{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T14:47:39Z","timestamp":1769266059330,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T00:00:00Z","timestamp":1710288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T00:00:00Z","timestamp":1710288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-024-00829-9","type":"journal-article","created":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:05:59Z","timestamp":1710360359000},"page":"2003-2021","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Dynamic authentication for intelligent sensor clouds in the Internet of Things"],"prefix":"10.1007","volume":"23","author":[{"given":"Hussain","family":"Al-Aqrabi","sequence":"first","affiliation":[]},{"given":"Ahmed M.","family":"Manasrah","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Hill","sequence":"additional","affiliation":[]},{"given":"Mohammed Q.","family":"Shatnawi","sequence":"additional","affiliation":[]},{"given":"Mohammad Sh","family":"Daoud","sequence":"additional","affiliation":[]},{"given":"Hoda","family":"Alkhzaimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,13]]},"reference":[{"key":"829_CR1","unstructured":"Sundmaeker, H., Guillemin, P., Friess, P., Woelffl, S.: e. Ccluster of european research projects on the internet of things. In vision and challenges for realizing the Internet of Things, page\u00a00, European Commission, (2010)"},{"key":"829_CR2","unstructured":"Evans, D.: The internet of things,howthenext evolution of the internet is changing everything. Whitepaper. Cisco Internet Business Solutions Group (IBSG), 1:1\u201312, (2011)"},{"key":"829_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jpdc.2014.08.003","volume":"79","author":"MD Assun\u00e7\u00e3o","year":"2015","unstructured":"Assun\u00e7\u00e3o, M.D., Calheiros, R.N., Bianchi, S., Netto, M.A.S., Buyya, R.: Big data computing and clouds: trends and future directions. J. Parallel Distrib. Comput. 79, 3\u201315 (2015)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"5","key":"829_CR4","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Longfei, W., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250\u20131258 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"829_CR5","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Wei, Yu., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125\u20131142 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"829_CR6","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1007\/s10586-017-1559-z","volume":"22","author":"AM Manasrah","year":"2019","unstructured":"Manasrah, A.M., Aldomi, A., Gupta, B.B.: An optimized service broker routing policy based on differential evolution algorithm in fog\/cloud environment. Clust. Comput. 22(1), 1639\u20131653 (2019)","journal-title":"Clust. Comput."},{"key":"829_CR7","doi-asserted-by":"crossref","unstructured":"SYi, S., Li, C. Li, Q: A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data, pages 37\u201342, (2015)","DOI":"10.1145\/2757384.2757397"},{"key":"829_CR8","doi-asserted-by":"crossref","unstructured":"Alessio, B., De Donato, W., Persico, V., Pescap\u00e9, A.: On the integration of cloud computing and internet of things. Proc. Future internet of things and cloud (FiCloud), 23\u201330 (2014)","DOI":"10.1109\/FiCloud.2014.14"},{"issue":"1","key":"829_CR9","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jcss.2014.06.013","volume":"81","author":"L Hussain Al-Aqrabi","year":"2015","unstructured":"Hussain Al-Aqrabi, L., Liu, R.H., Antonopoulos, N.: Cloud bi: future of business intelligence in the cloud. J. Comput. Syst. Sci. 81(1), 85\u201396 (2015)","journal-title":"J. Comput. Syst. Sci."},{"key":"829_CR10","volume-title":"Guide to Cloud Computing: Principles and Practice","author":"R Hill","year":"2012","unstructured":"Hill, R., Hirsch, L., Lake, P., Moshiri, S.: Guide to Cloud Computing: Principles and Practice. Springer (2012)"},{"key":"829_CR11","doi-asserted-by":"crossref","unstructured":"Al-Aqrabi, H., Hill, R., Lane, P., Aagela, H.: Securing manufacturing intelligence for the industrial internet of things. In: Fourth international congress on information and communication technology. pp 267\u2013282. Springer (2020)","DOI":"10.1007\/978-981-32-9343-4_21"},{"key":"829_CR12","doi-asserted-by":"crossref","unstructured":"Alsboui, T., Qin, Y., Hill, R., Al-Aqrabi, H.: Towards a scalable iota tangle-based distributed ntelligence approach for the internet of things. In: Science and information conference, pp 487\u2013501. Springer (2020)","DOI":"10.1007\/978-3-030-52246-9_35"},{"issue":"4","key":"829_CR13","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s42979-021-00677-7","volume":"2","author":"T Alsboui","year":"2021","unstructured":"Alsboui, T., Qin, Y., Hill, R., Al-Aqrabi, H.: Distributed intelligence in the internet of things: challenges and opportunities. SN Comput. Sci. 2(4), 277 (2021)","journal-title":"SN Comput. Sci."