{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T08:13:20Z","timestamp":1775031200041,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T00:00:00Z","timestamp":1709683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T00:00:00Z","timestamp":1709683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11276-024-03690-9","type":"journal-article","created":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T18:01:51Z","timestamp":1709748111000},"page":"2733-2752","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An anonymous mutual authentication and key agreement scheme in WMSN using physiological data"],"prefix":"10.1007","volume":"30","author":[{"given":"Shanvendra","family":"Rai","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rituparna","family":"Paul","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-1913","authenticated-orcid":false,"given":"Subhasish","family":"Banerjee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Preetisudha","family":"Meher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,3,6]]},"reference":[{"key":"3690_CR1","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.future.2019.05.058","volume":"100","author":"V Sureshkumar","year":"2019","unstructured":"Sureshkumar, V., Amin, R., Vijaykumar, V. R., & Sekar, S. R. (2019). Robust secure communication protocol for smart healthcare system with FPGA implementation. Future Generation Computer Systems, 100, 938\u2013951. https:\/\/doi.org\/10.1016\/j.future.2019.05.058","journal-title":"Future Generation Computer Systems"},{"key":"3690_CR2","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s40846-017-0351-0","volume":"39","author":"WL Tai","year":"2019","unstructured":"Tai, W. L., Chang, Y. F., & Lo, Y. L. (2019). An anonymity, availability and security-ensured authentication model of the IoT control system for reliable and anonymous eHealth services. Journal of Medical and Biological Engineering, 39, 443\u2013455. https:\/\/doi.org\/10.1007\/s40846-017-0351-0","journal-title":"Journal of Medical and Biological Engineering"},{"key":"3690_CR3","doi-asserted-by":"publisher","first-page":"13129","DOI":"10.1109\/ACCESS.2017.2789329","volume":"6","author":"JJ Rodrigues","year":"2018","unstructured":"Rodrigues, J. J., Segundo, D. B. D. R., Junqueira, H. A., Sabino, M. H., Prince, R. M., Al-Muhtadi, J., & De Albuquerque, V. H. C. (2018). Enabling technologies for the internet of health things. Ieee Access, 6, 13129\u201313141. https:\/\/doi.org\/10.1109\/ACCESS.2017.2789329","journal-title":"Ieee Access"},{"issue":"3.4","key":"3690_CR4","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1147\/sj.353.0609","volume":"35","author":"TG Zimmerman","year":"1996","unstructured":"Zimmerman, T. G. (1996). Personal area networks: Near-field intrabody communication. IBM systems Journal, 35(3.4), 609\u2013617. https:\/\/doi.org\/10.1147\/sj.353.0609","journal-title":"IBM systems Journal"},{"key":"3690_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0491-8","volume":"40","author":"L Wu","year":"2016","unstructured":"Wu, L., Zhang, Y., Li, L., & Shen, J. (2016). Efficient and anonymous authentication scheme for wireless body area networks. Journal of medical systems, 40, 1\u201312. https:\/\/doi.org\/10.1007\/s10916-016-0491-8","journal-title":"Journal of medical systems"},{"issue":"4","key":"3690_CR6","doi-asserted-by":"publisher","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","volume":"11","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., & Lee, J. H. (2016). Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal, 11(4), 2590\u20132601. https:\/\/doi.org\/10.1109\/JSYST.2016.2544805","journal-title":"IEEE Systems Journal"},{"issue":"4","key":"3690_CR7","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MWC.2013.6590052","volume":"20","author":"B Liu","year":"2013","unstructured":"Liu, B., Yan, Z., & Chen, C. W. (2013). MAC protocol in wireless body area networks for E-health: Challenges and a context-aware design. IEEE Wireless Communications, 20(4), 64\u201372. https:\/\/doi.org\/10.1109\/MWC.2013.6590052","journal-title":"IEEE Wireless Communications"},{"key":"3690_CR8","unstructured":"Ramli, S. N., Ahmad, R., Abdollah, M. F., & Dutkiewicz, E. (2013). A biometric-based security for data authentication in wireless body area network (wban). In\u00a02013 15th international conference on advanced communications technology (ICACT), IEEE, (pp. 998\u20131001)."},{"key":"3690_CR9","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comnet.2018.05.006","volume":"140","author":"AM Koya","year":"2018","unstructured":"Koya, A. M., & Deepthi, P. P. (2018). Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Computer Networks, 140, 138\u2013151. https:\/\/doi.org\/10.1016\/j.comnet.2018.05.006","journal-title":"Computer Networks"},{"issue":"4","key":"3690_CR10","doi-asserted-by":"publisher","first-page":"415","DOI":"10.5405\/jmbe.1478","volume":"33","author":"CK Yeh","year":"2013","unstructured":"Yeh, C. K., Chen, H. M., & Lo, J. W. (2013). An authentication protocol for ubiquitous health monitoring systems. Journal of Medical and Biological Engineering, 33(4), 415\u2013419.","journal-title":"Journal of Medical and Biological Engineering"},{"issue":"4","key":"3690_CR11","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MWC.2008.4599222","volume":"15","author":"X Du","year":"2008","unstructured":"Du, X., & Chen, H. H. (2008). Security in wireless sensor networks. IEEE Wireless Communications, 15(4), 60\u201366. https:\/\/doi.org\/10.1109\/MWC.2008.4599222","journal-title":"IEEE Wireless Communications"},{"key":"3690_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0272-9","volume":"39","author":"A Ali","year":"2015","unstructured":"Ali, A., & Khan, F. A. (2015). Key agreement schemes in wireless body area networks: Taxonomy and state-of-the-art. Journal of medical systems, 39, 1\u201314. https:\/\/doi.org\/10.1007\/s10916-015-0272-9","journal-title":"Journal of medical systems"},{"key":"3690_CR13","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s00530-015-0476-3","volume":"23","author":"F Wu","year":"2017","unstructured":"Wu, F., Xu, L., Kumari, S., & Li, X. (2017). An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems, 23, 195\u2013205. https:\/\/doi.org\/10.1007\/s00530-015-0476-3","journal-title":"Multimedia Systems"},{"key":"3690_CR14","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1007\/s11277-016-3718-6","volume":"94","author":"AK Das","year":"2017","unstructured":"Das, A. K., Sutrala, A. K., Odelu, V., & Goswami, A. (2017). A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Communications, 94, 1899\u20131933. https:\/\/doi.org\/10.1007\/s11277-016-3718-6","journal-title":"Wireless Personal Communications"},{"key":"3690_CR15","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.future.2016.05.032","volume":"80","author":"R Amin","year":"2018","unstructured":"Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., & Kumar, N. (2018). A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Generation Computer Systems, 80, 483\u2013495. https:\/\/doi.org\/10.1016\/j.future.2016.05.032","journal-title":"Future Generation Computer Systems"},{"key":"3690_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1015-9","author":"R Ali","year":"2018","unstructured":"Ali, R., Pal, A. K., Kumari, S., Sangaiah, A. K., Li, X., & Wu, F. (2018). An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-018-1015-9","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3690_CR17","doi-asserted-by":"publisher","first-page":"35405","DOI":"10.1007\/s11042-019-07760-5","volume":"79","author":"SS Rani","year":"2020","unstructured":"Rani, S. S., Alzubi, J. A., Lakshmanaprabu, S. K., Gupta, D., & Manikandan, R. (2020). Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers. Multimedia Tools and Applications, 79, 35405\u201335424. https:\/\/doi.org\/10.1007\/s11042-019-07760-5","journal-title":"Multimedia Tools and Applications"},{"issue":"15","key":"3690_CR18","doi-asserted-by":"publisher","first-page":"7487","DOI":"10.3390\/app12157487","volume":"12","author":"N Alsaeed","year":"2022","unstructured":"Alsaeed, N., & Nadeem, F. (2022). Authentication in the Internet of Medical Things: Taxonomy, review, and open issues. Applied Sciences, 12(15), 7487. https:\/\/doi.org\/10.3390\/app12157487","journal-title":"Applied Sciences"},{"key":"3690_CR19","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107, M., Brumen, B., & H\u00f6lbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks, 20, 96\u2013112. https:\/\/doi.org\/10.1016\/j.adhoc.2014.03.009","journal-title":"Ad Hoc Networks"},{"key":"3690_CR20","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farash","year":"2016","unstructured":"Farash, M. S., Turkanovi\u0107, M., Kumari, S., & H\u00f6lbl, M. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks, 36, 152\u2013176. https:\/\/doi.org\/10.1016\/j.adhoc.2015.05.014","journal-title":"Ad Hoc Networks"},{"key":"3690_CR21","doi-asserted-by":"publisher","first-page":"105101","DOI":"10.1109\/ACCESS.2021.3099299","volume":"9","author":"W Yuanbing","year":"2021","unstructured":"Yuanbing, W., Wanrong, L., & Bin, L. (2021). An improved authentication protocol for smart healthcare system using wireless medical sensor network. IEEE Access, 9, 105101\u2013105117. https:\/\/doi.org\/10.1109\/ACCESS.2021.3099299","journal-title":"IEEE Access"},{"key":"3690_CR22","doi-asserted-by":"crossref","unstructured":"Nazir, S., Kaleem, M., Hamdoun, H., Alzubi, J., & Tianfield, H. (2022). Blockchain of things for healthcare asset management. In\u00a0Healthcare Monitoring and Data Analysis using IoT: Technologies and Applications. Institution of Engineering and Technology (IET), (pp. 199\u2013209).","DOI":"10.1049\/PBHE038E_ch10"},{"key":"3690_CR23","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.comcom.2021.02.002","volume":"170","author":"JA Alzubi","year":"2021","unstructured":"Alzubi, J. A. (2021). Blockchain-based Lamport Merkle digital signature: Authentication tool in IoT healthcare. Computer Communications, 170, 200\u2013208. https:\/\/doi.org\/10.1016\/j.comcom.2021.02.002","journal-title":"Computer Communications"},{"key":"3690_CR24","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s40860-018-0062-5","volume":"4","author":"PK Dhillon","year":"2018","unstructured":"Dhillon, P. K., & Kalra, S. (2018). Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments, 4, 141\u2013160. https:\/\/doi.org\/10.1007\/s40860-018-0062-5","journal-title":"Journal of Reliable Intelligent Environments"},{"key":"3690_CR25","doi-asserted-by":"publisher","first-page":"53922","DOI":"10.1109\/ACCESS.2019.2912870","volume":"7","author":"Z Xu","year":"2019","unstructured":"Xu, Z., Xu, C., Liang, W., Xu, J., & Chen, H. (2019). A lightweight mutual authentication and key agreement scheme for medical Internet of Things. IEEE Access, 7, 53922\u201353931. https:\/\/doi.org\/10.1109\/ACCESS.2019.2912870","journal-title":"IEEE Access"},{"issue":"1","key":"3690_CR26","doi-asserted-by":"publisher","first-page":"607","DOI":"10.32604\/cmc.2021.015597","volume":"68","author":"S Nashwan","year":"2021","unstructured":"Nashwan, S. (2021). An End-to-End authentication scheme for healthcare IoT systems using WMSN. Computers, Materials & Continua, 68(1), 607\u2013642. https:\/\/doi.org\/10.32604\/cmc.2021.015597","journal-title":"Computers, Materials & Continua"},{"key":"3690_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-017-0720-9","volume":"41","author":"J Srinivas","year":"2017","unstructured":"Srinivas, J., Mishra, D., & Mukhopadhyay, S. (2017). A mutual authentication framework for wireless medical sensor networks. Journal of medical systems, 41, 1\u201319. https:\/\/doi.org\/10.1007\/s10916-017-0720-9","journal-title":"Journal of medical systems"},{"key":"3690_CR28","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","volume":"82","author":"F Wu","year":"2018","unstructured":"Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727\u2013737. https:\/\/doi.org\/10.1016\/j.future.2017.08.042","journal-title":"Future Generation Computer Systems"},{"key":"3690_CR29","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8145087","author":"M Shuai","year":"2019","unstructured":"Shuai, M., Liu, B., Yu, N., & Xiong, L. (2019). Lightweight and secure three-factor authentication scheme for remote patient monitoring using on-body wireless networks. Security and Communication Networks. https:\/\/doi.org\/10.1155\/2019\/8145087","journal-title":"Security and Communication Networks"},{"key":"3690_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107333","volume":"177","author":"M Fotouhi","year":"2020","unstructured":"Fotouhi, M., Bayat, M., Das, A. K., Far, H. A. N., Pournaghi, S. M., & Doostari, M. A. (2020). A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Computer Networks, 177, 107333. https:\/\/doi.org\/10.1016\/j.comnet.2020.107333","journal-title":"Computer Networks"},{"issue":"1","key":"3690_CR31","doi-asserted-by":"publisher","first-page":"8572410","DOI":"10.1155\/2016\/8572410","volume":"12","author":"Y Choi","year":"2016","unstructured":"Choi, Y., Lee, Y., & Won, D. (2016). Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction. International Journal of Distributed Sensor Networks, 12(1), 8572410. https:\/\/doi.org\/10.1155\/2016\/8572410","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"11","key":"3690_CR32","doi-asserted-by":"publisher","first-page":"2039","DOI":"10.1002\/sec.916","volume":"7","author":"S Kumari","year":"2014","unstructured":"Kumari, S., & Khan, M. K. (2014). More secure smart card-based remote user password authentication scheme with user anonymity. Security and Communication Networks, 7(11), 2039\u20132053. https:\/\/doi.org\/10.1002\/sec.916","journal-title":"Security and Communication Networks"},{"key":"3690_CR33","doi-asserted-by":"publisher","unstructured":"Moosavi, S. R., Nigussie, E., Virtanen, S., & Isoaho, J. (2017). Cryptographic key generation using ECG signal. In\u00a02017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, (pp. 1024\u20131031). https:\/\/doi.org\/10.1109\/CCNC.2017.7983280","DOI":"10.1109\/CCNC.2017.7983280"},{"key":"3690_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02623-6","author":"AA Movassagh","year":"2021","unstructured":"Movassagh, A. A., Alzubi, J. A., Gheisari, M., Rahimi, M., Mohan, S., Abbasi, A. A., & Nabipour, N. (2021). Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-020-02623-6","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"3690_CR35","doi-asserted-by":"publisher","unstructured":"Simske, S. J. (2009). Dynamic biometrics: The case for a real-time solution to the problem of access control, privacy and security. In\u00a02009 First IEEE International Conference on Biometrics, Identity and Security (BIdS), IEEE, (pp. 1\u201310). https:\/\/doi.org\/10.1109\/BIDS.2009.5507535","DOI":"10.1109\/BIDS.2009.5507535"},{"issue":"4","key":"3690_CR36","doi-asserted-by":"publisher","first-page":"570","DOI":"10.3390\/s16040570","volume":"16","author":"S Peter","year":"2016","unstructured":"Peter, S., Pratap Reddy, B., Momtaz, F., & Givargis, T. (2016). Design of secure ECG-based biometric authentication in body area sensor networks. Sensors, 16(4), 570. https:\/\/doi.org\/10.3390\/s16040570","journal-title":"Sensors"},{"key":"3690_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2008\/529879","volume":"2008","author":"FM Bui","year":"2007","unstructured":"Bui, F. M., & Hatzinakos, D. (2007). Biometric methods for secure communications in body sensor networks: Resource-efficient key management and signal-level data scrambling. EURASIP Journal on Advances in Signal Processing, 2008, 1\u201316. https:\/\/doi.org\/10.1155\/2008\/529879","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"3690_CR38","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1109\/ACCESS.2015.2445336","volume":"3","author":"G Zheng","year":"2015","unstructured":"Zheng, G., Fang, G., Shankaran, R., & Orgun, M. A. (2015). Encryption for implantable medical devices using modified one-time pads. IEEE Access, 3, 825\u2013836. https:\/\/doi.org\/10.1109\/ACCESS.2015.2445336","journal-title":"IEEE Access"},{"issue":"1","key":"3690_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-022-00616-4","volume":"22","author":"G Sah","year":"2023","unstructured":"Sah, G., Banerjee, S., & Singh, S. (2023). Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches. International Journal of Information Security, 22(1), 1\u201327. https:\/\/doi.org\/10.1007\/s10207-022-00616-4","journal-title":"International Journal of Information Security"},{"issue":"1\u20132","key":"3690_CR40","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1504\/IJICS.2022.126760","volume":"19","author":"G Sah","year":"2022","unstructured":"Sah, G., Banerjee, S., & Dutta, M. P. (2022). Ensemble learning algorithms with feature reduction mechanism for intrusion detection system. International Journal of Information and Computer Security, 19(1\u20132), 88\u2013117. https:\/\/doi.org\/10.1504\/IJICS.2022.126760","journal-title":"International Journal of Information and Computer Security"},{"issue":"12","key":"3690_CR41","doi-asserted-by":"publisher","first-page":"14305","DOI":"10.1007\/s11227-021-03802-8","volume":"77","author":"AS Parihar","year":"2021","unstructured":"Parihar, A. S., & Chakraborty, S. K. (2021). Token-based approach in distributed mutual exclusion algorithms: A review and direction to future research. The Journal of Supercomputing, 77(12), 14305\u201314355. https:\/\/doi.org\/10.1007\/s11227-021-03802-8","journal-title":"The Journal of Supercomputing"},{"key":"3690_CR42","doi-asserted-by":"publisher","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., & Vigneron, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In\u00a0Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6\u201310, 2005. Proceedings. Springer Berlin Heidelberg, 17\u00a0(pp. 281\u2013285). https:\/\/doi.org\/10.1007\/11513988_27","DOI":"10.1007\/11513988_27"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03690-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-024-03690-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03690-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T18:15:33Z","timestamp":1717006533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-024-03690-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,6]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["3690"],"URL":"https:\/\/doi.org\/10.1007\/s11276-024-03690-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,6]]},"assertion":[{"value":"30 January 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest among the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}