{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T12:24:51Z","timestamp":1769603091463,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11227-023-05712-3","type":"journal-article","created":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T17:01:39Z","timestamp":1698685299000},"page":"6855-6890","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments"],"prefix":"10.1007","volume":"80","author":[{"given":"Naveen Chandra","family":"Gowda","sequence":"first","affiliation":[]},{"given":"Sunilkumar S.","family":"Manvi","sequence":"additional","affiliation":[]},{"given":"A. Bharathi","family":"Malakreddy","sequence":"additional","affiliation":[]},{"given":"Rajkumar","family":"Buyya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,30]]},"reference":[{"key":"5712_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.4018\/joeuc.2018100102","volume":"30","author":"S Namasudra","year":"2018","unstructured":"Namasudra S, Roy P (2018) PpBAC. J Organ End User Comput 30:14\u201331. https:\/\/doi.org\/10.4018\/joeuc.2018100102","journal-title":"J Organ End User Comput"},{"key":"5712_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3318212","volume":"10","author":"H Xiong","year":"2019","unstructured":"Xiong H, Wang Y, Li W, Chen C-M (2019) Flexible, efficient, and secure access delegation in cloud computing. ACM Trans Manag Inf Syst 10:1\u201320. https:\/\/doi.org\/10.1145\/3318212","journal-title":"ACM Trans Manag Inf Syst"},{"key":"5712_CR3","doi-asserted-by":"publisher","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing-MCC\u201912. https:\/\/doi.org\/10.1145\/2342509.2342513","DOI":"10.1145\/2342509.2342513"},{"key":"5712_CR4","doi-asserted-by":"publisher","first-page":"2070","DOI":"10.1007\/s11227-018-2701-2","volume":"75","author":"SP Singh","year":"2019","unstructured":"Singh SP, Nayyar A, Kumar R (2019) Sharma A, Fog computing: from architecture to edge computing and big data processing. J Supercomput 75:2070\u20132105. https:\/\/doi.org\/10.1007\/s11227-018-2701-2","journal-title":"J Supercomput"},{"key":"5712_CR5","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-8295-3.ch002","author":"SS Manvi","year":"2019","unstructured":"Manvi SS, Gowda NC (2019) Trust management in fog computing. Appl Integr Tech Methods Distrib Syst Technol. https:\/\/doi.org\/10.4018\/978-1-5225-8295-3.ch002","journal-title":"Appl Integr Tech Methods Distrib Syst Technol"},{"key":"5712_CR6","doi-asserted-by":"publisher","first-page":"103332","DOI":"10.1016\/j.jisa.2022.103332","volume":"70","author":"MH Murtaza","year":"2022","unstructured":"Murtaza MH, Tahir H, Tahir S, Alizai ZA, Riaz Q, Hussain M (2022) A portable hardware security module and cryptographic key generator. J Inf Secur Appl 70:103332. https:\/\/doi.org\/10.1016\/j.jisa.2022.103332","journal-title":"J Inf Secur Appl"},{"key":"5712_CR7","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.3390\/electronics10141691","volume":"10","author":"M Mehdi","year":"2021","unstructured":"Mehdi M, Ajani MT, Tahir H, Tahir S, Alizai Z, Khan F, Riaz Q, Hussain M (2021) PUF-based key generation scheme for secure group communication using MEMS. Electronics 10:1691. https:\/\/doi.org\/10.3390\/electronics10141691","journal-title":"Electronics"},{"key":"5712_CR8","doi-asserted-by":"publisher","DOI":"10.15439\/2014f503","author":"I Stojmenovic","year":"2014","unstructured":"Stojmenovic I, Wen S (2014) The fog computing paradigm scenarios and security issues. Ann Comput Sci Inf Syst. https:\/\/doi.org\/10.15439\/2014f503","journal-title":"Ann Comput Sci Inf Syst"},{"key":"5712_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-023-01208-3","author":"N Kaliya","year":"2023","unstructured":"Kaliya N, Pawar D (2023) Unboxing fog security: a review of fog security and authentication mechanisms. Computing. https:\/\/doi.org\/10.1007\/s00607-023-01208-3","journal-title":"Computing"},{"key":"5712_CR10","doi-asserted-by":"publisher","first-page":"3543","DOI":"10.3390\/s23073543","volume":"23","author":"ZG Al-Mekhlafi","year":"2023","unstructured":"Al-Mekhlafi ZG, Al-Shareeda MA, Manickam S, Mohammed BA, Alreshidi A, Alazmi M, Alshudukhi JS, Alsaffar M, Rassem TH (2023) Efficient authentication scheme for 5G-enabled vehicular networks using fog computing. Sensors 23:3543. https:\/\/doi.org\/10.3390\/s23073543","journal-title":"Sensors"},{"key":"5712_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7742","author":"M Luqman","year":"2023","unstructured":"Luqman M, Faridi AR (2023) Authentication of fog-assisted IoT networks using advanced encryption credibility approach with modified Diffie\u2013Hellman encryption. Concurr Comput. https:\/\/doi.org\/10.1002\/cpe.7742","journal-title":"Concurr Comput"},{"key":"5712_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7673","author":"S Saravanakumar","year":"2023","unstructured":"Saravanakumar S, Saravanan T (2023) Secure personal authentication in fog devices via multimodal rank-level fusion. Concurr Comput. https:\/\/doi.org\/10.1002\/cpe.7673","journal-title":"Concurr Comput"},{"key":"5712_CR13","doi-asserted-by":"publisher","first-page":"102932","DOI":"10.1016\/j.jnca.2020.102932","volume":"176","author":"L Loffi","year":"2021","unstructured":"Loffi L, Westphall CM, Grudtner LD, Westphall CB (2021) Mutual authentication with multi-factor in IoT-Fog-Cloud environment. J Netw Comput Appl 176:102932. https:\/\/doi.org\/10.1016\/j.jnca.2020.102932","journal-title":"J Netw Comput Appl"},{"key":"5712_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/4520685","volume":"2019","author":"J Mo","year":"2019","unstructured":"Mo J, Hu Z, Chen H, Shen W (2019) An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing. Wirel Commun Mob Comput 2019:1\u201312. https:\/\/doi.org\/10.1155\/2019\/4520685","journal-title":"Wirel Commun Mob Comput"},{"key":"5712_CR15","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/tifs.2016.2647225","volume":"12","author":"P Kumar","year":"2017","unstructured":"Kumar P, Braeken A, Gurtov A, Iinatti J, Ha PH (2017) Anonymous secure framework in connected smart home environments. IEEE Trans Inform Forensic Secur 12:968\u2013979. https:\/\/doi.org\/10.1109\/tifs.2016.2647225","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"5712_CR16","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1007\/s11227-017-2190-8","volume":"74","author":"A Braeken","year":"2017","unstructured":"Braeken A, Kumar P, Liyanage M, Hue TTK (2017) An efficient anonymous authentication protocol in multiple server communication networks (EAAM). J Supercomput 74:1695\u20131714. https:\/\/doi.org\/10.1007\/s11227-017-2190-8","journal-title":"J Supercomput"},{"key":"5712_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2016.2602282","author":"V Odelu","year":"2016","unstructured":"Odelu V, Das AK, Wazid M, Conti M (2016) Provably Secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid. https:\/\/doi.org\/10.1109\/tsg.2016.2602282","journal-title":"IEEE Trans. Smart Grid"},{"key":"5712_CR18","doi-asserted-by":"publisher","first-page":"103183","DOI":"10.1016\/j.jnca.2021.103183","volume":"193","author":"J Guo","year":"2021","unstructured":"Guo J, Du Y, Zhang Y, Li M (2021) A provably secure ECC-based access and handover authentication protocol for space information networks. J Netw Comput Appl 193:103183. https:\/\/doi.org\/10.1016\/j.jnca.2021.103183","journal-title":"J Netw Comput Appl"},{"key":"5712_CR19","doi-asserted-by":"publisher","first-page":"22313","DOI":"10.1109\/access.2017.2757844","volume":"5","author":"HA Al Hamid","year":"2017","unstructured":"Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:22313\u201322328. https:\/\/doi.org\/10.1109\/access.2017.2757844","journal-title":"IEEE Access"},{"key":"5712_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3161935","author":"C Ke","year":"2022","unstructured":"Ke C, Zhu Z, Xiao F, Huang Z, Meng Y (2022) SDN-based privacy and functional authentication scheme for fog nodes of smart healthcare. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/jiot.2022.3161935","journal-title":"IEEE Internet Things J"},{"key":"5712_CR21","doi-asserted-by":"publisher","first-page":"6992","DOI":"10.1007\/s11227-020-03548-9","volume":"77","author":"TY Wu","year":"2021","unstructured":"Wu TY, Lee Z, Yang L (2021) Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J Supercomput 77:6992\u20137020. https:\/\/doi.org\/10.1007\/s11227-020-03548-9","journal-title":"J Supercomput"},{"key":"5712_CR22","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1080\/17517575.2020.1712746","volume":"15","author":"C-M Chen","year":"2020","unstructured":"Chen C-M, Huang Y, Wang K-H, Kumari S, Wu M-E (2020) A secure authenticated and key exchange scheme for fog computing. Enterprise Information Systems 15:1200\u20131215. https:\/\/doi.org\/10.1080\/17517575.2020.1712746","journal-title":"Enterprise Information Systems"},{"key":"5712_CR23","doi-asserted-by":"publisher","first-page":"e4072","DOI":"10.1002\/dac.4072","volume":"32","author":"D Tiwari","year":"2019","unstructured":"Tiwari D, Chaturvedi GK, Gangadharan GR (2019) ACDAS: Authenticated controlled data access and sharing scheme for cloud storage. Int J Commun Syst 32:e4072. https:\/\/doi.org\/10.1002\/dac.4072","journal-title":"Int J Commun Syst"},{"key":"5712_CR24","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-020-00227-9","author":"MA Akram","year":"2020","unstructured":"Akram MA, Ghaffar Z, Mahmood K, Kumari S, Agarwal K, Chen C-M (2020) An anonymous authenticated key-agreement scheme for multi-server infrastructure. Hum Cent Comput Inf Sci. https:\/\/doi.org\/10.1186\/s13673-020-00227-9","journal-title":"Hum Cent Comput Inf Sci"},{"key":"5712_CR25","doi-asserted-by":"publisher","first-page":"84","DOI":"10.3390\/sym10040084","volume":"10","author":"C-L Liu","year":"2018","unstructured":"Liu C-L, Tsai W-J, Chang T-Y, Liu T-M (2018) Ephemeral-secret-leakage secure ID based three-party authenticated key agreement protocol for mobile distributed computing environments. Symmetry 10:84. https:\/\/doi.org\/10.3390\/sym10040084","journal-title":"Symmetry"},{"key":"5712_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02084-6","author":"S Patonico","year":"2019","unstructured":"Patonico S, Braeken A, Steenhaut K (2019) Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti\u2013Krawczyk security model. Wireless Netw. https:\/\/doi.org\/10.1007\/s11276-019-02084-6","journal-title":"Wireless Netw"},{"key":"5712_CR27","doi-asserted-by":"publisher","first-page":"13893","DOI":"10.1007\/s11227-022-04411-9","volume":"78","author":"TY Wu","year":"2022","unstructured":"Wu TY, Meng Q, Yang L, Guo X, Kumari S (2022) A provably secure lightweight authentication protocol in mobile edge computing environments. J Supercomput 78:13893\u201313914. https:\/\/doi.org\/10.1007\/s11227-022-04411-9","journal-title":"J Supercomput"},{"key":"5712_CR28","doi-asserted-by":"publisher","first-page":"103177","DOI":"10.1016\/j.jnca.2021.103177","volume":"192","author":"AYF Alsahlani","year":"2021","unstructured":"Alsahlani AYF, Popa A (2021) LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment. J Netw Comput Appl 192:103177. https:\/\/doi.org\/10.1016\/j.jnca.2021.103177","journal-title":"J Netw Comput Appl"},{"key":"5712_CR29","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","volume":"91","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475\u2013492. https:\/\/doi.org\/10.1016\/j.future.2018.09.017","journal-title":"Futur Gener Comput Syst"},{"key":"5712_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05064-y","author":"AK Yadav","year":"2023","unstructured":"Yadav AK, Braeken A, Misra M (2023) Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-023-05064-y","journal-title":"J Supercomput"},{"key":"5712_CR31","doi-asserted-by":"publisher","first-page":"103204","DOI":"10.1016\/j.jnca.2021.103204","volume":"193","author":"X Yan","year":"2021","unstructured":"Yan X, Ma M (2021) A lightweight and secure handover authentication scheme for 5G network using neighbour base stations. J Netw Comput Appl 193:103204. https:\/\/doi.org\/10.1016\/j.jnca.2021.103204","journal-title":"J Netw Comput Appl"},{"key":"5712_CR32","doi-asserted-by":"publisher","first-page":"8804","DOI":"10.1109\/jiot.2019.2923611","volume":"6","author":"M Wazid","year":"2019","unstructured":"Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJPC, Park Y (2019) AKMIoV: authenticated key management protocol in fog computing-based internet of vehicles deployment. IEEE Internet Things J 6:8804\u20138817. https:\/\/doi.org\/10.1109\/jiot.2019.2923611","journal-title":"IEEE Internet Things J"},{"key":"5712_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5655-2_30","author":"HS Ali","year":"2022","unstructured":"Ali HS, Sridevi R (2022) Credential-based authentication mechanism for IoT devices in fog-cloud computing. ICT Anal Appl. https:\/\/doi.org\/10.1007\/978-981-16-5655-2_30","journal-title":"ICT Anal Appl"},{"key":"5712_CR34","doi-asserted-by":"publisher","first-page":"27588","DOI":"10.1109\/access.2021.3058180","volume":"9","author":"S Lu","year":"2021","unstructured":"Lu S, Li X (2021) Quantum-resistant lightweight authentication and key agreement protocol for fog-based microgrids. IEEE Access 9:27588\u201327600. https:\/\/doi.org\/10.1109\/access.2021.3058180","journal-title":"IEEE Access"},{"key":"5712_CR35","doi-asserted-by":"publisher","first-page":"101752","DOI":"10.1016\/j.asej.2022.101752","volume":"13","author":"M Hamada","year":"2022","unstructured":"Hamada M, Salem SA, Salem FM (2022) LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments. Ain Shams Eng J 13:101752. https:\/\/doi.org\/10.1016\/j.asej.2022.101752","journal-title":"Ain Shams Eng J"},{"key":"5712_CR36","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1007\/s00607-022-01055-8","volume":"104","author":"U Chatterjee","year":"2022","unstructured":"Chatterjee U, Ray S, Khan MK, Dasgupta M, Chen C-M (2022) An ECC based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104:1359\u20131395. https:\/\/doi.org\/10.1007\/s00607-022-01055-8","journal-title":"Computing"},{"key":"5712_CR37","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/tit.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29:198\u2013208. https:\/\/doi.org\/10.1109\/tit.1983.1056650","journal-title":"IEEE Trans Inform Theory"},{"key":"5712_CR38","doi-asserted-by":"publisher","unstructured":"Das AK, Sengupta I (2008) An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. In: 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE \u201908). https:\/\/doi.org\/10.1109\/comswa.2008.4554370","DOI":"10.1109\/comswa.2008.4554370"},{"key":"5712_CR39","doi-asserted-by":"crossref","unstructured":"Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the advances in cryptology (Eurocrypt\u201904), LNCS, vol 3027","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"5712_CR40","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/tdsc.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang D, He D, Wang P, Chu C-H (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12:428\u2013442. https:\/\/doi.org\/10.1109\/tdsc.2014.2355850","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"5712_CR41","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18\u201336. https:\/\/doi.org\/10.1145\/77648.77649","journal-title":"ACM Trans Comput Syst"},{"key":"5712_CR42","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/tdsc.2017.2764083","volume":"17","author":"M Wazid","year":"2020","unstructured":"Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2020) Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Dependable Secure Comput 17:391\u2013406. https:\/\/doi.org\/10.1109\/tdsc.2017.2764083","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"5712_CR43","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/tifs.2018.2850299","volume":"14","author":"L Wu","year":"2019","unstructured":"Wu L, Wang J, Choo K-KR, He D (2019) Secure key agreement and key protection for mobile device user authentication. IEEE Trans Inform Forensics Secur 14:319\u2013330. https:\/\/doi.org\/10.1109\/tifs.2018.2850299","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"5712_CR44","unstructured":"Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. p 05\u201316"},{"key":"5712_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69893-5_22","author":"KS Awaisi","year":"2021","unstructured":"Awaisi KS, Abbas A, Khan SU, Mahmud R, Buyya R (2021) Simulating fog computing applications using iFogSim toolkit. Mob Edge Comput. https:\/\/doi.org\/10.1007\/978-3-030-69893-5_22","journal-title":"Mob Edge Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05712-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05712-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05712-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T20:17:59Z","timestamp":1710274679000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05712-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":45,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["5712"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05712-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,30]]},"assertion":[{"value":"6 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Ethical approval is not required and not applicable to publish this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}