{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T10:08:21Z","timestamp":1763374101388,"version":"3.45.0"},"reference-count":119,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["2023YFC3303803"],"award-info":[{"award-number":["2023YFC3303803"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s11277-025-11841-0","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T12:44:27Z","timestamp":1762173867000},"page":"115-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Security and Privacy Framework for Federated Learning in Beyond 5G IoT Networks"],"prefix":"10.1007","volume":"144","author":[{"given":"Nasir Ahmad","family":"Jalali","sequence":"first","affiliation":[]},{"given":"Chen","family":"Hongsong","sequence":"additional","affiliation":[]},{"given":"Farid Ahmad","family":"Zahin","sequence":"additional","affiliation":[]},{"given":"Aliyu","family":"Ashiru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,3]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Dinh, C. N., Pubudu, N., Pathirana, M., Ding, Aruna, & Seneviratne (2019). Blockchain for 5G and beyond networks: A state of the Art survey. Journal of Netowrk and Comptuer Application, 166. pp 1-38","key":"11841_CR1","DOI":"10.1016\/j.jnca.2020.102693"},{"doi-asserted-by":"crossref","unstructured":"Estefania Coronado, R., Behravesh, T., Subramanya, A., Fernandez-Fernandez (2022). Zero touch management: A survey of network automationa solutions for 5G and 6G networks. IEEE Communication Surveys and Tutorials, 24(4) pp. 1\u201344.","key":"11841_CR2","DOI":"10.1109\/COMST.2022.3212586"},{"issue":"12","key":"11841_CR3","doi-asserted-by":"publisher","first-page":"8442","DOI":"10.1109\/TII.2020.3043458","volume":"17","author":"M Rahim Taheri","year":"2021","unstructured":"Rahim Taheri, M. (2021). Fed-IIoT: A robust federated malware detection architecture in industrial IoT. IEEE Transactions on Industrial Informatics, 17(12), 8442\u20138452.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"11841_CR4","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s10586-020-03058-6","volume":"23","author":"U Khalid","year":"2020","unstructured":"Khalid, U., Asim, M. et al. (2020). A decentralized lightweight blockchain-based authentication mechanism for IoT system. Cluster Computing, 23(3), 2067\u20132087.","journal-title":"Cluster Computing"},{"doi-asserted-by":"crossref","unstructured":"Liu, Y., Peng, J., Kang, J. (2020). A secure federated learning framework for 5G networks. IEEE Wireless Communication Magazine, 27(4), pp. 1\u20139.","key":"11841_CR5","DOI":"10.1109\/MWC.01.1900525"},{"doi-asserted-by":"crossref","unstructured":"Haja Moudoud, S., Cherkaoui, L., & Khoukhi Towards a Secure and Reliable Federated Learning Using Blockchain, in 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 2021.","key":"11841_CR6","DOI":"10.1109\/GLOBECOM46510.2021.9685388"},{"doi-asserted-by":"crossref","unstructured":"Lai, F., Dai, Y. (2022). FedScale: Benchmarking Model and System Performance of Federated Learning at Scale, in Preceeding of the 39th International Conference on Machine Learning, Baltimore, Maryland, USA.","key":"11841_CR7","DOI":"10.1145\/3477114.3488760"},{"doi-asserted-by":"crossref","unstructured":"Sara Salim, N., & Moustafa (2021). A blockchain-Enabled explainable federated learning for Securing Internet - of -Things-Based social media 3.0 networks. IEEE Transactions on Computational Social Systems, 11(4), pp. 1\u201317.","key":"11841_CR8","DOI":"10.1109\/TCSS.2021.3134463"},{"doi-asserted-by":"crossref","unstructured":"Li, T., Sahu, A. K., Talwalkar, A., & Smith, V. (2020). Federated learning: Challenges, Methods, and future direcitons. IEEE Signal Processing Magazine, 37(3) pp. 50\u201360.","key":"11841_CR9","DOI":"10.1109\/MSP.2020.2975749"},{"issue":"4","key":"11841_CR10","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MNET.2019.1800418","volume":"33","author":"Y Ping Yang","year":"2019","unstructured":"Ping Yang, Y., Xiao, M., & Li, X. S. (2019). 6G wireless communications: Vission and Potetial techniques. Ieee Network, 33(4), 70\u201375.","journal-title":"Ieee Network"},{"doi-asserted-by":"crossref","unstructured":"Lewis Tseng: Liwen Wong, et al, Blockchain for Managing Heterogeneous Internet of Things: A Perspective Architecture, IEEE Network, vol. 34, no. 1, pp. 16\u201323, (2020).","key":"11841_CR11","DOI":"10.1109\/MNET.001.1900103"},{"doi-asserted-by":"crossref","unstructured":"Yichen Wan, Y., Qu, L., Gao, & Xiang, Y. (2022). Privacy-Preserving Blockchain-enabled Federated Learning for B5G-Driven edge computing, Computer Networks, 204, 108671","key":"11841_CR12","DOI":"10.1016\/j.comnet.2021.108671"},{"doi-asserted-by":"crossref","unstructured":"Li, D., Luo, Z., & Cao, B. (2021). Blockchain-based federated learning methodology in smart environments, Cluster Computing, Cluster Computing, 25, 2585\u20132599.","key":"11841_CR13","DOI":"10.1007\/s10586-021-03424-y"},{"key":"11841_CR14","first-page":"1","volume":"22","author":"AR Javed","year":"2022","unstructured":"Javed, A. R., Hassan, M. A., Shahzad, F., et al. (2022). Integration