Security protection method for mobile authorization of train control system based on space transformation
A technology of train safety protection and space transformation, which is applied in the fields of operation center control system, railway signal and safety, railway traffic management, etc. It can solve the problems of inability to verify the result of safety, inability to ensure that the function is safe and correct, and the train cannot stop.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] The mobile authorization security protection method of the train control system proposed by the embodiment of the present invention describes the essential track section information description in the MA calculation process based on the related theory of space transformation, and realizes the security protection function of the MA through the security protection algorithm.
[0057] The embodiment of the present invention proposes a mobile authorization security protection algorithm based on space transformation. The schematic diagram of the implementation principle of the security protection algorithm is as follows figure 1 As shown, the present invention implements the MA security protection algorithm module inside the ZC (Zone Comtroller) system. The input data of the ZC system includes basic information such as train data and line data required for MA calculations, which are generated by the train control algorithm Original MA, train speed and braking instructions, etc....
Embodiment 2
[0103] According to the actual station layout of the Yizhuang line, the test has been carried out, and the effect proves that the protection method can protect the train movement authorization, and the experimental effect does not show a state explosion, and the calculation time can meet the use of the actual system.
[0104] Based on the original station data of Yizhuang Line, 5000 faults were randomly injected into 5000 infrastructures, original MA and train parameters through fault injection. These faults cover various situations that may occur in the train control system. Experiments show that using the above algorithm can protect mobile authorization.
[0105] During the experiment, a total of 48 two-way routes were considered for testing. Table 2 lists the infrastructure elements included in each route. It is proved that the proposed security protection algorithm can effectively protect against the possible problems of mobile authorization through the statistics of the number...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


