{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:25:54Z","timestamp":1773933954866,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05794-z","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T20:33:59Z","timestamp":1762893239000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure and efficient mutual authentication framework for IoT: a blockchain-integrated graph neural network approach"],"prefix":"10.1007","volume":"29","author":[{"given":"Mahendra Kumar","family":"Jhariya","sequence":"first","affiliation":[]},{"given":"Vasudev","family":"Dehalwar","sequence":"additional","affiliation":[]},{"given":"Jyoti","family":"Bharti","sequence":"additional","affiliation":[]},{"given":"R. K.","family":"Pateriya","sequence":"additional","affiliation":[]},{"given":"Yogendra","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,11]]},"reference":[{"key":"5794_CR1","doi-asserted-by":"crossref","unstructured":"Choudhary, V., Guha, P., Pau, G., Mishra, S.: An overview of smart agriculture using internet of things (IoT) and web services. Environ. Sustain. Indic. 26, 100607 (2025)","DOI":"10.1016\/j.indic.2025.100607"},{"key":"5794_CR2","doi-asserted-by":"publisher","first-page":"3431","DOI":"10.1007\/s11276-025-03942-2","volume":"31","author":"SF Ahmed","year":"2025","unstructured":"Ahmed, S.F., Shawon, S.S., Bhuyian, A., et al.: Forensics and security issues in the internet of things. Wireless Networks 31, 3431\u20133466 (2025). https:\/\/doi.org\/10.1007\/s11276-025-03942-2","journal-title":"Wireless Networks"},{"key":"5794_CR3","doi-asserted-by":"publisher","first-page":"79","DOI":"10.3390\/s25010079","volume":"25","author":"N Singh","year":"2025","unstructured":"Singh, N., Buyya, R., Kim, H.: Securing Cloud-Based internet of things: Challenges and mitigations. Sensors. 25, 79 (2025). https:\/\/doi.org\/10.3390\/s25010079","journal-title":"Sensors"},{"key":"5794_CR4","doi-asserted-by":"crossref","unstructured":"Dehalwar, V., Kolhe, M.L., Solanki, S., Jhariya, M.K., Ogura, K.: Blockchain based Device identification and authentication in a Smart Grid, 2020 5th International Conference on Smart and Sustainable Technologies (SpliTech), Split, Croatia, pp. 1\u20135 (2020)","DOI":"10.23919\/SpliTech49282.2020.9243707"},{"key":"5794_CR5","volume":"10","author":"A Ayub Khan","year":"2024","unstructured":"Ayub Khan, A., Laghari, A.A., Baqasah, M., Alroobaea, A., Almadhor, R., Avelino Sampedro, A., Kryvinska, G.: Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput. Sci. 10, e1933 (2024)","journal-title":"PeerJ Comput. Sci."},{"key":"5794_CR6","doi-asserted-by":"crossref","unstructured":"Vasudev Dehalwar, M.L., Kolhe, S., Deoli: Mahendra Kumar Jhariya, Blockchain-based trust management and authentication of devices in smart grid, Cleaner Engineering and Technology, Volume 8, 100481, ISSN 2666\u20137908, (2022). (2022)","DOI":"10.1016\/j.clet.2022.100481"},{"issue":"12","key":"5794_CR7","doi-asserted-by":"publisher","first-page":"18908","DOI":"10.1109\/JIOT.2025.3545737","volume":"12","author":"JS Yalli","year":"2025","unstructured":"Yalli, J.S., et al.: A systematic review for evaluating IoT security: A focus on Authentication, protocols and enabling technologies. IEEE Internet Things J. 12(12), 18908\u201318928 (2025)","journal-title":"IEEE Internet Things J."