CN110708091A - Network communication system, method and device based on power line - Google Patents

Network communication system, method and device based on power line Download PDF

Info

Publication number
CN110708091A
CN110708091A CN201910565561.9A CN201910565561A CN110708091A CN 110708091 A CN110708091 A CN 110708091A CN 201910565561 A CN201910565561 A CN 201910565561A CN 110708091 A CN110708091 A CN 110708091A
Authority
CN
China
Prior art keywords
data
channel
encryption
adaptive
wire channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910565561.9A
Other languages
Chinese (zh)
Inventor
张银辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Huaqing Intelligent Technology Co Ltd
Original Assignee
Hunan Huaqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Huaqing Intelligent Technology Co Ltd filed Critical Hunan Huaqing Intelligent Technology Co Ltd
Priority to CN201910565561.9A priority Critical patent/CN110708091A/en
Publication of CN110708091A publication Critical patent/CN110708091A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B3/00Line transmission systems
    • H04B3/54Systems for transmission via power distribution lines
    • H04B3/542Systems for transmission via power distribution lines the information being in digital form
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B3/00Line transmission systems
    • H04B3/54Systems for transmission via power distribution lines
    • H04B3/56Circuits for coupling, blocking, or by-passing of signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0071Use of interleaving
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2647Arrangements specific to the receiver only
    • H04L27/2655Synchronisation arrangements
    • H04L27/2689Link with other circuits, i.e. special connections between synchronisation arrangements and other circuits for achieving synchronisation
    • H04L27/2695Link with other circuits, i.e. special connections between synchronisation arrangements and other circuits for achieving synchronisation with channel estimation, e.g. determination of delay spread, derivative or peak tracking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B2203/00Indexing scheme relating to line transmission systems
    • H04B2203/54Aspects of powerline communications not already covered by H04B3/54 and its subgroups
    • H04B2203/5462Systems for power line communications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Cable Transmission Systems, Equalization Of Radio And Reduction Of Echo (AREA)

Abstract

The invention belongs to the technical field of communication, and particularly relates to a network communication system, method and device based on a power line. The method comprises the following steps: the control center is used for sending out a control command and controlling the wire channel selected during data transmission; the data base station is used for receiving the data of the remote end and sending the data according to the command of the control center; the adaptive modulation transmitting end is used for carrying out adaptive modulation on data transmitted by the data base station; the step-down transformer is used for carrying out step-down first data encryption on the electric wire channel and carrying out first encryption on data sent to the first electric wire channel; second data encryption means for encrypting data transmitted to a second electric wire channel for a second time; third data encryption means for third encrypting data sent on a third telecommunications channel. Has the advantages of high safety and high efficiency.

