09-30 东南大学深圳研究院 Internet of vehicles resource allocation method based on information age perception
CN115378658A (en) * 2022-07-27 2022-11-22 咚咚数字科技有限公司 Park communication data transmission method based on Internet of things cloud edge collaboration
CN115909560A (en) * 2022-11-28 2023-04-04 奥比中光科技集团股份有限公司 Data encryption method, data decryption method and door lock system
CN116367310A (en) * 2023-04-21 2023-06-30 东南大学 Maximum Gain-Oriented Channel Allocation Method for Mobile Edge Computing
CN116760771A (en) * 2023-07-17 2023-09-15 甘肃送变电工程有限公司 On-line monitoring data multichannel transmission control strategy processing method
CN117042050A (en) * 2023-08-17 2023-11-10 中国人民解放军陆军工程大学 Multi-user intelligent data unloading method based on distributed hybrid heterogeneous decision

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于GPRS和PLC的远程抄表系统可靠性设计与研究;任工昌;王党席;;机械设计与制造(12);全文 *

Also Published As

Publication number Publication date
CN117240610A (en) 2023-12-15

Similar Documents

Publication Publication Date Title
CN103414690B (en) One can openly be verified the high in the clouds data property held method of calibration
CN116074123B (en) Method for safely transmitting digital information of Internet of things
CN116886276B (en) Data transmission method and system based on dynamic key
CN113312608A (en) Electric power metering terminal identity authentication method and system based on timestamp
CN112182616A (en) Cipher technology safety control method and system for core table data
CN117240610B (en) PLC module operation data transmission method and system based on data encryption
CN119272290A (en) A method and system for optimizing operation data of a virtual power plant
Feng et al. Autonomous vehicles' forensics in smart cities
CN118018180A (en) Data transmission safety protection method based on encryption algorithm
US7920705B1 (en) System and method for convert channel detection
CN119324781B (en) Power data acquisition terminal and method with encryption function
CN111464549A (en) Computer network information security event processing method
Venkatesan et al. Analysis of accounting models for the detection of duplicate requests in web services
CN119513926A (en) A blockchain-based method for secure sharing of intelligent video surveillance data in steel plants
CN118611877A (en) A device identification access control method and system
CN117439799A (en) Anti-tampering method for http request data
CN114172710B (en) Data decryption method, device, equipment and storage medium
CN102355375A (en) Distributed abnormal flow detection method with privacy protection function and system
Vanja et al. Blockchain-based Data Security and Integrity Management Framework for Cyber-Physical Systems Using Hyperledger and Storj
CN117850700B (en) Method for controlling read-write of mobile storage medium file
CN120151083B (en) Intelligent money box encryption method, system and storage medium based on digital certificate
CN118054926A (en) Power system data monitoring and sharing method and system based on batch verification ring signature
CN120017365A (en) Terminal intelligent control system based on commercial secret algorithm
CN118713817A (en) A smart parking data security protection method
CN120017349A (en) Remote security monitoring system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant