{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T21:13:28Z","timestamp":1773782008271,"version":"3.50.1"},"reference-count":117,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T00:00:00Z","timestamp":1705968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T00:00:00Z","timestamp":1705968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11235-023-01089-z","type":"journal-article","created":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T02:04:05Z","timestamp":1705975445000},"page":"503-538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Secure and trustworthiness\u00a0IoT systems: investigations and literature review"],"prefix":"10.1007","volume":"85","author":[{"given":"Wiem","family":"Bekri","sequence":"first","affiliation":[]},{"given":"Rihab","family":"Jmal","sequence":"additional","affiliation":[]},{"given":"Lamia Chaari","family":"Fourati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,23]]},"reference":[{"issue":"15","key":"1089_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787\u20132805.","journal-title":"Computer networks"},{"key":"1089_CR2","unstructured":"Bekri, W., Jmal, R., & Fourati, L. C. Internet of Things Management Based on Software Defined Networking: A Survey."},{"issue":"44","key":"1089_CR3","first-page":"46","volume":"21","author":"N Scarpato","year":"2017","unstructured":"Scarpato, N., Pieroni, A., Di Nunzio, L., & Fallucchi, F. (2017). E-health-IoT universe: A review. Management, 21(44), 46.","journal-title":"Management"},{"key":"1089_CR4","doi-asserted-by":"crossref","unstructured":"Gerla, M., Lee, E. K., Pau, G., & Lee, U. (2014). Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In:\u00a02014 IEEE world forum on internet of things (WF-IoT)\u00a0(pp. 241\u2013246). IEEE.","DOI":"10.1109\/WF-IoT.2014.6803166"},{"issue":"4","key":"1089_CR5","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TII.2011.2166794","volume":"7","author":"VC Gungor","year":"2011","unstructured":"Gungor, V. C., Sahin, D., Kocak, T., Ergut, S., Buccella, C., Cecati, C., & Hancke, G. P. (2011). Smart grid technologies: Communication technologies and standards. IEEE transactions on Industrial informatics, 7(4), 529\u2013539.","journal-title":"IEEE transactions on Industrial informatics"},{"key":"1089_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006","author":"BL Risteska Stojkoska","year":"2016","unstructured":"Risteska Stojkoska, B. L., & Trivodaliev, K. V. (2016). A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production. https:\/\/doi.org\/10.1016\/j.jclepro.2016.10.006","journal-title":"Journal of Cleaner Production"},{"key":"1089_CR7","doi-asserted-by":"crossref","unstructured":"Su, K., Li, J., & Fu, H. (2011). Smart city and the applications. In:\u00a02011 international conference on electronics, communications and control (ICECC)\u00a0(pp. 1028\u20131031). IEEE.","DOI":"10.1109\/ICECC.2011.6066743"},{"key":"1089_CR8","unstructured":"Zhao, J. C., Zhang, J. F., Feng, Y., & Guo, J. X. (2010). The study and application of the IOT technology in agriculture. In:\u00a02010 3rd International Conference on Computer Science and Information Technology\u00a0(Vol. 2, pp. 462\u2013465). IEEE."},{"issue":"1","key":"1089_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42452-020-03978-3","volume":"3","author":"S Bhatt","year":"2021","unstructured":"Bhatt, S., & Ragiri, P. R. (2021). Security trends in Internet of Things: A survey. SN Applied Sciences, 3(1), 1\u201314.","journal-title":"SN Applied Sciences"},{"key":"1089_CR10","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395\u2013411.","journal-title":"Future Generation Computer Systems"},{"key":"1089_CR11","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017, March). Blockchain for IoT security and privacy: The case study of a smart home. In:\u00a02017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops)\u00a0(pp. 618\u2013623). IEEE.","DOI":"10.1109\/PERCOMW.2017.7917634"},{"issue":"1","key":"1089_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2014","unstructured":"Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2014). Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14\u201376.","journal-title":"Proceedings of the IEEE"},{"key":"1089_CR13","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.comnet.2015.02.014","volume":"81","author":"H Farhady","year":"2015","unstructured":"Farhady, H., Lee, H., & Nakao, A. (2015). Software-defined networking: A survey. Computer Networks, 81, 79\u201395.","journal-title":"Computer Networks"},{"key":"1089_CR14","doi-asserted-by":"crossref","unstructured":"Kalkan, K., & Zeadally, S. (2017). Securing internet of things with software defined networking.\u00a0IEEE Communications Magazine,\u00a056(9), 186\u2013192.","DOI":"10.1109\/MCOM.2017.1700714"},{"key":"1089_CR15","doi-asserted-by":"crossref","unstructured":"Mohammed, A. H., KHALEEFAH, R. M., & Abdulateef, I. A. (2020, June). A Review Software Defined Networking for Internet of Things. In\u00a02020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)\u00a0(pp. 1\u20138). IEEE.","DOI":"10.1109\/HORA49412.2020.9152862"},{"issue":"16","key":"1089_CR16","doi-asserted-by":"publisher","first-page":"3059","DOI":"10.1002\/sec.1243","volume":"9","author":"Z Yan","year":"2016","unstructured":"Yan, Z., Zhang, P., & Vasilakos, A. V. (2016). A security and trust frameyanwork for virtualized networks and software-defined networking. Security and communication networks, 9(16), 3059\u20133069.","journal-title":"Security and communication networks"},{"issue":"3","key":"1089_CR17","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s12599-017-0467-3","volume":"59","author":"M Nofer","year":"2017","unstructured":"Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). Blockchain. Business and Information Systems Engineering, 59(3), 183\u2013187.","journal-title":"Business and Information Systems Engineering"},{"key":"1089_CR18","unstructured":"Karame, G. O., & Androulaki, E. (2016).\u00a0Bitcoin and blockchain security. Artech House."},{"key":"1089_CR19","volume-title":"An artificial intelligence approach","author":"RS Mitchell","year":"2013","unstructured":"Mitchell, R. S., Michalski, J. G., & Carbonell, T. M. (2013). An artificial intelligence approach. Springer."},{"key":"1089_CR20","doi-asserted-by":"crossref","unstructured":"Bao, F., & Chen, I. R. (2012). Dynamic trust management for internet of things applications. In\u00a0Proceedings of the 2012 international workshop on Self-aware internet of things\u00a0(pp. 1\u20136).","DOI":"10.1145\/2378023.2378025"},{"key":"1089_CR21","unstructured":"Bao, F., & Chen, R. (2012). Trust management for the internet of things and its application to service composition. In:\u00a02012 IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM)\u00a0(pp. 1\u20136). IEEE."},{"issue":"1","key":"1089_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-020-00248-4","volume":"10","author":"R Abassi","year":"2020","unstructured":"Abassi, R., Douss, A. B. C., & Sauveron, D. (2020). TSME: A trust-based security scheme for message exchange in vehicular Ad hoc networks. Human-centric Computing and Information Sciences, 10(1), 1\u201319.","journal-title":"Human-centric Computing and Information Sciences"},{"key":"1089_CR23","doi-asserted-by":"crossref","unstructured":"Zhao, Y. L. (2013). Research on data security technology in internet of things. In:\u00a0Applied Mechanics and Materials\u00a0(Vol. 433, pp. 1752\u20131755). Trans Tech Publications Ltd.","DOI":"10.4028\/www.scientific.net\/AMM.433-435.1752"},{"key":"1089_CR24","doi-asserted-by":"crossref","unstructured":"Hasan, T., Adnan, A., Giannetsos, T., & Malik, J. (2020). Orchestrating SDN Control Plane towards Enhanced IoT Security. In: 2020 6TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT)\u00a0(pp. 457\u2013464). IEEE.","DOI":"10.1109\/NetSoft48620.2020.9165424"},{"issue":"6","key":"1089_CR25","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1109\/TCSS.2019.2918467","volume":"6","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Xu, X., Liu, A., Lu, Q., Xu, L., & Tao, F. (2019). Blockchain-based trust mechanism for IoT-based smart manufacturing system. IEEE Transactions on Computational Social Systems, 6(6), 1386\u20131394.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"1089_CR26","unstructured":"Zennaro, M. (2017). Introduction to the Internet of Things.\u00a0Telecommunication and ICT4D Lab, The Abdus Salam International Centre for Theoretical Physics Trieste, Italy, pp. 1\u201348."},{"key":"1089_CR27","doi-asserted-by":"crossref","unstructured":"Zarca, A. M., Bernabe, J. B., Trapero, R., Rivera, D., Villalobos, J., Skarmeta, A., & Gouvas, P. (2019). Security management architecture for NFV\/SDN-aware IoT systems. IEEE Internet of Things Journal,\u00a06(5), 8005\u20138020.","DOI":"10.1109\/JIOT.2019.2904123"},{"key":"1089_CR28","doi-asserted-by":"crossref","unstructured":"Hammi, M. T., Bellot, P., & Serhrouchni, A. (2018, April). BCTrust: A decentralized authentication blockchain-based mechanism. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/WCNC.2018.8376948"},{"key":"1089_CR29","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi, M. T., Hammi, B., Bellot, P., & Serhrouchni, A. (2018). Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers and Security, 78, 126\u2013142.","journal-title":"Computers and Security"},{"key":"1089_CR30","doi-asserted-by":"crossref","unstructured":"Amangele, P., Reed, M. J., Al-Naday, M., Thomos, N., & Nowak, M. (2019). Hierarchical Machine Learning for IoT Anomaly Detection in SDN. In: 2019 International Conference on Information Technologies (InfoTech)\u00a0(pp. 1\u20134). IEEE.","DOI":"10.1109\/InfoTech.2019.8860878"},{"key":"1089_CR31","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). Toward generating a new intrusion detection dataset and intrusion traffic characterization. In\u00a0ICISSP\u00a0(pp. 108\u2013116).","DOI":"10.5220\/0006639801080116"},{"issue":"1","key":"1089_CR32","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/COMST.2018.2862350","volume":"21","author":"I Farris","year":"2018","unstructured":"Farris, I., Taleb, T., Khettab, Y., & Song, J. (2018). A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Communications Surveys and Tutorials, 21(1), 812\u2013837.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"1089_CR33","doi-asserted-by":"crossref","unstructured":"Mohanta, B. K., Jena, D., Satapathy, U., & Patnaik, S. (2020). Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology.\u00a0Internet of Things, p. 100227.","DOI":"10.1016\/j.iot.2020.100227"},{"key":"1089_CR34","doi-asserted-by":"crossref","unstructured":"Alfandi, O., Khanji, S., Ahmad, L., & Khattak, A. (2020). A survey on boosting IoT security and privacy through blockchain.\u00a0Cluster Computing, pp. 1\u201319.","DOI":"10.1007\/s10586-020-03137-8"},{"key":"1089_CR35","doi-asserted-by":"publisher","first-page":"56656","DOI":"10.1109\/ACCESS.2019.2913682","volume":"7","author":"L Xie","year":"2019","unstructured":"Xie, L., Ding, Y., Yang, H., & Wang, X. (2019). Blockchain-based secure and trustworthy Internet of Things in SDN-enabled 5G-VANETs. IEEE Access, 7, 56656\u201356666.","journal-title":"IEEE Access"},{"key":"1089_CR36","doi-asserted-by":"crossref","unstructured":"Shu, J., Zhou, L., Zhang, W., Du, X., & Guizani, M. (2020). Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach.\u00a0IEEE Transactions on Intelligent Transportation Systems.","DOI":"10.1109\/TITS.2020.3027390"},{"key":"1089_CR37","doi-asserted-by":"crossref","unstructured":"Khoa, T. V., Saputra, Y. M., Hoang, D. T., Trung, N. L., Nguyen, D., Ha, N. V., & Dutkiewicz, E. (2020, May). Collaborative learning model for cyberattack detection systems in iot industry 4.0. In\u00a02020 IEEE Wireless Communications and Networking Conference (WCNC)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/WCNC45663.2020.9120761"},{"issue":"3","key":"1089_CR38","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018). N-baiot\u2014Network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Computing, 17(3), 12\u201322.","journal-title":"IEEE Pervasive Computing"},{"issue":"7","key":"1089_CR39","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.3390\/s20072081","volume":"20","author":"K Haseeb","year":"2020","unstructured":"Haseeb, K., Ud Din, I., Almogren, A., & Islam, N. (2020). An energy efficient and secure IoT-based WSN framework: An application to smart agriculture. Sensors, 20(7), 2081.","journal-title":"Sensors"},{"issue":"21","key":"1089_CR40","doi-asserted-by":"publisher","first-page":"6174","DOI":"10.3390\/s20216174","volume":"20","author":"KA Awan","year":"2020","unstructured":"Awan, K. A., Ud Din, I., Almogren, A., & Almajed, H. (2020). AgriTrust\u2014a trust management approach for smart agriculture in cloud-based internet of agriculture things. Sensors, 20(21), 6174.","journal-title":"Sensors"},{"key":"1089_CR41","doi-asserted-by":"crossref","unstructured":"Sengupta, J., Ruj, S., & Bit, S. D. (2020). A secure fog-based architecture for industrial Internet of Things and industry 4.0.\u00a0IEEE Transactions on Industrial Informatics,\u00a017(4), 2316\u20132324.","DOI":"10.1109\/TII.2020.2998105"},{"issue":"5","key":"1089_CR42","doi-asserted-by":"publisher","first-page":"1408","DOI":"10.1109\/JIOT.2017.2736446","volume":"4","author":"H Al-Hamadi","year":"2017","unstructured":"Al-Hamadi, H., & Chen, R. (2017). Trust-based decision making for health IoT systems. IEEE Internet of Things Journal, 4(5), 1408\u20131419.","journal-title":"IEEE Internet of Things Journal"},{"key":"1089_CR43","doi-asserted-by":"publisher","first-page":"111223","DOI":"10.1109\/ACCESS.2020.2999468","volume":"8","author":"EM Abou-Nassar","year":"2020","unstructured":"Abou-Nassar, E. M., Iliyasu, A. M., El-Kafrawy, P. M., Song, O. Y., Bashir, A. K., & Abd El-Latif, A. A. (2020). DITrust chain: Towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access, 8, 111223\u2013111238.","journal-title":"IEEE Access"},{"key":"1089_CR44","doi-asserted-by":"crossref","unstructured":"Han, B., Wong, S., Mannweiler, C., Dohler, M., & Schotten, H. D. (2017, May). Security trust zone in 5G networks. In\u00a02017 24th International Conference on Telecommunications (ICT)\u00a0(pp. 1\u20135). IEEE.","DOI":"10.1109\/ICT.2017.7998270"},{"key":"1089_CR45","doi-asserted-by":"crossref","unstructured":"Hakiri, A., & Dezfouli, B. (2021, April). Towards a blockchain-sdn architecture for secure and trustworthy 5G massive IoT networks. In:\u00a0Proceedings of the 2021 ACM International Workshop on Software Defined Networks and Network Function Virtualization Security\u00a0(pp. 11\u201318).","DOI":"10.1145\/3445968.3452090"},{"issue":"2","key":"1089_CR46","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1109\/TLA.2016.7437249","volume":"14","author":"JDJG Herrera","year":"2016","unstructured":"Herrera, J. D. J. G., & Vega, J. F. B. (2016). Network functions virtualization: A survey. IEEE Latin America Transactions, 14(2), 983\u2013997.","journal-title":"IEEE Latin America Transactions"},{"issue":"1","key":"1089_CR47","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","volume":"5","author":"N Abbas","year":"2017","unstructured":"Abbas, N., Zhang, Y., Taherkordi, A., & Skeie, T. (2017). Mobile edge computing: A survey. IEEE Internet of Things Journal, 5(1), 450\u2013465.","journal-title":"IEEE Internet of Things Journal"},{"key":"1089_CR48","doi-asserted-by":"crossref","unstructured":"Hayes, B. (2008). Cloud computing.","DOI":"10.1145\/1364782.1364786"},{"issue":"2","key":"1089_CR49","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s00354-008-0081-5","volume":"28","author":"L Wang","year":"2010","unstructured":"Wang, L., Von Laszewski, G., Younge, A., He, X., Kunze, M., Tao, J., & Fu, C. (2010). Cloud computing: A perspective study. New generation computing, 28(2), 137\u2013146.","journal-title":"New generation computing"},{"key":"1089_CR50","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012, August). Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing\u00a0(pp. 13\u201316).","DOI":"10.1145\/2342509.2342513"},{"issue":"5","key":"1089_CR51","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"LM Vaquero","year":"2014","unstructured":"Vaquero, L. M., & Rodero-Merino, L. (2014). Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review, 44(5), 27\u201332.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"4","key":"1089_CR52","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393\u2013422.","journal-title":"Computer Networks"},{"key":"1089_CR53","doi-asserted-by":"crossref","unstructured":"Minh, D., Wang, H. X., Li, Y. F., & Nguyen, T. N. (2022). Explainable artificial intelligence: a comprehensive review. Artificial Intelligence Review, pp. 1\u201366.","DOI":"10.1007\/s10462-021-10088-y"},{"issue":"1","key":"1089_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1743-0003-2-6","volume":"2","author":"E Jovanov","year":"2005","unstructured":"Jovanov, E., Milenkovic, A., Otto, C., & De Groen, P. C. (2005). A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation. Journal of NeuroEngineering and Rehabilitation, 2(1), 1\u201310.","journal-title":"Journal of NeuroEngineering and Rehabilitation"},{"issue":"2","key":"1089_CR55","doi-asserted-by":"publisher","first-page":"2779","DOI":"10.1109\/JSYST.2020.2990749","volume":"15","author":"M Kumar","year":"2020","unstructured":"Kumar, M., & Chand, S. (2020). A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Systems Journal, 15(2), 2779\u20132786.","journal-title":"IEEE Systems Journal"},{"issue":"6","key":"1089_CR56","doi-asserted-by":"publisher","first-page":"4131","DOI":"10.1109\/TII.2020.3006137","volume":"17","author":"W Fang","year":"2020","unstructured":"Fang, W., Cui, N., Chen, W., Zhang, W., & Chen, Y. (2020). A trust-based security system for data collection in smart city. IEEE Transactions on Industrial Informatics, 17(6), 4131\u20134140.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"1089_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102252","volume":"60","author":"SK Singh","year":"2020","unstructured":"Singh, S. K., Jeong, Y. S., & Park, J. H. (2020). A deep learning-based IoT-oriented infrastructure for secure smart city. Sustainable Cities and Society, 60, 102252.","journal-title":"Sustainable Cities and Society"},{"issue":"5","key":"1089_CR58","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MNET.011.1900536","volume":"34","author":"B Cao","year":"2020","unstructured":"Cao, B., Wang, X., Zhang, W., Song, H., & Lv, Z. (2020). A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Network, 34(5), 78\u201383.","journal-title":"IEEE Network"},{"issue":"6\u201310","key":"1089_CR59","first-page":"71","volume":"2","author":"M Crosby","year":"2016","unstructured":"Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6\u201310), 71.","journal-title":"Applied Innovation"},{"issue":"3","key":"1089_CR60","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","volume":"21","author":"N Neshenko","year":"2019","unstructured":"Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Communications Surveys and Tutorials, 21(3), 2702\u20132733.