Description

Network communication system, method and device based on power line
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a network communication system, method and device based on a power line.
Background
The Power Line Communication (PLC) technology is a Communication method for transmitting data and media signals by using a Power Line. The technology is that high frequency carrying information is loaded on current, then the high frequency is separated from the current by an adapter which transmits and receives information by a wire and then is transmitted to a computer or a telephone to realize information transmission.
The Power Line communication is generally called Power Line Carrier-PLC (Power Line Carrier-PLC) communication, and refers to a special communication method for performing voice or data transmission by using a high-voltage Power Line (generally, 35kV or higher voltage class in the field of Power Carrier), a medium-voltage Power Line (10 kV voltage class), or a low-voltage Power distribution Line (380/220V subscriber Line) as an information transmission medium.
The Modem is a common name of a Modem for broadband internet access through a power line. A network is built by using the existing power line and socket in the home or office to connect a PC, an ADSL modem, a set-top box, an audio device, a monitoring device and other intelligent electrical devices for transmitting data, voice and video. The system has the characteristic of plug and play, and can transmit the IP digital signals of the network through a common household power line.
The power communication network is developed to ensure safe and stable operation of the power system. The system is combined with a safety and stability control system and a dispatching automation system of a power system to be called as three large pillars for the safe and stable operation of the power system. The method is the basis of power grid dispatching automation, network operation marketization and management modernization; is an important means for ensuring the safe, stable and economic operation of the power grid; is an important infrastructure of power systems. Because the power communication network has strict requirements on the reliability of communication, the rapidity and the accuracy of protection control information transmission, and the power department has special resource advantages for developing communication, the power companies of most countries in the world establish the power system special communication network mainly by self-construction.
Patent No. CN201811055174.2 discloses a power line communication signal adaptive filtering method, which collects a power line communication signal sequence and converts it into a signal matrix; constructing a transformation operator matrix according to the signal matrix obtained by the transformation; constructing a measurement matrix; determining a filtering weight, and iteratively updating a signal matrix according to the obtained transformation operator matrix, the filtering weight and the constructed measurement matrix until the current iteration number is equal to the length of the power line communication signal sequence; and converting the currently obtained signal matrix to generate a power line communication signal sequence with noise removed, thereby effectively and quickly filtering the pulse noise in the power line communication signal. But the processing procedure is complex, and in the processing procedure, the channel selection is not performed according to the actual situation of the channel, resulting in low efficiency.
Patent No. CN201811055584.7 discloses a method for adaptively filtering power line communication signals, which can effectively filter out impulse noise in the power line communication signals. The method comprises the following steps: acquiring a power line communication signal sequence, and converting the power line communication signal sequence into a signal matrix; performing row Fourier transform on the signal matrix; iteratively calculating a power line communication signal filter factor based on the obtained line Fourier transform result, and correcting the obtained line Fourier transform result; judging whether the current iteration times are equal to the length of the power line communication signal sequence or not; and if so, performing inverse Fourier transform on the currently obtained correction result according to the rows to generate a power line communication signal sequence with noise removed. The filtering of the power line communication signal is calculated iteratively according to the transformation result, and then the transformation result is corrected, and similarly, the correction is only performed according to the transformation of a single path without combining the specific situation of a channel, and then the correction is performed on the self-adaption, so that the applicability of the correction result is not high.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a network communication system, method and device based on power line, which have the advantages of high security and high efficiency.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a power line based network communication system, the system comprising:
the control center is used for sending out a control command and controlling the wire channel selected during data transmission;
the data base station is used for receiving the data of the remote end and sending the data according to the command of the control center;
the adaptive modulation transmitting end is used for carrying out adaptive modulation on data transmitted by the data base station;
the step-down transformer is used for reducing the voltage of the wire channel;
first data encryption means for encrypting data transmitted to the first wire channel for a first time;
second data encryption means for encrypting data transmitted to a second electric wire channel for a second time;
third data encryption means for encrypting data sent on a third telecommunications channel a third time;
and the adaptive modulation and demodulation end is used for demodulating the received data and sending the demodulated data to the receiving end.
Further, the adaptive modulation transmitting end includes: a bit scrambling unit, an RS coding unit, a convolution coding unit, an interleaving unit, an IFFT unit, an adaptive modulator and an adaptive bit distribution unit; the self-adaptive modulation transmitting end carries out bit scrambling, RS coding, convolution coding and interleaving on data information which needs to be transmitted to an electric wire channel in sequence, and then completes baseband modulation on each channel through a self-adaptive modulator; then the data passes through an IFFT unit, adds a cyclic prefix and a guard interval, and finally is coupled and transmitted to a wire channel.
