{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T02:45:14Z","timestamp":1775529914080,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T00:00:00Z","timestamp":1664496000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T00:00:00Z","timestamp":1664496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10207-022-00619-1","type":"journal-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T07:02:57Z","timestamp":1664521377000},"page":"1373-1387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment"],"prefix":"10.1007","volume":"21","author":[{"given":"Mohammad","family":"Abdussami","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3592-9421","authenticated-orcid":false,"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Satyanarayana","family":"Vollala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,30]]},"reference":[{"issue":"4","key":"619_CR1","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"619_CR2","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2017","unstructured":"Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601\u2013628 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"619_CR3","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721\u201382743 (2019)","journal-title":"IEEE Access"},{"issue":"6","key":"619_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292674","volume":"51","author":"J Dizdarevi\u0107","year":"2019","unstructured":"Dizdarevi\u0107, J., Carpio, F., Jukan, A., Masip-Bruin, X.: A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Comput. Surv. CSUR 51(6), 1\u201329 (2019)","journal-title":"ACM Comput. Surv. CSUR"},{"key":"619_CR5","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., De Donato, W., Persico, V., Pescap\u00e9, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684\u2013700 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"619_CR6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1049\/iet-net.2015.0034","volume":"5","author":"S Sarkar","year":"2016","unstructured":"Sarkar, S., Misra, S.: Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. Iet Netw. 5(2), 23\u201329 (2016)","journal-title":"Iet Netw."},{"issue":"2","key":"619_CR7","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIC.2017.37","volume":"21","author":"A Alrawais","year":"2017","unstructured":"Alrawais, A., Alhothaily, A., Hu, C., Cheng, X.: Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34\u201342 (2017)","journal-title":"IEEE Internet Comput."},{"key":"619_CR8","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1109\/JSYST.2021.3101201","volume":"16","author":"P Mall","year":"2021","unstructured":"Mall, P., Amin, R.: EuDaimon: PUF-based robust and lightweight authenticated session key establishment protocol for IoT-enabled smart society. IEEE Syst. J. 16, 2891\u20132898 (2021)","journal-title":"IEEE Syst. J."},{"issue":"3","key":"619_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MDAT.2016.2544845","volume":"33","author":"D Mukhopadhyay","year":"2016","unstructured":"Mukhopadhyay, D.: PUFs as promising tools for security in internet of things. IEEE Des. Test 33(3), 103\u2013115 (2016)","journal-title":"IEEE Des. Test"},{"key":"619_CR10","doi-asserted-by":"publisher","first-page":"8205","DOI":"10.1109\/JIOT.2022.3142084","volume":"9","author":"P Mall","year":"2022","unstructured":"Mall, P., Amin, R., Das, A.K., Leung, M.T., Choo, K.-K.R.: PUF-based authentication and key agreement protocols for IoT, WSNs and smart grids: a comprehensive survey. IEEE Internet Things J. 9, 8205\u20138228 (2022)","journal-title":"IEEE Internet Things J."},{"key":"619_CR11","doi-asserted-by":"publisher","first-page":"5057","DOI":"10.1109\/JSYST.2020.3022244","volume":"15","author":"Y Guo","year":"2020","unstructured":"Guo, Y., Zhang, Z., Guo, Y.: Fog-centric authenticated key agreement scheme without trusted parties. IEEE Syst. J. 15, 5057\u201366 (2020)","journal-title":"IEEE Syst. J."},{"key":"619_CR12","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107, M., Brumen, B., H\u00f6lbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20, 96\u2013112 (2014)","journal-title":"Ad Hoc Netw."},{"key":"619_CR13","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farash","year":"2016","unstructured":"Farash, M.S., Turkanovi\u0107, M., Kumari, S., H\u00f6lbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36, 152\u2013176 (2016)","journal-title":"Ad Hoc Netw."},{"key":"619_CR14","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","volume":"78","author":"R Amin","year":"2018","unstructured":"Amin, R., Kumar, N., Biswas, G., Iqbal, R., Chang, V.: A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener. Comput. Syst. 78, 1005\u20131019 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"619_CR15","doi-asserted-by":"publisher","first-page":"8804","DOI":"10.1109\/JIOT.2019.2923611","volume":"6","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Bagga, P., Das, A.K., Shetty, S., Rodrigues, J.J., Park, Y.H.: AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J. 6(5), 8804\u20138817 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"619_CR16","doi-asserted-by":"publisher","first-page":"4671","DOI":"10.1109\/JIOT.2020.2975207","volume":"7","author":"MA Saleem","year":"2020","unstructured":"Saleem, M.A., Mahmood, K., Kumari, S.: Comments on \u201cAKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment\u2019\u2019. IEEE Internet Things J. 7(5), 4671\u20134675 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"619_CR17","volume":"2","author":"S Kunal","year":"2019","unstructured":"Kunal, S., Saha, A., Amin, R.: An overview of cloud-fog computing: architectures, applications with security challenges. Secur. Priv. 2(4), e72 (2019)","journal-title":"Secur. Priv."},{"key":"619_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.cose.2019.06.003","volume":"86","author":"P Gope","year":"2019","unstructured":"Gope, P.: LAAP: lightweight anonymous authentication protocol for D2D-aided fog computing paradigm. Comput. Secur. 86, 223\u2013237 (2019)","journal-title":"Comput. Secur."},{"key":"619_CR19","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","volume":"91","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V.: Design of secure key management and user authentication scheme for fog computing services. Future Gener. Comput. Syst. 91, 475\u2013492 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"8","key":"619_CR20","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia, X., He, D., Kumar, N., Choo, K.-K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 25(8), 4737\u20134750 (2019)","journal-title":"Wirel. Netw."},{"key":"619_CR21","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.jpdc.2020.02.005","volume":"140","author":"R Amin","year":"2020","unstructured":"Amin, R., Kunal, S., Saha, A., Das, D., Alamri, A.: CFSec: password based secure communication protocol in cloud\u2013fog environment. J. Parallel Distrib. Comput. 140, 52\u201362 (2020)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"3","key":"619_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3005715","volume":"16","author":"U Chatterjee","year":"2017","unstructured":"Chatterjee, U., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 16(3), 1\u201325 (2017)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"issue":"5","key":"619_CR23","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/JIOT.2017.2703088","volume":"4","author":"MN Aman","year":"2017","unstructured":"Aman, M.N., Chua, K.C., Sikdar, B.: Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J. 4(5), 1327\u20131340 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"619_CR24","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2018","unstructured":"Gope, P., Sikdar, B.: Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. 6(1), 580\u2013589 (2018)","journal-title":"IEEE Internet Things J."},{"key":"619_CR25","doi-asserted-by":"publisher","first-page":"102951","DOI":"10.1109\/ACCESS.2019.2931472","volume":"7","author":"JW Byun","year":"2019","unstructured":"Byun, J.W.: End-to-end authenticated key exchange based on different physical unclonable functions. IEEE Access 7, 102951\u2013102965 (2019)","journal-title":"IEEE Access"},{"issue":"4","key":"619_CR26","doi-asserted-by":"publisher","first-page":"5487","DOI":"10.1109\/JSEN.2020.3028872","volume":"21","author":"S Li","year":"2020","unstructured":"Li, S., Zhang, T., Yu, B., He, K.: A provably secure and practical PUF-based end-to-end mutual authentication and key exchange protocol for IoT. IEEE Sens. J. 21(4), 5487\u20135501 (2020)","journal-title":"IEEE Sens. J."},{"issue":"1","key":"619_CR27","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"C-C Chang","year":"2015","unstructured":"Chang, C.-C., Le, H.-D.: A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 15(1), 357\u2013366 (2015)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"11","key":"619_CR28","doi-asserted-by":"publisher","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","volume":"63","author":"P Gope","year":"2016","unstructured":"Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124\u20137132 (2016)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"7","key":"619_CR29","doi-asserted-by":"publisher","first-page":"7234","DOI":"10.1109\/TVT.2020.2976960","volume":"69","author":"G Bansal","year":"2020","unstructured":"Bansal, G., Naren, N., Chamola, V., Sikdar, B., Kumar, N., Guizani, M.: Lightweight mutual authentication protocol for V2G using physical unclonable function. IEEE Trans. Veh. Technol. 69(7), 7234\u20137246 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"619_CR30","doi-asserted-by":"publisher","first-page":"112733","DOI":"10.1109\/ACCESS.2021.3103889","volume":"9","author":"Y-H Chuang","year":"2021","unstructured":"Chuang, Y.-H., Lei, C.-L.: PUF based authenticated key exchange protocol for IoT without verifiers and explicit CRPs. IEEE Access 9, 112733\u2013112743 (2021)","journal-title":"IEEE Access"},{"key":"619_CR31","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.comcom.2021.03.022","volume":"173","author":"Q Jiang","year":"2021","unstructured":"Jiang, Q., Zhang, X., Zhang, N., Tian, Y., Ma, X., Ma, J.: Three-factor authentication protocol using physical unclonable function for IoV. Comput. Commun. 173, 45\u201355 (2021)","journal-title":"Comput. Commun."},{"key":"619_CR32","doi-asserted-by":"publisher","first-page":"2649","DOI":"10.1109\/JIOT.2021.3080461","volume":"9","author":"M Masud","year":"2021","unstructured":"Masud, M., Gaba, G.S., Choudhary, K., Hossain, M.S., Alhamid, M.F., Muhammad, G.: Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet Things J. 9, 2649\u20132656 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"619_CR33","doi-asserted-by":"publisher","first-page":"4957","DOI":"10.1109\/TII.2019.2895030","volume":"15","author":"P Gope","year":"2019","unstructured":"Gope, P., Das, A.K., Kumar, N., Cheng, Y.: Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 15(9), 4957\u20134968 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"619_CR34","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology\u2013EUROCRYPT 2001","author":"R Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) Advances in Cryptology\u2013EUROCRYPT 2001, pp. 453\u2013474. Springer, Berlin (2001)"},{"issue":"2","key":"619_CR35","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"619_CR36","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10916-015-0262-y","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Biswas, G.: An improved rsa based user authentication and session key agreement protocol usable in tmis. J. Med. Syst. 39(8), 79 (2015)","journal-title":"J. Med. Syst."},{"issue":"5","key":"619_CR37","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"issue":"8","key":"619_CR38","doi-asserted-by":"publisher","first-page":"9097","DOI":"10.1109\/TVT.2020.3000576","volume":"69","author":"B Bera","year":"2020","unstructured":"Bera, B., Saha, S., Das, A.K., Kumar, N., Lorenz, P., Alazab, M.: Blockchain-envisioned secure data delivery and collection scheme for 5g-based IoT-enabled internet of drones environment. IEEE Trans. Veh. Technol. 69(8), 9097\u20139111 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"619_CR39","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"P Hu","year":"2017","unstructured":"Hu, P., Dhelim, S., Ning, H., Qiu, T.: Survey on fog computing: architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 98, 27\u201342 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"619_CR40","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/COMST.2018.2814571","volume":"20","author":"M Mukherjee","year":"2018","unstructured":"Mukherjee, M., Shu, L., Wang, D.: Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun. Surv. Tutor. 20(3), 1826\u20131857 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"619_CR41","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: International Workshop on Public Key Cryptography, pp. 65\u201384. Springer (2005)","DOI":"10.1007\/978-3-540-30580-4_6"},{"issue":"2","key":"619_CR42","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/TDSC.2017.2764083","volume":"17","author":"M Wazid","year":"2017","unstructured":"Wazid, M., Das, A.K., Odelu, V., Kumar, N., Susilo, W.: Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Dependable Secur. Comput. 17(2), 391\u2013406 (2017)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"619_CR43","first-page":"70","volume-title":"Formal to Practical Security","author":"P Nadeau","year":"2009","unstructured":"Nadeau, P., Cremers, C.J., Lafourcade, P.: Comparing state spaces in automatic security protocol analysis. In: Cortier, V., Kirchner, C., Okada, M., Sakurada, H. (eds.) Formal to Practical Security, pp. 70\u201394. Springer, Berlin (2009)"},{"key":"619_CR44","doi-asserted-by":"publisher","unstructured":"Ali, R., Pal, A.K., Kumari, S., Sangaiah, A.K., Li, X., Wu, F.: An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. J. Ambient Intell. Humaniz. Comput. (2018). https:\/\/doi.org\/10.1007\/s12652-018-1015-9","DOI":"10.1007\/s12652-018-1015-9"},{"issue":"5","key":"619_CR45","doi-asserted-by":"publisher","first-page":"8065","DOI":"10.1109\/JIOT.2019.2902840","volume":"6","author":"M Ma","year":"2019","unstructured":"Ma, M., He, D., Wang, H., Kumar, N., Choo, K.-K.R.: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks. IEEE Internet Things J. 6(5), 8065\u20138075 (2019)","journal-title":"IEEE Internet Things J."},{"key":"619_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107731","volume":"185","author":"Z Ali","year":"2021","unstructured":"Ali, Z., Chaudhry, S.A., Mahmood, K., Garg, S., Lv, Z., Zikria, Y.B.: A clogging resistant secure authentication scheme for fog computing services. Comput. Netw. 185, 107731 (2021)","journal-title":"Comput. Netw."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00619-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00619-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00619-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T17:27:01Z","timestamp":1665682021000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00619-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,30]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["619"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00619-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,30]]},"assertion":[{"value":"30 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical statements"}}]}}