CN116540597A - Industrial control system based on edge calculation - Google Patents
Industrial control system based on edge calculation Download PDFInfo
- Publication number
- CN116540597A CN116540597A CN202310422178.4A CN202310422178A CN116540597A CN 116540597 A CN116540597 A CN 116540597A CN 202310422178 A CN202310422178 A CN 202310422178A CN 116540597 A CN116540597 A CN 116540597A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- edge
- encryption
- signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004364 calculation method Methods 0.000 title claims abstract description 19
- 238000012795 verification Methods 0.000 claims abstract description 50
- 238000012545 processing Methods 0.000 claims abstract description 38
- 238000004458 analytical method Methods 0.000 claims abstract description 36
- 238000004891 communication Methods 0.000 claims abstract description 33
- 238000006243 chemical reaction Methods 0.000 claims abstract description 21
- 230000002159 abnormal effect Effects 0.000 claims abstract description 20
- 238000007405 data analysis Methods 0.000 claims abstract description 17
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 15
- 238000005538 encapsulation Methods 0.000 claims abstract description 6
- 238000004806 packaging method and process Methods 0.000 claims abstract description 6
- 230000005540 biological transmission Effects 0.000 claims description 11
- 230000004044 response Effects 0.000 claims description 8
- 230000001360 synchronised effect Effects 0.000 claims description 5
- 230000008859 change Effects 0.000 claims description 3
- 230000004927 fusion Effects 0.000 claims description 3
- 238000000034 method Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 230000008439 repair process Effects 0.000 claims description 2
- 238000012544 monitoring process Methods 0.000 abstract description 6
- 238000010219 correlation analysis Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000005457 optimization Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0423—Input/output
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/25—Pc structure of the system
- G05B2219/25257—Microcontroller
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an industrial control system based on edge calculation, which relates to the technical field of edge calculation and comprises a data acquisition module, a data encryption module and a signal verification module; the data acquisition module is used for acquiring equipment data received by a plurality of edge nodes and carrying out data encapsulation processing; the encapsulated data is subjected to protocol conversion through a protocol conversion module, and is converted into a data protocol with a uniform fixed format; carrying out algorithm analysis and processing on the converted data protocol through a data analysis module, and packaging the analyzed and processed data into a data packet to be transmitted to a server; if the core node is the core node, the data encryption module is utilized to encrypt and transmit the data packet; the signal verification module is used for verifying the communication state of the edge node in real time, and calculating to obtain a limit deviation coefficient GF; if GF is greater than the deviation coefficient threshold value, generating a communication abnormal signal; to remind the manager to maintain the edge node, guarantee the accuracy of data monitoring.
Description
Technical Field
The invention relates to the technical field of edge calculation, in particular to an industrial control system based on edge calculation.
Background
The edge calculation is a distributed open platform integrating network, calculation, storage and application core capabilities at the network edge side close to an object or data source, provides edge intelligent service nearby, and meets key requirements of industry digitization in aspects of agile connection, real-time service, data optimization, application intelligence, safety, privacy protection and the like. The intelligent network system can be used as a bridge for connecting physical and digital worlds to realize intelligent assets, intelligent gateways, intelligent systems and intelligent services;
with the advent of the big data age, the data volume of enterprises is larger and larger, and the timeliness requirement is higher and higher; uploading a large amount of data to a server end for processing, and returning a result to equipment, wherein the response time delay of the large closed-loop data is high, the data of the equipment end cannot be processed in time, the network congestion has a large influence on the data, and meanwhile, potential safety hazards exist in network safety and management maintenance; based on the defects, the invention provides an industrial control system based on edge calculation.
Disclosure of Invention
The present invention aims to solve at least one of the technical problems existing in the prior art. To this end, the invention proposes an industrial control system based on edge computation.