Further, the adaptive modulation receiving end includes: the device comprises a symbol synchronization detection unit, a signal equalization unit, an FFT unit, a self-adaptive mapping demodulator, a signal-to-noise ratio estimation unit, a self-adaptive bit allocation unit, a de-interleaving unit, a decoding unit, an RS decoding unit and a de-scrambling unit; the adaptive modulation receiving end sequentially performs symbol synchronization detection and channel equalization processing on the received data information; then, the cyclic prefix and the guard interval are removed, after FFT conversion, the signal-to-noise ratio estimation is carried out at the same time, then the data information is demodulated, deinterleaved, decoded, RS decoded and deinterleaved in turn by using the modulation parameters of the sub-channel in the self-adaptive mapping demodulator, and finally the sending data of the original sending end can be recovered.
Further, the adaptive bit allocation unit is a shared unit of the adaptive modulation transmitting end and the adaptive modulation receiving end; the adaptive debugging receiving end obtains the signal-to-noise ratio of the sub-channels by a channel estimation method, obtains different modulation methods of each sub-channel of the system by using an adaptive technology, and transmits the different modulation methods to the adaptive debugging transmitting end through channel feedback.
A power line based network communication method, the method performing the steps of:
step 1: the control center sends out a control command to control the wire channel selected during data transmission;
step 2: the data base station receives the data of the remote end and sends the data according to the command of the control center;
and step 3: the self-adaptive modulation transmitting end carries out self-adaptive modulation on data transmitted by the data frame station, and the modulated data enters an electric wire channel;
and 4, step 4: if the control command of the control center controls the data transmission, a first wire channel is selected; encrypting data transmitted to the first wire channel for the first time, and then performing step 7;
and 5: if the control command of the control center controls the data transmission, a second wire channel is selected; sequentially performing first encryption and second encryption on data transmitted to the first wire channel, and then performing step 7;
step 6: if the control command of the control center controls the data transmission, a first wire channel is selected; sequentially performing first encryption, second encryption and third encryption on data transmitted to the first electric wire channel, and then executing the step 7;
and 7: the adaptive modulation receiving end demodulates the received data and sends the demodulated data to the receiving end.
Further, the method further comprises: the adaptive bit allocation unit obtains the signal-to-noise ratio of the sub-channel by a channel estimation method, obtains different modulation methods of each channel of the system by using an adaptive technology, and transmits the different modulation methods to the adaptive modulation transmitting end through channel feedback.
Further, the adaptive bit allocation unit acquires the signal-to-noise ratio of the sub-channel by a channel estimation method, obtains different modulation methods of each channel of the system by using an adaptive technology, and transmits the different modulation methods to the adaptive modulation transmitting end by channel feedback to execute the following steps:
step S1: initializing, setting the number of useful channels in the system as N and the target error rate as BtargetAll sub-channels are allocated with fixed power;
step S2 calculates the subchannel signal-to-noise ratio Yi from the data preamble sequence and the channel gain estimation value of the previous frame:
Figure BDA0002109475530000051
wherein | Hi|2And σi 2Respectively representing the channel gain and the noise power of i bits of a subchannel; since the preamble sequence is known, the subchannel signal power P is knowniChannel gain | Hi|2Obtainable from channel estimation, noise power σi 2From the receiving end preamble sequence power and Pi×|Hi|2Subtracting to obtain the result;
step 3S 3: at Pi(i)<BtargetUnder the constraint condition of (2), the signal-to-noise ratio of the sub-channel and the bit number b of the pre-allocated sub-channel are obtained by the formula (1)iAnd average bit error rate
Figure BDA0002109475530000052
Figure BDA0002109475530000053
Figure BDA0002109475530000054
Figure BDA0002109475530000055
Step S4: by the channel signal-to-noise ratio XiAnd average bit error rate
Figure BDA0002109475530000056
Calculating the current multi-channel signal-to-noise ratio XmcAnd average number of bits of subchannel
Figure BDA0002109475530000057
Figure BDA0002109475530000058
Figure BDA0002109475530000059
Step S5: at BERtargetUnder the constraint of (2), by XmcCalculating the maximum average number of bits of the subchannel
Figure BDA0002109475530000061
Figure BDA0002109475530000062
Step S6: the extra bits that can be added to the OFDM symbol are calculated:
Figure BDA0002109475530000063
step S7: if the number of sub-channel bits
Figure BDA0002109475530000064
Then, the incremental bit error rate Δ P on the subchannel is calculatede(i),
Figure BDA0002109475530000065
Wherein the content of the first and second substances,
Figure BDA0002109475530000066
is the bit error rate allocated by the ith sub-channel by adopting the maximum modulation technique. If the number of bits in a certain sub-channel is equal to
Figure BDA0002109475530000067
If yes, directly jumping to the step 8;
step S8: if N sub-channels are circulated completely, increasing the bit error rate delta P of the sub-channelse(i) In ascending order of value; otherwise, jumping to step 1.
Step S9: adding I extra bits to the lowest Δ Pe(i) The sub-channel of (2). For each lowest Δ P, with the highest order modulation allowed by the systeme(i) The subchannel is allocated with the maximum number of bits until all the I extra bits are allocated or the lowest delta Pe(i) The subchannels are each allocated a maximum number of bits.
Further, the method for performing the first encryption, the second encryption and the third encryption respectively performs the following steps:
