Data-Driven Zero Trust Key Algorithm

In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging technologies such as big data, cloud computing, and artificial intelligence. Data-driven (DD) security has emerged as a new network security technol...

Full description

Saved in:
Bibliographic Details
Published inWireless communications and mobile computing Vol. 2022; no. 1
Main Authors Liu, Zhiwei, Li, Xiaoyu, Mu, Dejun
Format Journal Article
LanguageEnglish
Published Oxford Hindawi 2022
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1530-8669
1530-8677
1530-8677
DOI10.1155/2022/8659428

Cover

Abstract In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging technologies such as big data, cloud computing, and artificial intelligence. Data-driven (DD) security has emerged as a new network security technology development direction. The key technologies for DD network security are discussed in depth in this paper. A data security protection system is designed from the perspective of ZT, based on advanced security concepts and technologies developed by ZT, as well as a foreign data security governance framework. The number of alarms generated per hour is counted, removal rules are defined, and real-time rule matching is performed to eliminate false alarms based on different combinations of attributes. By analyzing the security data generation rules and internal relations, a security aggregation method can reduce redundant data and improve alarm quality.
AbstractList In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging technologies such as big data, cloud computing, and artificial intelligence. Data-driven (DD) security has emerged as a new network security technology development direction. The key technologies for DD network security are discussed in depth in this paper. A data security protection system is designed from the perspective of ZT, based on advanced security concepts and technologies developed by ZT, as well as a foreign data security governance framework. The number of alarms generated per hour is counted, removal rules are defined, and real-time rule matching is performed to eliminate false alarms based on different combinations of attributes. By analyzing the security data generation rules and internal relations, a security aggregation method can reduce redundant data and improve alarm quality.
Author Liu, Zhiwei
Li, Xiaoyu
Mu, Dejun
Author_xml – sequence: 1
  givenname: Zhiwei
  orcidid: 0000-0002-1206-9553
  surname: Liu
  fullname: Liu, Zhiwei
  organization: Network Security College of Northwestern Polytechnical UniversityXi’anShaanxi 710072China
– sequence: 2
  givenname: Xiaoyu
  surname: Li
  fullname: Li, Xiaoyu
  organization: Network Security College of Northwestern Polytechnical UniversityXi’anShaanxi 710072China
– sequence: 3
  givenname: Dejun
  orcidid: 0000-0002-6091-7967
  surname: Mu
  fullname: Mu, Dejun
  organization: Network Security College of Northwestern Polytechnical UniversityXi’anShaanxi 710072China
BookMark eNqFjz1PwzAQhi1UJNrCxg-IBBuE2k58dsaq5UtUYikLi-XYDk2VJsFOWuXfkyoVI0x3w_O-d88EjcqqtAhdE_xACGMziimdCWBJTMUZGhMW4VAA56PfHZILNPF-izGOMCVjdLtUjQqXLt_bMvi0rgrWrvVN8Ga7YF58VS5vNrtLdJ6pwtur05yij6fH9eIlXL0_vy7mq1DTJG5CEKkw1DAGKWSpTbWiyhKhsUkzZQFYhhmPE2366xoTbHQiYiM4RH2QEx5NUTj0tmWtuoMqClm7fKdcJwmWR0V5VJQnxZ6_GfjaVd-t9Y3cVq0r-xclhRggAkpZT90PlHaV985m_5XeDfgmL4065H_TP_HeamQ
Cites_doi 10.1016/s1353-4858(21)00063-5
10.1016/s1353-4858(21)00019-2
ContentType Journal Article
Copyright Copyright © 2022 Zhiwei Liu et al.
Copyright © 2022 Zhiwei Liu et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: Copyright © 2022 Zhiwei Liu et al.
– notice: Copyright © 2022 Zhiwei Liu et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
7XB
8FD
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
ADTOC
UNPAY
DOI 10.1155/2022/8659428
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ProQuest Central (purchase pre-March 2016)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database

CrossRef
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 3
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1530-8677
Editor Ning, Xin
Editor_xml – sequence: 1
  givenname: Xin
  surname: Ning
  fullname: Ning, Xin
ExternalDocumentID 10.1155/2022/8659428
10_1155_2022_8659428
GrantInformation_xml – fundername: Shaanxi Provincial Key R&D Program
  grantid: 2021ZDLGY05-01
– fundername: Shenzhen Fundamental Research Program
  grantid: 20210317191843003
GroupedDBID .3N
.DC
.GA
05W
0R~
123
1L6
24P
3SF
3WU
4.4
4ZD
50Y
50Z
52M
52O
52T
52U
52W
66C
6OB
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAFWJ
AAJEY
AAONW
ABIJN
ABPVW
ACCMX
ACGFO
ADBBV
ADIZJ
AENEX
AFBPY
AFKRA
AIAGR
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARAPS
ASPBG
ATUGU
AVWKF
AZBYB
AZQEC
AZVAB
BAFTC
BCNDV
BENPR
BGLVJ
BHBCM
BNHUX
BROTX
BRXPI
CCPQU
CS3
D-E
D-F
DPXWK
DR2
DU5
DWQXO
EBS
F00
F01
F04
F21
G-S
G.N
GNP
GNUQQ
GODZA
H.T
H.X
H13
HCIFZ
HZ~
ITG
ITH
IX1
JPC
K7-
KQQ
LAW
LITHE
LP6
LP7
MK4
MY~
N04
N05
NF~
O9-
OIG
OK1
P2P
P2X
P4D
PHGZT
PIMPY
Q.N
QB0
QRW
R.K
RHU
RHW
RHX
RX1
RYL
SUPJJ
UB1
W8V
W99
WBKPD
XPP
XV2
~IA
~WT
.Y3
31~
5VS
AAEVG
AAMMB
AANHP
AAYXX
AAZKR
ACBWZ
ACRPL
ACXQS
ACYXJ
ADNMO
AEFGJ
AEIMD
AEUCX
AFZJQ
AGQPQ
AGXDD
AIDQK
AIDYY
AZFZN
BDRZF
BFHJK
CITATION
EJD
FEDTE
HF~
HVGLF
LH4
LW6
PHGZM
PQGLB
PUEGO
ROL
WYUIH
7SC
7SP
7XB
8FD
8FE
8FG
ABUWG
JQ2
L7M
L~C
L~D
M0N
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
Q9U
ADTOC
UNPAY
ID FETCH-LOGICAL-c294t-68b8d2d556b6fbebca2ae18c0dbfae665f05749cd000c010dc984d87638b87173
IEDL.DBID UNPAY
ISSN 1530-8669
1530-8677
IngestDate Wed Oct 01 16:45:19 EDT 2025
Fri Jul 25 09:28:46 EDT 2025
Wed Oct 01 05:27:05 EDT 2025
Wed Apr 16 06:26:45 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c294t-68b8d2d556b6fbebca2ae18c0dbfae665f05749cd000c010dc984d87638b87173
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1206-9553
0000-0002-6091-7967
OpenAccessLink https://proxy.k.utb.cz/login?url=https://downloads.hindawi.com/journals/wcmc/2022/8659428.pdf
PQID 2646636225
PQPubID 2034344
ParticipantIDs unpaywall_primary_10_1155_2022_8659428
proquest_journals_2646636225
crossref_primary_10_1155_2022_8659428
hindawi_primary_10_1155_2022_8659428
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-00-00
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – year: 2022
  text: 2022-00-00
PublicationDecade 2020
PublicationPlace Oxford
PublicationPlace_xml – name: Oxford
PublicationTitle Wireless communications and mobile computing