To achieve the above objective, an embodiment according to a first aspect of the present invention provides an industrial control system based on edge computing, which includes a data acquisition module, a protocol conversion module, an FPGA master control, a data analysis module, a data encryption module, a feature acquisition module, a node analysis module, and a signal verification module;
the data acquisition module is used for acquiring equipment data received by a plurality of edge nodes and carrying out data encapsulation processing on the acquired equipment data; the encapsulated data is subjected to protocol conversion through a protocol conversion module, and is converted into a data protocol with a uniform fixed format;
the FPGA main control is in control connection with the protocol conversion module and is used for acquiring the data protocol converted by the protocol conversion module, carrying out algorithm analysis and processing on the converted data protocol through the data analysis module, packaging the analyzed and processed data into a data packet, and transmitting the data packet to the server through the 5G communication module;
the characteristic acquisition module is used for acquiring characteristic information of the equipment data received by each edge node and transmitting the acquired characteristic information to the node analysis module for analysis of the optimizing coefficient YS;
the node analysis module is used for classifying the edge nodes according to the optimal coefficient YS, and if the optimal coefficient YS is larger than a set value, the corresponding edge nodes are marked as core nodes;
before the data analysis module transmits the data packet after analysis to the server, the data analysis module is further used for acquiring an edge node corresponding to the data packet, and if the edge node is a core node, the data packet is encrypted and transmitted by the data encryption module;
the signal verification module is used for verifying the communication state of the edge node in real time, and calculating to obtain a limit deviation coefficient GF; if GF is larger than the deviation coefficient threshold value, judging that the edge node is abnormal in communication, and generating a communication abnormal signal; to alert the manager to repair and maintain the edge node.
Further, the specific analysis steps of the node analysis module are as follows:
aiming at a certain edge node, acquiring characteristic information of equipment data received by the edge node; counting the total operation times of the edge nodes as C1 in a preset time period;
sequentially marking corresponding equipment data quantity, equipment data transmission distance and equipment data transmission bandwidth in the characteristic information as Li, di and Wi; acquiring equipment data types in the characteristic information, setting a corresponding preset type value for each data type, and matching the equipment data types with all the data types to acquire the corresponding preset type value and marking the corresponding preset type value as CYi;
the calculation value Yi required for the edge node to process each device data is calculated using the formula yi= (CYi ×a1+li×a2+di×a3)/(wi×a4); wherein a1, a2, a3 and a4 are coefficient factors;
comparing the operation value Yi with a preset operation threshold value; counting the times of Yi > a preset operation threshold value as P1; when Yi is larger than a preset operation threshold, obtaining a difference value of Yi and the preset operation threshold and summing to obtain an supercomputed total value CZ; and calculating to obtain the running and optimizing coefficient YS by using a formula YS= (P1×g1+CZ×g2)/C1, wherein g1 and g2 are preset coefficient factors.
Further, the data encryption module is used for carrying out distributed multi-layer encryption on the received data packet and transmitting the encrypted ciphertext to the server; the specific encryption steps are as follows:
randomly splitting the data packet into a plurality of data blocks; generating an AES128 encryption key, and generating a plurality of groups of sub-keys by the encryption key according to a preset rule;
performing MD5 processing on the obtained subkeys to obtain processed subkeys; wherein the number of subkeys is equal to the number of data blocks; carrying out multi-layer encryption processing on the split data blocks through the processing sub-secret key to generate an information encryption identification code and a layer 1 secret key; and (5) the information encryption identification code and the layer 1 key are subjected to time stamp fusion to form an encryption ciphertext.
Further, the server is used for analyzing received data through a self-written model algorithm input by a user terminal after decrypting the received data, judging whether the corresponding data is abnormal or not, and providing a data early warning notice for the user; the model algorithm is written for users by oneself and comprises a safety range of various data, and is used for judging whether the data are abnormal or not; the safety range is preset by a user.
