{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T00:25:33Z","timestamp":1778631933918,"version":"3.51.4"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T00:00:00Z","timestamp":1720310400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T00:00:00Z","timestamp":1720310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s11276-024-03790-6","type":"journal-article","created":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T16:01:23Z","timestamp":1720368083000},"page":"1053-1070","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Crystals kyber cryptographic algorithm for efficient IoT D2d communication"],"prefix":"10.1007","volume":"31","author":[{"given":"S.","family":"Selvakumar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Ahilan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"B.","family":"Ben Sujitha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N.","family":"Muthukumaran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,7,7]]},"reference":[{"issue":"8","key":"3790_CR1","doi-asserted-by":"publisher","first-page":"367","DOI":"10.3390\/a16080367","volume":"16","author":"E Ntawuzumunsi","year":"2023","unstructured":"Ntawuzumunsi, E., Kumaran, S., Sibomana, L., & Mtonga, K. (2023). Design and development of an energy-efficient algorithm for smart beekeeping device-to-device communication based on data aggregation techniques. Algorithms, 16(8), 367. https:\/\/doi.org\/10.3390\/a16080367","journal-title":"Algorithms"},{"key":"3790_CR2","doi-asserted-by":"publisher","unstructured":"Khujamatov, K., Akhmedov, N., Reypnazarov, E., Khasanov, D., & Lazarev, A. (2022). Device-to-device and millimeter wave communication for 5G healthcare informatics. In Blockchain Applications for Healthcare Informatics (pp. 181\u2013211). Academic Press. https:\/\/doi.org\/10.1016\/b978-0-323-90615-9.00019-0","DOI":"10.1016\/b978-0-323-90615-9.00019-0"},{"key":"3790_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3312480","author":"A Ahilan","year":"2023","unstructured":"Ahilan, A., Rejula, M. A., Kumar, S. N., & Kumar, B. M. (2023). Virtual Reality Sensor Based IoT Embedded System for Stress Diagnosis. IEEE Sensors Journal. https:\/\/doi.org\/10.1109\/JSEN.2023.3312480","journal-title":"IEEE Sensors Journal"},{"issue":"5","key":"3790_CR4","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/mnet.001.1900659","volume":"34","author":"W Duan","year":"2020","unstructured":"Duan, W., Gu, J., Wen, M., Zhang, G., Ji, Y., & Mumtaz, S. (2020). Emerging technologies for 5G-IoV networks: Applications, trends, and opportunities. IEEE Network, 34(5), 283\u2013289. https:\/\/doi.org\/10.1109\/mnet.001.1900659","journal-title":"IEEE Network"},{"issue":"28","key":"3790_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7398","volume":"34","author":"MK Roberts","year":"2022","unstructured":"Roberts, M. K., & Thangavel, J. (2022). An optimized ticket manager-based energy-aware multipath routing protocol design for IoT based wireless sensor networks. Concurrency and Computation: Practice and Experience, 34(28), e7398. https:\/\/doi.org\/10.1002\/cpe.7398","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"4","key":"3790_CR6","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.3390\/app12042083","volume":"12","author":"AM Farooqi","year":"2022","unstructured":"Farooqi, A. M., Alam, M. A., Hassan, S. I., & Idrees, S. M. (2022). A fog computing model for VANET to reduce latency and delay using a 5G network in smart city transportation. Applied Sciences, 12(4), 2083. https:\/\/doi.org\/10.3390\/app12042083","journal-title":"Applied Sciences"},{"issue":"1","key":"3790_CR7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.37385\/jaets.v5i1.3411","volume":"1","author":"S Muthukumar","year":"2023","unstructured":"Muthukumar, S., Hevin Rajesh, A., & Jenice Prabhu, D. (2023). Reduancy aware