{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T09:33:04Z","timestamp":1768987984757,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T00:00:00Z","timestamp":1696809600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T00:00:00Z","timestamp":1696809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00762-3","type":"journal-article","created":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T08:59:07Z","timestamp":1696841947000},"page":"679-698","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks"],"prefix":"10.1007","volume":"23","author":[{"given":"Muralidhara Rao","family":"Patruni","sequence":"first","affiliation":[]},{"given":"Abdul Gaffar","family":"Humayun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,9]]},"reference":[{"key":"762_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.comcom.2022.01.015","volume":"187","author":"R Pirmagomedov","year":"2022","unstructured":"Pirmagomedov, R., Moltchanov, D., Samuylov, A., Orsino, A., Torsner, J., Andreev, S., Koucheryavy, Y.: Characterizing throughput and convergence time in dynamic multi-connectivity 5G deployments. Comput. Commun. 187, 45\u201358 (2022)","journal-title":"Comput. Commun."},{"key":"762_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1155\/2022\/8421434","volume":"2022","author":"AA Pise","year":"2022","unstructured":"Pise, A.A., Almusaini, K.K., Ahanger, T.A., Farouk, A., Pareek, P.K., Nuagah, S.J.: Enabling artificial intelligence of things (AIoT) healthcare architectures and listing security issues. Comput. Intell. Neurosci. 2022, 14 (2022)","journal-title":"Comput. Intell. Neurosci."},{"key":"762_CR3","unstructured":"Maayan, G.D.: The IoT rundown for 2020: stats, risks, and solutions. Security Today, 13. (2020)"},{"issue":"8","key":"762_CR4","doi-asserted-by":"publisher","first-page":"10741","DOI":"10.1007\/s11042-016-3268-7","volume":"76","author":"DB David","year":"2017","unstructured":"David, D.B.: Mutual authentication scheme for multimedia medical information systems. Multimed. Tools Appl. 76(8), 10741\u201310759 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"762_CR5","doi-asserted-by":"publisher","first-page":"38","DOI":"10.3390\/jsan11030038","volume":"11","author":"G Abbas","year":"2022","unstructured":"Abbas, G., Mehmood, A., Carsten, M., Epiphaniou, G., Lloret, J.: Safety, security and privacy in machine learning based internet of things. J. Sens. Actuator Netw. 11(3), 38 (2022)","journal-title":"J. Sens. Actuator Netw."},{"key":"762_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-030-89554-9_4","volume-title":"IoT for Sustainable Smart Cities and Society","author":"R Mehta","year":"2022","unstructured":"Mehta, R., Khanna, K., Sahni, J.: IoT in healthcare: a 360-degree view. In: Rodrigues, J.J.P.C., Agarwal, P., Khanna, K. (eds.) IoT for Sustainable Smart Cities and Society, pp. 85\u2013106. Springer, Cham (2022)"},{"key":"762_CR7","doi-asserted-by":"publisher","first-page":"122213","DOI":"10.1016\/j.techfore.2022.122213","volume":"186","author":"S Chatterjee","year":"2023","unstructured":"Chatterjee, S., Chaudhuri, R., Kumar, A., Ar\u00e1nega, A.Y., Biswas, B.: Development of an integrative model for electronic vendor relationship management for improving technological innovation, social change and sustainability performance. Technol. Forecast. Soc. Chang. 186, 122213 (2023)","journal-title":"Technol. Forecast. Soc. Chang."},{"issue":"1","key":"762_CR8","doi-asserted-by":"publisher","first-page":"242","DOI":"10.3390\/electronics12010242","volume":"12","author":"T Mazhar","year":"2023","unstructured":"Mazhar, T., Irfan, H.M., Haq, I., Ullah, I., Ashraf, M., Shloul, T.A., Elkamchouchi, D.H.: Analysis of challenges and solutions of IoT in smart grids using AI and machine learning techniques: a review. Electronics 12(1), 242 (2023)","journal-title":"Electronics"},{"key":"762_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.future.2022.08.004","volume":"138","author":"A Rahman","year":"2023","unstructured":"Rahman, A., Hasan, K., Kundu, D., Islam, M.J., Debnath, T., Band, S.S., Kumar, N.: On the ICN-IoT with federated learning integration of communication: concepts, security-privacy issues, applications, and future perspectives. Futur. Gener. Comput. Syst. 138, 61\u201388 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"762_CR10","doi-asserted-by":"publisher","first-page":"878","DOI":"10.1016\/j.scs.2018.06.004","volume":"41","author":"AG Reddy","year":"2018","unstructured":"Reddy, A.G., Suresh, D., Phaneendra, K., Shin, J.S., Odelu, V.: Provably secure pseudo-identity based device authentication for smart cities environment. Sustain. Cities Soc. 41, 878\u2013885 (2018)","journal-title":"Sustain. Cities Soc."