Further, the specific verification steps of the signal verification module are as follows:
the signal verification module sends a verification configuration message to the edge node according to a preset verification period, wherein the verification configuration message comprises a first signal quality threshold; in response to receiving the verification configuration message sent by the signal verification module, the edge node sends a second synchronization signal to the signal verification module;
determining, by the signal verification module, a signal quality of the second synchronization signal; comparing the signal quality of the second synchronous signal with the first signal quality threshold to obtain a corresponding quality difference Zc;
performing time difference calculation on the time when the signal verification module sends the verification configuration message and the time when the signal verification module monitors the second synchronous signal again to obtain response time XT;
calculating a signal loss index SH of the edge node by using a formula SH=Zc×g4+XT×g5, wherein g4 and g5 are coefficient factors; establishing a graph of the change of the signal loss index SH with time;
the time required for the signal loss index SH to reach the preset loss threshold G1 is counted as the communication limit time Gn; wherein G1 is a preset value; acquiring the communication limit duration of each operation of the edge node, taking the value of Gn and the previous X1 group communication limit duration thereof, and marking the values as GS1, GS2, … and GSn in sequence according to the time sequence; when GSm is less than or equal to GS (m-1), marking the GS (m-1) with a first limit value;
counting the occurrence number of the first limit value as limit frequency P1; when GSm is less than or equal to GS (m-1), obtaining a difference value between GS (m-1) and GSm and summing to obtain a limit difference value PX; the limiting deviation factor GF is calculated using the formula gf=p1×k3+px×k4, where k3, k4 are factor coefficients.
Further, each layer of encryption processing of the encryption module is a group of processing subkeys to encrypt one of the data blocks, which are not overlapped with each other.
Further, the layer 1 key is used for identifying the layer 1 encryption information in the information encryption identification code and generating a layer 2 key, the layer 2 key is used for identifying the layer 2 encryption information in the information encryption identification code and generating a layer 3 key, and the like.
Compared with the prior art, the invention has the beneficial effects that:
1. the data acquisition module is used for acquiring equipment data received by a plurality of edge nodes and carrying out data encapsulation processing on the acquired equipment data; the encapsulated data is subjected to protocol conversion through a protocol conversion module, and is converted into a data protocol with a uniform fixed format; carrying out algorithm analysis and processing on the converted data protocol through a data analysis module, packaging the analyzed and processed data into a data packet, and transmitting the data packet to a server through a 5G communication module; the server is used for decrypting the received data, analyzing the received data through a self-written model algorithm input by the user terminal, and judging whether the corresponding data is abnormal or not; the parallel time acquisition of the data of the different edge nodes of the multichannel is realized, the real-time performance and timeliness of the edge nodes are improved, meanwhile, the data correlation analysis is carried out on the data of the different edge nodes, a reference basis is provided for the subsequent data processing analysis and early warning, and the data processing efficiency is improved;
2. the characteristic acquisition module is used for acquiring characteristic information of equipment data received by each edge node, transmitting the acquired characteristic information to the node analysis module for analysis of the fortune optimizing coefficient YS, and classifying the edge nodes according to the fortune optimizing coefficient YS; if the data packet is a core node, before the data analysis module transmits the data packet after analysis processing to the server, the data encryption module is utilized to encrypt and transmit the data packet, so that the data transmission safety is improved; the signal verification module is used for verifying the communication state of the edge node in real time, and judging that the edge node is abnormal in communication if the limit deviation coefficient GF is greater than the deviation coefficient threshold value, and generating a communication abnormal signal; in order to remind the manager in time to carry out maintenance to this edge node, reduce the influence of interference signal, guarantee the accuracy of data monitoring.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a system block diagram of an industrial control system based on edge computing according to the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, an industrial control system based on edge calculation comprises a data acquisition module, a protocol conversion module, an FPGA master control, a data analysis module, a 5G communication module, a server, a data encryption module, a feature acquisition module, a node analysis module and a signal verification module;
the data acquisition module is used for acquiring equipment data received by a plurality of edge nodes and carrying out data encapsulation processing on the acquired equipment data; the encapsulated data is subjected to protocol conversion through a protocol conversion module, and is converted into a data protocol with a uniform fixed format;