},{"issue":"4","key":"829_CR14","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2019.2908989","volume":"10","author":"X Da Li","year":"2014","unstructured":"Da Li, X., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inf. 10(4), 2233\u20132243 (2014)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"1","key":"829_CR15","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TMC.2011.246","volume":"12","author":"A Wasef","year":"2011","unstructured":"Wasef, A., Shen, X.: Emap: expedite message authentication protocol for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 12(1), 78\u201389 (2011)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"2","key":"829_CR16","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s11235-019-00612-5","volume":"73","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Derhab, A., Janicke, H.: Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues. Telecommun. Syst. 73(2), 317\u2013348 (2020)","journal-title":"Telecommun. Syst."},{"key":"829_CR17","doi-asserted-by":"crossref","unstructured":"Hada, S., Maruyama, H.: Session authentication protocol for web services. In: Proceedings 2002 symposium on applications and the internet (SAINT) workshops, pages 158\u2013165. IEEE (2002)","DOI":"10.1109\/SAINTW.2002.994566"},{"issue":"6","key":"829_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5173","volume":"32","author":"H Darabian","year":"2020","unstructured":"Darabian, H., Dehghantanha, A., Hashemi, S., Homayoun, S., Choo, K.K.: An opcode-based technique for polymorphic internet of things malware detection. Concurr. Comput. Pract. Exp. 32(6), e5173 (2020)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"829_CR19","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: Authentication protocols for internet of things: a comprehensive survey. Secur. Commun. Netw. (2017)","DOI":"10.1155\/2017\/6562953"},{"issue":"8","key":"829_CR20","doi-asserted-by":"publisher","first-page":"2562","DOI":"10.1109\/TC.2015.2485225","volume":"65","author":"L Zhang","year":"2015","unstructured":"Zhang, L., Chuanyan, H., Qianhong, W., Domingo-Ferrer, J., Qin, B.: Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Trans. Comput. 65(8), 2562\u20132574 (2015)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"829_CR21","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/JSYST.2013.2271537","volume":"8","author":"H Li","year":"2013","unstructured":"Li, H., Rongxing, L., Zhou, L., Yang, B., Shen, X.: An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst. J. 8(2), 655\u2013663 (2013)","journal-title":"IEEE Syst. J."},{"issue":"17","key":"829_CR22","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3986","volume":"29","author":"M Jan","year":"2017","unstructured":"Jan, M., Nanda, P., Usman, M., He, X.: Pawn: a payload-based mutual authentication scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(17), e3986 (2017)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"829_CR23","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Vij, D.: Intercloud security considerations. In 2010 IEEE second international conference on cloud computing technology and science, pages 537\u2013544. IEEE (2010)","DOI":"10.1109\/CloudCom.2010.82"},{"issue":"4","key":"829_CR24","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.3390\/s22041674","volume":"22","author":"AA Zubair","year":"2022","unstructured":"Zubair, A.A., et al.: A cloud computing-based modified symbiotic organisms search algorithm (ai) for optimal task scheduling. Sensors 22(4), 1674 (2022)","journal-title":"Sensors"},{"key":"829_CR25","doi-asserted-by":"crossref","unstructured":"Liu, L., Gao, J.: An organization-oriented model for federated indentity management and its application. In: 2008 6th IEEE international conference on industrial informatics. pp 197\u2013202 (2008)","DOI":"10.1109\/INDIN.2008.4618093"},{"key":"829_CR26","volume-title":"Building Trust into Utility Cloud Computing","author":"FJ Krautheim","year":"2010","unstructured":"Krautheim, F.J.: Building Trust into Utility Cloud Computing. University of Maryland, Baltimore County (2010)"},{"issue":"5","key":"829_CR27","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2010.128","volume":"12","author":"KM Khan","year":"2010","unstructured":"Khan, K.M., Malluhi, Q.: Establishing trust in cloud computing. IT Professional 12(5), 20\u201327 (2010)","journal-title":"IT Professional"},{"issue":"1","key":"829_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-113X-2-9","volume":"2","author":"J Huang","year":"2013","unstructured":"Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 2(1), 1\u201314 (2013)","journal-title":"J. Cloud Comput. Adv. Syst. Appl."},{"key":"829_CR29","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1016\/j.procs.2013.05.149","volume":"17","author":"W Xiaonian","year":"2013","unstructured":"Xiaonian, W., Zhang, R., Zeng, B., Zhou, S.: A trust evaluation model for cloud computing. Proc. Comput. Sci. 17, 1170\u20131177 (2013)","journal-title":"Proc. Comput. Sci."},{"key":"829_CR30","doi-asserted-by":"crossref","unstructured":"Celesti, A., Tusa, F., Villari, M., Puliafito, A.: Security and cloud computing: intercloud identity management infrastructure. In 2010 19th IEEE international workshops on enabling technologies: infrastructures for collaborative enterprises, pp 263\u2013265. IEEE (2010)","DOI":"10.1109\/WETICE.2010.49"},{"key":"829_CR31","doi-asserted-by":"crossref","unstructured":"Sharma, R., Joshi, B.: H-ibe: Hybrid-identity based encryption approach for cloud security with outsourced revocation. In: 2016 International conference on signal processing, communication, power and embedded system. pp 1192\u20131196. IEEE (2016)","DOI":"10.1109\/SCOPES.2016.7955629"},{"key":"829_CR32","doi-asserted-by":"crossref","unstructured":"Schridde, C., D\u00f6rnemann, T., Juhnke, E., Freisleben, B., Smith, M.: An identity-based security infrastructure for cloud environments. In 2010 IEEE International conference on wireless communications, networking and information security, pp 644\u2013649. IEEE (2010)","DOI":"10.1109\/WCINS.2010.5541859"},{"key":"829_CR33","doi-asserted-by":"crossref","unstructured":"Al-Aqrabi, H., Hill, R.: Dynamic multiparty authentication of data analytics services within cloud environments. In 2018 IEEE 20th International conference on high performance computing and communications. In: IEEE 16th international conference on smart city; IEEE 4th international conference on data science and systems (HPCC\/SmartCity\/DSS), pp 742\u2013749. IEEE (2018)","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00127"},{"key":"829_CR34","doi-asserted-by":"crossref","unstructured":"Dai, Q., Zhao, X., Xu, Q., Jiang, H.: A new cross-realm group password-based authenticated key exchange protocol. In: 2011 Seventh international conference on computational intelligence and security. pp 856\u2013860. IEEE (2011)","DOI":"10.1109\/CIS.2011.193"},{"issue":"1","key":"829_CR35","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSC.2010.33","volume":"5","author":"J Xu","year":"2010","unstructured":"Xu, J., Zhang, D., Liu, L., Li, X.: Dynamic authentication for cross-realm soa-based business processes. IEEE Trans. Serv. Comput. 5(1), 20\u201332 (2010)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"7","key":"829_CR36","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"829_CR37","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"829_CR38","doi-asserted-by":"crossref","unstructured":"Uckelmann, D., Harrison, M., Michahelles, F.: An architectural approach towards the future internet of things. In Architecting the internet of things, pages 1\u201324. Springer, (2011)","DOI":"10.1007\/978-3-642-19157-2_1"},{"issue":"1","key":"829_CR39","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2015.12","volume":"48","author":"R Want","year":"2015","unstructured":"Want, R., Schilit, B.N., Jenson, S.: Enabling the internet of things. Computer 48(1), 28\u201335 (2015)","journal-title":"Computer"},{"key":"829_CR40","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1016\/j.procs.2017.08.138","volume":"112","author":"BM Balachandran","year":"2017","unstructured":"Balachandran, B.M., Prasad, S.: Challenges and benefits of deploying big data analytics in the cloud for business intelligence. Proc. Comput. Sci. 112, 1112\u20131122 (2017)","journal-title":"Proc. Comput. Sci."