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"1089_CR61","doi-asserted-by":"crossref","unstructured":"Zaman, S., Kaiser, M. S., Khan, R. T., & Mahmud, M. (2020, December). Towards SDN and Blockchain based IoT Countermeasures: A Survey. In:\u00a02020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)\u00a0(pp. 1\u20136). IEEE","DOI":"10.1109\/STI50764.2020.9350392"},{"issue":"2","key":"1089_CR62","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1587\/transinf.2019INI0002","volume":"103","author":"W Li","year":"2020","unstructured":"Li, W., Meng, W., Liu, Z., & Au, M. H. (2020). Towards blockchain-based software-defined networking: Security challenges and solutions. IEICE Transactions on Information and Systems, 103(2), 196\u2013203.","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"10","key":"1089_CR63","doi-asserted-by":"publisher","first-page":"10250","DOI":"10.1109\/JIOT.2020.2997651","volume":"7","author":"W Iqbal","year":"2020","unstructured":"Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., & Bangash, Y. A. (2020). An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet of Things Journal, 7(10), 10250\u201310276.","journal-title":"IEEE Internet of Things Journal"},{"key":"1089_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2021.100224","volume":"23","author":"C Zhang","year":"2021","unstructured":"Zhang, C., & Lu, Y. (2021). Study on artificial intelligence: The state of the art and future prospects. Journal of Industrial Information Integration, 23, 100224.","journal-title":"Journal of Industrial Information Integration"},{"key":"1089_CR65","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s12525-020-00441-4","volume":"31","author":"S Thiebes","year":"2021","unstructured":"Thiebes, S., Lins, S., & Sunyaev, A. (2021). Trustworthy artificial intelligence. Electronic Markets, 31, 447\u2013464.","journal-title":"Electronic Markets"},{"issue":"3","key":"1089_CR66","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s12525-021-00475-2","volume":"31","author":"C Janiesch","year":"2021","unstructured":"Janiesch, C., Zschech, P., & Heinrich, K. (2021). Machine learning and deep learning. Electronic Markets, 31(3), 685\u2013695.","journal-title":"Electronic Markets"},{"key":"1089_CR67","unstructured":"Goodfellow, I., Bengio, Y., & Courville, A. (2016).\u00a0Deep learning. MIT press."},{"key":"1089_CR68","unstructured":"Borisov, V., Leemann, T., Se\u00dfler, K., Haug, J., Pawelczyk, M., & Kasneci, G. (2022). Deep neural networks and tabular data: A survey.\u00a0IEEE Transactions on Neural Networks and Learning Systems."},{"key":"1089_CR69","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.ijmedinf.2019.04.024","volume":"129","author":"RK Behera","year":"2019","unstructured":"Behera, R. K., Bala, P. K., & Dhir, A. (2019). The emerging role of cognitive computing in healthcare: A systematic literature review. International journal of medical informatics, 129, 154\u2013166.","journal-title":"International journal of medical informatics"},{"issue":"10","key":"1089_CR70","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1007\/s11431-020-1647-3","volume":"63","author":"X Qiu","year":"2020","unstructured":"Qiu, X., Sun, T., Xu, Y., Shao, Y., Dai, N., & Huang, X. (2020). Pre-trained models for natural language processing: A survey. Science China Technological Sciences, 63(10), 1872\u20131897.","journal-title":"Science China Technological Sciences"},{"issue":"3","key":"1089_CR71","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1109\/COMST.2020.2997475","volume":"22","author":"W Rafique","year":"2020","unstructured":"Rafique, W., Qi, L., Yaqoob, I., Imran, M., Rasool, R. U., & Dou, W. (2020). Complementing IoT services through software defined networking and edge computing: A comprehensive survey. IEEE Communications Surveys and Tutorials, 22(3), 1761\u20131804.