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References Jiao D. (e_1_2_9_14_2) 2018; 44
Zuo Y. (e_1_2_9_20_2) 2018; 11
Zhao Q. (e_1_2_9_12_2) 2020; 49
Zhong X. (e_1_2_9_21_2) 2019; 3
Qiu J. (e_1_2_9_17_2) 2021; 9
Shu Y. (e_1_2_9_19_2) 2021; 17
Li H. (e_1_2_9_10_2) 2021; 19
Xia S. (e_1_2_9_15_2) 2021; 1
Zhao Y. (e_1_2_9_5_2) 2021; 1
Tian Y. (e_1_2_9_13_2) 2020; 5
Wang S. (e_1_2_9_1_2) 2021; 7
Wang J. (e_1_2_9_18_2) 2020; 5
e_1_2_9_23_2
e_1_2_9_22_2
Bogner E. (e_1_2_9_24_2) 2019; 50
Sun R. (e_1_2_9_3_2) 2020; 36
Hu W. (e_1_2_9_4_2) 2019; 24
Guo Z. (e_1_2_9_6_2) 2020; 39
Cai R. (e_1_2_9_8_2) 2019; 9
Lu B. (e_1_2_9_9_2) 2020; 4
Zhong X. (e_1_2_9_25_2) 2019; 3
Hu Y. (e_1_2_9_11_2) 2020; 22
Zuo Y. (e_1_2_9_2_2) 2019; 11
Zuo Y. (e_1_2_9_7_2) 2020; 3
Zeng H. (e_1_2_9_16_2) 2020; 7
References_xml – volume: 9
  year: 2021
  ident: e_1_2_9_17_2
  article-title: Research on university network security protection based on zero trust SDP
  publication-title: Electronic Technology and Software Engineering
– volume: 36
  year: 2020
  ident: e_1_2_9_3_2
  article-title: Zero-trust network construction based on multi-factor authentication
  publication-title: Journal of Bei Jing Institute of Technology
– volume: 1
  year: 2021
  ident: e_1_2_9_15_2
  article-title: The new trend of zero-trust security network security system construction
  publication-title: Data
– volume: 11
  year: 2018
  ident: e_1_2_9_20_2
  article-title: Zero-trust architecture: a new paradigm for network security
  publication-title: Financial Electronics
– volume: 19
  year: 2021
  ident: e_1_2_9_10_2
  article-title: Research on the architecture and application of network security model based on zero trust
  publication-title: Science & Technology Information
– ident: e_1_2_9_23_2
  doi: 10.1016/s1353-4858(21)00063-5
– volume: 49
  year: 2020
  ident: e_1_2_9_12_2
  article-title: Research on the application of zero trust architecture in unit government network security protection
  publication-title: Gansu Science and Technology
– volume: 3
  year: 2020
  ident: e_1_2_9_7_2
  article-title: Research on the security system and application of remote mobile office based on zero trust architecture
  publication-title: Confidential Science and Technology
– ident: e_1_2_9_22_2
  doi: 10.1016/s1353-4858(21)00019-2
– volume: 7
  year: 2021
  ident: e_1_2_9_1_2
  article-title: Research on internet of things terminal access security based on zero trust architecture
  publication-title: Post and Telecommunications Design Technology
– volume: 4
  year: 2020
  ident: e_1_2_9_9_2
  article-title: Research on data security system guided by zero trust technology
  publication-title: Modern Information Technology
– volume: 5
  year: 2020
  ident: e_1_2_9_18_2
  article-title: Zero-trust architecture to build a secure network environment
  publication-title: Network Security and Information Technology
– volume: 1
  start-page: 23
  year: 2021
  ident: e_1_2_9_5_2
  article-title: Arctic sea ice detection based on microwave radiometer in 89GHz channels
  publication-title: ASP Transactions on Internet of Things
– volume: 11
  year: 2019
  ident: e_1_2_9_2_2
  article-title: Research on the application of zero trust architecture in the security protection of critical information infrastructure
  publication-title: Confidential Science and Technology
– volume: 3
  start-page: 114
  year: 2019
  ident: e_1_2_9_25_2
  article-title: Airport network security protection scheme based on zero-trust security architecture
  publication-title: Journal of Civil Aviation
– volume: 44
  year: 2018
  ident: e_1_2_9_14_2
  article-title: Why “Zero Trust” will become one of the popular frameworks of network security
  publication-title: Computer Networks
– volume: 24
  year: 2019
  ident: e_1_2_9_4_2
  article-title: Application and practice of zero-trust security architecture in hospitals
  publication-title: Modern Economic Information
– volume: 22
  year: 2020
  ident: e_1_2_9_11_2
  article-title: Zero-trust technology and its application in information network security
  publication-title: China New Telecommunications
– volume: 7
  year: 2020
  ident: e_1_2_9_16_2
  article-title: Discussion on network security model and zero trust practice
  publication-title: Computer Products and Circulation
– volume: 3
  year: 2019
  ident: e_1_2_9_21_2
  article-title: Airport network security protection scheme based on zero-trust security architecture
  publication-title: Journal of Civil Aviation
– volume: 50
  start-page: 9
  year: 2019
  ident: e_1_2_9_24_2
  article-title: The zero-trust mandate: never trust, continually verify
  publication-title: Software World
– volume: 17
  year: 2021
  ident: e_1_2_9_19_2
  article-title: Enterprise security architecture based on zero trust
  publication-title: Electronic Technology and Software Engineering
– volume: 9
  year: 2019
  ident: e_1_2_9_8_2
  article-title: Zero trust identity security solution
  publication-title: Information Technology and Standardization
– volume: 39
  year: 2020
  ident: e_1_2_9_6_2
  article-title: Research on identity authentication mechanism of IoT devices based on zero trust architecture
  publication-title: Information Technology and Network Security
– volume: 5
  year: 2020
  ident: e_1_2_9_13_2
  article-title: Network security protection ideas based on zero trust architecture
  publication-title: Information Technology and Information Technology
SSID ssj0003021
Score 2.3035312
Snippet In today’s information society, network security is a crucial issue. Network security technology is changing as a result of the development of emerging...
SourceID unpaywall
proquest
crossref
hindawi
SourceType Open Access Repository
Aggregation Database
Index Database
Publisher
SubjectTerms Access control
Alarms
Algorithms
Artificial intelligence
Big Data
Cloud computing
Correlation analysis
Cybersecurity
False alarms
Fuzzy logic
Internet
Mathematical models
Neural networks
New technology
Process controls
Security management
Security systems
Trust
SummonAdditionalLinks – databaseName: Hindawi Publishing Open Access
  dbid: RHX
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFL24gagP4idOp_Rh-hbs2ubrcThlKPogGwxfSpImTpjd2DrG_r3Jlo1NQX0sJA09Te49J7k9BajRMBHK0Bg5j0lkVyJFXFGNjBGRZcChwvP9jucX0uokj13c9SZJ459H-DbbOXke3TKCuWXKJSgx4iq3XlvdVcCNw8jbooaIEcKX9e3f-m5knu2ek7zTjw1iuTPJh2I2Ff3-Wo55OIB9Tw6DxuJtHsKWzo9gb80y8BhqTVEI1By5IBW86dEgaLuvJoInPQsa_feB1fq9zxPoPNy371rI_-kAqYgnBSJMsizKMCaSGOnqkyKh60yFmTRCE4KNpVUJV5l9WmUVVKY4SzJnJmc7unP0Uyjng1yfQWBEXdQJxtI2TyjFklOhYif0iOYxlxW4XqKQDheGFulcCGCcOrRSj1YFah6iP5pVl_ilfvaPU0uyLJEhNlRU4GaF6a_3Of_fcBew6y4XeyBVKBejib60rKCQV_M58QX5Zape
  priority: 102
  providerName: Hindawi Publishing
– databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3NT8IwFH9BiFEPxs-IotkBvTWMbe3WgzEoEKKRGAMJ8bJ0XScmOBBHCP-9fWNDvOD9tUl_bd9XX38PoOqajpCRaxPkmCT6JrqES1eRKBKW9oBNSdN8x3OXdfrO44AOCtDN_8JgWWWuE1NFHY4l5shr2nBr48j08bubfBHsGoWvq3kLDZG1VghvU4qxLShZyIxVhNJ9q_vyutLNtmllDKom8RjjeSk8pZgFsGoeo9zBzuxrRmp7iNHx_OOPD7oziydiMRej0Zo5ah_AfuZHGo3lxh9CQcVHsLfGLngM1aZIBGlOUZ8Zb2o6Nnr4wcJ4UgujMXrXi0uGnyfQb7d6Dx2SNUUg0uJOQpgXeKEVUsoCFgVYymQJVfekGQaRUIzRSHtgDpehXq3UwVYoueeEyDunB-KT-ykU43GszsCIRF3UGaWBFndclwbcFdLGmJApbvOgDNc5Cv5kyX3hpzEDpT6i5WdolaGaQfSPWCXHz88uyrf_u61luFlhunGe883zXMAuSi_TJBUoJtOZutSOQxJcZafhBwSJuw4
  priority: 102
  providerName: ProQuest
Title Data-Driven Zero Trust Key Algorithm
URI https://dx.doi.org/10.1155/2022/8659428
https://www.proquest.com/docview/2646636225
https://downloads.hindawi.com/journals/wcmc/2022/8659428.pdf
UnpaywallVersion publishedVersion
Volume 2022
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1530-8677
  dateEnd: 20250131
  omitProxy: true
  ssIdentifier: ssj0003021
  issn: 1530-8677
  databaseCode: BENPR
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1530-8677
  databaseCode: DR2
  dateStart: 20010101
  customDbUrl:
  isFulltext: true
  eissn: 1530-8677
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0003021
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1530-8677
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0003021
  issn: 1530-8677
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD7MDVEfvIvTOfqgvnV2XZO04Mt0zqE4ZDiYgpTc6oa7MTuGPvkT_I3-EpO1FeeDii-lgdM05yQ9-U568gVgn1gO5QEpmZpj0lRfIjE9TqQZBNRWCNjiaLrecVXHtaZz0UKtFBwne2GEpogfUPFUaOuYdNKZeuvYrk9HE97jOl63j1yMPAWdC0MRzEFGFbCVhkyzfl2-jShSLdPF0xPt4ntCkrx3hGaqmJmR5uPXzgDOhXF_SJ8ntNv9MvdUV-A-aXWUcvJYGIeswF--ETr-V61VWI5BqVGORtEapGR_HZa-UBVuwGGFhvT99a0y0u7RuJOjgXGj92sYl_LZKHcfBqNO2O5tQrN6dnNaM-MzFkxue05oYpe5whYIYYYDpjOjbCqLLrcEC6jEGAUK0DkeF8p1chW7Ce65jtA0dupB_Qd_C9L9QV9ugxHQIi1ihJgSdwhBzCOUl3SIiaVX8lgWDhI7-8OISsOfhiAI-Vp3P9Y9C_uxkX4RyyU95CeG9BW8UxAKKyeVhcPPXvuxnp2_Cu7Coi5G6y85SIejsdxTiCRkeZhzq-d5yJyc1a8bqlRp2OraqLXy8ZD8ALln3Z4
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB2xCAEHxCrKmkPLzSJNbCc-IAQUVOgihIqEuATHcShSaUsJqvg5vo1x60C5wIm77cPzeGbeeBaAYuBSqdLAJ6bHJMGXGBChAk3SVHroAbuKjeIdjSav3tKrO3Y3BR95LYxJq8x14khRJz1lYuSHaLjROHIUv-P-CzFTo8zvaj5CQ9rRCsnRqMWYLeyo6fchUrjXo8sK3nfJ8y7OW2dVYqcMEOUJmhEexmHiJYzxmKexyQ3ypC6Hyk3iVGrOWYouDRUqQeWhkL0kSoQ0MY3ccKP5w8Zzp2GW-lQg-Zs9PW9e33zZAt_1bMdWl4Scizz1njETdfAOQ84ENZPgJ4ziXNuw8eHTD593_q3bl-9D2elMmL-LZViyfqtzMha0FZjS3VVYnOhmuAbFiswkqQyM_nTu9aDntExBh4P4OCedRwQzaz-vw-2_wLMBM91eV2-Ck8qyLHPGYlxOg4DFIpDKNxyUa-GLuAClHIWoP-61EY04CmORQSuyaBWgaCH6Y9lOjl9kH-Zr9C1GBTj4wvTXc7Z-P2cf5qutRj2qXzZr27Bgdo5DNDswkw3e9C46LVm8ZyXDgYf_FsZPTgD4lg
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV05T8MwFH7iENeAOEU5MxQ2q2kSO_GAECKUGzEUCbEEx3EAqbSlBFX8NX4d7zUJlKVM7LaHz5_f5XcAVH3bUzr1XUY9Jhm-RJ9J7RuWpspBC9jWfBDvuLoWp7fe-R2_G4PPshaG0ipLmTgQ1ElHU4y8hooblaNA-tXSIi3iJmwcdF8ZTZCin9ZynEZOkQvz0Uf37W3_LMS73nWcxnHz6JQVEwaYdqSXMRHEQeIknItYpDHlBTnK1ANtJ3GqjBA8RXPGkzpBwaHRc0m0DLyEmrjhRvq_xnPHYdKnLu5Upd44-dYCru0UvVptFgghy6R7zine4NQCwaVHM-CH1OHUE_nh_edf1u7Me7urPvqq1RpSfI0FmC8sVuswp9gijJn2EswN9TFchmqoMsXCHklO6970OlaTSjksRMc6bD0idNnTywrc_gs4qzDR7rTNGlipqqu64DzG5Z7v81j6SrvkfQojXRlXYLdEIermXTaigXfCeURoRQVaFagWEP2xbLPELyqe5Fv0Q6AK7H1jOvKc9dHn7MA0UjC6PLu-2IBZ2pjHZjZhIuu9my20VrJ4e0ALCx7-m4dfbHP2MA
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1PS8MwFH_MDVEP_henU3pQb-26rkla8DKcYyiKBwcqSMm_qrh1o-sY8-RH8DP6SUzWVpwHFW8NvCZ9L8nL76UvvwAcENulPCR1U3NMmmomEtPnRJphSB2FgG2OpvsdF5e43XHPbtBNAY7zszBCU8T3qRhajzomHT9NvXVm12F1zHtcx-tO1cPIV9DZGohwDkqqgO0ilDqXV43blCLVNj08vdEueyYkz3tHaKaKmRVpPmt2BnAujKIBnYxpt_tl7WmtwH3-1WnKybM1SpjFX74ROv5XrVVYzkCp0UhH0RoUZLQOS1-oCjfgqEkT-v761oy1ezTuZNw3rvV5DeNcToxG96EfPyWPvU3otE6vT9pmdseCyR3fTUzsMU84AiHMcMh0ZpRDZc3jtmAhlRijUAE61-dCuU6uYjfBfc8VmsZOvaj_4G9BMepHchuMkNZoDSPElLhLCGI-obyuQ0ws_brPynCY2zkYpFQawTQEQSjQugeZ7mU4yIz0i1gl76EgN2Sg4J2CUFg5qTIcffbaj_Xs_FVwFxZ1Md1_qUAxiUdyTyGShO1nA-8De4DZIg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Data-Driven+Zero+Trust+Key+Algorithm&rft.jtitle=Wireless+communications+and+mobile+computing&rft.au=Liu%2C+Zhiwei&rft.au=Li%2C+Xiaoyu&rft.au=Mu%2C+Dejun&rft.date=2022&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1530-8669&rft.eissn=1530-8677&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F8659428&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-8669&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-8669&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-8669&client=summon