the FPGA main control is in control connection with the protocol conversion module and is used for acquiring the data protocol converted by the protocol conversion module, carrying out algorithm analysis and processing on the converted data protocol through the data analysis module, packaging the analyzed and processed data into a data packet, and transmitting the data packet to the server through the 5G communication module; wherein the algorithm analysis and processing is performed to reject significantly erroneous and missing data;
in the embodiment, the invention realizes the simultaneous acquisition of the data of different edge nodes in multiple channels, improves the instantaneity and timeliness of the edge nodes, simultaneously carries out data correlation analysis on the data of the different edge nodes, and provides a reference basis for subsequent data processing analysis and early warning;
in this embodiment, before the data analysis module transmits the data packet after analysis processing to the server, the data analysis module is further configured to obtain an edge node corresponding to the data packet, and if the edge node is a core node, encrypt and transmit the data packet by using the data encryption module;
the data encryption module is used for carrying out distributed multi-layer encryption on the received data packet and transmitting the encrypted ciphertext to the server; the specific encryption steps are as follows:
randomly splitting the data packet into a plurality of data blocks; generating an AES128 encryption key, and generating a plurality of groups of sub-keys by the encryption key according to a preset rule; wherein the number of subkeys is equal to the number of data blocks;
performing MD5 processing on the obtained subkeys to obtain processed subkeys; carrying out multi-layer encryption processing on the split data blocks through the processing sub-secret key to generate an information encryption identification code and a layer 1 secret key; the information encryption identification code and the layer 1 secret key are subjected to time stamp fusion to form an encryption ciphertext;
each layer of encryption processing of the encryption module is a group of processing subkeys for carrying out encryption processing on one data block, and the data blocks are not overlapped with each other;
the layer 1 secret key is used for identifying the layer 1 encryption information in the information encryption identification code and generating a layer 2 secret key, the layer 2 secret key is used for identifying the layer 2 encryption information in the information encryption identification code and generating a layer 3 secret key, and the like;
the server is used for decrypting the received data, analyzing the received data through a self-written model algorithm input by the user terminal, judging whether the corresponding data is abnormal or not, and providing a data early warning notice for the user; the model algorithm is written for users in a self-running way and comprises a safety range of various data, and is used for judging whether the data are abnormal or not; the safety range is preset by a user;
the characteristic acquisition module is used for acquiring characteristic information of the equipment data received by each edge node and transmitting the acquired characteristic information to the node analysis module; the characteristic information comprises equipment data type, equipment data quantity, equipment data transmission distance and equipment data transmission bandwidth;
the node analysis module is used for carrying out the analysis of the operation optimization coefficient YS on each edge node according to the received characteristic information, and classifying the edge nodes according to the operation optimization coefficient YS, and specifically comprises the following steps:
aiming at a certain edge node, acquiring characteristic information of equipment data received by the edge node; counting the total operation times of the edge nodes as C1 in a preset time period;
sequentially marking corresponding equipment data quantity, equipment data transmission distance and equipment data transmission bandwidth in the characteristic information as Li, di and Wi; acquiring equipment data types in the characteristic information, setting a corresponding preset type value for each data type, and matching the equipment data types with all the data types to acquire the corresponding preset type value and marking the corresponding preset type value as CYi;
the calculation value Yi required for the edge node to process each device data is calculated using the formula yi= (CYi ×a1+li×a2+di×a3)/(wi×a4); wherein a1, a2, a3 and a4 are coefficient factors;
comparing the operation value Yi with a preset operation threshold value; counting the times of Yi > a preset operation threshold value as P1; when Yi is larger than a preset operation threshold, obtaining a difference value of Yi and the preset operation threshold and summing to obtain an supercomputed total value CZ; calculating to obtain an optimal coefficient YS by using a formula YS= (P1×g1+CZ×g2)/C1, wherein g1 and g2 are preset coefficient factors;
comparing the running coefficient YS with a set value; if the running and optimizing coefficient YS is larger than the set value, marking the corresponding edge node as a core node; otherwise, marking the corresponding edge node as a common node;
in an alternative embodiment, in order to reduce the influence of interference signals, the accuracy of data monitoring is ensured; the edge node is connected with a signal verification module, and the signal verification module is used for verifying the communication state of the edge node in real time; the specific verification steps are as follows:
the signal verification module sends a verification configuration message to the edge node according to a preset verification period, wherein the verification configuration message comprises a first signal quality threshold; in response to receiving the verification configuration message sent by the signal verification module, the edge node sends a second synchronization signal to the signal verification module;
determining, by the signal verification module, a signal quality of the second synchronization signal in response to monitoring the second synchronization signal; comparing the signal quality of the second synchronization signal with the first signal quality threshold to obtain a corresponding quality difference Zc, wherein it will be appreciated by those skilled in the art that any metric known in the art can be used to characterize the signal quality, e.g. RSRQ, RSRP, RSSI, etc.; the quality difference here may reflect the attenuation of the signal during transmission;
performing time difference calculation on the time when the signal verification module sends the verification configuration message and the time when the signal verification module monitors the second synchronous signal again to obtain response time XT; calculating a signal loss index SH of the edge node by using a formula SH=Zc×g4+XT×g5, wherein g4 and g5 are coefficient factors;
establishing a graph of the change of the signal loss index SH along with time, and counting the time required for the signal loss index SH to reach a preset loss threshold G1 as the communication limit time Gn; wherein G1 is a preset value;
acquiring the communication limit duration of each operation of the edge node, taking the value of Gn and the previous X1 group communication limit duration thereof, and marking the values as GS1, GS2, … and GSn in sequence according to the time sequence;
when GSm is less than or equal to GS (m-1), marking the GS (m-1) with a first limit value; counting the occurrence number of the first limit value as limit frequency P1; when GSm is less than or equal to GS (m-1), obtaining a difference value between GS (m-1) and GSm and summing to obtain a limit difference value PX; calculating a limit deviation coefficient GF by using a formula GF=P1×k3+PX×k4, wherein k3 and k4 are coefficient factors;
comparing the limiting departure coefficient GF with a departure coefficient threshold; if GF is larger than the deviation coefficient threshold value, judging that the edge node is abnormal in communication, and generating a communication abnormal signal;
the signal verification module is used for uploading the communication abnormal signal to the server so as to remind a manager of timely repairing and maintaining the edge node, and data monitoring efficiency is improved.
The above formulas are all formulas with dimensions removed and numerical values calculated, the formulas are formulas which are obtained by acquiring a large amount of data and performing software simulation to obtain the closest actual situation, and preset parameters and preset thresholds in the formulas are set by a person skilled in the art according to the actual situation or are obtained by simulating a large amount of data.
The working principle of the invention is as follows:
the industrial control system based on edge calculation is used for acquiring equipment data received by a plurality of edge nodes and carrying out data encapsulation processing on the acquired equipment data when the industrial control system works; the encapsulated data is subjected to protocol conversion through a protocol conversion module, and is converted into a data protocol with a uniform fixed format; carrying out algorithm analysis and processing on the converted data protocol through a data analysis module, packaging the analyzed and processed data into a data packet, and transmitting the data packet to a server through a 5G communication module; the server is used for decrypting the received data, analyzing the received data through a self-written model algorithm input by the user terminal, and judging whether the corresponding data is abnormal or not; the parallel time acquisition of the data of the different edge nodes of the multichannel is realized, the real-time performance and timeliness of the edge nodes are improved, meanwhile, the data correlation analysis is carried out on the data of the different edge nodes, a reference basis is provided for the subsequent data processing analysis and early warning, and the data processing efficiency is improved;
the characteristic acquisition module is used for acquiring characteristic information of the equipment data received by each edge node and transmitting the acquired characteristic information to the node analysis module; the node analysis module is used for carrying out analysis on the optimizing coefficient YS of each edge node according to the received characteristic information and classifying the edge nodes according to the optimizing coefficient YS; if the data packet is a core node, before the data analysis module transmits the data packet after analysis processing to the server, the data encryption module is utilized to encrypt and transmit the data packet, so that the data transmission safety is improved; the signal verification module is used for verifying the communication state of the edge node in real time, and judging that the edge node is abnormal in communication if the limit deviation coefficient GF is greater than the deviation coefficient threshold value, and generating a communication abnormal signal; in order to remind the manager in time to carry out maintenance to this edge node, reduce the influence of interference signal, guarantee the accuracy of data monitoring.
In the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.
