期刊文献+

基于智慧物联体系及边缘计算的全链路监测系统的开发与应用 被引量:1

Development and Application of Full Link Monitoring System Based on Smart IoT System and Edge Computing
下载PDF
导出
摘要 目前电力系统的低压配电网数量大、拓扑和走线复杂、管理水平低等问题,现场运行时则易遇到交叉重复、链路断点难以排查等运维问题。基于此,该文提出一种基于智慧物联体系和边缘计算的新型监控手段——全链路监测,其通过边缘计算框架实现控制指令递传,贯通物联体系中各级节点,进而对链路全程监控,对潜在断点精准定位,可有效解决运维过程中故障难以排查等问题,减轻基层运维负担,节约资源,提高生产效率。该全链路监测系统具有广阔的研究前景和较高的推广价值。 At present,the low-voltage distribution network of the power system is large,the topology and wiring are complicated,and the management level is low.During on-site operation,it is easy to encounter operation and maintenance problems such as cross duplication and link breakpoints that are difficult to troubleshoot.Based on this,this paper proposes a new monitoring method based on the intelligent IoT system and edge computing-full link monitoring,which realizes the transmission of control instructions through the edge computing framework,connects all levels of nodes in the IoT system,and then monitors the link.Full-process monitoring and precise positioning of potential breakpoints can effectively solve problems such as difficulty in troubleshooting during operation and maintenance,reduce the burden of grassroots operation and maintenance,save resources,and improve production efficiency.This full-link monitoring system has broad research prospects and high promotion value.
作者 施沩 周鹏 富思 SHI Wei;ZHOU Peng;FU Si(School of Electrical Engineering,Southeast University,Nanjing 210009,China;Department of Computer Science and Technology,Nanjing University,Nanjing 210093,China;School of Automation,Beijing University of Technology,Beijing 100089,China)
出处 《自动化与仪表》 2022年第6期1-5,共5页 Automation & Instrumentation
关键词 智慧物联 边缘计算 全链路监测 故障定位 smart IoT edge computing full link monitoring fault location
  • 相关文献

参考文献19

二级参考文献128

  • 1薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 2周鸣争,楚宁,周涛,强俊.一种基于能量约束的传感器网络动态数据融合算法[J].仪器仪表学报,2007,28(1):172-175. 被引量:13
  • 3王捷民,宋瀚涛,姜少峰,吴正宇.传感器网络中一种能量有效的自适应成簇算法[J].电子测量技术,2007,30(4):209-212. 被引量:4
  • 4AMRITA G, OTI P S. Secure data aggregation using some degree of persistent authentication in sensor networks [ C ]. Mobile and Pervasive Computing , 2008:153-186.
  • 5BAHI J M, GUYEUX C, MAKHOUL A. Efficient and robust secure aggregation of encrypted data in sensor networks [ C ]. Fourth International Conference on Sensor Technologies and Applications,2010:472-477.
  • 6ALBATH J, MADRIA S K. Secure hierarchical data aggregation in wireless sensor networks [ C ]. Proc of the WCNC 2009,2009 : 1-6.
  • 7GIRAO J, WESTHOFF D, SCHNEIDER M. CDA: Concealed data aggregation for reverse muhicast traffic in wireless sensor networks [ C ]. IEEE International Confer- ence on Communications, Washington,2005.
  • 8PRZYDATEK B, SONG D, PERRIG A. SIA : Secure infor- mation aggregation in sensor networks [ C ]. The First ACM Conference on Embedded Networked Systems ( Sen- Sys' 03) , New York,2003:255-265.
  • 9DU W L, DENG J, HAN Y S. A witness-based approach for data fusion assurance wireless sensor networks [ C ]. IEEE Global Telecommunication Conference. Washington,2003,3 : 1435-1439.
  • 10工业无线网络WIA规范,第一部分:用于过程自动化的WIA系统结构与通信规范[S].GB/T26790.1-2011.

共引文献767

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部