step A1: generating an AES initial key by using an SAES encryption algorithm; spreading an AES initial key to obtain an AES encryption key; encrypting the information to be encrypted by using an AES encryption key according to an AES encryption algorithm;
configuring an SAES initial key and an SAES plaintext in the process of generating an AES initial key by using an SAES encryption algorithm; performing SAES key processing on the SAES initial key to obtain a processing result; performing key expansion on the processing result to obtain an SAES encryption key; and according to the SAES encryption algorithm, encrypting SAES plaintext by using an SAES encryption key to generate an AES initial key.
Combining a plurality of M groups of n-bit data in the SAES initial key into an M x n-bit serial stream; performing cyclic shift processing on the M x n bit serial stream to generate a new M x n bit serial stream; and performing key selection processing on the new M x n bit serial stream, and selecting a plurality of L groups of adjacent data from the new M x n bit serial stream, wherein the L groups of the adjacent data are used as input of the SAES encryption key expansion.
A power line based network communication device, the device being: a non-transitory computer readable storage medium storing computing instructions, comprising: a code segment for sending out a control command and controlling the wire channel selected during data transmission; a code segment for receiving the data of the remote end and sending the data according to the command of the control center; the data sent by the data frame station is subjected to self-adaptive modulation, and the modulated data enters a code segment in the wire channel, and if a control command controls data transmission, a first wire channel is selected; a code segment for encrypting data transmitted to the first wire channel for the first time; if the control command controls the data transmission, a second wire channel is selected; sequentially carrying out first encryption on data sent to a first electric wire channel, and selecting the first electric wire channel if a control command of a control center controls data transmission by code segments subjected to second encryption; a code segment for sequentially encrypting the data transmitted to the first wire channel for the first time, the second time and the third time; and demodulating the received data, and sending the demodulated data to a code segment of a receiving end.
The network communication system, the method and the device based on the power line have the following beneficial effects that: the invention can determine the channel of data transmission under the control of the control center, and can determine to adopt several encryption modes to encrypt the data, for example, when using the first channel, only the first encryption mode can be used for encrypting, when using the second channel, the first and the second encryption modes can be used for encrypting, and when using the third channel, the third channel can be used for encrypting. Meanwhile, the invention obtains the signal-to-noise ratio estimated value of more channels through the preamble sequence data and the gain estimated value of the communication carrier frame, and adaptively distributes the extra bit to the sub-channel with lower average bit error rate. Therefore, the maximum bit allocation increment superposition incremental quota value given by the traditional algorithm is not used in a non-progressive superposition mode, the processing flow is simplified, and the system complexity is reduced. Under the same simulation condition, the self-adaptive bit power distribution effect of the invention is better, and meanwhile, the transmission rate is faster, the channel capacity is larger, and the signal-to-noise ratio is lower, thereby further explaining that the optimization method has simplification and practicability.
Drawings
Fig. 1 is a schematic system structure diagram of a power line-based network communication system according to the present invention;
fig. 2 is a schematic structural diagram of an adaptive modulation transmitting end of a power line-based network communication system according to the present invention;
fig. 3 is a schematic structural diagram of an adaptive modulation receiving end of a power line-based network communication system according to the present invention;
fig. 4 is a flowchart illustrating a power line-based network communication method according to the present invention.
Detailed Description
The method of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments of the invention.
Example 1
As shown in fig. 1, 2 and 3, a power line-based network communication system includes:
the control center is used for sending out a control command and controlling the wire channel selected during data transmission;
the data base station is used for receiving the data of the remote end and sending the data according to the command of the control center;
the adaptive modulation transmitting end is used for carrying out adaptive modulation on data transmitted by the data base station;
the step-down transformer is used for reducing the voltage of the wire channel;
first data encryption means for encrypting data transmitted to the first wire channel for a first time;
second data encryption means for encrypting data transmitted to a second electric wire channel for a second time;
third data encryption means for encrypting data sent on a third telecommunications channel a third time;
and the adaptive modulation and demodulation end is used for demodulating the received data and sending the demodulated data to the receiving end.
Further, the adaptive modulation transmitting end includes: a bit scrambling unit, an RS coding unit, a convolution coding unit, an interleaving unit, an IFFT unit, an adaptive modulator and an adaptive bit distribution unit; the self-adaptive modulation transmitting end carries out bit scrambling, RS coding, convolution coding and interleaving on data information which needs to be transmitted to an electric wire channel in sequence, and then completes baseband modulation on each channel through a self-adaptive modulator; then the data passes through an IFFT unit, adds a cyclic prefix and a guard interval, and finally is coupled and transmitted to a wire channel.