dynamic routing protocol using salp swarm optimization algorithm. International Journal of System Design and Computing, 1(1), 35\u201342. https:\/\/doi.org\/10.37385\/jaets.v5i1.3411","journal-title":"International Journal of System Design and Computing"},{"key":"3790_CR8","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.comcom.2021.01.010","volume":"169","author":"GS Gaba","year":"2021","unstructured":"Gaba, G. S., Kumar, G., Kim, T. H., Monga, H., & Kumar, P. (2021). Secure device-to-device communications for 5 g-enabled Internet of Things applications. Computer Communications, 169, 114\u2013128. https:\/\/doi.org\/10.1016\/j.comcom.2021.01.010","journal-title":"Computer Communications"},{"key":"3790_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3275915","author":"MA Areqi","year":"2023","unstructured":"Areqi, M. A., Zahary, A. T., & Ali, M. N. (2023). State-of-the-art device-to-device communication solutions. IEEE Access. https:\/\/doi.org\/10.1109\/access.2023.3275915","journal-title":"IEEE Access"},{"issue":"1","key":"3790_CR10","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/mcomstd.0001.2100077","volume":"7","author":"Z Wu","year":"2022","unstructured":"Wu, Z., Umebayashi, K., Lehtom\u00e4ki, J., & Zorba, N. (2022). Device-to-device communications at the terahertz band: Open challenges for realistic implementation. IEEE Communications Standards Magazine, 7(1), 82\u201387. https:\/\/doi.org\/10.1109\/mcomstd.0001.2100077","journal-title":"IEEE Communications Standards Magazine"},{"issue":"8","key":"3790_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/dac.511","volume":"35","author":"N Kumar Jadav","year":"2022","unstructured":"Kumar Jadav, N., Gupta, R., & Tanwar, S. (2022). A survey on energy-efficient resource allocation schemes in device-to-device communication. International Journal of Communication Systems, 35(8), e5112. https:\/\/doi.org\/10.1002\/dac.511","journal-title":"International Journal of Communication Systems"},{"key":"3790_CR12","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2023.2253777","author":"M Usha","year":"2023","unstructured":"Usha, M., Mahalingam, T., Ahilan, A., & Sathiamoorthy, J. (2023). EOEEORFP: Eagle optimized energy efficient optimal route-finding protocol for secure data transmission in FANETs. IETE Journal of Research. https:\/\/doi.org\/10.1080\/03772063.2023.2253777","journal-title":"IETE Journal of Research"},{"issue":"4","key":"3790_CR13","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/s11235-022-00954-7","volume":"81","author":"A Khan","year":"2022","unstructured":"Khan, A., & Das, R. (2022). Security aspects of device-to-device (D2D) networks in wireless communication: A comprehensive survey. Telecommunication Systems, 81(4), 625\u2013642. https:\/\/doi.org\/10.1007\/s11235-022-00954-7","journal-title":"Telecommunication Systems"},{"key":"3790_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2023.100290","author":"A Ahad","year":"2023","unstructured":"Ahad, A., Ali, Z., Mateen, A., Tahir, M., Hannan, A., Garcia, N. M., & Pires, I. M. (2023). A comprehensive review on 5G-based smart healthcare network security: Taxonomy, issues, solutions, and future research directions. Array. https:\/\/doi.org\/10.1016\/j.array.2023.100290","journal-title":"Array"},{"key":"3790_CR15","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.neunet.2021.10.021","volume":"145","author":"A Ali","year":"2022","unstructured":"Ali, A., Zhu, Y., & Zakarya, M. (2022). Exploiting dynamic spatio-temporal graph convolutional neural networks for citywide traffic flows prediction. Neural networks, 145, 233\u2013247. https:\/\/doi.org\/10.1016\/j.neunet.2021.10.021","journal-title":"Neural networks"},{"key":"3790_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102955","volume":"137","author":"FZ Alden","year":"2022","unstructured":"Alden, F. Z., Hassan, S., Habbal, A., & Wei, X. (2022). An adaptive social-aware device-to-device communication mechanism for wireless networks. Ad Hoc Networks, 137, 102955. https:\/\/doi.org\/10.1016\/j.adhoc.2022.102955","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"3790_CR17","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3390\/app10010217","volume":"10","author":"B Seok","year":"2019","unstructured":"Seok, B., Sicato, J. C. S., Erzhena, T., Xuan, C., Pan, Y., & Park, J. H. (2019). Secure D2D communication for 5G IoT network based on lightweight cryptography. Applied Sciences, 10(1), 217. https:\/\/doi.org\/10.3390\/app10010217","journal-title":"Applied Sciences"},{"issue":"01","key":"3790_CR18","first-page":"26","volume":"01","author":"MB Asha","year":"2023","unstructured":"Asha, M. B., & Jeyam, A. (2023). Estimation of household appliances and monitorization for impact reduction using electro chemical sensor. International Journal of System Design and Computing, 01(01), 26\u201334.","journal-title":"International Journal of System Design and Computing"},{"key":"3790_CR19","doi-asserted-by":"publisher","unstructured":"Zografopoulos, I., Hatziargyriou, N. D., & Konstantinou, C. (2022). Distributed energy resources cybersecurity outlook: Vulnerabilities, attacks, impacts, and mitigations. arXiv preprint arXiv:2205.11171. https:\/\/doi.org\/10.1109\/jsyst.2023.3305757","DOI":"10.1109\/jsyst.2023.3305757"},{"key":"3790_CR20","doi-asserted-by":"crossref","unstructured":"Backlund, L., Ngo, K., G\u00e4rtner, J., & Dubrova, E. (2023). Secret key recovery attack on masked and shuffled implementations of crystals-kyber and saber. In International Conference on Applied Cryptography and Network Security (pp. 159\u2013177).","DOI":"10.1007\/978-3-031-41181-6_9"},{"issue":"21","key":"3790_CR21","doi-asserted-by":"publisher","first-page":"21382","DOI":"10.1109\/JIOT.2022.3179683","volume":"9","author":"BY Sim","year":"2022","unstructured":"Sim, B. Y., Park, A., & Han, D. G. (2022). Chosen-ciphertext clustering attack on CRYSTALS-KYBER using the side-channel leakage of Barrett reduction. IEEE Internet of Things Journal, 9(21), 21382\u201321397. https:\/\/doi.org\/10.1109\/JIOT.2022.3179683","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"3790_CR22","doi-asserted-by":"publisher","first-page":"546","DOI":"10.3390\/electronics12030546","volume":"12","author":"Z Wenhua","year":"2023","unstructured":"Wenhua, Z., Qamar, F., Abdali, T. A. N., Hassan, R., Jafri, S. T. A., & Nguyen, Q. N. (2023). Blockchain technology: Security issues, healthcare applications, challenges, and future trends. Electronics, 12(3), 546. https:\/\/doi.org\/10.3390\/electronics12030546","journal-title":"Electronics"},{"issue":"10","key":"3790_CR23","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.3390\/electronics10101171","volume":"10","author":"AAN Patwary","year":"2021","unstructured":"Patwary, A. A. N., Naha, R. K., Garg, S., Battula, S. K., Patwary, M. A. K., Aghasian, E., Amin, M. B., Mahanti, A., & Gong, M. (2021). Towards secure fog computing: A survey on trust management, privacy, authentication, threats, and access control. Electronics, 10(10), 1171. https:\/\/doi.org\/10.3390\/electronics10101171","journal-title":"Electronics"},{"issue":"5","key":"3790_CR24","doi-asserted-by":"publisher","first-page":"1969","DOI":"10.3390\/s22051969","volume":"22","author":"SA Abdel Hakeem","year":"2022","unstructured":"Abdel Hakeem, S. A., Hussein, H. H., & Kim, H. (2022). Security requirements and challenges of 6G technologies and applications. Sensors, 22(5), 1969. https:\/\/doi.org\/10.3390\/s22051969","journal-title":"Sensors"},{"issue":"20","key":"3790_CR25","doi-asserted-by":"publisher","first-page":"31401","DOI":"10.1007\/s11042-020-10486-4","volume":"80","author":"A Ali","year":"2021","unstructured":"Ali, A., Zhu, Y., & Zakarya, M. (2021). A data aggregation-based approach to exploit dynamic spatio-temporal correlations for citywide crowd flows prediction in fog computing. Multimedia Tools and Applications, 80(20), 31401\u201331433. https:\/\/doi.org\/10.1007\/s11042-020-10486-4","journal-title":"Multimedia Tools and Applications"},{"key":"3790_CR26","doi-asserted-by":"publisher","first-page":"26502","DOI":"10.1109\/ACCESS.2021.3056926","volume":"9","author":"N Awan","year":"2021","unstructured":"Awan, N., Ali, A., Khan, F., Zakarya, M., Alturki, R., Kundi, M., Alshehri, M. D., & Haleem, M. (2021). Modeling dynamic spatio-temporal correlations for urban traffic flows prediction. IEEE Access, 9, 26502\u201326511. https:\/\/doi.org\/10.1109\/ACCESS.2021.3056926","journal-title":"IEEE Access"},{"key":"3790_CR27","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1016\/j.ins.2021.08.042","volume":"577","author":"A Ali","year":"2021","unstructured":"Ali, A., Zhu, Y., & Zakarya, M. (2021). Exploiting dynamic spatio-temporal correlations for citywide traffic flow prediction using attention based neural networks. Information Sciences, 577, 852\u2013870. https:\/\/doi.org\/10.1016\/j.ins.2021.08.042","journal-title":"Information Sciences"},{"key":"3790_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100401","volume":"33","author":"R Gupta","year":"2022","unstructured":"Gupta, R., Tanwar, S., & Kumar, N. (2022). B-IoMV: Blockchain-based onion routing protocol for D2D communication in an IoMV environment beyond 5G. Vehicular Communications, 33, 100401. https:\/\/doi.org\/10.1016\/j.vehcom.2021.100401","journal-title":"Vehicular Communications"},{"key":"3790_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108942","volume":"210","author":"SO Ogundoyin","year":"2022","unstructured":"Ogundoyin, S. O., & Kamil, I. A. (2022). Secure and privacy-preserving D2D communication in fog computing services. Computer Networks, 210, 108942. https:\/\/doi.org\/10.1016\/j.comnet.2022.108942","journal-title":"Computer Networks"},{"key":"3790_CR30","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6983655","author":"D Gupta","year":"2022","unstructured":"Gupta, D., Rani, S., Singh, A., & Mazon, J. L. V. (2022). Towards security mechanism in D2D wireless communication: A 5G network approach. Wireless Communications and Mobile Computing. https:\/\/doi.org\/10.1155\/2022\/6983655","journal-title":"Wireless Communications and Mobile Computing"},{"key":"3790_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100493","volume":"18","author":"R Hajian","year":"2022","unstructured":"Hajian, R., Haghighat, A., & Erfani, S. H. (2022). A secure anonymous D2D mutual authentication and key agreement protocol for IoT. Internet of Things, 18, 100493. https:\/\/doi.org\/10.1016\/j.iot.2021.100493","journal-title":"Internet of Things"},{"issue":"9","key":"3790_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11082-023-05018-x","volume":"55","author":"P Tayade","year":"2023","unstructured":"Tayade, P., & Vijaya Kumar, P. (2023). Quantum-based flexible secure authentication protocol (SAP) for device-to-device (D2D) communication. Optical and Quantum Electronics, 55(9), 1\u201334. https:\/\/doi.org\/10.1007\/s11082-023-05018-x","journal-title":"Optical and Quantum Electronics"},{"key":"3790_CR33","doi-asserted-by":"publisher","first-page":"1210777","DOI":"10.3389\/fphy.2023.1210777","volume":"11","author":"J Miao","year":"2023","unstructured":"Miao, J., Wang, Z., Xue, X., Wang, M., Lv, J., & Li, M. (2023). Lightweight and secure D2D group communication for wireless IoT. Frontiers in Physics, 11, 1210777. https:\/\/doi.org\/10.3389\/fphy.2023.1210777","journal-title":"Frontiers in Physics"},{"issue":"12","key":"3790_CR34","doi-asserted-by":"publisher","first-page":"5703","DOI":"10.3390\/s23125703","volume":"23","author":"A Allakany","year":"2023","unstructured":"Allakany, A., Saber, A., Mostafa, S. M., Alsabaan, M., Ibrahem, M. I., & Elwahsh, H. (2023). Enhancing security in ZigBee wireless sensor networks: A new approach and mutual authentication scheme for D2D communication. Sensors, 23(12), 5703. https:\/\/doi.org\/10.3390\/s23125703","journal-title":"Sensors"},{"issue":"1","key":"3790_CR35","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1007\/s11277-021-08232-6","volume":"119","author":"M Suresh Chinnathampy","year":"2021","unstructured":"Suresh Chinnathampy, M., Aruna, T., & Muthukumaran, N. (2021). Antenna design: Micro strip patch for spectrum utilization in cognitive radio networks. Wireless Personal Communications, 119(1), 959\u2013979. https:\/\/doi.org\/10.1007\/s11277-021-08232-6","journal-title":"Wireless Personal Communications"},{"key":"3790_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-023-02188-y","author":"S Senthil","year":"2023","unstructured":"Senthil, S., & Muthukumaran, N. (2023). Joined Bi-model RNN with spatial attention and GAN based IoT botnet attacks detection. Sadhana Academy Proceedings in Engineering Sciences. https:\/\/doi.org\/10.1007\/s12046-023-02188-y","journal-title":"Sadhana Academy Proceedings in Engineering Sciences"},{"key":"3790_CR37","doi-asserted-by":"publisher","unstructured":"Perumal, P., Gnanaraj, S. J. P., Pandian, G. S., Livingston, T., & Muthukumaran, N. (2023). Revolutionizing E-Cycle Charging with a Novel Regenerative Battery System. In 2023 International Conference on Sustainable Communication Networks and Application (ICSCNA) (pp. 762\u2013767). IEEE. https:\/\/doi.org\/10.1109\/ICSCNA58489.2023.10370720.","DOI":"10.1109\/ICSCNA58489.2023.10370720"},{"key":"3790_CR38","doi-asserted-by":"publisher","unstructured":"Muthukumaran, N., Kumar, T. V., Raj, R. J. S., & Devaraj, S. A. (2023). Design and analysis of AI based autonomous waste segregator using deep learning. In 2023 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 524\u2013526). IEEE. https:\/\/doi.org\/10.1109\/I-SMAC58438.2023.10290696","DOI":"10.1109\/I-SMAC58438.2023.10290696"},{"issue":"1","key":"3790_CR39","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s11276-023-03448-9","volume":"30","author":"K Rajkumar","year":"2024","unstructured":"Rajkumar, K., Hariharan, U., Dhanakoti, V., & Muthukumaran, N. (2024). A secure framework for managing data in cloud storage using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication. Wireless Networks, 30(1), 321\u2013334. https:\/\/doi.org\/10.1007\/s11276-023-03448-9","journal-title":"Wireless Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03790-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-024-03790-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03790-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T12:15:03Z","timestamp":1739535303000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-024-03790-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,7]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["3790"],"URL":"https:\/\/doi.org\/10.1007\/s11276-024-03790-6","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,7]]},"assertion":[{"value":"29 May 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This paper has no conflict of interest for publishing.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"My research guide reviewed and ethically approved this manuscript for publishing in this Journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"I certify that I have explained the nature and purpose of this study to the above-named individual, and I have discussed the potential benefits of this study participation. The questions the individual had about this study have been answered, and we will always be available to address future questions.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}