Claims (7)
1. The industrial control system based on the edge calculation is characterized by comprising a data acquisition module, a protocol conversion module, an FPGA main control module, a data analysis module, a data encryption module, a characteristic acquisition module, a node analysis module and a signal verification module;
the data acquisition module is used for acquiring equipment data received by a plurality of edge nodes and carrying out data encapsulation processing on the acquired equipment data; the encapsulated data is subjected to protocol conversion through a protocol conversion module, and is converted into a data protocol with a uniform fixed format;
the FPGA main control is in control connection with the protocol conversion module and is used for acquiring the data protocol converted by the protocol conversion module, carrying out algorithm analysis and processing on the converted data protocol through the data analysis module, packaging the analyzed and processed data into a data packet, and transmitting the data packet to the server through the 5G communication module;
the characteristic acquisition module is used for acquiring characteristic information of the equipment data received by each edge node and transmitting the acquired characteristic information to the node analysis module for analysis of the optimizing coefficient YS;
the node analysis module is used for classifying the edge nodes according to the optimal coefficient YS, and if the optimal coefficient YS is larger than a set value, the corresponding edge nodes are marked as core nodes;
before the data analysis module transmits the data packet after analysis to the server, the data analysis module is further used for acquiring an edge node corresponding to the data packet, and if the edge node is a core node, the data packet is encrypted and transmitted by the data encryption module;
the signal verification module is used for verifying the communication state of the edge node in real time, and calculating to obtain a limit deviation coefficient GF; if GF is larger than the deviation coefficient threshold value, judging that the edge node is abnormal in communication, and generating a communication abnormal signal; to alert the manager to repair and maintain the edge node.
2. The industrial control system based on edge computing according to claim 1, wherein the specific analysis steps of the node analysis module are:
aiming at a certain edge node, acquiring characteristic information of equipment data received by the edge node; counting the total operation times of the edge nodes as C1 in a preset time period;
sequentially marking corresponding equipment data quantity, equipment data transmission distance and equipment data transmission bandwidth in the characteristic information as Li, di and Wi; acquiring equipment data types in the characteristic information, setting a corresponding preset type value for each data type, and matching the equipment data types with all the data types to acquire the corresponding preset type value and marking the corresponding preset type value as CYi;
the calculation value Yi required for the edge node to process each device data is calculated using the formula yi= (CYi ×a1+li×a2+di×a3)/(wi×a4); wherein a1, a2, a3 and a4 are coefficient factors;
comparing the operation value Yi with a preset operation threshold value; counting the times of Yi > a preset operation threshold value as P1; when Yi is larger than a preset operation threshold, obtaining a difference value of Yi and the preset operation threshold and summing to obtain an supercomputed total value CZ; and calculating to obtain the running and optimizing coefficient YS by using a formula YS= (P1×g1+CZ×g2)/C1, wherein g1 and g2 are preset coefficient factors.
3. The industrial control system based on edge computing according to claim 1, wherein the data encryption module is configured to perform distributed multi-layer encryption on the received data packet and transmit the encrypted ciphertext to the server; the specific encryption steps are as follows:
randomly splitting the data packet into a plurality of data blocks; generating an AES128 encryption key, and generating a plurality of groups of sub-keys by the encryption key according to a preset rule;
performing MD5 processing on the obtained subkeys to obtain processed subkeys; wherein the number of subkeys is equal to the number of data blocks; carrying out multi-layer encryption processing on the split data blocks through the processing sub-secret key to generate an information encryption identification code and a layer 1 secret key; and (5) the information encryption identification code and the layer 1 key are subjected to time stamp fusion to form an encryption ciphertext.
4. The industrial control system based on edge calculation according to claim 1, wherein the server is configured to decrypt the received data, analyze the decrypted data through a self-written model algorithm input by a user terminal, determine whether the corresponding data is abnormal, and provide a data early warning notification for the user; the model algorithm is written for users by oneself and comprises a safety range of various data, and is used for judging whether the data are abnormal or not; the safety range is preset by a user.