of blockchain technology and federated learning in vehicular (IoT) network: A comprehensive survey. MDPI, 22, 1\u201324.","journal-title":"MDPI"},{"key":"11841_CR15","doi-asserted-by":"publisher","first-page":"33154","DOI":"10.1109\/ACCESS.2022.3161132","volume":"10","author":"A Deepti Saraswat","year":"2022","unstructured":"Deepti Saraswat, A., Verma, P., Bhattacharya, c, et al. (2022). Blockchain-Based federated learning in UAVs beyond 5G network: A solution taxonomy and future directions. IEEE Access Multidisciplinary, 10, 33154\u201333183.","journal-title":"IEEE Access Multidisciplinary"},{"key":"11841_CR16","doi-asserted-by":"publisher","first-page":"4423","DOI":"10.1007\/s00500-021-06496-5","volume":"26","author":"D Li","year":"2022","unstructured":"Li, D., Han, D., & Weng, T. H. (2022). Blockchain for federated learning toward secure distributed machine learning systems: A systemic survey. Soft Computing, 26, 4423\u20134440.","journal-title":"Soft Computing"},{"doi-asserted-by":"crossref","unstructured":"Kumar, P., Kumar, R., Gag, S., Kaur, K., Zhang, Y., & Guizani, M. A Secure Data Dissemination Scheme for IoT-Based e-Health Systems Using AI and Blockchain, in 2022 IEEE Global Communication Conference: Selected Areas in Communications: E-Health, 2022.","key":"11841_CR17","DOI":"10.1109\/GLOBECOM48099.2022.10000801"},{"unstructured":"Mika Ylianttila, R., Kantola, A., Gurtov (2020). 6G White Paper: Research Challenges for Trust, Security and Privacy, arXiv:2004.11665,.","key":"11841_CR18"},{"key":"11841_CR19","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.comcom.2023.07.039","volume":"210","author":"Ducange","year":"2023","unstructured":"Jose Luis Corcuera Barcena, Ducange, Marcelloni, F., et al. (2023). Enabling federated learning of explianble AI models within Beyond-5G\/6G networks. Computer Communications, 210, 356\u2013375.","journal-title":"Computer Communications"},{"issue":"3","key":"11841_CR20","first-page":"1","volume":"61","author":"L Hashan Ratnayake","year":"2023","unstructured":"Hashan Ratnayake, L., Chen, X., & Ding (2023). A review of federated learning: Taxonomy, privacy and future directions. Journal of Intelligent Information System, 61(3), 1\u201327.","journal-title":"Journal of Intelligent Information System"},{"unstructured":"Afaq, A., Ahmed, Z., Haider, N., & Imran, M. Blockchain-based Collaborated Federated Learning for Improved Security, Privacy and Reliability, arXiv:2201.08551v1 [cs.CR] 21 Jan 2022, 2022.","key":"11841_CR21"},{"doi-asserted-by":"crossref","unstructured":"Kangde Liu, Z., Liang, Y. X., Kantola, R., Chuangyue, & Hu (2022). A survey on Blockchain-enabled federated learning and its prospects with digital twin. Digital Communication and Networks. 10(2), pp 248-264","key":"11841_CR22","DOI":"10.1016\/j.dcan.2022.08.001"},{"key":"11841_CR23","first-page":"1","volume":"166","author":"C Dinh","year":"2020","unstructured":"Dinh, C., Nguyen, P. N., Pathirana, M., Ding, & Seneviratne, A. (2020). Blockchain for 5G and beyond networks: A state of the Art survey. Journal of Network and Computer Applications, 166, 1\u201338.","journal-title":"Journal of Network and Computer Applications"},{"doi-asserted-by":"crossref","unstructured":"Moayad Aloqaily, O., Bouachir, Ismaeel, A. I., & Ridhawi (2021). Blockchain and FL-based Network Resource Management for Interactive Immersive Services, in 2021 IEEE Global communications conference (GLOBECOM).","key":"11841_CR24","DOI":"10.1109\/GLOBECOM46510.2021.9685091"},{"doi-asserted-by":"crossref","unstructured":"Saurabh Singh, C. R., Babu, I. H., Ra, & Yoon, B. (2022). BENS-B5G: Blockchain-Enabled Network Slicing in 5G and Beyon-5G (B5G) Netowrks, MDPI -Sensors, vol. 22.","key":"11841_CR25","DOI":"10.3390\/s22166068"},{"issue":"5","key":"11841_CR26","first-page":"527","volume":"12","author":"F Kai","year":"2020","unstructured":"Kai, F., Ren, Y., Wang, Y., Li, H., & Yang, Y. T. (2020). Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G. The Institution of Engineering and Technology (IET), 12(5), 527\u2013532.","journal-title":"The Institution of Engineering and Technology (IET)"},{"key":"11841_CR27","doi-asserted-by":"publisher","first-page":"2446","DOI":"10.55730\/1300-0632.3950","volume":"30","author":"S Chaudhary","year":"2022","unstructured":"Chaudhary, S., Kakkar, R., Gupta, R., et al. (2022). Blockchian and federated Learning-based security solution for telesurgery system: A comprehensive review. Turkish Journal of Electrical Engineering & Computer Sciences, 30, 2446\u20132488.","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"key":"11841_CR28","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11036-019-01448-8","volume":"25","author":"X Xu","year":"2020","unstructured":"Xu, X., Liu, X., Xu, Z., et al. (2020). Joint optimization of resource utilization and Laod balance with privacy preservation for edge services in 5G Netowrks. Mobile Networks & Applications, 25, 713\u2013724.","journal-title":"Mobile Networks & Applications"},{"issue":"7","key":"11841_CR29","doi-asserted-by":"publisher","first-page":"5194","DOI":"10.1109\/JIOT.2020.3035608","volume":"8","author":"P Amrit Mukherjee","year":"2021","unstructured":"Amrit Mukherjee, P., Goswami, M. A., Khan, et al. (2021). Energy-Efficient resource allocation strategy in massive IoT for industerial 6G applications. IEEE Internet of Things, 8(7), 5194\u20135201.","journal-title":"IEEE Internet of Things"},{"issue":"2","key":"11841_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Y Qiang Yang","year":"2019","unstructured":"Qiang Yang, Y., Liu, T., Chen, Y., & Tong (2019). Federated machine learning: Concept and applications. ACM Transactions on Intellegent System and Technology, 10(2), 1\u201319.","journal-title":"ACM Transactions on Intellegent System and Technology"},{"unstructured":"Zakaria Abou, E. I., Houda, H., Moudoud, B., Brik, L., & Khoukhi (2023). Securing Federated Learning Through Blockchain and Explainable AI for Robust Intrusion Detection in IoT Networks, in IEEE INFOCOM 2023- IEEE Conference on Computer Communications Workships, Hoboken, NJ, USA.","key":"11841_CR31"},{"unstructured":"Aniruddha Saha, A., Subramanya, H., & Pirshiavash (2020). Hidden Trigger Backdoor Attacks, in Proceedings of the AAAI Conference on Artificial Intelligence.","key":"11841_CR32"},{"doi-asserted-by":"crossref","unstructured":"Jiahui Geng, Y., Mou, Q., Li (2023). Improved gradient inversion attacks and defenses in federated learning. IEEE Transactions on Big Data, 10(6), pp. 1\u201313.","key":"11841_CR33","DOI":"10.1109\/TBDATA.2023.3239116"},{"key":"11841_CR34","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00105-6","volume":"5","author":"P Liu","year":"2022","unstructured":"Liu, P., Xu, X., & Wang, W. (2022). Threats, attacks and defenses to federated learning: Issues, taxonomy and perspectives. Cybersecurity, 5, Article 4 pp 1-19","journal-title":"Cybersecurity"},{"issue":"2","key":"11841_CR35","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MCOM.001.2200294","volume":"61","author":"K Kumar Randhir","year":"2022","unstructured":"Kumar Randhir, K., Prabhat, A., Moayad, A., & Ahamed (2022). Deep Learning-Based blockchain for security zero touch networks. IEEE Communications Magazine, 61(2), 96\u2013102.","journal-title":"IEEE Communications Magazine"},{"doi-asserted-by":"crossref","unstructured":"Leonardo Babun, K., Denney, Z. B., Celik (2021). A survey on IoT platform: Communication, security and privacy prespectives. Computer Networks, 192, pp 1-26","key":"11841_CR36","DOI":"10.1016\/j.comnet.2021.108040"},{"doi-asserted-by":"crossref","unstructured":"Jassim Happa, A., Steed, M., & Glencross (2021). Privacy-Certificate Standards for Extended-reality devices and services, in 2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstract and Workshops (VRW), Lisbon, Portugal.","key":"11841_CR37","DOI":"10.1109\/VRW52623.2021.00085"},{"issue":"5","key":"11841_CR38","doi-asserted-by":"publisher","first-page":"2802","DOI":"10.1109\/TNSE.2022.3191601","volume":"10","author":"P Kumar","year":"2023","unstructured":"Kumar, P., Kumar, R., Kumar, A., Franklin, A. A., Garg, S., & Singh, S. (2023). Blockchain and deep learning for security communication in digital twin empowered industrial IoT network. IEEE Transactions on Network Science and Engineering, 10(5), 2802\u20132814.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"11841_CR39","doi-asserted-by":"publisher","first-page":"11352","DOI":"10.1109\/ACCESS.2020.2964673","volume":"8","author":"N Mohmammad","year":"2020","unstructured":"Mohmammad, N., Patwary, S. J., Nawaz, M. D., AbduR Rahman, et al. (2020). The potential short-and Long-term disruptions and transformativ impacts of 5G and beyond wireless networks: Lessons learnt form teh development of a 5G testbed environment. Ieee Access : Practical Innovations, Open Solutions, 8, 11352\u201311378.","journal-title":"Ieee Access : Practical Innovations, Open Solutions"},{"key":"11841_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618","author":"VL Nguyen","year":"2021","unstructured":"Nguyen, V. L., Lin, P. C., & Cheng, B. C. (2021). Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Communications Surveys and Tutorials 23(4). https:\/\/doi.org\/10.1109\/COMST.2021.3108618","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"5","key":"11841_CR41","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MCE.2022.3193268","volume":"12","author":"K Aljuhani Ahamed","year":"2022","unstructured":"Aljuhani Ahamed, K., Prabhat, K., Randhir, J., Alireza, Islam, A. K. M., & Najmul (2022). Fog intellligence for secure smart villages: Architecture, and future challenges. IEEE Consumer Electronics Mazazine, 12(5), 12\u201321.","journal-title":"IEEE Consumer Electronics Mazazine"},{"doi-asserted-by":"crossref","unstructured":"Chuhan Wu, F., Wu, L., Lyu (2032). Communication-Efficient Learning federated learning via knowledge distilation, Nature Communication, vol. 13, no. 2022.","key":"11841_CR42","DOI":"10.1038\/s41467-022-29763-x"},{"issue":"7","key":"11841_CR43","doi-asserted-by":"publisher","first-page":"9334","DOI":"10.1109\/TVT.2024.3359998","volume":"73","author":"EI Zakaria Abou","year":"2024","unstructured":"Zakaria Abou, E. I., Houda, H., Moudoud, B., & Brik (2024). Federated deep reinforcement learning for efficient jamming attack mitigation in O-RAN. IEEE Transactions on Vehicular Technology, 73(7), 9334\u20139343.","journal-title":"IEEE Transactions on Vehicular Technology"},{"unstructured":"Dinh, M. D., & Nguyen, C. (2021). Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges, IEEE Internet of Things,.","key":"11841_CR44"},{"key":"11841_CR45","first-page":"55","volume":"201","author":"C Yu","year":"2021","unstructured":"Yu, C., Chen, S., Wang, F., & Wei, Z. (2021). Improving 4G\/5G air interface security: A survey of existing attacks on different LTE layers. International Journal of Computer and Telecommunications Networking, 201, 55\u201382.","journal-title":"International Journal of Computer and Telecommunications Networking"},{"doi-asserted-by":"crossref","unstructured":"Khaled.Letaief, W., Chen, Y., Shi, J., Zhang, & Zhang, Y. J. A. (2019). The roadmap to 6G: AI empowered wireless networks. IEEE Commuincation Magazine, 57(8) ,pp. 84\u201390.","key":"11841_CR46","DOI":"10.1109\/MCOM.2019.1900271"},{"issue":"1","key":"11841_CR47","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/COMST.2023.3327327","volume":"26","author":"M Elmehdi Illi","year":"2024","unstructured":"Elmehdi Illi, M., Qaraqe, S., Althunibat, et al. (2024). Physical layer security for Authentication, confidentiality, and malicious node detection: A paradigm shift in securiing IoT networks. IEEE Communications Survey & Tutorials, 26(1), 347\u2013388.","journal-title":"IEEE Communications Survey & Tutorials"},{"key":"11841_CR48","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.eng.2021.10.002","volume":"8","author":"D Xuemin Shen","year":"2021","unstructured":"Xuemin Shen, D., Liu, C., Huang, et al. (2021). Blockchain for transparnet data management toward 6G. Engineering, 8, 74\u201385.","journal-title":"Engineering"},{"doi-asserted-by":"crossref","unstructured":"Hasna Uddin, M., Gibson, G. A., Safdar (2019). IoT for 5G\/B5G applications in Smart Homes, Smart Citites, Wearables and Connected Cars, in, IEEE 24th International Workshop on Computer Aided Modeling and Design of Communcation Links and Networks (CAMAD), Limassol, 2019.","key":"11841_CR49","DOI":"10.1109\/CAMAD.2019.8858455"},{"doi-asserted-by":"crossref","unstructured":"Rahma Trabelsi, G., Fersi, M., & Jmaiel (2023). Access control in internet of thing: A survey. Computers & Security, 135, 103472., pp 84-90.","key":"11841_CR50","DOI":"10.1016\/j.cose.2023.103472"},{"doi-asserted-by":"crossref","unstructured":"Lei, Qu, Y., Xie, G. (2021). Security and Privacy-Enhanced federated learning for anomaly detection in IoT infrastructures. IEEE Transactions on Industrial Informatics, 18(5), pp. 1\u201310.","key":"11841_CR51","DOI":"10.1109\/TII.2021.3107783"},{"key":"11841_CR52","doi-asserted-by":"publisher","first-page":"11297","DOI":"10.1007\/s10462-023-10417-3","volume":"56","author":"N Deepika Sirohi","year":"2023","unstructured":"Deepika Sirohi, N., Kumar, et al. (2023). Federared learning for 6G-enabled secure communication system: A comprehensive survey. Artificail Intellegence Reveiw, 56, 11297\u201311389.","journal-title":"Artificail Intellegence Reveiw"},{"doi-asserted-by":"crossref","unstructured":"Abreha, H. G., Hayajneh, M., & Serhani, M. A. (2021). Federated learning in edge computing: A systematic survey. MDPI-Sensors, 22 pp. 1-47.","key":"11841_CR53","DOI":"10.3390\/s22020450"},{"key":"11841_CR54","doi-asserted-by":"publisher","first-page":"63229","DOI":"10.1109\/ACCESS.2021.3075203","volume":"9","author":"Neder","year":"2021","unstructured":"Neder, BouAcida, & Mohapatra, P. (2021). Vulenerabilities in federared learning. Ieee Access : Practical Innovations, Open Solutions, 9, 63229\u201363250.","journal-title":"Ieee Access : Practical Innovations, Open Solutions"},{"key":"11841_CR55","first-page":"1","volume":"6","author":"F Salahdine","year":"2022","unstructured":"Salahdine, F., Han, T., & Zhang, N. (2022). Security in 5G and beyond recent advanced and future challenges. Security and Privacy, 6, 1\u201332.","journal-title":"Security and Privacy"},{"doi-asserted-by":"crossref","unstructured":"Li, X., Wei, Q., Wu, Z. et al. (2023). Harden-IoT: Hardening the eol devices by intercepting the attack vector for future B5G\/6G IoT. Wireless Networks, 30, 6797-6808.","key":"11841_CR56","DOI":"10.1007\/s11276-023-03517-z"},{"key":"11841_CR57","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.iotcps.2023.04.001","volume":"3","author":"A Jean-Paul","year":"2023","unstructured":"Jean-Paul, A., Yaacoub, Hassan, N., Noura, O., & Salman (2023). Security of Federaed learning with IoT system: Issues, Limitations, Challenges, and solutions. Internet of Things and Cyber-Physical System, 3, 155\u2013179.","journal-title":"Internet of Things and Cyber-Physical System"},{"doi-asserted-by":"crossref","unstructured":"Chamara Sandeepa, B., Siniarski (2022). A survey on privacy of B5G\/6G: New privacy challenges and research directions. Journal of Industrial