},{"key":"762_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4716","author":"S Das","year":"2023","unstructured":"Das, S., Namasudra, S.: Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare. Trans. Emerg. Telecommun. Technol. (2023). https:\/\/doi.org\/10.1002\/ett.4716","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"762_CR12","first-page":"1","volume-title":"A Glimpse Beyond 5G in Wireless Networks","author":"M Alfaqawi","year":"2023","unstructured":"Alfaqawi, M., Gateau, M., Huard, P., Reungoat, P., Le Mercier, M.C., Davai, S., Ben Mabrouk, M.: A comprehensive study on 5G: RAN architecture, enabling technologies, challenges, and deployment. In: Matin, M.A. (ed.) A Glimpse Beyond 5G in Wireless Networks, pp. 1\u201357. Springer, Cham (2023)"},{"issue":"3","key":"762_CR13","doi-asserted-by":"publisher","first-page":"2629","DOI":"10.1007\/s40747-020-00231-7","volume":"9","author":"BD Deebak","year":"2023","unstructured":"Deebak, B.D., Al-Turjman, F.: Secure-user sign-in authentication for IoT-based eHealth systems. Complex Intell. Syst. 9(3), 2629\u20132649 (2023)","journal-title":"Complex Intell. Syst."},{"issue":"4","key":"762_CR14","first-page":"2919","volume":"17","author":"AT Fadi","year":"2020","unstructured":"Fadi, A.T., David, D.B.: Seamless authentication: for IoT-big data technologies in smart industrial application systems. IEEE Trans. Ind. Inform. 17(4), 2919\u20132927 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"762_CR15","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/TPDS.2012.146","volume":"24","author":"R Lu","year":"2012","unstructured":"Lu, R., Lin, X., Shen, X.: SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3), 614\u2013624 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"762_CR16","doi-asserted-by":"publisher","first-page":"e7428","DOI":"10.1002\/cpe.7428","volume":"35","author":"U Jain","year":"2023","unstructured":"Jain, U., Pirasteh, S., Hussain, M.: Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet-of-Things-Fog environment. Concurr. Comput.: Pract. Exp. 35(1), e7428 (2023)","journal-title":"Concurr. Comput.: Pract. Exp."},{"issue":"1","key":"762_CR17","doi-asserted-by":"publisher","first-page":"199","DOI":"10.3390\/s23010199","volume":"23","author":"J Bhatia","year":"2023","unstructured":"Bhatia, J., Italiya, K., Jadeja, K., Kumhar, M., Chauhan, U., Tanwar, S., Raboaca, M.S.: An overview of fog data analytics for IoT applications. Sensors 23(1), 199 (2023)","journal-title":"Sensors"},{"key":"762_CR18","doi-asserted-by":"publisher","first-page":"102416","DOI":"10.1016\/j.scs.2020.102416","volume":"63","author":"BD Deebak","year":"2020","unstructured":"Deebak, B.D.: Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems. Sustain. Cities Soc. 63, 102416 (2020)","journal-title":"Sustain. Cities Soc."},{"key":"762_CR19","doi-asserted-by":"publisher","first-page":"102610","DOI":"10.1016\/j.scs.2020.102610","volume":"66","author":"J Al-Muhtadi","year":"2021","unstructured":"Al-Muhtadi, J., Saleem, K., Al-Rabiaah, S., Imran, M., Gawanmeh, A., Rodrigues, J.J.: A lightweight cyber security framework with context-awareness for pervasive computing environments. Sustain. Cities Soc. 66, 102610 (2021)","journal-title":"Sustain. Cities Soc."},{"key":"762_CR20","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s00779-019-01299-w","volume":"26","author":"J Kim","year":"2022","unstructured":"Kim, J., Park, N.: Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing. Pers. Ubiquitous Comput. 26, 345\u2013353 (2022)","journal-title":"Pers. Ubiquitous Comput."},{"key":"762_CR21","doi-asserted-by":"crossref","unstructured":"Dammak, M., Boudia, O.R.M., Messous, M.A., Senouci, S.M., & Gransart, C.: Token-based lightweight authentication to secure IoT networks. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 1\u20134). IEEE (2019)","DOI":"10.1109\/CCNC.2019.8651825"},{"key":"762_CR22","doi-asserted-by":"publisher","first-page":"8729","DOI":"10.1007\/s11227-020-03160-x","volume":"76","author":"M Ghahramani","year":"2020","unstructured":"Ghahramani, M., Javidan, R., Shojafar, M.: A secure biometric-based authentication protocol for global mobility networks in smart cities. J. Supercomput. 