},{"key":"5794_CR8","doi-asserted-by":"crossref","unstructured":"Yalli, J.S., Hasan, M.H., Jung, L.T.: Safwan Mahmood Al-Selwi, Authentication schemes for Internet of Things (IoT) networks: A systematic review and security assessment, Internet of Things, Volume 30, 101469, ISSN 2542\u20136605, (2025)","DOI":"10.1016\/j.iot.2024.101469"},{"key":"5794_CR9","doi-asserted-by":"publisher","unstructured":"Khan, A.A., Yang, J., Laghari, A.A., Baqasah, A.M., Alroobaea, R., Ku, C.S., Alizadehsani, R., Rajendra Acharya, U.: Lip yee Por, BAIoT-EMS: Consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things, engineering applications of artificial intelligence, 141, 109838, ISSN 0952\u20131976, (2025). https:\/\/doi.org\/10.1016\/j.engappai.2024.109838","DOI":"10.1016\/j.engappai.2024.109838"},{"issue":"7","key":"5794_CR10","doi-asserted-by":"publisher","first-page":"6235","DOI":"10.1109\/JIOT.2022.3224465","volume":"10","author":"J Noh","year":"2023","unstructured":"Noh, J., Kwon, Y., Son, J., Cho, S.: Blockchain-Based One-Time authentication for secure V2X communication against insiders and authority compromise attacks. IEEE Internet Things J 10(7), 6235\u20136248 (2023)","journal-title":"IEEE Internet Things J"},{"key":"5794_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06782-7","volume":"81","author":"AA Khan","year":"2025","unstructured":"Khan, A.A., Laghari, A.A., Baqasah, A.M., et al.: BDLT-IoMT\u2014a novel architecture: SVM machine learning for robust and secure data processing in internet of medical things with blockchain cybersecurity. J. Supercomput 81, 271 (2025). https:\/\/doi.org\/10.1007\/s11227-024-06782-7","journal-title":"J. Supercomput"},{"key":"5794_CR12","doi-asserted-by":"publisher","first-page":"69383","DOI":"10.1109\/ACCESS.2024.3401591","volume":"12","author":"AA Khan","year":"2024","unstructured":"Khan, A.A., et al.: Secure Remote Sensing Data with Blockchain Distributed Ledger Technology: A Solution for Smart Cities. IEEE Access 12, 69383\u201369396 (2024)","journal-title":"IEEE Access"},{"key":"5794_CR13","doi-asserted-by":"crossref","unstructured":"Alyazia Aldhaheri, F., Alwahedi, M.A., Ferrag, A., Battah: Deep learning for cyber threat detection in IoT networks: A review. Internet Things Cyber-Phys. Syst. 4, 110\u2013128 (2024)","DOI":"10.1016\/j.iotcps.2023.09.003"},{"issue":"Issue 2","key":"5794_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100220","volume":"4","author":"LP Rachakonda","year":"2024","unstructured":"Rachakonda, L.P., Siddula, M., Sathya, V.: A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G\/6G\/beyond). High-Confidence Computing 4(Issue 2), 100220 (2024). https:\/\/doi.org\/10.1016\/j.hcc.2024.100220","journal-title":"High-Confidence Computing"},{"key":"5794_CR15","unstructured":"NASA: Cybersecurity Management and Oversight at the Jet Propulsion Laboratory (Report No. IG-19-022). (2019). Retrieved from https:\/\/oig.nasa.gov\/docs\/IG-19-022.pdf"},{"key":"5794_CR16","unstructured":"Khan, A.A., Dhabi, S., Yang, J., Alhakami, W., Bourouis, S., Yee, P.L., B-LPoET:, Part, A.: 109343, ISSN 0045\u20137906, (2024)"},{"key":"5794_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2025.112274","volume":"Volume 171","author":"TM Beigh","year":"2026","unstructured":"Beigh, T.M., Prasanna Venkatesan, D.V., Arumugam, J.: Predictive summarization framework for resource-constrained device surveillance videos. Pattern Recognition Volume 171, 112274 (2026). https:\/\/doi.org\/10.1016\/j.patcog.2025.112274","journal-title":"Pattern Recognition"},{"issue":"1","key":"5794_CR18","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/TII.2022.3204692","volume":"19","author":"SK Singh","year":"2023","unstructured":"Singh, S.K., Park, J.H.: TaLWaR: Blockchain-Based trust management scheme for smart enterprises with augmented intelligence. IEEE Transactions on Industrial Informatics 19(1), 626\u2013634 (2023)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"5794_CR19","doi-asserted-by":"publisher","first-page":"28370","DOI":"10.1109\/ACCESS.2023.3259068","volume":"11","author":"A Garba","year":"2023","unstructured":"Garba, A., et al.: LightCert4IoTs: Blockchain-Based lightweight certificates authentication for IoT applications. IEEE Access 11, 28370\u201328383 (2023)","journal-title":"IEEE Access"},{"issue":"1","key":"5794_CR20","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1109\/TWC.2023.3278108","volume":"23","author":"Z Zhou","year":"2024","unstructured":"Zhou, Z., et al.: Blockchain-Based secure and efficient secret image sharing with outsourcing computation in wireless networks. IEEE Trans. Wireless Commun. 23(1), 423\u2013435 (2024)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"5794_CR21","doi-asserted-by":"publisher","first-page":"3817","DOI":"10.1109\/TIFS.2023.3288689","volume":"18","author":"K Yang","year":"2023","unstructured":"Yang, K., Zhang, Z., Youliang, T., Ma, J.: A secure authentication framework to guarantee the traceability of avatars in metaverse. IEEE Transactions on Information Forensics and Security 18, 3817\u20133832 (2023)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"5794_CR22","doi-asserted-by":"publisher","first-page":"8535","DOI":"10.1109\/TAES.2023.3306336","volume":"59","author":"Z Wu","year":"2023","unstructured":"Wu, Z., Shang, T., Yue, M., Liu, L.: ADS-Bchain: A Blockchain-Based trusted service scheme for automatic dependent surveillance broadcast. IEEE Trans. Aerosp. Electron. Syst. 59(6), 8535\u20138549 (2023)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"4","key":"5794_CR23","doi-asserted-by":"publisher","first-page":"4380","DOI":"10.1109\/TAES.2023.3241041","volume":"59","author":"Z Wu","year":"2023","unstructured":"Wu, Z., Liang, C., Zhang, Y.: Blockchain-Based authentication of GNSS civil navigation message. IEEE Trans. Aerosp. Electron. Syst. 59(4), 4380\u20134392 (2023)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"5794_CR24","doi-asserted-by":"crossref","unstructured":"Tao, Q., Ding, H., Jiang, T., Cui, X.: B-DSPA: A Blockchain-Based dynamically scalable privacy-preserving authentication scheme in vehicular ad hoc Networks. IEEE Internet Things J. 11(1), 1385\u20131397 (2024)","DOI":"10.1109\/JIOT.2023.3289057"},{"issue":"12","key":"5794_CR25","doi-asserted-by":"publisher","first-page":"15200","DOI":"10.1109\/TVT.2023.3289175","volume":"72","author":"Q Xie","year":"2023","unstructured":"Xie, Q., Ding, Z., Tang, W., He, D., Tan, X.: Provable secure and lightweight Blockchain-Based V2I handover authentication and V2V broadcast protocol for VANETs. IEEE Trans. Veh. Technol. 72(12), 15200\u201315212 (2023)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"5794_CR26","first-page":"1127","volume":"23","author":"J Zhang","year":"2024","unstructured":"Zhang, J., Jiang, Y., Cui, J., He, D., Bolodurina, I., Zhong, H.: DBCPA: Dual Blockchain-Assisted conditional Privacy-Preserving authentication framework and protocol for vehicular ad hoc networks. IEEE Trans. Mob. Comput 23(2), 1127\u20131141 (2024)","journal-title":"IEEE Trans. Mob. Comput"},{"issue":"2","key":"5794_CR27","first-page":"2322","volume":"24","author":"P Zhang","year":"2023","unstructured":"Zhang, P., Wang, Y., Aujla, G.S., Jindal, A., Otaibi, Y.D.: A Blockchain-based authentication scheme and secure architecture for IoT-Enabled maritime transportation systems. IEEE Trans. Intell. Transp. Syst. 24(2), 2322\u20132331 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5794_CR28","doi-asserted-by":"crossref","unstructured":"Subramani, J., Maria, A., Rajasekaran, A.S., Turjman, F.A., Gopal, M.: Blockchain-based physically secure and privacy-aware anonymous authentication scheme for fog-based Vanets. IEEE Access 11, 17138\u201317150 (2023)","DOI":"10.1109\/ACCESS.2022.3230448"},{"issue":"7","key":"5794_CR29","doi-asserted-by":"publisher","first-page":"8929","DOI":"10.1109\/TVT.2023.3246466","volume":"72","author":"J Liu","year":"2023","unstructured":"Liu, J., et al.: CPAHP: Conditional Privacy-Preserving authentication scheme with hierarchical pseudonym for 5G-Enabled IoV. IEEE Trans. Veh. Technol 72(7), 8929\u20138940 (2023)","journal-title":"IEEE Trans. Veh. Technol"},{"key":"5794_CR30","doi-asserted-by":"crossref","unstructured":"Karim, S.M., Habbal, A., Chaudhry, S.A., Irshad, A.: BSDCE-IoV: Blockchain-based secure data collection and exchange scheme for IoV in 5G Environment. IEEE Access 11, 36158\u201336175 (2023)","DOI":"10.1109\/ACCESS.2023.3265959"},{"issue":"6","key":"5794_CR31","first-page":"3491","volume":"10","author":"SK Dwivedi","year":"2023","unstructured":"Dwivedi, S.K., Amin, R., Vollala, S., Khan, M.K.: B-HAS: Blockchain-Assisted efficient handover authentication and secure communication protocol in VANETs. IEEE Trans. Netw. Sci. Eng. 10(6), 3491\u20133504 (2023)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"3","key":"5794_CR32","first-page":"1818","volume":"20","author":"C Lin","year":"2023","unstructured":"Lin, C., Huang, X., He, D.: EBCPA: Efficient Blockchain-Based conditional Privacy-Preserving authentication for VANETs. IEEE Trans. Dependable Secur. Comput 20(3), 1818\u20131832 (2023)","journal-title":"IEEE Trans. Dependable Secur. Comput"},{"issue":"2","key":"5794_CR33","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1109\/TNSM.2022.3217320","volume":"20","author":"MA Zawawy","year":"2023","unstructured":"Zawawy, M.A., Brighente, A., Conti, M.: Authenticating Drone-Assisted internet of vehicles using elliptic curve cryptography and blockchain. IEEE Trans. Netw. Serv. Manage 20(2), 1775\u20131789 (2023)","journal-title":"IEEE Trans. Netw. Serv. Manage"},{"key":"5794_CR34","doi-asserted-by":"publisher","first-page":"60240","DOI":"10.1109\/ACCESS.2023.3286016","volume":"11","author":"S Son","year":"2023","unstructured":"Son, S., Kwon, D., Lee, S., Jeon, Y., Das, A.K., Park, Y.: Design of secure and lightweight authentication scheme for UAV-enabled intelligent transportation systems using blockchain and PUF. IEEE Access 11, 60240\u201360253 (2023)","journal-title":"IEEE access"},{"issue":"1","key":"5794_CR35","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1109\/TII.2023.3271127","volume":"20","author":"P Zhang","year":"2024","unstructured":"Zhang, P., Yang, P., Kumar, N., Hsu, C.H., Wu, S., Zhou, F.: RRV-BC: Random reputation voting mechanism and blockchain assisted access authentication for industrial internet of things. IEEE Transactions on Industrial Informatics 20(1), 713\u2013722 (2024)","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"5794_CR36","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/TNSE.2023.3292624","volume":"11","author":"Y Liu","year":"2024","unstructured":"Liu, Y., et al.: A Blockchain-Based Cross-Domain authentication management system for IoT devices. IEEE Trans. Netw. Sci. Eng. 11(1), 115\u2013127 (2024)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"2","key":"5794_CR37","doi-asserted-by":"publisher","first-page":"3316","DOI":"10.1109\/JIOT.2023.3296506","volume":"11","author":"J Dong","year":"2024","unstructured":"Dong, J., Xu, G., Ma, C., Liu, J., Cliff, U.G.O.: Blockchain-Based Certificate-Free Cross-Domain authentication mechanism for industrial internet. IEEE Internet Things J. 11(2), 3316\u20133330 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5794_CR38","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TDSC.2022.3163138","volume":"20","author":"K Park","year":"2023","unstructured":"Park, K., Lee, J., Das, A.K., Park, Y.: BPPS:Blockchain-Enabled Privacy-Preserving scheme for Demand-Response management in smart grid environments. IEEE Transactions on Dependable and Secure Computing 20(2), 1719\u20131729 (2023)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"5794_CR39","doi-asserted-by":"crossref","unstructured":"Deebak, B.D., et al.: A lightweight blockchain-based remote mutual authentication for AI-empowered IoT sustainable computing Systems. IEEE Internet Things J. 10(8), 6652\u20136660 (2023)","DOI":"10.1109\/JIOT.2022.3152546"},{"key":"5794_CR40","doi-asserted-by":"crossref","unstructured":"Papaioannou, M., Zachos, G., Mantas, G., Essop, A., Karasuwa, A., Rodriguez, J.: Generating Datasets Based on the HuMIdb Dataset for Risk-based User Authentication on Smartphones, 2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Paris, France, pp. 134\u2013139, (2022)","DOI":"10.1109\/CAMAD55695.2022.9966901"},{"key":"5794_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33386-6_29","volume-title":"Trends in Data Protection and Encryption Technologies","author":"B M\u00fcller","year":"2023","unstructured":"M\u00fcller, B.: Authentication. In: Mulder, V., Mermoud, A., Lenders, V., Tellenbach, B. (eds.) Trends in Data Protection and Encryption Technologies. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-33386-6_29"},{"key":"5794_CR42","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Nickolaos Koroniotis","year":"2019","unstructured":"Nickolaos Koroniotis, N., Moustafa, E., Sitnikova, B., Turnbull: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Generation Comput. Syst. 100, 779\u2013796 (2019). ISSN 0167-739X https:\/\/doi.org\/10.1016\/j.future.2019.05.041","journal-title":"Future Generation Comput. Syst."},{"issue":"13","key":"5794_CR43","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: CICIoT2023: A Real-Time dataset and benchmark for Large-Scale attacks in IoT environment. Sensors 23(13), 5941 (2023). https:\/\/doi.org\/10.3390\/s23135941","journal-title":"Sensors"},{"issue":"13","key":"5794_CR44","doi-asserted-by":"publisher","DOI":"10.3390\/s24134122","volume":"24","author":"T Shi","year":"2024","unstructured":"Shi, T., McCann, R.A., Huang, Y., Wang, W., Kong, J.: Malware detection for internet of things using One-Class classification. Sensors 24(13), 4122 (2024). https:\/\/doi.org\/10.3390\/s24134122","journal-title":"Sensors"},{"key":"5794_CR45","doi-asserted-by":"publisher","unstructured":"Mohammad Hasan, M.S., Rahman, H., Janicke, I.H., Sarker: Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis, Blockchain: Research and Applications, Volume 5, Issue 3, 100207, ISSN 2096\u20137209, (2024). https:\/\/doi.org\/10.1016\/j.bcra.2024.100207","DOI":"10.1016\/j.bcra.2024.100207"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05794-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05794-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05794-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:08:32Z","timestamp":1773925712000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05794-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,11]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5794"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05794-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,11]]},"assertion":[{"value":"19 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"28"}}