Information Integration, 30. pp. 1-37.","key":"11841_CR58","DOI":"10.1016\/j.jii.2022.100405"},{"key":"11841_CR59","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MIC.2022.3190552","volume":"27","author":"G Luciano Baresi","year":"2023","unstructured":"Luciano Baresi, G., Quattrocchi, & Rasi, N. (2023). Open challenges in federated machine learning. IEEE Internet Computing, 27, 20\u201327.","journal-title":"IEEE Internet Computing"},{"key":"11841_CR60","doi-asserted-by":"publisher","first-page":"80903","DOI":"10.1109\/ACCESS.2023.3295412","volume":"11","author":"S Vuchinich","year":"2023","unstructured":"Vuchinich, S., & Zhu, Q. (2023). The current state and challenges of fairness in federated learning. IEEE Access\u202f: Practical Innovations, Open Solutions, 11, 80903\u201380914.","journal-title":"IEEE Access\u202f: Practical Innovations, Open Solutions"},{"doi-asserted-by":"crossref","unstructured":"Chamara Sandeepa, B., Siniarski (2022). A survey on privacy of personal and Non-Personal data in B5G\/6G networks. ACM  58(2), pp. 1\u201334.","key":"11841_CR61","DOI":"10.1145\/3662179"},{"doi-asserted-by":"crossref","unstructured":"Rafik Hamza, K., Zettsu, & Investigation on Privacy-Preseving Techniques For Personal Data. (2021)., in Proceedings of the 2021 ACM Workshop on Intelligent Cross-Data Analysis and Retrieval (ICDAR ' 21).","key":"11841_CR62","DOI":"10.1145\/3463944.3469267"},{"doi-asserted-by":"crossref","unstructured":"Rafik Hamza, A., & Hassan, A. (2022). Ali, et al, Towards secure big data analysis via fully homomorphic encryption algorithm. Entropy, 24, 4. pp. 1-17.","key":"11841_CR63","DOI":"10.3390\/e24040519"},{"doi-asserted-by":"crossref","unstructured":"Marco Arazzi, S. Nicolazzo, & Nocera, A. (2023). A fully Privacy-Preserving solution for anomaly detection in IoT using federated learning and homomorphic encryption. Information System Frontiers","key":"11841_CR64","DOI":"10.1007\/s10796-023-10443-0"},{"doi-asserted-by":"crossref","unstructured":"Naaz, R. (2023). Ashendra kumar Saxena, & pradeep Kr Shah, Blockchain Technology\u2019s Overview: Consensus, Archtecture and Future Trends, in AIP Conference Proceedings, Greater Noida, India.","key":"11841_CR65","DOI":"10.1063\/5.0125073"},{"key":"11841_CR66","first-page":"2067","volume":"23","author":"M Umair Khalid","year":"2020","unstructured":"Umair Khalid, M., Asim, T., Baker, et al. (2020). A decentralized lightweight Blockchain-based authentication mechanism for IoT system. Liverpool John Moores University (Cluster Computing), 23, 2067\u20132087.","journal-title":"Liverpool John Moores University (Cluster Computing)"},{"doi-asserted-by":"publisher","unstructured":"Hajar Moudoud, S., & Cherkaoui (2023). Federated learning Meets blockchain to secure the metaverse. in 2023 international wireless communications and mobile computing (IWCMC). Marrakesh. https:\/\/doi.org\/10.1109\/iwcmc58020.2023.10182956","key":"11841_CR67","DOI":"10.1109\/iwcmc58020.2023.10182956"},{"issue":"3","key":"11841_CR68","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TGCN.2022.3165692","volume":"6","author":"P Kumar","year":"2022","unstructured":"Kumar, P., Kumar, R., & Tripathi, G. P. G. R. (2022). BDEdge: Blockchain and deep-learning for secure edge-envisioned green CAVs. IEEE Transactions on Green Communications and Networking, 6(3), 1330\u20131339.","journal-title":"IEEE Transactions on Green Communications and Networking"},{"issue":"31","key":"11841_CR69","first-page":"1027","volume":"16","author":"M Roopesh","year":"2024","unstructured":"Roopesh, M. (2024). Blockchain technology\u2019s role in securing data and preventing cyberattacks: A detailed review. Academic Journal on Science Technology Engineering and Mathematics, 16(31), 1027\u20131038.","journal-title":"Academic Journal on Science Technology Engineering and Mathematics"},{"doi-asserted-by":"crossref","unstructured":"Mohan, V. S., Sankaran, S., Priyadarsi Nanda, Krishnashree, & Achuthan (2023). Enabling secure lightweight mobile narrowband internet of things (NB-IoT) applications using blockchain. Journal of Network and Comptuer Applilcation, 219 , pp. 1-17.","key":"11841_CR70","DOI":"10.1016\/j.jnca.2023.103723"},{"doi-asserted-by":"crossref","unstructured":"Liang, Y. C. (2020). Blockchain for Dynamic Spectrum Management, in Dynamic Spectrum Management (from Congitive Radio to Blockchain and Artificial Intelligence), Chengdu, Sichuan, China, Springer(signals and Communication Technology), pp. 121\u2013146.","key":"11841_CR71","DOI":"10.1007\/978-981-15-0776-2_5"},{"key":"11841_CR72","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s00607-023-01228-z","volume":"106","author":"RK Prity Rani","year":"2023","unstructured":"Prity Rani, R. K., & Kukrega, S. (2023). A systematic study on blockchain technology in education: Initiatives, products, applications, benefits, challenges and research direction. Computing, 106, 405\u2013447.","journal-title":"Computing"},{"issue":"2","key":"11841_CR73","doi-asserted-by":"publisher","first-page":"189","DOI":"10.30954\/2322-0465.2.2021.7","volume":"9","author":"PK