ZOU Hongfeng. Compatibility Analysis of Urban Rail Transit Train Control System and Cloud-Edge ComputingJ. Urban Mass Transit, 2025, 28(8): 202-209,228. DOI: 10.16037/j.1007-869x.20241491
Citation: ZOU Hongfeng. Compatibility Analysis of Urban Rail Transit Train Control System and Cloud-Edge ComputingJ. Urban Mass Transit, 2025, 28(8): 202-209,228. DOI: 10.16037/j.1007-869x.20241491

Compatibility Analysis of Urban Rail Transit Train Control System and Cloud-Edge Computing

  • Objective To address the limitations of traditional urban rail transit train control systems that solely rely on the “fault-safety” principle, the feasibility of meeting the SIL4 standard is explored by introducing the cloud-edge computing technology, attempting to enhance the system′s dynamic risk prevention, control capabilities and overall efficiency from three dimensions: operational safety, operational safety, and cyber security. Method Based on an analysis of fault dynamic propagation characteristics and combined with the risk transfer theory, a multi-dimensional security assessment model including homogeneous or heterogeneous risk transfer is constructed. By comparing and analyzing the limitations of the risk matrix in standard EN 50126, a four-dimensional assessment framework that adds controllability and dynamic propagation is proposed. Combined with the characteristics of cloud-edge computing technology, the security threats and countermeasures at the platform layer, data layer, edge layer and business layer are systematically analyzed. Result & Conclusion Cloud-edge computing can meet SIL4 standard requirements through computing power elastic expansion and distributed redundant architecture; the decoupling of data and computing units, secure migration strategies, and distributed fault detection three key technical challenges are identified; a unified access control strategy based on virtualization interfaces is proposed. The research provides a theoretical basis and technical path for building a new type of train control system with “cloud-edge-end” collaboration. The proposed four-dimensional security assessment framework and hierarchical protection strategy can effectively enhance the overall system security.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return