5. The industrial control system based on edge computing according to claim 1, wherein the specific verification steps of the signal verification module are:
the signal verification module sends a verification configuration message to the edge node according to a preset verification period, wherein the verification configuration message comprises a first signal quality threshold; in response to receiving the verification configuration message sent by the signal verification module, the edge node sends a second synchronization signal to the signal verification module;
determining, by the signal verification module, a signal quality of the second synchronization signal; comparing the signal quality of the second synchronous signal with the first signal quality threshold to obtain a corresponding quality difference Zc;
performing time difference calculation on the time when the signal verification module sends the verification configuration message and the time when the signal verification module monitors the second synchronous signal again to obtain response time XT;
calculating a signal loss index SH of the edge node by using a formula SH=Zc×g4+XT×g5, wherein g4 and g5 are coefficient factors; establishing a graph of the change of the signal loss index SH with time;
the time required for the signal loss index SH to reach the preset loss threshold G1 is counted as the communication limit time Gn; wherein G1 is a preset value; acquiring the communication limit duration of each operation of the edge node, taking the value of Gn and the previous X1 group communication limit duration thereof, and marking the values as GS1, GS2, … and GSn in sequence according to the time sequence; when GSm is less than or equal to GS (m-1), marking the GS (m-1) with a first limit value;
counting the occurrence number of the first limit value as limit frequency P1; when GSm is less than or equal to GS (m-1), obtaining a difference value between GS (m-1) and GSm and summing to obtain a limit difference value PX; the limiting deviation factor GF is calculated using the formula gf=p1×k3+px×k4, where k3, k4 are factor coefficients.
6. An industrial control system based on edge computation according to claim 3, wherein each layer of encryption processing of the encryption module is a set of processing subkeys for encrypting one of the data blocks, without overlapping each other.
7. An industrial control system based on edge computation according to claim 3, wherein the layer 1 key is used to identify layer 1 encryption information in the information encryption identifier and to generate a layer 2 key, wherein the layer 2 key is used to identify layer 2 encryption information in the information encryption identifier and to generate a layer 3 key, and so on.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310422178.4A CN116540597A (en) | 2023-04-19 | 2023-04-19 | Industrial control system based on edge calculation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310422178.4A CN116540597A (en) | 2023-04-19 | 2023-04-19 | Industrial control system based on edge calculation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116540597A true CN116540597A (en) | 2023-08-04 |
Family
ID=87451503
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310422178.4A Pending CN116540597A (en) | 2023-04-19 | 2023-04-19 | Industrial control system based on edge calculation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116540597A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117319517A (en) * | 2023-11-27 | 2023-12-29 | 佛山市灏飞科技信息技术有限公司 | Multi-protocol-based water supply equipment data integration and forwarding method |
CN117471982A (en) * | 2023-11-07 | 2024-01-30 | 广东知业科技有限公司 | Method for remotely controlling PLC (programmable logic controller) through edge calculation |
CN117518939A (en) * | 2023-12-06 | 2024-02-06 | 广州市顺风船舶服务有限公司 | Industrial control system based on big data |
CN117891614A (en) * | 2024-03-14 | 2024-04-16 | 山西泓禾惜贤科贸有限公司 | Big data analysis platform based on cloud service |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180332009A1 (en) * | 2017-05-15 | 2018-11-15 | Medtronic, Inc. | Multimodal Cryptographic Data Communications in a Remote Patient Monitoring Environment |
CN112751855A (en) * | 2020-12-30 | 2021-05-04 | 合肥大多数信息科技有限公司 | Cross-browser user data security management system based on encryption technology |
CN114039819A (en) * | 2022-01-07 | 2022-02-11 | 中大检测(湖南)股份有限公司 | Edge intelligent gateway based on 5G |
CN115087143A (en) * | 2022-06-15 | 2022-09-20 | 万申科技股份有限公司 | AIoT measurement and control edge gateway based on embedded system |
CN115208562A (en) * | 2022-07-07 | 2022-10-18 | 安徽省极光智能科技有限公司 | Operation and maintenance support system based on quantum encryption technology |
CN115442375A (en) * | 2022-11-08 | 2022-12-06 | 深圳市亲邻科技有限公司 | Property digital management system based on cloud edge cooperation technology |
-
2023
- 2023-04-19 CN CN202310422178.4A patent/CN116540597A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180332009A1 (en) * | 2017-05-15 | 2018-11-15 | Medtronic, Inc. | Multimodal Cryptographic Data Communications in a Remote Patient Monitoring Environment |
CN112751855A (en) * | 2020-12-30 | 2021-05-04 | 合肥大多数信息科技有限公司 | Cross-browser user data security management system based on encryption technology |
CN114039819A (en) * | 2022-01-07 | 2022-02-11 | 中大检测(湖南)股份有限公司 | Edge intelligent gateway based on 5G |
CN115087143A (en) * | 2022-06-15 | 2022-09-20 | 万申科技股份有限公司 | AIoT measurement and control edge gateway based on embedded system |
CN115208562A (en) * | 2022-07-07 | 2022-10-18 | 安徽省极光智能科技有限公司 | Operation and maintenance support system based on quantum encryption technology |
CN115442375A (en) * | 2022-11-08 | 2022-12-06 | 深圳市亲邻科技有限公司 | Property digital management system based on cloud edge cooperation technology |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117471982A (en) * | 2023-11-07 | 2024-01-30 | 广东知业科技有限公司 | Method for remotely controlling PLC (programmable logic controller) through edge calculation |
CN117319517A (en) * | 2023-11-27 | 2023-12-29 | 佛山市灏飞科技信息技术有限公司 | Multi-protocol-based water supply equipment data integration and forwarding method |
CN117319517B (en) * | 2023-11-27 | 2024-02-20 | 佛山市灏飞科技信息技术有限公司 | Multi-protocol-based water supply equipment data integration and forwarding method |
CN117518939A (en) * | 2023-12-06 | 2024-02-06 | 广州市顺风船舶服务有限公司 | Industrial control system based on big data |
CN117891614A (en) * | 2024-03-14 | 2024-04-16 | 山西泓禾惜贤科贸有限公司 | Big data analysis platform based on cloud service |
CN117891614B (en) * | 2024-03-14 | 2024-05-14 | 山西泓禾惜贤科贸有限公司 | Big data analysis platform based on cloud service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116540597A (en) | Industrial control system based on edge calculation | |
CA2607603C (en) | Distributed traffic analysis | |
CN115442375B (en) | Property digital management system based on cloud edge cooperation technology | |
CN109347688B (en) | Method and device for positioning fault in wireless local area network | |
CN115549954B (en) | Heterogeneous-based fragmented network resource security splicing communication system | |
CN114039819B (en) | Edge intelligent gateway based on 5G | |
CN114710353B (en) | Risk management and control system based on AIoT intelligent edge gateway | |
CN107181743A (en) | Network direct broadcasting data reporting method and device | |
CN111654321B (en) | Satellite network management method and device and electronic equipment | |
CN115087143A (en) | AIoT measurement and control edge gateway based on embedded system | |
CN112688822A (en) | Edge computing fault or security threat monitoring system and method based on multi-point cooperation | |
CN115766242A (en) | Environment-friendly management system based on safety isolation communication | |
CN115102747A (en) | Internet management platform based on digital twin | |
EP4224369A1 (en) | Method, apparatus and system for managing machine learning model | |
CN104539556A (en) | Method for providing satisfaction service quality for users under heterogeneous network environment | |
CN115766471B (en) | Network service quality analysis method based on multicast flow | |
CN104104548A (en) | Network security posture information acquisition system and method based on SFLOW and OWAMP (One Way Active Measurement Protocol) | |
CN114338221B (en) | Network detection system based on big data analysis | |
CN116224915A (en) | Distributed manufacturing process quality monitoring method and system based on federal learning | |
CN115442739A (en) | Subway construction temporary communication processing method and device, electronic equipment and medium | |
CN109788249B (en) | Video monitoring control method based on industrial internet operating system | |
CN113645101A (en) | Automatic verification method for CSD link of intelligent substation switch | |
CN113890814B (en) | Fault perception model construction and fault perception method and system, equipment and medium | |
CN111935250B (en) | Automatic driving data classification transmission method and system | |
CN104852861A (en) | Stream information transmission method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |