<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">45615</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2023.045615</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust</article-title>
<alt-title alt-title-type="left-running-head">Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust</alt-title>
<alt-title alt-title-type="right-running-head">Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Zhu</surname><given-names>Xiaoyan</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Jia</surname><given-names>Ruchun</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Zhang</surname><given-names>Tingrui</given-names></name><xref ref-type="aff" rid="aff-3">3</xref></contrib>
<contrib id="author-4" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Yao</surname><given-names>Song</given-names></name><xref ref-type="aff" rid="aff-4">4</xref><email>yaosong@nsu.edu.cn</email></contrib>
<aff id="aff-1"><label>1</label><institution>School of Computer Science, Hefei University of Technology</institution>, <addr-line>Hefei, 230000</addr-line>, <country>China</country></aff>
<aff id="aff-2"><label>2</label><institution>College of Computer Science, Sichuan University</institution>, <addr-line>Chengdu, 610065</addr-line>, <country>China</country></aff>
<aff id="aff-3"><label>3</label><institution>Sichuan University-Pittsburgh Institute, Sichuan University</institution>, <addr-line>Chengdu, 610065</addr-line>, <country>China</country></aff>
<aff id="aff-4"><label>4</label><institution>School of Information and Business Management, Chengdu Neusoft University</institution>, <addr-line>Chengdu, 610065</addr-line>, <country>China</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Song Yao. Email: <email>yaosong@nsu.edu.cn</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2024</year></pub-date>
<pub-date date-type="pub" publication-format="electronic"><day>26</day>
<month>3</month>
<year>2024</year></pub-date>
<volume>78</volume>
<issue>3</issue>
<fpage>4363</fpage>
<lpage>4377</lpage>
<history>
<date date-type="received">
<day>02</day>
<month>9</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>13</day>
<month>12</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2024 Zhu et al.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Zhu et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_45615.pdf"></self-uri>
<abstract>
<p>The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC&#x2019;s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC&#x2019;s information sharing on the Internet. From the single management authority to the unified management of data units, the systematic algorithm improvement of shared network data tamper prevention method is realized, and RDTP (Reliable Data Transfer Protocol) is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission. The results show that this method can reasonably avoid the tampering of information sharing on the Internet, maintain the security factors of air traffic control information sharing on the Internet, and the Central Processing Unit (CPU) utilization rate is only 4.64%, which effectively increases the performance of air traffic control data comprehensive security protection system.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Zero trust access policy</kwd>
<kwd>air traffic information sharing network</kwd>
<kwd>privacy data</kwd>
<kwd>tam-per-proof</kwd>
<kwd>certification features</kwd>
</kwd-group>
<funding-group>
<award-group id="awg1">
<funding-source>National Natural Science Foundation of China</funding-source>
<award-id>U2133208</award-id>
<award-id>U20A20161</award-id>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>With the continuous development of high-tech technology around the world, the world has entered the era of digital intelligence [<xref ref-type="bibr" rid="ref-1">1</xref>], and the real-time sharing of security situation information has a key practical significance in helping risk suppression [<xref ref-type="bibr" rid="ref-2">2</xref>]. Security situation information sharing The Internet uses data distribution solutions to complete information sharing [<xref ref-type="bibr" rid="ref-3">3</xref>]. Real-time security situation information sharing can help decision-makers respond quickly and transmit the best decision data to the desired transmission site [<xref ref-type="bibr" rid="ref-4">4</xref>]. The sharing of security situation information is of great significance for information risk suppression. Decision makers involved in risk suppression must distinguish, manage, and manipulate decisions according to the implementation of risk suppression, and use shared information and data to take the initiative in risk suppression. The stability and rationalization of real-time sharing of security situation information and data is extremely important, and efficient security situation information sharing Internet has key practical significance in helping risk suppression [<xref ref-type="bibr" rid="ref-5">5</xref>].</p>
<p>Computer information network technology has been widely used in many government organs enterprises and institutions in our country. However, due to the complexity, variability, and openness of the computer network environment, there are many potential threats, such as hacker attacks, computer virus spread, cyber-crime, and so on, no matter in the Wide Area Network (WAN) or Local Area Network (LAN). The air traffic control network and information system is an important national network and information security system, so it has high requirements for technology, security, and service. Because of its tedious business and capital-intensive characteristics, once the air traffic control information network is destroyed, it will cause serious damage to public interests and people&#x2019;s security [<xref ref-type="bibr" rid="ref-6">6</xref>]. Although the general server firewall and intrusion detection system can prevent a small amount of security risks on the Internet, they cannot guarantee that the data on the Internet will not be forged [<xref ref-type="bibr" rid="ref-7">7</xref>]. Security situation information sharing Internet data security risks has become a key research topic in the field of information security [<xref ref-type="bibr" rid="ref-8">8</xref>]. In the past, database backup data, financial audits, and so on could only achieve general Internet database security, and could not ensure the relatively highly sensitive security situation [<xref ref-type="bibr" rid="ref-9">9</xref>], information sharing Internet data security. The tamper-proof method of information sharing network data based on a zero-trust access policy can effectively improve the security of Internet data sharing of security situation information.</p>
<p>Zero Trust Architecture is a new concept that departs from the traditional network security model. Its core idea is to refuse access and security protection based on trust. The security focus of zero trust is not on establishing perimeter defense, but on establishing effective data protection. Through continuous verification and monitoring of identity, devices, environment, and applications, it can achieve comprehensive and flexible security protection.</p>
<p>With the continuous improvement of zero trust theory and practice in the industry, zero trust gradually evolves from a prototype concept to mainstream network security technology architecture. Starting from the original category of network layer differential segment, zero trust gradually evolves into a new generation security architecture covering cloud environment, big data center, microservice, and many other scenarios. &#x201C;Never trust, always verify&#x201D; is the design principle of zero trust architecture [<xref ref-type="bibr" rid="ref-1">1</xref>], the basic principle of zero trust can be summarized as below:</p>
<p>(1) All network traffic is untrusted and must be verified and protected.</p>
<p>(2) Access control must be limited and strictly implemented, and all network traffic should be checked and recorded.</p>
<p>(3) Authentication and authorization should be a prerequisite for all resources and activities.</p>
<p>(4) Cybersecurity has no time limit&#x2014;danger comes from every moment, so all resources must be verified and protected.</p>
<p>(5) Cybersecurity has no boundary&#x2014;threats come from all directions, so the concept of a trusted network must be eliminated.</p>
<p>(6) Everyone/everything/everywhere/every network/every information/every supply chain must be authenticated and authorized (dynamic security strategy).</p>
<p>The advancement of zero trust architecture lies in its ability to adapt to the complex needs and changes of modern networks and provide more comprehensive and flexible security solutions.</p>
<p>(1) The default setting is that all visitors cannot be trusted;</p>
<p>(2) The minimum administrative authority standard;</p>
<p>(3) Continuous dynamic key management and authorization;</p>
<p>(4) Continuous security protection.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Materials and Methods</title>
<sec id="s2_1">
<label>2.1</label>
<title>Zero Trust Physical Layer Authentication Technology for Intelligent Air Traffic Control</title>
<p>For the zero trust Medium Access Control (MAC) layer authentication technology, based on the research of ensuring highly reliable data transmission, the inherent transmission stability of finger-print-basedfingerprint-based authentication technology is completed by breaking out of the security concepts of external attachment and patch packet [<xref ref-type="bibr" rid="ref-10">10</xref>]. Coefficient stability and inter-dependence are combined, and on this basis, simulation evaluation data are integrated to continuously improve and formulate the scheme, to achieve the overall goal of specific transmission [<xref ref-type="bibr" rid="ref-11">11</xref>]. For mechanical equipment that must have a high safety factor, MAC authentication of mechanical equipment must be carried out to prevent information leakage [<xref ref-type="bibr" rid="ref-12">12</xref>]. Therefore, it is suggested to select rare space vector (accumulation) codes to achieve high reliability of small data (program control, etc.) transmission while improving the transmission safety factor, and then adopt the 12-constellation framing strategy according to the actual demand and environment. Based on the technology of transmission stability, fingerprint identification and authentication of data signals are selected to improve the endogenous security factor of transmission. The authentication process is shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>, based on zero trust sparse vector encoding authentication in intelligent air traffic authentication.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Sparse vector (overlay) codes and fingerprint authentication for static small data transmission</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_45615-fig-1.tif"/>
</fig>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Distributed Authentication Optimization of Information-Sharing Network Data</title>
<p>By the traditional tamper-proof methods for analyzing shared data, it can be found that the traditional authentication system allows visitors to adjust the key value of browsing registry file management permission according to the shared temporary management permission, and there is a security protection structure system that conforms to the characteristics of personal privacy data. The attacker can temporarily increase the management authority for the problem to a low degree, to obtain the change management authority of forging and sharing personal privacy data [<xref ref-type="bibr" rid="ref-13">13</xref>]. Therefore, the distributed system authentication structure is selected in this study to separate verification data and verification management authority from digitalization, to complete the irrelevance and unification of verification data, verification optimization algorithm, and personal privacy data. Firstly, the distributed system is used to solve the information flow problem of the proofreader&#x2019;s real identity authentication data proofreader. The information function formula after processing is as below:</p>
<p><disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msup></mml:math></disp-formula></p>
<p>In the formula, M<sub>i</sub>~M<sub>0</sub> means that the total output of the data stream to be verified in distributed computing is i 1 bit. Thus, the number of real identity identification marks of the data stream to be verified is:</p>
<p><disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mfrac><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>9</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>9</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mfrac><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>9</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:math></disp-formula></p>
<p>In the formula, any set of parameters on the right side of the expression consists of a clear value and an added value. The first set of zeroed values in the expression is obtained. The combined values are combined with the next set of zeroed values to obtain the following value:</p>
<p><disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mfrac><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>9</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>=</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:mn>3</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>+</mml:mo><mml:mfrac><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>9</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>+</mml:mo><mml:mfrac><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>9</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mfrac><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>9</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msup></mml:math></disp-formula></p>
<p>According to the above calculation method, the whole derivation and replacement calculation of <xref ref-type="disp-formula" rid="eqn-2">formula (2)</xref> can be obtained as below:</p>
<p><disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mfrac><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>9</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac><mml:mo>=</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>&#x22C5;</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msup><mml:mn>3</mml:mn><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>Through the derivation and calculation of the above formula, a unique value-added table can be obtained. The value-added relationship expression refers to the final pit-bull information flow form of the authentication and verification status flag of the distributed system.</p>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Distributed Authentication Feature Differentiation Calculation of Privacy Data</title>
<p>After the above-improved calculation of the structure of the authentication system, the characteristics of the authentication of the distributed system of personal privacy data are diversified according to the authentication characteristics of the distributed system. The calculation process is as follows:</p>
<p>Based on the calculation method of minimum norm, the number of set sparse coefficients is reset for the authenticated data stream. Make <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:msubsup><mml:mrow><mml:mo>{</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>}</mml:mo></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msup><mml:mi>i</mml:mi><mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:msup></mml:mrow></mml:msubsup></mml:math></inline-formula> a collection of authenticated distributed information flow data, If the condition <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mi>T</mml:mi><mml:mrow><mml:mi>z</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> is satisfied, set the vector value of this set and its mapping matrix <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:mi>C</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mi>C</mml:mi><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mi>C</mml:mi><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x22EF;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mrow><mml:msup><mml:mi>i</mml:mi><mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:msup></mml:mrow></mml:mrow></mml:msub><mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mi>T</mml:mi><mml:mrow><mml:mi>z</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msup><mml:mi>i</mml:mi><mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:msup></mml:mrow></mml:mrow></mml:msup></mml:math></inline-formula> as a symmetric mapping relationship. The symmetric vector <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mover><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover></mml:math></inline-formula> in the set parameter is sparsely reset to obtain the reset matrix dn, and the minimum norm conversion calculation is carried out to obtain the expression with distributed linear characteristics as follows:</p>
<p><disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:mi>U</mml:mi><mml:mo>=</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">min</mml:mo><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mrow><mml:mo symmetric="true">&#x2016;</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo symmetric="true">&#x2016;</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>.</mml:mo><mml:mi>y</mml:mi><mml:mo>.</mml:mo><mml:mover><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover><mml:mo>=</mml:mo><mml:msup><mml:mi>C</mml:mi><mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:msup><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></disp-formula></p>
<p>In the formula, C is the matrix form of C after excluding the vector value data in column n, <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mo>[</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x22EF;</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>n</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x22EF;</mml:mo><mml:mo>,</mml:mo><mml:msup><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:msup><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mi>Y</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> represents the matrix factor under a single i, dimension coefficient, <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> (k &#x2260; n) is the conversion amount of the k symmetric vector <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mover><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover></mml:math></inline-formula> in the set when resetting <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mover><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover></mml:math></inline-formula>, the vector factors and <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mover><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover></mml:math></inline-formula> formed in <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mover><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover></mml:math></inline-formula> are reset quantities for each other. After the reset parameters <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mi>D</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mover><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">&#x2192;</mml:mo></mml:mover><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:msup><mml:mi>i</mml:mi><mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:msup></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msup><mml:mi>i</mml:mi><mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:msup></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>D</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mover><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo></mml:mrow><mml:mo>&#x007E;</mml:mo></mml:mover></mml:mrow><mml:mspace width="thinmathspace" /><mml:mrow><mml:mover><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo></mml:mrow><mml:mo>&#x007E;</mml:mo></mml:mover></mml:mrow><mml:mo>&#x22EF;</mml:mo><mml:mo>,</mml:mo><mml:mrow><mml:mover><mml:msup><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:msup><mml:mo>&#x007E;</mml:mo></mml:mover></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:math></inline-formula> are obtained, the characteristics of the authentication distributed system are measured combined with the authentication data, and the differences between the left and right characteristics before and after reset are analyzed. The smaller the difference between the left and right characteristics before and after reset, the higher the security of the obtained authentication parameters and the higher the management authority of the change. Therefore, it can be obtained that the weight D(t) of the rare diversification objective function is:</p>
<p><disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:mi>D</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:munderover><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mi>n</mml:mi><mml:mi>t</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>C</mml:mi><mml:mrow><mml:mover><mml:mrow><mml:mi>d</mml:mi><mml:mi>n</mml:mi></mml:mrow><mml:mo>&#x007E;</mml:mo></mml:mover></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi>B</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>C</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>In the formula, the molecular structure in the rational number of the right correlation expression indicates that the global data acquisition is the iterative difference between the t-layer indoor spatial feature cnt and the symmetrical reset feature. <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mrow><mml:mtext>Bst</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>C</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>t</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the hierarchical combination of global data as a function of characteristic standard deviation in t indoor space. According to the calculation, the value <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mrow><mml:mtext>D</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>t</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> can be solved. It is very important to compile and sort the projection values of the global data corresponding to the obtained feature parameters according to the growth logic, and extract smaller combinations from the feature combinations to verify the diversified features of the distributed system. The acquisition and calculation method of authentication feature difference of personal privacy data distributed system is shown in <xref ref-type="fig" rid="fig-2">Fig. 2</xref> below.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Method of extracting and calculating the difference value of distributed authentication feature of privacy data</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_45615-fig-2.tif"/>
</fig>
</sec>
<sec id="s2_4">
<label>2.4</label>
<title>Tamper-Proof Security Enhancement Calculation</title>
<p>To ensure the anti-attack capability of the whole process of authentication and computing of the distributed system and improve the security level of tamper-proof, the sharing and browsing of personal private data and the encryption and computing of data are separated and transmitted. Ensure that the above-distributed system improves the measurement stability. The key step is to improve the main parameters of the transmission strategy. The process is as follows.</p>
<p>Assuming g(c) is a set of feature functions satisfying [0,3], the mathematical form of multiple execution policy function <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:msub><mml:mrow><mml:mtext>M</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext>c</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> can be expressed as follows:</p>
<p><disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>g</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:munderover><mml:mi>g</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:mfrac><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mrow><mml:mspace width="negativethinmathspace" /><mml:mo>&#x00A0;</mml:mo></mml:mrow><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msubsup><mml:mo>)</mml:mo></mml:mrow><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mn>3</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:msup><mml:mi>c</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow></mml:msup></mml:math></disp-formula></p>
<p>In the formula, I represent a non-negative <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mrow><mml:mspace width="negativethinmathspace" /><mml:mo>&#x00A0;</mml:mo></mml:mrow><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msubsup><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> integer, is the i-th subset of multiple execution strategy function, and the expression is:</p>
<p><disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mrow><mml:mspace width="negativethinmathspace" /><mml:mo>&#x00A0;</mml:mo></mml:mrow><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msubsup><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>i</mml:mi><mml:mo>!</mml:mo></mml:mrow><mml:mrow><mml:mi>l</mml:mi><mml:mo>!</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>l</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>!</mml:mo></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>The <xref ref-type="disp-formula" rid="eqn-7">formula (7)</xref> and the <xref ref-type="disp-formula" rid="eqn-8">formula (8)</xref> can be obtained:</p>
<p><disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>g</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:munderover><mml:mi>g</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mi>l</mml:mi><mml:mi>i</mml:mi></mml:mfrac><mml:mo>)</mml:mo></mml:mrow><mml:msubsup><mml:mi>M</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msubsup><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>In the formula, <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:msubsup><mml:mi>M</mml:mi><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msubsup><mml:mo stretchy="false">(</mml:mo><mml:mi>c</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the initial function. Based on the logical transformation in the above authentication calculation, the corresponding key generation countermeasure function formula is selected to complete the tamper-proof of personal privacy data. The transformed game function formula is as follows:</p>
<p><disp-formula id="eqn-10"><label>(10)</label><mml:math id="mml-eqn-10" display="block"><mml:mi>L</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>q</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>O</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mi>G</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>J</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>V</mml:mi><mml:mi>G</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>In the formula, q and G<sub>n</sub> are decrypted data sets and key function formulas respectively for the first n feature. O<sub>n</sub> is the N key value of the authentication code, and T<sub>n</sub> is used to register the n value of the key value. J<sub>n</sub> (VG) is the characteristic scattering value of the N characteristic function, and VG is the measured value.</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Information Sharing Network Data Tamper-Proof Method</title>
<sec id="s3_1">
<label>3.1</label>
<title>Security Situation Information Sharing Network</title>
<p>The security situation information sharing network is heterogeneous. The accuracy of the security situation information sharing network is analyzed from the operation mode, network structure, and Internet data flow.</p>
<sec id="s3_1_1">
<label>3.1.1</label>
<title>Overall Network Architecture</title>
<p>Security situation information sharing Internet is heterogeneous. The key is that different network structures have different Transmission Control Protocol (TCP) protocols and communication file formats. To complete the Internet data sharing of Security situation information and prevent the communication computer equipment from being modified too much, the network structure of Security situation information sharing is shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref> below.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Block diagram of security situation information sharing network</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_45615-fig-3.tif"/>
</fig>
<p>According to <xref ref-type="fig" rid="fig-3">Fig. 3</xref>, the structure of the security situation information sharing network completes data sharing according to intermediate connection points. Unlike a connection point on the Internet, it only needs to complete its own TCP protocol and network architecture [<xref ref-type="bibr" rid="ref-14">14</xref>]. The shared data solution layer that can be used for common applications of different network communications is set up at the network communication Data network layer and the link layer. The shared data solution layer is used to:</p>
<p>1. The set shared data solution layer can simultaneously transmit and solve all data of different network communication data network layer and link layer [<xref ref-type="bibr" rid="ref-15">15</xref>].</p>
<p>2. The shared data resolution layer can convert the security situation information data in different network communications into the security situation information that can be reasonably distinguished in another network communication through relevant solutions, and forward the resolved data from one network communication to the communication link layer and its data network layer of another network [<xref ref-type="bibr" rid="ref-16">16</xref>].</p>
<p>Due to the shared data parsing layer, different network communication can use different routers to transmit security situation information data, and then select different material key management modes at the link layer to complete the Internet data sharing of security situation information and prevent Internet access due to security situation [<xref ref-type="bibr" rid="ref-17">17</xref>] share information and data about heterogeneous hazard security scenarios.</p>
</sec>
<sec id="s3_1_2">
<label>3.1.2</label>
<title>Network Stream</title>
<p>The security situation information sharing network includes different network communications. Intermediate nodes are used to share security situation information. The intermediate node is located in the control module of multi-network data information sharing and resource allocation of the intermediate node. The steps of security situation information sharing resource network data are shown in <xref ref-type="fig" rid="fig-4">Fig. 4</xref> below.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Flow chart of security situation information sharing network</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_45615-fig-4.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="fig-4">Fig. 4</xref>, the thin two-way arrow represents information in network communication A, the bold arrow symbol represents information in network communication B, and the thin single dashed arrow symbol represents security situation information in network A. A thin single-slash arrow symbol indicates network B in the security situation information; a Double solid arrow symbol represents all network A information of the shared resource security situation, and A single solid arrow symbol represents all network B information of the shared resource security situation. Intermediate nodes multi-network data information sharing Shared resource distribution control module includes A and B network information control module, A and B network information classification control module, network A to network B situation and network B to network A situation change control module and sharing network A, network B information control module. As can be seen from <xref ref-type="fig" rid="fig-4">Fig. 4</xref>, different network communications can complete the transmission of internal Internet data according to their network design schemes, and fulfill the operational application requirements such as danger warning information and guidance and manipulation according to network communications. Intermediate node multi-network data information sharing. Sharing resource distribution control module After receiving the security situation information of different network communication, it uses the receiving, filtering, transformation, and sharing of data information to complete the security situation information network data sharing resource.</p>
</sec>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Information Sharing Network Data Tamper-Proof Method</title>
<p>RDTP protocol is chosen to avoid data tampering in the security situation information sharing network, effectively solve the shared resource data of the security situation information sharing resource network structure, and process the data transmission process in the method layer. In the security situation information sharing network operation and maintenance upgrade, node sleep quality production scheduling, and node re-liable information data to achieve information sharing. Through the RDTP protocol cycle time, the sleep quality production scheduling of nodes and their nodes can repeatedly run reliable information data to achieve information sharing. The upgraded network nodes can share kinetic energy, clock, and connectivity, and the network operation and maintenance upgrade can complete the network&#x2019;s reliable information sharing and data information sharing. When there is no information data that must be transmitted in the security situation information sharing network, the intermediate nodes of the security situation information sharing network turn to a sleep state, and the sleep state can reasonably reduce the basic metabolism of nodes. When the security situation information sharing network contains information that must be transmitted, the intermediate nodes of the Internet are awakened and work simultaneously. The sleep quality production scheduling optimization algorithm can detect the residual kinetic energy, connectivity, and regionality of Internet nodes. The production scheduling formula of node sleep quality is calculated as below:</p>
<p><disp-formula id="eqn-11"><label>(11)</label><mml:math id="mml-eqn-11" display="block"><mml:msub><mml:mi>q</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mfrac><mml:msub><mml:mi>B</mml:mi><mml:mrow><mml:mi>e</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>B</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mfrac><mml:mo>+</mml:mo><mml:mi>&#x03B2;</mml:mi><mml:mfrac><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mfrac><mml:mo>+</mml:mo><mml:mi>&#x03B3;</mml:mi><mml:mfrac><mml:msub><mml:mi>N</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>M</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mfrac></mml:math></disp-formula></p>
<p>In the formula, <italic>&#x03B1;</italic>, <italic>&#x03B2;</italic>, <italic>&#x03B3;</italic> all represent the weight calculation index of shared network node information data information, <italic>&#x03B1;</italic> &#x002B; <italic>&#x03B2;</italic> &#x002B; <italic>&#x03B3;</italic> &#x003D; 1; B<sub>ei</sub> and B<sub>i</sub> respectively indicate that the intermediate node i of the shared network wants the connectivity of the Internet node in the information transmission data stage, and its layout shares the connectivity behind the intermediate node i of the network; <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>ni</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> respectively represent the kinetic energy when the intermediate node i of the shared network does not transmit data and the average kinetic energy information of the adjacent nodes of the intermediate node i; N<sub>i</sub> and M<sub>i</sub> respectively represent the information transmission data frequency of the intermediate node i of the current periodic time-sharing network and the total information sharing frequency of reliable information data.</p>
<p>Sharing network node information promotes market competition. Sharing market competition and reliable transmission constitute the reliable information-sharing link of the sharing network node. The shared network node sets the push order of information data according to the priority of Security situation information data. Three kinds of information data push sequences constitute the competition of node information data push market; Node a in the shared network obtains node information and data information. Push the ownership of the secure channel of information transmission data generated by market competition, and then push the information to node B. Node B calculates the information sharing uses value of node a according to its residual momentum, and evaluates the Euclidean distance between Internet node A and the middle node of node B at the same time, to obtain the information data of node B. The formula of information sharing value is as follows:</p>
<p><disp-formula id="eqn-12"><label>(12)</label><mml:math id="mml-eqn-12" display="block"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>l</mml:mi><mml:mrow><mml:mi>A</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>l</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mi>R</mml:mi></mml:mfrac><mml:mo>+</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>B</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>B</mml:mi></mml:mrow></mml:msub></mml:mfrac></mml:math></disp-formula></p>
<p><inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:msub><mml:mrow><mml:mtext>l</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>B</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:msub><mml:mrow><mml:mtext>l</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>A</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> respectively represent the Euclidean distance from node A and node B to intermediate nodes in the shared network. R stands for residual kinetic energy; <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>B</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:msub><mml:mrow><mml:mtext>F</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>nB</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> respectively represent the kinetic energy of node B of the shared network before data transmission and the kinetic energy information of its neighboring nodes. When the security situation information sharing resource network data is tampered with, the reserved nodes of each node in the shared network are used to complete the transmission. The formula for selecting reserved nodes is as follows:</p>
<p><disp-formula id="eqn-13"><label>(13)</label><mml:math id="mml-eqn-13" display="block"><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>X</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>X</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>&#x2264;</mml:mo><mml:mi>k</mml:mi></mml:math></disp-formula></p>
<p>In the formula, <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>X</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> and <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>X</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> respectively represents the B coordinate of the master node sharing network information transmission data and the node participating in market competition, and k is the parameter, which represents the radius of the geographical location of the selected reserved node. The reserved nodes of shared network nodes are selected according to <xref ref-type="disp-formula" rid="eqn-12">formula (12)</xref>. When a node does not conform to <xref ref-type="disp-formula" rid="eqn-13">formula (13)</xref>, it will enter the sleep state aftermarket competition. Complete the RDTP protocol according to the preceding process to ensure the stability of data transmission on the shared resource network and prevent tampering with data on the shared resource network.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Experimental Analysis</title>
<p>To verify the effectiveness of the security situation information sharing resource network data tampering method designed in this paper and avoid the effectiveness of security situation information data tampering, two computer operating systems are selected as Windows 10 operating system. The CPU uses 4 cores, 2.4 GHz IN-TEL XEON E7440CPU, the storage capacity is 2 TB, the Internet Information Services (IIS) 5.0 cloud server is used, and the security situation information sharing network is set up according to the method in the paper. Among them, the basic parameters of simulation are shown in <xref ref-type="table" rid="table-1">Table 1</xref>.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Parameter setting</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Parameter</th>
<th>Value</th>
<th>Parameter</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td><italic>&#x03B1;</italic></td>
<td>0.8</td>
<td><italic>&#x03B2;</italic></td>
<td>2.309</td>
</tr>
<tr>
<td><italic>&#x03B3;</italic></td>
<td>1.3</td>
<td>k</td>
<td>0.6</td>
</tr>
<tr>
<td>B<sub>ei</sub></td>
<td>3</td>
<td>B<sub>i</sub></td>
<td>4</td>
</tr>
<tr>
<td>N<sub>i</sub></td>
<td>200 times</td>
<td>M<sub>i</sub></td>
<td>300 times</td>
</tr>
<tr>
<td>R</td>
<td>2J</td>
<td></td>
<td></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Under the above basic parameters, the Matlab simulation service platform is selected, and the text method and its simulation experiment are written using the Java language program. The method in this paper is compared with the reference [<xref ref-type="bibr" rid="ref-18">18</xref>] and reference [<xref ref-type="bibr" rid="ref-19">19</xref>]. Among them, reference [<xref ref-type="bibr" rid="ref-18">18</xref>] built a multi-service platform to identify the Internet based on the situation awareness system software and key sensors and analyzes part of it according to the actual situation. Contradictory situations, complete the cognition of security situations. Reference [<xref ref-type="bibr" rid="ref-19">19</xref>] adopted digital Earth and visual simulation dual-service platform architecture to develop global and local high-precision situation displays of the system and complete real-time interactive solutions for security situations. To ensure the stability of the experiment, the basic parameters of the experimental hardware configuration are unified. Based on the simulation service platform, the network attack tampered with the security situation information sharing resource network data 1000 times, and the method in this paper was statistically analyzed for the security situation information sharing resource network data. By comparing the results of references [<xref ref-type="bibr" rid="ref-18">18</xref>] and [<xref ref-type="bibr" rid="ref-19">19</xref>], the tamper-proof individual behavior test results are shown in <xref ref-type="table" rid="table-2">Table 2</xref>.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Results of tampering detection by different methods (times)</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Number of attempts to tamper</th>
<th>Method in this paper</th>
<th>Literature methods</th>
<th>Literature methods</th>
</tr>
</thead>
<tbody>
<tr>
<td>100</td>
<td>100</td>
<td>98</td>
<td>97</td>
</tr>
<tr>
<td>200</td>
<td>199</td>
<td>196</td>
<td>195</td>
</tr>
<tr>
<td>300</td>
<td>298</td>
<td>295</td>
<td>293</td>
</tr>
<tr>
<td>400</td>
<td>398</td>
<td>393</td>
<td>391</td>
</tr>
<tr>
<td>500</td>
<td>497</td>
<td>492</td>
<td>489</td>
</tr>
<tr>
<td>600</td>
<td>596</td>
<td>591</td>
<td>586</td>
</tr>
<tr>
<td>700</td>
<td>696</td>
<td>690</td>
<td>685</td>
</tr>
<tr>
<td>800</td>
<td>796</td>
<td>788</td>
<td>783</td>
</tr>
<tr>
<td>900</td>
<td>895</td>
<td>886</td>
<td>881</td>
</tr>
<tr>
<td>1000</td>
<td>995</td>
<td>984</td>
<td>979</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>According to the test results in <xref ref-type="table" rid="table-2">Table 2</xref>, when the frequency of network attacks attempting to tamper with the network data of security situation information sharing resources is 1000, the accuracy rate of tampering individual detections by using the method in the paper is 99.5%, and the method and reference [<xref ref-type="bibr" rid="ref-19">19</xref>] of reference [<xref ref-type="bibr" rid="ref-18">18</xref>] are selected. The accuracy of this method is only 98.4% and 97.9%. The test results show that the proposed method can effectively detect individual tampering behavior in network attacks in security situation information sharing networks [<xref ref-type="bibr" rid="ref-20">20</xref>]. Network attacks attempted to tamper with the network data of security situation information sharing resources 1000 times were statistically analyzed. The results of the three methods [<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-19">19</xref>] in the paper and references to prevent tampering are shown in <xref ref-type="table" rid="table-3">Table 3</xref>. As can be seen in <xref ref-type="table" rid="table-3">Table 3</xref>, the tamper-proof security factor of security situation information sharing resource network data using the method in this paper is significantly higher than the other two methods, indicating that the text selected by the method in this paper can better ensure the security factor of security situation information sharing resource network data [<xref ref-type="bibr" rid="ref-21">21</xref>]. Compared with the other two methods, the total number of tampered data information using this method in this paper is at least the least. When the total number of tampering attempts by network attacks is 1000 times, the total number of tampered data information is only 5 times, indicating that the selection of this method can reasonably avoid security situation information [<xref ref-type="bibr" rid="ref-22">22</xref>]. Network data of shared resources is tampered with.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Tamper-proof results of different methods (times)</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead valign="top">
<tr>
<th rowspan="2">Number of attempts to tamper</th>
<th colspan="2" align="center">Method in this paper</th>
<th colspan="2" align="center">Method in this paper</th>
<th colspan="2" align="center">Method in this paper</th>
</tr>
<tr>
<th>Tamper proofing success times</th>
<th>Failure to prevent tampering</th>
<th>Tamper proofing success times</th>
<th>Failure to prevent tampering</th>
<th>Tamper proofing success times</th>
<th>Failure to prevent tampering</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td>100</td>
<td>100</td>
<td>0</td>
<td>98</td>
<td>2</td>
<td>97</td>
<td>3</td>
</tr>
<tr>
<td>200</td>
<td>199</td>
<td>1</td>
<td>196</td>
<td>4</td>
<td>195</td>
<td>5</td>
</tr>
<tr>
<td>300</td>
<td>298</td>
<td>2</td>
<td>295</td>
<td>5</td>
<td>293</td>
<td>7</td>
</tr>
<tr>
<td>400</td>
<td>398</td>
<td>2</td>
<td>393</td>
<td>7</td>
<td>391</td>
<td>9</td>
</tr>
<tr>
<td>500</td>
<td>497</td>
<td>3</td>
<td>492</td>
<td>8</td>
<td>489</td>
<td>11</td>
</tr>
<tr>
<td>600</td>
<td>596</td>
<td>4</td>
<td>591</td>
<td>9</td>
<td>586</td>
<td>14</td>
</tr>
<tr>
<td>700</td>
<td>696</td>
<td>4</td>
<td>690</td>
<td>10</td>
<td>685</td>
<td>15</td>
</tr>
<tr>
<td>800</td>
<td>796</td>
<td>4</td>
<td>788</td>
<td>12</td>
<td>783</td>
<td>17</td>
</tr>
<tr>
<td>900</td>
<td>895</td>
<td>5</td>
<td>886</td>
<td>14</td>
<td>881</td>
<td>19</td>
</tr>
<tr>
<td>1000</td>
<td>995</td>
<td>5</td>
<td>984</td>
<td>16</td>
<td>979</td>
<td>21</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The method in this paper is used to prevent the security situation of information-sharing resource network data from being tampered with. When network attacks attempt to enhance and tamper with the network data of security situation information sharing resources, the promotion of network attacks and individual tampering behaviors can be reasonably avoided. The tamper-proof success rate is higher than 99%, and the tamper-proof pass rate is significantly higher than that of interaction mode H1 and cognitive ability mode [<xref ref-type="bibr" rid="ref-23">23</xref>]. When network attacks attempt to delete and tamper with the network data of security situation information sharing resources, the success rate of anti-deletion and tamper is higher than 99.0%, which is significantly higher than the interaction mode and cognitive ability mode, and the ability to prevent the deletion and tamper of authentication methods in text [<xref ref-type="bibr" rid="ref-24">24</xref>].</p>
<p>When the network attack attempts to tamper the security situation information sharing resource network data out of order, the success rate of anti-replacement tampering is more than 99%, which is significantly higher than the interaction mode and cognitive ability mode, as well as the ability to prevent the authentication method in the text from tampering out of order. Based on the above test results, it can be seen that the method in this paper is used to prevent the security situation of information-sharing resource network data from being tampered with. When a network attack attempts to upgrade, delete, and replace the security situation information sharing resource network data, it can be reasonably discouraged and reasonably proved. The method in this paper is tamper-proof. The statistical analysis selects the long-duration tamper-proof time of the method in different security situations information sharing resource network data and compares the method in reference [<xref ref-type="bibr" rid="ref-2">2</xref>] with that in reference [<xref ref-type="bibr" rid="ref-3">3</xref>]. The comparison results are shown in <xref ref-type="table" rid="table-4">Table 4</xref>. According to the test results in <xref ref-type="table" rid="table-4">Table 4</xref>, the method selected in this paper can not only effectively check and avoid network attacks and tampering with individual behaviors, but also has high processing power and speed [<xref ref-type="bibr" rid="ref-25">25</xref>]. For different scales of security situations information-sharing resource network data, can avoid network at-tacks and tampering faster, and the authentication mode has a higher tamper-proof processing speed. The methods in the text are selected to prevent tampering with the security situation information sharing resource network data and network resource occupancy status at the same time, and the methods in the text are compared with the interactive and cognitive methods [<xref ref-type="bibr" rid="ref-26">26</xref>]. The comparison results are shown in <xref ref-type="table" rid="table-5">Table 5</xref>.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Tamper-proof time of different methods</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead valign="top">
<tr>
<th>Data size/KB</th>
<th>Method of this paper</th>
<th>Literature methods</th>
<th>Literature methods</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td>10</td>
<td>24</td>
<td>116</td>
<td>106</td>
</tr>
<tr>
<td>20</td>
<td>25</td>
<td>126</td>
<td>104</td>
</tr>
<tr>
<td>30</td>
<td>32</td>
<td>133</td>
<td>109</td>
</tr>
<tr>
<td>40</td>
<td>36</td>
<td>143</td>
<td>107</td>
</tr>
<tr>
<td>50</td>
<td>37</td>
<td>127</td>
<td>109</td>
</tr>
<tr>
<td>60</td>
<td>42</td>
<td>136</td>
<td>117</td>
</tr>
<tr>
<td>70</td>
<td>39</td>
<td>135</td>
<td>118</td>
</tr>
<tr>
<td>80</td>
<td>40</td>
<td>129</td>
<td>129</td>
</tr>
<tr>
<td>90</td>
<td>38</td>
<td>130</td>
<td>135</td>
</tr>
<tr>
<td>100</td>
<td>49</td>
<td>136</td>
<td>140</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Resource occupancy</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead valign="top">
<tr>
<th rowspan="2">Data size/KB</th>
<th colspan="2" align="center">Method of this paper</th>
<th colspan="2" align="center">Literature methods</th>
<th colspan="2" align="center">Literature methods</th>
</tr>
<tr>
<th>CPU occupancy rate/%</th>
<th>Memory using/MB</th>
<th>CPU occupancy rate/%</th>
<th>Memory using/MB</th>
<th>CPU occupancy rate/%</th>
<th>Memory using/MB</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td>20</td>
<td>3.26</td>
<td>153</td>
<td>5.27</td>
<td>186</td>
<td>5.87</td>
<td>180</td>
</tr>
<tr>
<td>40</td>
<td>3.52</td>
<td>159</td>
<td>5.39</td>
<td>190</td>
<td>5.95</td>
<td>182</td>
</tr>
<tr>
<td>60</td>
<td>3.83</td>
<td>163</td>
<td>5.57</td>
<td>192</td>
<td>6.00</td>
<td>184</td>
</tr>
<tr>
<td>80</td>
<td>3.94</td>
<td>165</td>
<td>5.69</td>
<td>193</td>
<td>6.06</td>
<td>185</td>
</tr>
<tr>
<td>100</td>
<td>4.15</td>
<td>167</td>
<td>5.82</td>
<td>194</td>
<td>6.09</td>
<td>187</td>
</tr>
<tr>
<td>120</td>
<td>4.26</td>
<td>169</td>
<td>5.93</td>
<td>195</td>
<td>6.14</td>
<td>190</td>
</tr>
<tr>
<td>140</td>
<td>4.37</td>
<td>170</td>
<td>6.06</td>
<td>196</td>
<td>6.29</td>
<td>193</td>
</tr>
<tr>
<td>160</td>
<td>4.43</td>
<td>172</td>
<td>6.12</td>
<td>202</td>
<td>6.39</td>
<td>195</td>
</tr>
<tr>
<td>180</td>
<td>4.59</td>
<td>174</td>
<td>6.22</td>
<td>204</td>
<td>6.44</td>
<td>199</td>
</tr>
<tr>
<td>200</td>
<td>4.65</td>
<td>176</td>
<td>6.36</td>
<td>206</td>
<td>6.59</td>
<td>204</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>According to the test results in <xref ref-type="table" rid="table-5">Table 5</xref>, it can be seen that the method in this paper is used to prevent the security situation of information-sharing resource network data from being tampered with. The CPU market share and the state of the running memory application at different information levels are both important. Because the two methods are selected, the CPU usage is only 4.64% and the memory usage is only 175 MB when the text information size is 200 KB. The excellent network resource occupancy again proves the tamper-proof property of the proposed method.</p>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusions</title>
<p>At present, although collaborative data can suppress most risks, security situation information sharing and network resource data security factors are more important to suppress security risks. The security situation information sharing network adopts the centralized working mode, which is easy to complete and practical. Security situation information sharing resource network data selection RDTP reasonably avoids network attack tampering, and has the advantages of strong adaptability. According to multiple simulations, this method is applied to security situation information sharing networks, which can effectively prevent network attacks from tampering with security situation information sharing resource network data, and effectively improve the security factor of air traffic control security situation information sharing resource network data.</p>
</sec>
</body>
<back>
<ack><p>I would like to thank my research partner professor Ruchun Jia for his strong support for my project. Thanks to his guidance and help, I was able to finish all my work. I would also like to thank the research team for their cooperation and help in collecting data for my research project.</p>
</ack>
<sec><title>Funding Statement</title>
<p>This work was supported by National Natural Science Foundation of China (U2133208, U20A20161).</p>
</sec>
<sec><title>Author Contributions</title>
<p>The authors confirm contribution to the paper as follows: study conception and design: Xiaoyan Zhu, Ruchun Jia; data collection: Tingrui Zhang; analysis and interpretation of results: Tingrui Zhang, Ruchun Jia; draft manuscript preparation: Song Yao, Xiaoyan Zhu. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability"><title>Availability of Data and Materials</title>
<p>Due to the nature of this research, participants of this study did not agree for their data to be shared publicly, so supporting data is not available.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Zhou</surname></string-name></person-group>, &#x201C;<article-title>Research on computer network information security in the era of big data&#x2014;Comment on network security situational awareness: Extraction, understanding and prediction</article-title>,&#x201D; <source>J. Saf. Environ.</source>, vol. <volume>21</volume>, no. <issue>3</issue>, pp. <fpage>1338</fpage>, <year>2021</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Research on the development of rural computer network information technology under the background of big data</article-title>,&#x201D; <source>China Rice</source>, vol. <volume>27</volume>, no. <issue>6</issue>, pp. <fpage>149</fpage>, <year>2021</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Wu</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Gao</surname></string-name></person-group>, &#x201C;<article-title>Data forwarding scheme for delay tolerant networks based on distributed trust management</article-title>,&#x201D; <source>Comput. Appl. Softw.</source>, vol. <volume>38</volume>, no. <issue>1</issue>, pp. <fpage>116</fpage>&#x2013;<lpage>120</lpage>, <year>2021</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Guo</surname></string-name></person-group>, &#x201C;<article-title>Research on abnormal data detection in long-distance multi-channel optical fiber communication network</article-title>,&#x201D; <source>Laser J.</source>, vol. <volume>42</volume>, no. <issue>9</issue>, pp. <fpage>98</fpage>&#x2013;<lpage>103</lpage>, <year>2021</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Zhao</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Fang</surname></string-name></person-group>, &#x201C;<article-title>Design of intelligent detection system for complex network intrusion data based on big data</article-title>,&#x201D; <source>Autom. Technol. Appl.</source>, vol. <volume>40</volume>, no. <issue>11</issue>, pp. <fpage>164</fpage>&#x2013;<lpage>167</lpage>, <year>2021</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Tian</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Deng</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Xu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, and <string-name><given-names>X.</given-names> <surname>Zhao</surname></string-name></person-group>, &#x201C;<article-title>Modeling and numerical analysis on communication delay boundary for CACC string stability</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>7</volume>, pp. <fpage>168870</fpage>&#x2013;<lpage>168884</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2019.2954978</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Ramezanpour</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Jagannath</surname></string-name></person-group>, &#x201C;<article-title>Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN</article-title>,&#x201D; <source>Comput. Netw.</source>, vol. <volume>217</volume>, pp. <fpage>109358</fpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1016/j.comnet.2022.109358</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W. R.</given-names> <surname>Simpson</surname></string-name> and <string-name><given-names>K. E.</given-names> <surname>Foltz</surname></string-name></person-group>, &#x201C;<article-title>Resolving network defense conflicts with zero trust architectures and other end-to-end paradigms</article-title>,&#x201D; <source>Int. J. Netw. Secur. Appl.</source>, vol. <volume>13</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>20</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Deshpande</surname></string-name></person-group>, &#x201C;<article-title>Analyzing the deployment of zero trust network architecture in enterprise networks</article-title>,&#x201D; <source>GIS-Zeitschrift f&#x00FC; Geoinformatik</source>, vol. <volume>8</volume>, no. <issue>5</issue>, pp. <fpage>1587</fpage>&#x2013;<lpage>1594</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Greenwood</surname></string-name></person-group>, &#x201C;<article-title>Applying the principles of zero trust architecture to protect sensitive and critical data</article-title>,&#x201D; <source>Netw. Secur.</source>, vol. <volume>2021</volume>, no. <issue>6</issue>, pp. <fpage>7</fpage>&#x2013;<lpage>9</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1016/S1353-4858(21)00063-5</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Wu</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Jiang</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Pan</surname></string-name>, and <string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>An SDN network access control method based on zero trust</article-title>,&#x201D; <source>Inform. Netw. Secur.</source>, vol. <volume>20</volume>, no. <issue>8</issue>, pp. <fpage>37</fpage>&#x2013;<lpage>46</lpage>, <year>2020</year> <comment>(In Chinese)</comment>. doi: <pub-id pub-id-type="doi">10.3969/j.issn.1671-1122.2020.08.005</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Zhou</surname></string-name></person-group>, &#x201C;<article-title>Anti tampering method of privacy data in ship sharing network</article-title>,&#x201D; <source>Ship Sci. Technol.</source>, vol. <volume>42</volume>, no. <issue>8</issue>, pp. <fpage>121</fpage>&#x2013;<lpage>123</lpage>, <year>2020</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Wang</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Huang</surname></string-name></person-group>, &#x201C;<article-title>Design of automatic monitoring system for data access security of cloud computing storage in mobile network center</article-title>,&#x201D; <source>Autom. Instrum.</source>, no. <issue>2</issue>, pp. <fpage>73</fpage>&#x2013;<lpage>76</lpage>, <year>2020</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Wang</surname></string-name>, and <string-name><given-names>A.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Tamper proof simulation of link network sensitive data under flood attack</article-title>,&#x201D; <source>Comput. Simul.</source>, vol. <volume>36</volume>, no. <issue>10</issue>, pp. <fpage>285</fpage>&#x2013;<lpage>288</lpage>, <year>2019</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Wu</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Min</surname></string-name></person-group>, &#x201C;<article-title>Distributed network information false data accurate identification simulation</article-title>,&#x201D; <source>Comput. Simul.</source>, vol. <volume>36</volume>, no. <issue>4</issue>, pp. <fpage>269</fpage>&#x2013;<lpage>272</lpage>, <year>2019</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Zou</surname></string-name></person-group>, &#x201C;<article-title>Design of adaptive encryption system for privacy information of big data network users</article-title>,&#x201D; <source>Autom. Instrum.</source>, no. <issue>5</issue>, pp. <fpage>28</fpage>&#x2013;<lpage>31</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Xin</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Fang</surname></string-name>, and <string-name><given-names>H.</given-names> <surname>Luo</surname></string-name></person-group>, &#x201C;<article-title>Optimization of data retransmission algorithm in information center network</article-title>,&#x201D; <source>Comput. Appl.</source>, vol. <volume>39</volume>, no. <issue>3</issue>, pp. <fpage>829</fpage>&#x2013;<lpage>833</lpage>, <year>2019</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>U.</given-names> <surname>Roth</surname></string-name></person-group>, &#x201C;<article-title>Proof of file access in a private P2P network using blockchain</article-title>,&#x201D; <source>Comput. Sci.</source>, vol. <volume>16</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Jing</surname></string-name>, and <string-name><given-names>J.</given-names> <surname>Yan</surname></string-name></person-group>, &#x201C;<article-title>Intermittent connection wireless network data forwarding mechanism to protect against defamation attacks</article-title>,&#x201D; <source>J. Shanghai Jiaotong Univ.</source>, vol. <volume>52</volume>, no. <issue>7</issue>, pp. <fpage>808</fpage>&#x2013;<lpage>815</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>Simulation of optimization and elimination of redundant information in network data transmission</article-title>,&#x201D; <source>Comput. Simul.</source>, vol. <volume>35</volume>, no. <issue>1</issue>, pp. <fpage>370</fpage>&#x2013;<lpage>373</lpage>, <year>2018</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Zhu</surname></string-name></person-group>, &#x201C;<article-title>Mobile terminal network data information security detection simulation</article-title>,&#x201D; <source>Comput. Simul.</source>, vol. <volume>35</volume>, no. <issue>5</issue>, pp. <fpage>418</fpage>&#x2013;<lpage>421</lpage>, <year>2018</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Zheng</surname></string-name></person-group>, &#x201C;<article-title>Simulation research on communication transmission interference information identification in big data network</article-title>,&#x201D; <source>Comput. Simul.</source>, vol. <volume>35</volume>, no. <issue>4</issue>, pp. <fpage>422</fpage>&#x2013;<lpage>426</lpage>, <year>2018</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Q.</given-names> <surname>Lai</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Zeng</surname></string-name></person-group>, &#x201C;<article-title>Network data anomaly information flow transmission security detection simulation</article-title>,&#x201D; <source>Comput. Simul.</source>, vol. <volume>35</volume>, no. <issue>3</issue>, pp. <fpage>293</fpage>&#x2013;<lpage>296</lpage>, <year>2018</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>Design and research of network information security and web data mining system</article-title>,&#x201D; <source>Electron. Des. Eng.</source>, vol. <volume>26</volume>, no. <issue>12</issue>, pp. <fpage>83</fpage>&#x2013;<lpage>87</lpage>, <year>2018</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>Research on anti leakage technology of sensitive data in ship wireless mobile communication network under cloud computing</article-title>,&#x201D; <source>Ship Sci. Technol.</source>, vol. <volume>40</volume>, no. <issue>4</issue>, pp. <fpage>121</fpage>&#x2013;<lpage>123</lpage>, <year>2018</year> <comment>(In Chinese)</comment>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Fang</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Yi</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Pang</surname></string-name>, and <string-name><given-names>V. S.</given-names> <surname>Sheng</surname></string-name></person-group>, &#x201C;<article-title>Study of cross-domain person re-identification based on DCGAN</article-title>,&#x201D; <source>Multimed. Tools Appl.</source>, vol. <volume>81</volume>, no. <issue>25</issue>, pp. <fpage>36551</fpage>&#x2013;<lpage>36565</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1007/s11042-022-13526-3</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>