Paul","year":"2021","unstructured":"Paul, P. K., Aithal, S., Surajit, & Ghosh. (2021). Block chain technology and its types\u2013A short review. International Journal of Applied Science and Engineering, 9(2), 189\u2013200.","journal-title":"International Journal of Applied Science and Engineering"},{"doi-asserted-by":"crossref","unstructured":"Gousia Habib, S., Sharma (2022). Blockchain technology: Benefits, Challenges, Applications, and integration of blockchain technology with cloud computing. Future Internet, 14, 341 , pp. 1-22.","key":"11841_CR74","DOI":"10.3390\/fi14110341"},{"doi-asserted-by":"crossref","unstructured":"Kumar, P., Kumar, R., AIoqaily, M., & Najmul Islam, A. K. M. (2023). Explainable AI and blockchain for metaerse: A security and privacy presepective. IEEE Consumer Electronics Magazine, 13(3), pp. 90\u201398.","key":"11841_CR75","DOI":"10.1109\/MCE.2023.3296222"},{"issue":"1","key":"11841_CR76","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TCE.2023.3320157","volume":"70","author":"R Kumar","year":"2024","unstructured":"Kumar, R., Javeed, D., Aljuhani, A., Jolfaei, A., Kumar, P., & Najmul Islam, A. K. M. (2024). Blockchain-based authentication and explianable AI for securing consumer IoT applications. IEEE Transactions on Consumer Electronics, 70(1), 1145\u20131155.","journal-title":"IEEE Transactions on Consumer Electronics"},{"doi-asserted-by":"crossref","unstructured":"Geetanjali Rathee, A., Sharma (2019). A blockchain framework for Securing connected and autonomous vehicles. Sensors (MDPI), 19, pp. (1\u201315).","key":"11841_CR77","DOI":"10.3390\/s19143165"},{"issue":"8","key":"11841_CR78","doi-asserted-by":"publisher","first-page":"4734","DOI":"10.1109\/TCOMM.2020.2990686","volume":"68","author":"J Choi","year":"2020","unstructured":"Choi, J. (2020). Federated learning with blockchain for autonomous vehicles: Analysis and design challenges. IEEE Transaction on Communication, 68(8), 4734\u20134747.","journal-title":"IEEE Transaction on Communication"},{"doi-asserted-by":"crossref","unstructured":"Omar Cliff Uchani Gutierrez, and, & Xu, G. (2023). Blockchain and smart contracts to secure property transactions in smart cities. Applied Sciences, 13, 1 , pp. 1-20.","key":"11841_CR79","DOI":"10.3390\/app13010066"},{"key":"11841_CR80","doi-asserted-by":"crossref","DOI":"10.3390\/economies10090206","volume":"10","author":"ER Keresztes","year":"2022","unstructured":"Keresztes, E. R., Kovacs, I. I., Horvath, A., & Zimanyi, K. (2022). Is your supply chain ready to embrace blockchain? Economies, 10, Article 9 , pp. 1-21.","journal-title":"Economies"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Q., Palacharla, P., Sekiya, M., Suga, J., & Katagiri, T. (2020). Demo: A Blockchain Based Protocol for Federated Learning, 2020 IEEE 28th International Conference on Network Protocols (ICNP),.","key":"11841_CR81","DOI":"10.1109\/ICNP49622.2020.9259388"},{"key":"11841_CR82","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10192395","volume":"10","author":"AA Khan","year":"2021","unstructured":"Khan, A. A., Laghari, A. A., & Liu, D. S. (2021). EPS-ledger: Blockchain hyperledger sawtooth-enabled distributed power system chain of operation and control node privacy and security. Electronics, 10, Article 19 , pp. 1-22.","journal-title":"Electronics"},{"doi-asserted-by":"crossref","unstructured":"Juan Minango, M., Zambrano, W. P., Parada (2023). Proof of Concepts of Corda Blockchain Technology Applied on the supply Chain Area, in Trends in Artificial Intelligence and Computer Engineering. ICAETT 2022.","key":"11841_CR83","DOI":"10.1007\/978-3-031-25942-5_48"},{"unstructured":"Yann Fraboni, R., Vidal, M., & Lorenzi (2021). Free-rider Attacks on Model Aggregation in Federated Learning, in Proceedings of the 24th International Conference on Artificial Intellegence and Statistics (AISTATS), San Diego, California.","key":"11841_CR84"},{"doi-asserted-by":"crossref","unstructured":"Junaid Ansari, C., Andersson (2022). Performance of 5G trials for industrial automation. Electronics, 11, 412 , pp. 1-13.","key":"11841_CR85","DOI":"10.3390\/electronics11030412"},{"doi-asserted-by":"crossref","unstructured":"Komal Farooq, H. J., Syed, S. O., Alqahtani (2022). Blockchain federated learning for In-Home health monitoring. MDPI Electronis, 12, 136 , pp. 1-20.","key":"11841_CR86","DOI":"10.3390\/electronics12010136"},{"doi-asserted-by":"crossref","unstructured":"Emmanouil Skondras, I., Kosmopoulos, et, & al (2022). A group handover scheme for supporting drone services in IoT-Based 5G Netwrok architectures. Drones, 6, 425 , pp. 1-21.","key":"11841_CR87","DOI":"10.3390\/drones6120425"},{"doi-asserted-by":"crossref","unstructured":"Yuxia Chang, C., Fang, & Sun, W. (2021). A Blockcahin-Based federated learning method for smart healthcare. Hindawi Computational Intelligence and Neuroscience, 3, pp. 1\u201312.","key":"11841_CR88","DOI":"10.1155\/2021\/4376418"},{"key":"11841_CR89","doi-asserted-by":"publisher","DOI":"10.3390\/s19173704","volume":"19","author":"M Marchese","year":"2019","unstructured":"Marchese, M., Moheddine, A., & Patrone, F. (2019). IoT and UAV integration in 5G hybrid terrestrial-satellite network. Sensor, 19, Article 3704 , pp. 1-19.","journal-title":"Sensor"},{"doi-asserted-by":"crossref","unstructured":"Ge, Y., & Zhou, J. Blockchain Based Federated Learning for Object Detection, in Proceedings of the 2022 2nd International Conference on Control and Intelligent Robotics (ICCIR), Nanjing, China, 2022.","key":"11841_CR90","DOI":"10.1145\/3548608.3559272"},{"doi-asserted-by":"crossref","unstructured":"Giovanni Giambene, E. O. Addo, & Kota, S. (2019). 5G Aerial Component for IoT Support in Remote Rural Areas, in 2019 IEEE 2nd 5G World Forum (5GWF), Dresden, Germany.","key":"11841_CR91","DOI":"10.1109\/5GWF.2019.8911667"},{"doi-asserted-by":"crossref","unstructured":"Majeed, U., & Hong, C. S. (2019). FLchain: Federated Learning Via MEC-enabled Blockchain Network, in 2019 20th Asia-Pacific Network Operation and Management Symosium (APNOMS), Matsue, Japan.","key":"11841_CR92","DOI":"10.23919\/APNOMS.2019.8892848"},{"issue":"16","key":"11841_CR93","doi-asserted-by":"publisher","first-page":"12806","DOI":"10.1109\/JIOT.2021.3072611","volume":"8","author":"C Dinh","year":"2021","unstructured":"Dinh, C., Nguyen, M., Ding, Q. V., Pham, et al. (2021). Federated learning Meets blockchain in edge computing: Opportunities and challenges. IEEE Internet of Things, 8(16), 12806\u201312825.","journal-title":"IEEE Internet of Things"},{"doi-asserted-by":"crossref","unstructured":"Biswas, A., & Wang, H.C. (2023). Autonomous Vehicles Enabled by the Integration of IoT, Edge Intelligence, 5G, and Blockchain, Sensors, 23, 1963.","key":"11841_CR94","DOI":"10.3390\/s23041963"},{"doi-asserted-by":"crossref","unstructured":"Abdullah Alghamdi, J., Zhu, G., Yin (2022). Blockchain empowered federated learning ecosystem for Securing consumer IoT features analysis. MDPI (Sensors), 22 , pp. 1-15.","key":"11841_CR95","DOI":"10.3390\/s22186786"},{"doi-asserted-by":"crossref","unstructured":"Hongxun Hui, Y., & Ding, Q. (2020). Shi, et al, 5G Network-based internet of things for demand response in smart gird: A survey on application potential. Applied Energy, 257, 113972 , pp. 1-15.","key":"11841_CR96","DOI":"10.1016\/j.apenergy.2019.113972"},{"doi-asserted-by":"crossref","unstructured":"Podschwadt, R., & Takabi, D. Non-interactive Privacy Preserving Recurrent Neural Network Prediction with Homomorphic Encryption, in 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA, 2021.","key":"11841_CR97","DOI":"10.1109\/CLOUD53861.2021.00019"},{"issue":"2","key":"11841_CR98","first-page":"400","volume":"29","author":"H Chen","year":"2023","unstructured":"Chen, H. (2023). Federated learning security and privacy-preserving algorithm and experimental research under internet of things critical infrastracture. Tsinghua Science and Technology, 29(2), 400\u2013414.","journal-title":"Tsinghua Science and Technology"},{"issue":"10","key":"11841_CR99","first-page":"1572","volume":"110","author":"V Chiara Marcolla","year":"2022","unstructured":"Chiara Marcolla, V., Sucasas, M., Manzano, et al. (2022). A survey on homomorphic encryption scheme: Theory and implementation. ACM Computing Surveys, 110(10), 1572\u20131609.","journal-title":"ACM Computing Surveys"},{"key":"11841_CR100","volume":"64","author":"FU Xiang","year":"2021","unstructured":"Xiang, F. U., Huaimin, W. A. N. G., & Peichang, S. H. I. (2021). A survey of blockchain consensus algorithms: Mechanism, design and applications. Science China Information Sciences, 64, Article 2 , pp. 1-15.","journal-title":"Science China Information Sciences"},{"issue":"8","key":"11841_CR101","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/TPDS.2021.3056773","volume":"32","author":"Xidi Qu","year":"2021","unstructured":"Xidi Qu, S., Wang, & Cheng, X. (2021). Proof of federated learning: A novel energy-recycling consensus algorithm. IEEE Transactions on Parallel and Distributed Systems, 32(8), 2074\u20132085.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"11841_CR102","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.iotcps.2023.04.001","volume":"3","author":"A Jean-Paul","year":"2023","unstructured":"Jean-Paul, A., Yaacoub, Hassan, & Salman, O. (2023). Security of federated learning with IoT system: Issues, limitations, challenges, and solutions. Internet of Things and Cyber-Physical Systems, 3, 155\u2013179.","journal-title":"Internet of Things and Cyber-Physical Systems"},{"doi-asserted-by":"crossref","unstructured":"Leonardo Babun, K., Denney, Z. B., Celik, P., & McDaniel (2021). A survey on IoT platforms: Communication, Security, and privacy perespectives. Computer Networks, 192 , pp. 1-26.","key":"11841_CR103","DOI":"10.1016\/j.comnet.2021.108040"},{"key":"11841_CR104","doi-asserted-by":"publisher","first-page":"140699","DOI":"10.1109\/ACCESS.2020.3013541","volume":"8","author":"M Aledhari","year":"2020","unstructured":"Aledhari, M., Razzak, R., Parizi, R. M., & Saeed, F. (2020). Federated learning: A survey on enabling technologies, protocols, and application. IEEE Access\u202f: Practical Innovations, Open Solutions, 8, 140699\u2013140725.","journal-title":"IEEE Access\u202f: Practical Innovations, Open Solutions"},{"issue":"5","key":"11841_CR105","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1016\/j.icte.2023.03.006","volume":"9","author":"Vinay Gugueoth","year":"2023","unstructured":"Vinay Gugueoth, S., Sachin, & Shetty. (2023). Security of internet of things (IoT) using federated learning and deep learning - Recent advancements, issues and prospects. ICT Express, 9(5), 941\u2013960.","journal-title":"ICT Express"},{"doi-asserted-by":"crossref","unstructured":"Ghafoor, U., Ali, M., & Khan, H. Z. (2022). Adil Masood Siddiqui, & Muhammad Naeem, NOMA and future 5G & B5G wireless network: A paradigm. Journal of Network and Computer Applications, 204 , pp. 1-30.","key":"11841_CR106","DOI":"10.1016\/j.jnca.2022.103413"},{"doi-asserted-by":"crossref","unstructured":"Beomyeol Jeon, S. M., Ferdous, & Walid, A. (2021). Privacy-Preserving Decentralized Aggregation for Federated Learning.","key":"11841_CR107","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484437"},{"key":"11841_CR108","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10774-7","volume":"57","author":"H Li","year":"2024","unstructured":"Li, H., Ge, L., & Tian, L. (2024). Survey: Federated learning data security and privacy-preserving in edge-Internet of things. Artificial Intelligence Review, 57, Article 130 , pp. 1-38.","journal-title":"Artificial Intelligence Review"},{"key":"11841_CR109","doi-asserted-by":"publisher","DOI":"10.1145\/3460427","author":"X Yin","year":"2021","unstructured":"Yin, X., Zhu, Y., & Hu, J. (2021). A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions. Acm Computing Surveys , 54(6), pp. 1-36. https:\/\/doi.org\/10.1145\/3460427","journal-title":"Acm Computing Surveys"},{"unstructured":"Jonas Geiping, H., Bauermeister, H., Droge, M., & Moeller (2020). Intverting Gradients-How easy is it to break privacy in federated learning? in 34th Conference on Neural Information Processing System (NeurIPS 2020), Vancouver, Canada.","key":"11841_CR110"},{"unstructured":"Zhu, L., Liu, Z., & Han, S. (2019). Deep Leakage from Gradients, in 33rd Conference on Neural Information Processing System (NeurIPS), Vancouver, Canada.","key":"11841_CR111"},{"issue":"11","key":"11841_CR112","doi-asserted-by":"publisher","first-page":"8229","DOI":"10.1109\/JIOT.2022.3150363","volume":"9","author":"DB Bimal Ghimire","year":"2022","unstructured":"Bimal Ghimire, D. B., & Rawat (2022). Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet of Things, 9(11), 8229\u20138249.","journal-title":"IEEE Internet of Things"},{"doi-asserted-by":"crossref","unstructured":"Wang, K., Wang, Y., & Zhenzhou, J. I. (2019). Defending blockchain forking attack by delaying MTC confirmation. IEEE Access , 8, pp. 113847-113859.","key":"11841_CR113","DOI":"10.1109\/ACCESS.2020.3000571"},{"unstructured":"Shengling Wang, Wang, & Hu, Q. (2019). Corking by Forking: Vulnerability Analysis of Blockchain, in IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France.","key":"11841_CR114"},{"doi-asserted-by":"crossref","unstructured":"Bing Liu, Y., Qin, & Chu, X. Reducing Forks in the Blockchain via Probabillistic Verification, in 2019 IEEE 35th International Conference on Data Engineering workshops (ICDEW), 2019.","key":"11841_CR115","DOI":"10.1109\/ICDEW.2019.00-42"},{"doi-asserted-by":"crossref","unstructured":"Badis Hammi, S., Zeadally, & Nebhen, J. (2023). Security Threats, Contermeasures, and Challenges of Digital Supply Chains, ACM Computing Surveys, vol. 55, no. 14s.","key":"11841_CR116","DOI":"10.1145\/3588999"},{"doi-asserted-by":"crossref","unstructured":"Zhang, R., Xue, R., & Liu, L. (2019). Security and privacy on blockchain. ACM Computing Surveys, 52, 3 , pp. 1-34.","key":"11841_CR117","DOI":"10.1145\/3316481"},{"key":"11841_CR118","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00377-4","volume":"11","author":"G Bao","year":"2022","unstructured":"Bao, G., & Guo, P. (2022). Federated learning in cloud-edge collaborative architecture: Key technologies, applications and challenges. Journal of Cloud Computing, 11, Article 94 , pp. 1-22.","journal-title":"Journal of Cloud Computing"},{"doi-asserted-by":"crossref","unstructured":"Nidal Nasser, Z. M., Fadlullah (2022). A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: A proof-of-concept. Computer Netwroks, 205, 108672 , pp. 1-11.","key":"11841_CR119","DOI":"10.1016\/j.comnet.2021.108672"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-025-11841-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-025-11841-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-025-11841-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T10:03:29Z","timestamp":1763373809000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-025-11841-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":119,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["11841"],"URL":"https:\/\/doi.org\/10.1007\/s11277-025-11841-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"29 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}