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"1089_CR72","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s10776-020-00488-2","volume":"27","author":"W Bekri","year":"2020","unstructured":"Bekri, W., Jmal, R., & Chaari Fourati, L. (2020). Internet of things management based on software defined networking: A survey. International Journal of Wireless Information Networks, 27, 385\u2013410.","journal-title":"International Journal of Wireless Information Networks"},{"issue":"1","key":"1089_CR73","doi-asserted-by":"publisher","first-page":"21","DOI":"10.34257\/GJCSTEVOL19IS1PG21","volume":"19","author":"MNA Sheikh","year":"2019","unstructured":"Sheikh, M. N. A., Halder, M., Kabir, S. S., Miah, M. W., & Khatun, S. (2019). SDN-Based approach to evaluate the best controller: Internal controller NOX and external controllers POX, ONOS, RYU. Global Journal of Computer Science and Technology, 19(1), 21\u201332.","journal-title":"Global Journal of Computer Science and Technology"},{"key":"1089_CR74","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11235-020-00747-w","volume":"77","author":"A Mishra","year":"2021","unstructured":"Mishra, A., Gupta, N., & Gupta, B. B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommunication systems, 77, 47\u201362.","journal-title":"Telecommunication systems"},{"issue":"2","key":"1089_CR75","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.1007\/s11277-017-4939-z","volume":"98","author":"IZ Bholebawa","year":"2018","unstructured":"Bholebawa, I. Z., & Dalal, U. D. (2018). Performance analysis of SDN\/ OpenFlow controllers: POX versus foodlight. Wireless Personal Communications, 98(2), 1679\u20131699.","journal-title":"Wireless Personal Communications"},{"key":"1089_CR76","doi-asserted-by":"crossref","unstructured":"Eljack, A. H., Hassan, A. H. M., & Elamin, H. H. (2019, September). Performance Analysis of ONOS and Floodlight SDN Controllers based on TCP and UDP Traffic. In:\u00a02019 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/ICCCEEE46830.2019.9071189"},{"issue":"12","key":"1089_CR77","doi-asserted-by":"publisher","first-page":"7566","DOI":"10.1109\/TII.2019.2957404","volume":"16","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., He, Q., Chen, G., Zhang, X., & Xiang, Y. (2019). A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT. IEEE Transactions on Industrial Informatics, 16(12), 7566\u20137578.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"1089_CR78","doi-asserted-by":"crossref","unstructured":"Valea, E., Da Silva, M., Flottes, M. L., Di Natale, G., Dupuis, S., & Rouzeyre, B. (2019, April). Providing confidentiality and integrity in ultra low power iot devices. In:\u00a02019 14th International Conference on Design and Technology of Integrated Systems In Nanoscale Era (DTIS)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/DTIS.2019.8735090"},{"issue":"4","key":"1089_CR79","first-page":"2919","volume":"17","author":"AT Fadi","year":"2020","unstructured":"Fadi, A. T., & Deebak, B. D. (2020). Seamless authentication: For IoT-big data technologies in smart industrial application systems. IEEE Transactions on Industrial Informatics, 17(4), 2919\u20132927.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"6","key":"1089_CR80","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102355","volume":"57","author":"Q Zhao","year":"2020","unstructured":"Zhao, Q., Chen, S., Liu, Z., Baker, T., & Zhang, Y. (2020). Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing and Management, 57(6), 102355.","journal-title":"Information Processing and Management"},{"issue":"10","key":"1089_CR81","doi-asserted-by":"publisher","first-page":"10695","DOI":"10.1109\/JIOT.2020.3012763","volume":"7","author":"MA L\u00f3pez-Pe\u00f1a","year":"2020","unstructured":"L\u00f3pez-Pe\u00f1a, M. A., D\u00edaz, J., P\u00e9rez, J. E., & Humanes, H. (2020). DevOps for IoT systems: Fast and continuous monitoring feedback of system availability. IEEE Internet of Things Journal, 7(10), 10695\u201310707.","journal-title":"IEEE Internet of Things Journal"},{"key":"1089_CR82","doi-asserted-by":"publisher","first-page":"82890","DOI":"10.1109\/ACCESS.2020.2991861","volume":"8","author":"MR Amini","year":"2020","unstructured":"Amini, M. R., & Baidas, M. W. (2020). Availability-Reliability-Stability trade-offs in ultra-reliable energy-harvesting cognitive radio IoT networks. IEEE Access, 8, 82890\u201382916.","journal-title":"IEEE Access"},{"key":"1089_CR83","doi-asserted-by":"publisher","first-page":"117503","DOI":"10.1109\/ACCESS.2020.3004843","volume":"8","author":"K Song","year":"2020","unstructured":"Song, K., Zhang, J., Ji, Z., Jiang, J., & Li, C. (2020). Energy-efficiency for IoT system with cache-enabled fixed-wing UAV relay. IEEE Access, 8, 117503\u2013117512.","journal-title":"IEEE Access"},{"key":"1089_CR84","doi-asserted-by":"publisher","first-page":"63679","DOI":"10.1109\/ACCESS.2020.2984461","volume":"8","author":"CK Metallidou","year":"2020","unstructured":"Metallidou, C. K., Psannis, K. E., & Egyptiadou, E. A. (2020). Energy efficiency in smart buildings: IoT approaches. IEEE Access, 8, 63679\u201363699.","journal-title":"IEEE Access"},{"key":"1089_CR85","doi-asserted-by":"publisher","first-page":"135479","DOI":"10.1109\/ACCESS.2020.3011503","volume":"8","author":"J