Further, the adaptive modulation receiving end includes: the device comprises a symbol synchronization detection unit, a signal equalization unit, an FFT unit, a self-adaptive mapping demodulator, a signal-to-noise ratio estimation unit, a self-adaptive bit allocation unit, a de-interleaving unit, a decoding unit, an RS decoding unit and a de-scrambling unit; the adaptive modulation receiving end sequentially performs symbol synchronization detection and channel equalization processing on the received data information; then, the cyclic prefix and the guard interval are removed, after FFT conversion, the signal-to-noise ratio estimation is carried out at the same time, then the data information is demodulated, deinterleaved, decoded, RS decoded and deinterleaved in turn by using the modulation parameters of the sub-channel in the self-adaptive mapping demodulator, and finally the sending data of the original sending end can be recovered.
Further, the adaptive bit allocation unit is a shared unit of the adaptive modulation transmitting end and the adaptive modulation receiving end; the adaptive debugging receiving end obtains the signal-to-noise ratio of the sub-channels by a channel estimation method, obtains different modulation methods of each sub-channel of the system by using an adaptive technology, and transmits the different modulation methods to the adaptive debugging transmitting end through channel feedback.
Specifically, the wire transmission channel has time domain attenuation characteristics, and a large amount of transmission interference plus noise exists. The orthogonal frequency division multiplexing modulation technology simultaneously serves as the functions of frequency division multiplexing and multi-channel modulation technology, and can obviously inhibit channel noise and communication channel attenuation characteristics. However, in the conventional ofdm modulation system, the modulation schemes of the sub-channels are uniform, and the key to the performance of the system is the worst channel gain in the sub-channels, so the adaptive ofdm modulation technique is developed. The self-adaptive modulation and the orthogonal frequency division multiplexing modulation technology are organically combined, the modulation method can be determined according to the conduction characteristic state of the sub-channel, and the conduction capability of the channel is maximized at any moment on the premise of ensuring the conduction reliability, so that the high-efficiency frequency band utilization rate and the bit code element transmission rate are obtained.
Meanwhile, the control center can control data to be specifically encrypted for several times and then transmitted to the receiving end, and multiple times of encryption are used in a system with higher data transmission safety, so that the safety of the system can be obviously improved. In a system with low data transmission safety, once encryption or no encryption is used, so that the data transmission efficiency can be obviously improved.
Example 2
As shown in fig. 1 and 4, a power line based network communication method performs the following steps:
step 1: the control center sends out a control command to control the wire channel selected during data transmission;
step 2: the data base station receives the data of the remote end and sends the data according to the command of the control center;
and step 3: the self-adaptive modulation transmitting end carries out self-adaptive modulation on data transmitted by the data frame station, and the modulated data enters an electric wire channel;
and 4, step 4: if the control command of the control center controls the data transmission, a first wire channel is selected; encrypting data transmitted to the first wire channel for the first time, and then performing step 7;
and 5: if the control command of the control center controls the data transmission, a second wire channel is selected; sequentially performing first encryption and second encryption on data transmitted to the first wire channel, and then performing step 7;
step 6: if the control command of the control center controls the data transmission, a first wire channel is selected; sequentially performing first encryption, second encryption and third encryption on data transmitted to the first electric wire channel, and then executing the step 7;
and 7: the adaptive modulation receiving end demodulates the received data and sends the demodulated data to the receiving end.
Further, the method further comprises: the adaptive bit allocation unit obtains the signal-to-noise ratio of the sub-channel by a channel estimation method, obtains different modulation methods of each channel of the system by using an adaptive technology, and transmits the different modulation methods to the adaptive modulation transmitting end through channel feedback.
Further, the adaptive bit allocation unit acquires the signal-to-noise ratio of the sub-channel by a channel estimation method, obtains different modulation methods of each channel of the system by using an adaptive technology, and transmits the different modulation methods to the adaptive modulation transmitting end by channel feedback to execute the following steps:
step S1: initializing, setting the number of useful channels in the system as N and the target error rate as BtargetAll sub-channels are allocated with fixed power;
step S2 calculates the subchannel signal-to-noise ratio Yi from the data preamble sequence and the channel gain estimation value of the previous frame:
wherein | Hi|2And σi 2Respectively representing the channel gain and the noise power of i bits of a subchannel; since the preamble sequence is known, the subchannel signal power P is knowniChannel gain | Hi|2Obtainable from channel estimation, noise power σi 2From the receiving end preamble sequence power and Pi×|Hi|2Subtracting to obtain the result;
step 3S 3: at Pi(i)<BtargetUnder the constraint condition of (2), the signal-to-noise ratio of the sub-channel and the bit number b of the pre-allocated sub-channel are obtained by the formula (1)iAnd average bit error rate
Figure BDA0002109475530000114
Figure BDA0002109475530000115
Step S4: by the channel signal-to-noise ratio XiAnd average bit error rate
Figure BDA0002109475530000116
Calculating the current multi-channel signal-to-noise ratio XmcAnd average number of bits of subchannel
Figure BDA0002109475530000117
Figure BDA0002109475530000121
Step S5: at BERtargetUnder the constraint of (2), by XmcCalculating the maximum average number of bits of the subchannel
Figure BDA0002109475530000122
Figure BDA0002109475530000123
Step S6: the extra bits that can be added to the OFDM symbol are calculated:
step S7: if the number of sub-channel bitsThen, the incremental bit error rate Δ P on the subchannel is calculatede(i),
Figure BDA0002109475530000126
Wherein the content of the first and second substances,
Figure BDA0002109475530000127
is the bit error rate allocated by the ith sub-channel by adopting the maximum modulation technique. If the number of bits in a certain sub-channel is equal to