},{"key":"829_CR41","doi-asserted-by":"crossref","unstructured":"JinJing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wireless Netw. 20(8), 2481\u20132501 (2014)","DOI":"10.1007\/s11276-014-0761-7"},{"key":"829_CR42","doi-asserted-by":"crossref","unstructured":"Al-Aqrabi, H., Johnson, A.P., Hill, R., Lane, P., Liu, L.: A multi-layer security model for 5g-enabled industrial internet of things. In: International conference on smart city and informatization. pp 279\u2013292. Springer (2019)","DOI":"10.1007\/978-981-15-1301-5_23"},{"key":"829_CR43","doi-asserted-by":"crossref","unstructured":"Saadeh, M., Sleit, A., Qatawneh, M., Almobaideen, W.: Authentication techniques for the internet of things: a survey. In: 2016 cybersecurity and cyberforensics conference. pp 28\u201334. IEEE (2016)","DOI":"10.1109\/CCC.2016.22"},{"key":"829_CR44","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings IEEE INFOCOM. pp 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"issue":"5","key":"829_CR45","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1016\/j.jcss.2011.12.019","volume":"78","author":"DW Chadwick","year":"2012","unstructured":"Chadwick, D.W., Fatema, K.: A privacy preserving authorisation system for the cloud. J. Comput. Syst. Sci. 78(5), 1359\u20131373 (2012)","journal-title":"J. Comput. Syst. Sci."},{"key":"829_CR46","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"829_CR47","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM\/EDAC\/IEEE design automation conference. pp 1\u20136. IEEE (2015)","DOI":"10.1145\/2744769.2747942"},{"key":"829_CR48","doi-asserted-by":"crossref","unstructured":"Li, H., Dai, Y., Tian, L., Yang, H.: Identity-based authentication for cloud computing. In: IEEE international conference on cloud computing. pp 157\u2013166. Springer (2009)","DOI":"10.1007\/978-3-642-10665-1_14"},{"issue":"4","key":"829_CR49","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/s100090050046","volume":"2","author":"A Cimatti","year":"2000","unstructured":"Cimatti, A., Clarke, E., Giunchiglia, F., Roveri, M.: Nusmv: a new symbolic model checker. Int. J. Softw. Tools Technol. Transf. 2(4), 410\u2013425 (2000)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"829_CR50","unstructured":"Inc. OPNET\u00a0Technologies. The opnet simulator. http:\/\/www.opnet.com"},{"key":"829_CR51","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.procs.2015.03.175","volume":"45","author":"A Ambre","year":"2015","unstructured":"Ambre, A., Shekokar, N.: Insider threat detection using log analysis and event correlation. Proc. Comput. Sci. 45, 436\u2013445 (2015)","journal-title":"Proc. Comput. Sci."},{"key":"829_CR52","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/j.sbspro.2014.03.716","volume":"129","author":"ZM Yusop","year":"2014","unstructured":"Yusop, Z.M., Abawajy, J.: Analysis of insiders attack mitigation strategies. Proc. Soc. Behav. Sci. 129, 581\u2013591 (2014)","journal-title":"Proc. Soc. Behav. Sci."},{"issue":"3","key":"829_CR53","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1109\/TCC.2015.2415794","volume":"5","author":"D Gonzales","year":"2015","unstructured":"Gonzales, D., Kaplan, J.M., Saltzman, E., Winkelman, Z., Woods, D.: Cloud-trust-a security assessment model for infrastructure as a service (iaas) clouds. IEEE Trans. Cloud Comput. 5(3), 523\u2013536 (2015)","journal-title":"IEEE Trans. Cloud Comput."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00829-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00829-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00829-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T07:45:20Z","timestamp":1731570320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00829-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,13]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["829"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00829-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,13]]},"assertion":[{"value":"13 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not include studies with human participants or animals conducted by any of the authors. The authors state that all experiments and research outlined in this manuscript adhere to ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}