Li","year":"2020","unstructured":"Li, J., Cai, J., Khan, F., Rehman, A. U., Balasubramaniam, V., Sun, J., & Venu, P. (2020). A secured framework for sdn-based edge computing in IOT-enabled healthcare system. IEEE Access, 8, 135479\u2013135490.","journal-title":"IEEE Access"},{"key":"1089_CR86","doi-asserted-by":"crossref","unstructured":"Prabavathy, S., & Supriya, V. (2021, August). SDN based Cognitive Security System for Large-Scale Internet of Things using Fog Computing. In: 2021 International Conference on Emerging Techniques in Computational Intelligence (ICETCI)\u00a0(pp. 129\u2013134). IEEE.","DOI":"10.1109\/ICETCI51973.2021.9574051"},{"key":"1089_CR87","unstructured":"Accessed 7 january 2022, <https:\/\/www.sdnmicrosense.eu\/>"},{"key":"1089_CR88","doi-asserted-by":"crossref","unstructured":"Grammatikis, P. R., Sarigiannidis, P., Dalamagkas, C., Spyridis, Y., Lagkas, T., Efstathopoulos, G., & Arce, A. (2021). SDN-Based Resilient Smart Grid: The SDN-microSENSE Architecture.\u00a0Digital,\u00a01(4), 173\u2013187.","DOI":"10.3390\/digital1040013"},{"key":"1089_CR89","doi-asserted-by":"crossref","unstructured":"Ortiz, J., Sanchez-Iborra, R., Bernabe, J. B., Skarmeta, A., Benzaid, C., Taleb, T., & Lopez, D. (2020). INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks. In: Proceedings of the 15th International Conference on Availability, Reliability and Security\u00a0(pp. 1\u201310).","DOI":"10.1145\/3407023.3409219"},{"key":"1089_CR90","unstructured":"Accessed 14 january 2022, <https:\/\/www.concordia-h2020.eu\/> ."},{"key":"1089_CR91","unstructured":"Accessed 14 january 2022, <https:\/\/terminet-h2020.eu\/>."},{"key":"1089_CR92","unstructured":"Accessed 14 january 2022, <https:\/\/www.serums-h2020.org\/>."},{"key":"1089_CR93","unstructured":"Accessed 15 january 2022, <https:\/\/www.upf.edu\/web\/bandit>"},{"key":"1089_CR94","unstructured":"Accessed 16 january 2022, <https:\/\/www.c4iiot.eu\/>"},{"key":"1089_CR95","unstructured":"Accessed 16 january 2022, <https:\/\/www.5gzorro.eu\/>"},{"key":"1089_CR96","unstructured":"Accessed 20 january 2022, <https:\/\/puzzle-h2020.com\/>"},{"key":"1089_CR97","unstructured":"Accessed 23 january 2022, <https:\/\/echonetwork.eu\/>"},{"key":"1089_CR98","doi-asserted-by":"crossref","unstructured":"Da Xu, L., Lu, Y., & Li, L. (2021). Embedding blockchain technology into IoT for security: a survey.\u00a0IEEE Internet of Things Journal.","DOI":"10.1109\/JIOT.2021.3060508"},{"key":"1089_CR99","doi-asserted-by":"publisher","first-page":"167123","DOI":"10.1109\/ACCESS.2020.3022661","volume":"8","author":"V Sharma","year":"2020","unstructured":"Sharma, V., You, I., Andersson, K., Palmieri, F., Rehmani, M. H., & Lim, J. (2020). Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey. IEEE Access, 8, 167123\u2013167163.","journal-title":"IEEE Access"},{"key":"1089_CR100","doi-asserted-by":"crossref","unstructured":"Liao, Z., Pang, X., Zhang, J., Xiong, B., & Wang, J. (2021). Blockchain on Security and Forensics management in edge computing for IoT: a comprehensive survey.\u00a0IEEE Transactions on Network and Service Management.","DOI":"10.1109\/TNSM.2021.3122147"},{"issue":"3","key":"1089_CR101","doi-asserted-by":"publisher","first-page":"2157","DOI":"10.1007\/s11277-020-07965-0","volume":"117","author":"B Mbarek","year":"2021","unstructured":"Mbarek, B., Ge, M., & Pitner, T. (2021). Trust-based authentication for smart home systems. Wireless Personal Communications, 117(3), 2157\u20132172.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"1089_CR102","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s10836-018-5725-x","volume":"34","author":"Y Naija","year":"2018","unstructured":"Naija, Y., Beroulle, V., & Machhout, M. (2018). Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag. Journal of Electronic Testing, 34(3), 291\u2013304.","journal-title":"Journal of Electronic Testing"},{"key":"1089_CR103","unstructured":"Babiker Mohamed, M., Matthew Alofe, O., Ajmal Azad, M., Singh Lallie, H., Fatema, K., & Sharif, T. (10). A comprehensive survey on secure software\u2010defined network for the Internet of Things.\u00a0Transactions on Emerging Telecommunications Technologies, e4391."},{"key":"1089_CR104","doi-asserted-by":"crossref","unstructured":"Gopalan, S. S., Raza, A., & Almobaideen, W. (2021, March). IoT Security in Healthcare using AI: A Survey. In:\u00a02020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/ICCSPA49915.2021.9385711"},{"key":"1089_CR105","doi-asserted-by":"crossref","unstructured":"Ferreira, J. C., Teixeira, D., & Macedo, J. (2021). Systematic literature review of AI\/ML in software-defined networks using the snowballing approach.","DOI":"10.1007\/978-3-030-98015-3_23"},{"key":"1089_CR106","doi-asserted-by":"crossref","unstructured":"Nawir, M., Amir, A., Yaakob, N., & Lynn, O. B. (2016). Internet of Things (IoT): Taxonomy of security attacks. In:\u00a02016 3rd international conference on electronic design (ICED)\u00a0(pp. 321\u2013326). IEEE.","DOI":"10.1109\/ICED.2016.7804660"},{"key":"1089_CR107","doi-asserted-by":"crossref","unstructured":"Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014, November). IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications\u00a0(pp. 230\u2013234). IEEE.","DOI":"10.1109\/SOCA.2014.58"},{"key":"1089_CR108","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, H., Gong, L., Cao, J., & Gu, Z. (2019). The current research of IoT security. In:\u00a02019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)\u00a0(pp. 346\u2013353). IEEE.","DOI":"10.1109\/DSC.2019.00059"},{"key":"1089_CR109","doi-asserted-by":"crossref","unstructured":"Attkan, A., & Ranga, V. (2022). Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security.\u00a0Complex and Intelligent Systems, pp. 1\u201333.","DOI":"10.1007\/s40747-022-00667-z"},{"key":"1089_CR110","doi-asserted-by":"publisher","first-page":"94668","DOI":"10.1109\/ACCESS.2021.3089681","volume":"9","author":"S Zaman","year":"2021","unstructured":"Zaman, S., Alhazmi, K., Aseeri, M. A., Ahmed, M. R., Khan, R. T., Kaiser, M. S., & Mahmud, M. (2021). Security threats and artificial intelligence based countermeasures for internet of things networks: A comprehensive survey. Ieee Access, 9, 94668\u201394690.","journal-title":"Ieee Access"},{"key":"1089_CR111","doi-asserted-by":"crossref","unstructured":"Gebremariam, A. A., Usman, M., & Qaraqe, M. (2019, March). Applications of artificial intelligence and machine learning in the area of SDN and NFV: A survey. In:\u00a02019 16th International Multi-Conference on Systems, Signals and Devices (SSD)\u00a0(pp. 545\u2013549). IEEE.","DOI":"10.1109\/SSD.2019.8893244"},{"key":"1089_CR112","doi-asserted-by":"crossref","unstructured":"Flauzac, O., Gonz\u00e1lez, C., Hachani, A., & Nolot, F. (2015, March). SDN based architecture for IoT and improvement of the security. In:\u00a02015 IEEE 29th international conference on advanced information networking and applications workshops\u00a0(pp. 688\u2013693). IEEE.","DOI":"10.1109\/WAINA.2015.110"},{"key":"1089_CR113","doi-asserted-by":"crossref","unstructured":"Sambandam, N., Hussein, M., Siddiqi, N., & Lung, C. H. (2018). Network security for iot using sdn: Timely ddos detection. In:\u00a02018 IEEE Conference on Dependable and Secure Computing (DSC)\u00a0(pp. 1\u20132). IEEE.","DOI":"10.1109\/DESEC.2018.8625119"},{"key":"1089_CR114","unstructured":"Ghazal, T. M. (2021). Internet of things with artificial intelligence for health care security.\u00a0Arabian Journal for Science and Engineering, pp. 1\u201312."},{"issue":"1","key":"1089_CR115","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-020-01665-w","volume":"2020","author":"W Fang","year":"2020","unstructured":"Fang, W., Chen, W., Zhang, W., Pei, J., Gao, W., & Wang, G. (2020). Digital signature scheme for information non-repudiation in blockchain: A state of the art review. EURASIP Journal on Wireless Communications and Networking, 2020(1), 1\u201315.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"1089_CR116","doi-asserted-by":"crossref","unstructured":"Bekri, W., Layeb, T., Rihab, J. M. A. L., & Fourati, L. C. (2022, May). Intelligent IoT Systems: Security issues, attacks, and countermeasures. In:\u00a02022 International Wireless Communications and Mobile Computing (IWCMC)\u00a0(pp. 231\u2013236). IEEE.","DOI":"10.1109\/IWCMC55113.2022.9825120"},{"key":"1089_CR117","doi-asserted-by":"publisher","first-page":"45820","DOI":"10.1109\/ACCESS.2022.3168972","volume":"10","author":"M Rahouti","year":"2022","unstructured":"Rahouti, M., Xiong, K., Xin, Y., Jagatheesaperumal, S. K., Ayyash, M., & Shaheed, M. (2022). SDN security review: Threat taxonomy, implications, and open challenges. IEEE Access, 10, 45820\u201345854.","journal-title":"IEEE Access"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01089-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-023-01089-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-023-01089-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T21:54:41Z","timestamp":1731102881000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-023-01089-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,23]]},"references-count":117,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["1089"],"URL":"https:\/\/doi.org\/10.1007\/s11235-023-01089-z","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,23]]},"assertion":[{"value":"9 December 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}