Figure BDA0002109475530000128
If yes, directly jumping to the step 8;
step S8: if N sub-channels are circulated completely, increasing the bit error rate delta P of the sub-channelse(i) In ascending order of value; otherwise, jumping to step 1.
Step S9: adding I extra bits to the lowest Δ Pe(i) The sub-channel of (2). For each lowest Δ P, with the highest order modulation allowed by the systeme(i) The subchannel is allocated with the maximum number of bits until all the I extra bits are allocated or the lowest delta Pe(i) The subchannels are each allocated a maximum number of bits.
Specifically, the number of effective subchannels on each ofdm symbol in the wire channel transmission system is large, and performing resource allocation processing on each symbol will drastically increase the signal workload. The greedy algorithm achieves the total power limit by circularly comparing the process of increasing bits of the channel with less increased power; however, the greedy avaricious algorithm has the main problem of high complexity, and a large amount of comparison and multiplication operations must be used; in the algorithm execution process, the method cannot be decomposed into a plurality of sub-processes to be parallel, and the power channel bandwidth is wasted, so that the resource waste is caused.
Example 4
On the basis of the above embodiment, the method for performing the first encryption, the second encryption and the third encryption all performs the following steps:
step A1: generating an AES initial key by using an SAES encryption algorithm; spreading an AES initial key to obtain an AES encryption key; encrypting the information to be encrypted by using an AES encryption key according to an AES encryption algorithm;
configuring an SAES initial key and an SAES plaintext in the process of generating an AES initial key by using an SAES encryption algorithm; performing SAES key processing on the SAES initial key to obtain a processing result; performing key expansion on the processing result to obtain an SAES encryption key; and according to the SAES encryption algorithm, encrypting SAES plaintext by using an SAES encryption key to generate an AES initial key.
Combining a plurality of M groups of n-bit data in the SAES initial key into an M x n-bit serial stream; performing cyclic shift processing on the M x n bit serial stream to generate a new M x n bit serial stream; and performing key selection processing on the new M x n bit serial stream, and selecting a plurality of L groups of adjacent data from the new M x n bit serial stream, wherein the L groups of the adjacent data are used as input of the SAES encryption key expansion.
Specifically, the input to the encryption and decryption algorithm is a 128-bit packet. These packets are described as a 4 x 4 byte square, and the packet is copied into a state array and modified at each stage of encryption and decryption. In a byte matrix, each cell is a word, containing 4 bytes. The words are ordered by columns in the matrix. The encryption consists of N rounds, the number of rounds depends on the key length: a 16 byte key corresponds to 10 rounds, a 24 byte key corresponds to 12 rounds, and a 32 byte key corresponds to 14 rounds.
AES did not use a Feistel structure. The first N-1 round consisted of 4 different transformations: byte substitution, row shift, column obfuscation, and round key addition. The last round contains only three transforms. And a single transformation (round key plus) starting before the first round, can be considered as round 0.
The reason for using round key addition from beginning to end: if other stages which do not need the key are placed at the beginning and the end, the inverse can be calculated under the condition of not knowing the key, and the safety of the algorithm cannot be increased.
Encryption principle: the round key plus is actually a Vernam password form, and the round key plus is not difficult to crack. The other three stages together provide the functions of aliasing, diffusion and nonlinearity. These three phases do not involve keys and, by themselves, do not provide security for the algorithm. However, this algorithm alternates between an XOR encryption of a packet (round key addition), an alias diffusion of the packet (the other three stages), and then an XOR encryption, which is very efficient and very secure.
The principle of round key addition is to use the same round key and block differences or the principle of a ⊕ B ⊕ B-a-as in most block ciphers, the AES decryption algorithm uses the spreading key in reverse order, however its decryption algorithm is not the same as the encryption algorithm, which is determined by the particular structure of the AES.
Example 5
A power line based network communication device, the device being: a non-transitory computer readable storage medium storing computing instructions, comprising: a code segment for sending out a control command and controlling the wire channel selected during data transmission; a code segment for receiving the data of the remote end and sending the data according to the command of the control center; the data sent by the data frame station is subjected to self-adaptive modulation, and the modulated data enters a code segment in the wire channel, and if a control command controls data transmission, a first wire channel is selected; a code segment for encrypting data transmitted to the first wire channel for the first time; if the control command controls the data transmission, a second wire channel is selected; sequentially carrying out first encryption on data sent to a first electric wire channel, and selecting the first electric wire channel if a control command of a control center controls data transmission by code segments subjected to second encryption; a code segment for sequentially encrypting the data transmitted to the first wire channel for the first time, the second time and the third time; and demodulating the received data, and sending the demodulated data to a code segment of a receiving end.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be allocated to different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further decomposed into multiple sub-modules, so as to complete all or part of the functions described above. The names of the modules and steps involved in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative modules, method steps, and modules described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether these functions are performed as electronic hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (9)