76, 8729\u20138755 (2020)","journal-title":"J. Supercomput."},{"key":"762_CR23","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili, S.F., Mala, H., Shojafar, M., Peris-Lopez, P.: LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gener. Comput. Syst. 96, 410\u2013424 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"762_CR24","first-page":"15","volume":"10","author":"A Mohseni-Ejiyeh","year":"2018","unstructured":"Mohseni-Ejiyeh, A., Ashouri-Talouki, M., Mahdavi, M.: An incentive-aware lightweight secure data sharing scheme for D2D communication in 5G cellular networks. ISC Int. J. Inf. Secur. 10(1), 15\u201327 (2018)","journal-title":"ISC Int. J. Inf. Secur."},{"issue":"1","key":"762_CR25","doi-asserted-by":"publisher","first-page":"155014771882446","DOI":"10.1177\/1550147718824465","volume":"15","author":"C Zhou","year":"2019","unstructured":"Zhou, C.: An improved lightweight certificateless generalized signcryption scheme for mobile-health system. Int. J. Distrib. Sens. Netw. 15(1), 1550147718824465 (2019)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"762_CR26","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.future.2016.05.032","volume":"80","author":"R Amin","year":"2018","unstructured":"Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Kumar, N.: A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener. Comput. Syst. 80, 483\u2013495 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"762_CR27","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8145087","author":"M Shuai","year":"2019","unstructured":"Shuai, M., Liu, B., Yu, N., Xiong, L.: Lightweight and secure three-factor authentication scheme for remote patient monitoring using on-body wireless networks. Secur. Commun. Netw. (2019). https:\/\/doi.org\/10.1155\/2019\/8145087","journal-title":"Secur. Commun. Netw."},{"issue":"9","key":"762_CR28","doi-asserted-by":"publisher","first-page":"2511","DOI":"10.3390\/s20092511","volume":"20","author":"AMK Wong","year":"2020","unstructured":"Wong, A.M.K., Hsu, C.L., Le, T.V., Hsieh, M.C., Lin, T.W.: Three-factor fast authentication scheme with time bound and user anonymity for multi-server E-health systems in 5G-based wireless sensor networks. Sensors 20(9), 2511 (2020)","journal-title":"Sensors"},{"issue":"8","key":"762_CR29","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia, X., He, D., Kumar, N., Choo, K.K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 25(8), 4737\u20134750 (2019)","journal-title":"Wirel. Netw."},{"issue":"3","key":"762_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3325130","volume":"4","author":"D Wang","year":"2020","unstructured":"Wang, D., Wang, P., Wang, C.: Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs. ACM Trans. Cyber-Phys. Syst. 4(3), 1\u201326 (2020)","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"762_CR31","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6658041","author":"TY Wu","year":"2021","unstructured":"Wu, T.Y., Wang, T., Lee, Y.Q., Zheng, W., Kumari, S., Kumar, S.: Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur. Commun. Netw. (2021). https:\/\/doi.org\/10.1155\/2021\/6658041","journal-title":"Secur. Commun. Netw."},{"key":"762_CR32","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.comcom.2022.09.021","volume":"196","author":"M Masud","year":"2022","unstructured":"Masud, M., Gaba, G.S., Kumar, P., Gurtov, A.: A user-centric privacy-preserving authentication protocol for IoT-Am I environments. Comput. Commun. 196, 45\u201354 (2022)","journal-title":"Comput. Commun."},{"key":"762_CR33","doi-asserted-by":"crossref","unstructured":"Al-Sarawi, S., Anbar, M., Alieyan, K., & Alzubaidi, M.: Internet of Things (IoT) communication protocols. In: 2017 8th International Conference on Information Technology (ICIT)\u00a0(pp. 685\u2013690). IEEE (2017)","DOI":"10.1109\/ICITECH.2017.8079928"},{"key":"762_CR34","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.future.2020.11.010","volume":"116","author":"BD Deebak","year":"2021","unstructured":"Deebak, B.D., Fadi, A.T.: Lightweight authentication for IoT\/Cloud-based forensics in intelligent data computing. Future Gener. Comput. Syst. 116, 406\u2013425 (2021)","journal-title":"Future Gener. Comput. Syst."},{"key":"762_CR35","doi-asserted-by":"crossref","unstructured":"Mao, W.: A structured operational modelling of the dolev-yao threat model. In: International Workshop on Security Protocols (pp. 34\u201346). Springer, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-39871-4_5"},{"key":"762_CR36","doi-asserted-by":"crossref","unstructured":"Canetti, R., Jain, A., & Scafuro, A.: Practical UC security with a global random oracle. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, (pp. 597\u2013608), (2014)","DOI":"10.1145\/2660267.2660374"},{"key":"762_CR37","doi-asserted-by":"publisher","first-page":"108465","DOI":"10.1016\/j.comnet.2021.108465","volume":"199","author":"S Amanlou","year":"2021","unstructured":"Amanlou, S., Hasan, M.K., Bakar, K.A.A.: Lightweight and secure authentication scheme for IoT network based on publish\u2013subscribe fog computing model. Comput. Netw. 199, 108465 (2021)","journal-title":"Comput. Netw."},{"key":"762_CR38","doi-asserted-by":"publisher","first-page":"106782","DOI":"10.1016\/j.compeleceng.2020.106782","volume":"87","author":"BD Deebak","year":"2020","unstructured":"Deebak, B.D., Al-Turjman, F., Mostarda, L.: Seamless secure anonymous authentication for cloud-based mobile edge computing. Comput. Electr. Eng. 87, 106782 (2020)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"762_CR39","doi-asserted-by":"publisher","first-page":"013014","DOI":"10.1117\/1.JEI.26.1.013014","volume":"26","author":"MA Pagnutti","year":"2017","unstructured":"Pagnutti, M.A., Ryan, R.E., Gold, M.J., Harlan, R., Leggett, E., Pagnutti, J.F.: Laying the foundation to use Raspberry Pi 3 V2 camera module imagery for scientific and engineering purposes. J. Electron. Imaging 26(1), 013014 (2017)","journal-title":"J. Electron. Imaging"},{"key":"762_CR40","doi-asserted-by":"crossref","unstructured":"Kusriyanto, M., & Putra, B.D.: Smart home using local area network (LAN) based arduino mega 2560. In: 2016 2nd International Conference on Wireless and Telematics (ICWT) (pp. 127\u2013131), IEEE, (2016)","DOI":"10.1109\/ICWT.2016.7870866"},{"issue":"2","key":"762_CR41","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1109\/JSYST.2017.2685524","volume":"12","author":"O Ruan","year":"2017","unstructured":"Ruan, O., Zhang, Y., Zhang, M., Zhou, J., Harn, L.: After-the-fact leakage-resilient identity-based authenticated key exchange. IEEE Syst. J. 12(2), 2017\u20132026 (2017)","journal-title":"IEEE Syst. J."},{"key":"762_CR42","doi-asserted-by":"publisher","first-page":"103117","DOI":"10.1016\/j.adhoc.2023.103117","volume":"142","author":"VO Nyangaresi","year":"2023","unstructured":"Nyangaresi, V.O.: Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks. Ad Hoc Netw. 142, 103117 (2023)","journal-title":"Ad Hoc Netw."},{"key":"762_CR43","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O., Abduljabbar, Z.A., Mutlaq, K.A.A., Hussain, M.A., & Hussien, Z.A.: Forward and backward key secrecy preservation scheme for medical Internet of Things. In: Human-Centric Smart Computing: Proceedings of ICHCSC 2022 (pp. 15\u201329). Singapore: Springer Nature Singapore, (2022)","DOI":"10.1007\/978-981-19-5403-0_2"},{"key":"762_CR44","doi-asserted-by":"crossref","unstructured":"Nyangaresi, V.O., & Ma, J.: A formally verified message validation protocol for intelligent IoT E-health systems. In: 2022 IEEE World Conference on Applied Intelligence and Computing (AIC) (pp. 416\u2013422). IEEE, (2022)","DOI":"10.1109\/AIC55036.2022.9848874"}],"updated-by":[{"DOI":"10.1007\/s10207-023-00775-y","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T00:00:00Z","timestamp":1699660800000}}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00762-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00762-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00762-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T01:14:47Z","timestamp":1705972487000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00762-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,9]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["762"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00762-3","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s10207-023-00775-y","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,9]]},"assertion":[{"value":"12 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2023","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10207-023-00775-y","URL":"https:\/\/doi.org\/10.1007\/s10207-023-00775-y","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}