1. A power line based network communication system, the system comprising:
the control center is used for sending out a control command and controlling the wire channel selected during data transmission;
the data base station is used for receiving the data of the remote end and sending the data according to the command of the control center;
the adaptive modulation transmitting end is used for carrying out adaptive modulation on data transmitted by the data base station;
the step-down transformer is used for reducing the voltage of the wire channel;
first data encryption means for encrypting data transmitted to the first wire channel for a first time;
second data encryption means for encrypting data transmitted to a second electric wire channel for a second time;
third data encryption means for encrypting data for a third time for transmission onto a third telecommunications channel;
and the adaptive modulation and demodulation end is used for demodulating the received data and sending the demodulated data to the receiving end.
2. The power line-based network communication system of claim 1, wherein the adaptive modulation transmitting end comprises: a bit scrambling unit, an RS coding unit, a convolution coding unit, an interleaving unit, an IFFT unit, an adaptive modulator and an adaptive bit distribution unit; the self-adaptive modulation transmitting end carries out bit scrambling, RS coding, convolution coding and interleaving on data information which needs to be transmitted to an electric wire channel in sequence, and then completes baseband modulation on each channel through a self-adaptive modulator; then the data passes through an IFFT unit, adds a cyclic prefix and a guard interval, and finally is coupled and transmitted to a wire channel.
3. The power line-based network communication system of claim 1, wherein the adaptive modulation receiving end comprises: the device comprises a symbol synchronization detection unit, a signal equalization unit, an FFT unit, a self-adaptive mapping demodulator, a signal-to-noise ratio estimation unit, a self-adaptive bit allocation unit, a de-interleaving unit, a decoding unit, an RS decoding unit and a de-scrambling unit; the adaptive modulation receiving end sequentially performs symbol synchronization detection and channel equalization processing on the received data information; then removing the cyclic prefix and the guard interval, after FFT conversion, simultaneously carrying out signal-to-noise ratio estimation, then sequentially demodulating, de-interleaving, decoding, RS decoding and de-interleaving the data information in a self-adaptive mapping demodulator by using the modulation parameters of the sub-channels, and finally recovering the transmitted data of the original transmitting end.
4. The power-line-based network communication system according to claim 2 or 3, wherein the adaptive bit allocation unit is a common unit of an adaptive-debug transmitting end and an adaptive-debug receiving end; the adaptive modulation receiving end obtains the signal-to-noise ratio of the sub-channel by a channel estimation method, obtains different modulation methods of each sub-channel of the system by using an adaptive technology, and transmits the different modulation methods to the adaptive modulation transmitting end through channel feedback.
5. A power line based network communication method based on the system of one of claims 1 to 4, characterized in that the method performs the following steps:
step 1: the control center sends out a control command to control the wire channel selected during data transmission;
step 2: the data base station receives the data of the remote end and sends the data according to the command of the control center;
and step 3: the self-adaptive modulation transmitting end carries out self-adaptive modulation on data transmitted by the data frame station, and the modulated data enters an electric wire channel;
and 4, step 4: if the control command of the control center controls the data transmission, a first wire channel is selected; encrypting data transmitted to the first wire channel for the first time, and then performing step 7;
and 5: if the control command of the control center controls the data transmission, a second wire channel is selected; sequentially performing first encryption and second encryption on data transmitted to the first wire channel, and then performing step 7;
step 6: if the control command of the control center controls the data transmission, a first wire channel is selected; sequentially performing first encryption, second encryption and third encryption on data transmitted to the first wire channel, and then executing the step 7;
and 7: the adaptive modulation receiving end demodulates the received data and sends the demodulated data to the receiving end.
6. The power-line based network communication method of claim 5, wherein the method further comprises: the adaptive bit allocation unit obtains the signal-to-noise ratio of the sub-channel by a channel estimation method, obtains different modulation methods of each channel of the system by using an adaptive technology, and transmits the different modulation methods to the adaptive modulation transmitting end through channel feedback.
7. The power line-based network communication method of claim 6, wherein the adaptive bit allocation unit obtains the snr of the sub-channel by a channel estimation method, obtains different modulation methods of each channel of the system by an adaptive technique, and performs the following steps by transmitting to the adaptive modulation transmitting end through channel feedback:
step S1: initializing, setting the number of useful channels in the system as N and the target error rate as BtargetAll sub-channels are allocated with fixed power;
step S2 calculates the subchannel signal-to-noise ratio Yi from the data preamble sequence and the channel gain estimation value of the previous frame:
Figure FDA0002109475520000031
wherein | Hi|2And σi 2Respectively representing the channel gain and the noise power of i bits of a subchannel; since the preamble sequence is known, the subchannel signal power P is knowniChannel gain | Hi|2Obtainable from channel estimation, noise power σi 2From the receiving end preamble sequence power and Pi×|Hi|2Subtracting to obtain the result;
step 3S 3: at Pi(i)<BtargetUnder the constraint condition of (2), the signal-to-noise ratio of the sub-channel and the bit number b of the pre-allocated sub-channel are obtained by the formula (1)iAnd average bit error rate
Figure FDA0002109475520000033
Figure FDA0002109475520000034
Figure FDA0002109475520000035
Step S4: by the channel signal-to-noise ratio XiAnd average bit error rate
Figure FDA0002109475520000036
Calculating the current multi-channel signal-to-noise ratio XmcAnd average number of bits of subchannel
Figure FDA0002109475520000037
Figure FDA0002109475520000041
Figure FDA0002109475520000042
Step S5: at BERtargetUnder the constraint of (2), by XmcCalculating the maximum average number of bits of the subchannel
Figure FDA0002109475520000043
Figure FDA0002109475520000044
Step S6: the extra bits that can be added to the OFDM symbol are calculated:
Figure FDA0002109475520000045
step S7: if the number of sub-channel bitsThen, calculating the incremental bit error rate delta P on the sub-channele(i),
Figure FDA0002109475520000047
Wherein the content of the first and second substances,
Figure FDA0002109475520000048
is the bit error rate allocated by the ith sub-channel by adopting the maximum modulation technique. If the number of bits in a certain sub-channel is equal to
Figure FDA0002109475520000049
If yes, directly jumping to the step 8;
step S8: if N sub-channels are circulated completely, increasing the bit error rate delta P of the sub-channelse(i) In ascending order of value; otherwise, jumping to step 1.
Step S9: adding I extra bits to the lowest Δ Pe(i) The sub-channel of (2). For each lowest Δ P, using the highest order modulation allowed by the systeme(i) The subchannel is allocated the maximum number of bits until all the I extra bits are allocated or the lowest Δ Pe(i) The subchannels are each allocated a maximum number of bits.
8. The power-line-based network communication method according to claim 6, wherein the first encryption, the second encryption and the third encryption are performed by the method comprising:
step A1: generating an AES initial key by using an SAES encryption algorithm; spreading an AES initial key to obtain an AES encryption key; encrypting the information to be encrypted by using an AES encryption key according to an AES encryption algorithm;
configuring an SAES initial key and an SAES plaintext in the process of generating an AES initial key by using an SAES encryption algorithm; performing SAES key processing on the SAES initial key to obtain a processing result; performing key expansion on the processing result to obtain an SAES encryption key; and according to the SAES encryption algorithm, encrypting SAES plaintext by using an SAES encryption key to generate an AES initial key.
Combining a plurality of M groups of n-bit data in the SAES initial key into an M x n-bit serial stream; performing cyclic shift processing on the M x n bit serial stream to generate a new M x n bit serial stream; and performing key selection processing on the new M x n bit serial stream, and selecting a plurality of L groups of adjacent data from the new M x n bit serial stream, wherein the L groups of the adjacent data are used as input of the SAES encryption key expansion.
9. A power line based network communication apparatus based on the method of any one of claims 5 to 9, wherein the apparatus is: a non-transitory computer-readable storage medium storing computing instructions, comprising: a code segment for sending out a control command and controlling the wire channel selected during data transmission; a code segment for receiving the data of the remote end and sending the data according to the command of the control center; the data sent by the data frame station is subjected to self-adaptive modulation, and the modulated data enters a code segment in the wire channel, and if a control command controls data transmission, a first wire channel is selected; a code segment for encrypting data transmitted to the first wire channel for the first time; if the control command controls the data transmission, a second wire channel is selected; sequentially carrying out first encryption on data sent to a first electric wire channel, and selecting the first electric wire channel if a control command of a control center controls data transmission by code segments subjected to second encryption; a code segment for sequentially performing first encryption, second encryption and third encryption on data transmitted to the first wire channel; and demodulating the received data, and sending the demodulated data to a code segment of a receiving end.
CN201910565561.9A 2019-06-27 2019-06-27 Network communication system, method and device based on power line Pending CN110708091A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910565561.9A CN110708091A (en) 2019-06-27 2019-06-27 Network communication system, method and device based on power line

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910565561.9A CN110708091A (en) 2019-06-27 2019-06-27 Network communication system, method and device based on power line

Publications (1)

Publication Number Publication Date
CN110708091A true CN110708091A (en) 2020-01-17

Family

ID=69193062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910565561.9A Pending CN110708091A (en) 2019-06-27 2019-06-27 Network communication system, method and device based on power line

Country Status (1)

Country Link
CN (1) CN110708091A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112994745A (en) * 2021-02-03 2021-06-18 青岛鼎信通讯股份有限公司 Power distribution optimization method suitable for medium-voltage carrier system
CN114584300A (en) * 2022-03-02 2022-06-03 中国科学院国家授时中心 Encryption and decryption method and system for bidirectional time service
CN114629530A (en) * 2022-04-24 2022-06-14 哈尔滨工业大学 Power line carrier communication key generation method based on physical layer security

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080034197A1 (en) * 2005-10-21 2008-02-07 Engel Technologieberatung, Entwicklung/Verkauf Von Soft- Und Hardware Kg Method of encrypting or decrypting data packets of a data stream as well as a signal sequence and data processing system for performing the method
CN102710293A (en) * 2012-06-08 2012-10-03 北京福星晓程电子科技股份有限公司 Adaptive multi-channel communication receiving equipment, system and communication method
CN104253684A (en) * 2014-09-23 2014-12-31 深圳市汇顶科技股份有限公司 Encryption method and encryption device
CN105450259A (en) * 2015-11-13 2016-03-30 湖南工业大学 Smart meter reading system multicarrier communication module adaptive modulation method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080034197A1 (en) * 2005-10-21 2008-02-07 Engel Technologieberatung, Entwicklung/Verkauf Von Soft- Und Hardware Kg Method of encrypting or decrypting data packets of a data stream as well as a signal sequence and data processing system for performing the method
CN102710293A (en) * 2012-06-08 2012-10-03 北京福星晓程电子科技股份有限公司 Adaptive multi-channel communication receiving equipment, system and communication method
CN104253684A (en) * 2014-09-23 2014-12-31 深圳市汇顶科技股份有限公司 Encryption method and encryption device
CN105450259A (en) * 2015-11-13 2016-03-30 湖南工业大学 Smart meter reading system multicarrier communication module adaptive modulation method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112994745A (en) * 2021-02-03 2021-06-18 青岛鼎信通讯股份有限公司 Power distribution optimization method suitable for medium-voltage carrier system
CN114584300A (en) * 2022-03-02 2022-06-03 中国科学院国家授时中心 Encryption and decryption method and system for bidirectional time service
CN114584300B (en) * 2022-03-02 2024-02-02 中国科学院国家授时中心 Encryption and decryption method and system for bidirectional time service
CN114629530A (en) * 2022-04-24 2022-06-14 哈尔滨工业大学 Power line carrier communication key generation method based on physical layer security
CN114629530B (en) * 2022-04-24 2024-03-29 哈尔滨工业大学 Power line carrier communication key generation method based on physical layer security

Similar Documents

Publication Publication Date Title
EP3172857B1 (en) System and method for generating waveforms and utilization thereof
JP6664124B2 (en) Transmission apparatus and transmission method for aggregate physical layer protocol data unit
US8989379B2 (en) Network encryption key rotation
KR101613893B1 (en) Method and apparatus for interleaving data in mobile telecommunication system
US8781006B2 (en) Link adaptation in multi-carrier communication systems
CN110708091A (en) Network communication system, method and device based on power line
KR101103903B1 (en) Hybrid subcarrier mapping method and system
US20150263825A1 (en) Method and apparatus for interleaving data in a mobile communication system
EP3247079A1 (en) Peak-to-average power ratio reducing method, apparatus, device and system
WO2004017529A2 (en) Method and system for maximizing data throughput rate in a power line communications system by modifying payload symbol length
JP2017063472A (en) Method and transmitter for transmitting data block in wireless communication system
US6683955B1 (en) Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels
US20150162970A1 (en) Narrowband OFDM (NOFDM) Transceiver for Powerline Communications (PLC)
WO2008156338A1 (en) Method and apparatus for transmitting uplink control channel in a mobile communication system
WO2009043311A1 (en) Time-frequency spreading method and apparatus in ofdma system
CN103731388B (en) The amplitude limit method of PAPR in ofdm system is reduced based on quantification theory
CN116389214B (en) Noise reduction method, noise reduction terminal and medium suitable for voltage power line carrier communication
Rozaini et al. Median codeword shift (MCS) technique for PAPR reduction with low complexity in OFDM system
CN211018826U (en) Network communication system based on power line
Ndlovu et al. An OFDM inter-subcarrier permutation coding scheme for power-line communication
CN107566311B (en) Transmission method based on resource block filtering RB F-OFDM system
CN113572571B (en) Data transmission method and device, chip system and computer readable storage medium
US6501841B1 (en) Method for providing security for a transmission of information through a plurality of frequency orthogonal subchannels
Hossain et al. Spectrum efficient DSI-based OFDM PAPR reduction by subcarrier group modulation
Manhas et al. OFDM PAPR reduction using recurring SLM with cyclic and linear block codes schemes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination