{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:03:11Z","timestamp":1776096191493,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-024-01864-y","type":"journal-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T09:31:37Z","timestamp":1739784697000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An efficient privacy-preserving authentication scheme for internet of vehicles based on blockchain technology with hybrid adaptive network"],"prefix":"10.1007","volume":"18","author":[{"given":"R.","family":"Loganathan","sequence":"first","affiliation":[]},{"given":"S.","family":"SelvakumaraSamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"1864_CR1","doi-asserted-by":"publisher","first-page":"109215","DOI":"10.1016\/j.knosys.2022.109215","volume":"251","author":"C Zhong","year":"2022","unstructured":"Zhong C, Li G, Meng Z (2022) Beluga whale optimization: a novel nature-inspired metaheuristic algorithm. Knowl-Based Syst 251:109215","journal-title":"Knowl-Based Syst"},{"issue":"11","key":"1864_CR2","doi-asserted-by":"publisher","first-page":"22571","DOI":"10.1109\/TITS.2021.3102581","volume":"23","author":"R Kumar","year":"2022","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Kumar N (2022) P2SF-IoV: a privacy-preservation-based secured framework for internet of vehicles. IEEE Trans Intell Transp Syst 23(11):22571\u201322582","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1864_CR3","doi-asserted-by":"publisher","first-page":"102627","DOI":"10.1016\/j.simpat.2022.102627","volume":"120","author":"S Wang","year":"2022","unstructured":"Wang S, Yingnan Hu, Qi G (2022) Blockchain and deep learning based trust management for Internet of Vehicles. Simul Model Pract Theory 120:102627","journal-title":"Simul Model Pract Theory"},{"issue":"9","key":"1864_CR4","doi-asserted-by":"publisher","first-page":"16492","DOI":"10.1109\/TITS.2021.3098636","volume":"23","author":"R Kumar","year":"2022","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Kumar N, Hassan MM (2022) A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system. IEEE Trans Intell Transp Syst 23(9):16492\u201316503","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1864_CR5","doi-asserted-by":"crossref","unstructured":"Fan M, Zhang Z, Li Z, Sun G, Yu H, Guizani M (2022) Blockchain-based decentralized and lightweight anonymous authentication for federated learning. IEEE Trans Veh Technol, 72(9):12075-12086","DOI":"10.1109\/TVT.2023.3265366"},{"key":"1864_CR6","doi-asserted-by":"crossref","unstructured":"Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298\u20134311","DOI":"10.1109\/TVT.2020.2973651"},{"key":"1864_CR7","doi-asserted-by":"crossref","unstructured":"Feng X, Cui K, Wang L (2022) PBAG: a privacy-preserving blockchain-based authentication protocol with global-updated commitment in IoV. Cryptography and Security 25:13524\u201313545","DOI":"10.1109\/TITS.2024.3399200"},{"issue":"5","key":"1864_CR8","doi-asserted-by":"publisher","first-page":"4620","DOI":"10.1109\/TVT.2021.3132961","volume":"71","author":"H Chai","year":"2022","unstructured":"Chai H, Leng S, He J, Zhang K, Cheng B (2022) CyberChain: cybertwin empowered blockchain for lightweight and privacy-preserving authentication in internet of vehicles. IEEE Trans Veh Technol 71(5):4620\u20134631","journal-title":"IEEE Trans Veh Technol"},{"key":"1864_CR9","doi-asserted-by":"crossref","unstructured":"Qureshi KN, Jeon G, Hassan MM, Hassan MR, Kaur K (2022) Blockchain-based privacy-preserving authentication model intelligent transportation systems. IEEE Trans Intell Transport Syst 24(7):7435\u20137443","DOI":"10.1109\/TITS.2022.3158320"},{"key":"1864_CR10","doi-asserted-by":"publisher","first-page":"45061","DOI":"10.1109\/ACCESS.2019.2909004","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang X, Zeng P, Patterson N, Jiang F, Doss R (2019) An improved authentication scheme for internet of vehicles based on blockchain technology. IEEE Access 7:45061\u201345072","journal-title":"IEEE Access"},{"issue":"4","key":"1864_CR11","first-page":"1","volume":"22","author":"G Manogaran","year":"2023","unstructured":"Manogaran G, Rawal BS, Saravanan V, Priyan MK, Xin Qin, Shakeel P (2023) Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication. ACM Transact Int Technol 22(4):1\u201320","journal-title":"ACM Transact Int Technol"},{"key":"1864_CR12","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.comcom.2022.05.014","volume":"192","author":"M Poongodi","year":"2022","unstructured":"Poongodi M, Bourouis Sami, Ahmed Ahmed Najat, Vijayaragavan M, Venkatesan KGS, Alhakami Wajdi, Hamdi Mounir (2022) A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework. Comp Commun 192:48\u201356","journal-title":"Comp Commun"},{"key":"1864_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.future.2022.09.010","volume":"139","author":"B Zhang","year":"2023","unstructured":"Zhang B, Xiaoliang Wang Ru, Xie CL, Zhang H, Jiang F (2023) A reputation mechanism based Deep reinforcement learning and blockchain to suppress selfish node attack motivation in Vehicular Ad-Hoc Network. Futur Gener Comput Syst 139:17\u201328","journal-title":"Futur Gener Comput Syst"},{"key":"1864_CR14","doi-asserted-by":"publisher","first-page":"105630","DOI":"10.1016\/j.engappai.2022.105630","volume":"117","author":"AO Philip","year":"2023","unstructured":"Philip AO, Saravanaguru RAK (2023) Multisource traffic incident reporting and evidence management in the Internet of Vehicles using machine learning and blockchain. Eng Appl Artif Intel 117:105630","journal-title":"Eng Appl Artif Intel"},{"key":"1864_CR15","doi-asserted-by":"publisher","first-page":"3198","DOI":"10.1007\/s12083-021-01079-5","volume":"14","author":"B Chaudhary","year":"2021","unstructured":"Chaudhary B, Singh K (2021) A blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks. Peer-to-Peer Netw Appl 14:3198\u20133212","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1864_CR16","doi-asserted-by":"publisher","first-page":"24155","DOI":"10.1007\/s11042-022-14288-8","volume":"82","author":"P Mundhe","year":"2022","unstructured":"Mundhe P, Pooja Phad R, Yuvaraj SV, Venkatesan S (2022) Blockchain-based conditional privacy-preserving authentication scheme in VANETs. Multimed Tools Appl 82:24155\u201324179","journal-title":"Multimed Tools Appl"},{"key":"1864_CR17","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/s12243-021-00897-1","volume":"77","author":"KA Yadav","year":"2022","unstructured":"Yadav KA, Vijayakumar P (2022) LPPSA: an efficient lightweight privacy-preserving signature-based authentication protocol for a vehicular ad hoc network. Ann Telecommun 77:473\u2013489","journal-title":"Ann Telecommun"},{"issue":"1","key":"1864_CR18","first-page":"8868355","volume":"2021","author":"ES Ali","year":"2021","unstructured":"Ali ES, Hasan MK, Hassan R, Saeed RA, Hassan MB, Islam S, Nafi NS, Bevinakoppa S (2021) Machine learning technologies for secure vehicular communication in internet of vehicles: recent advances and applications. Sec Commun Netw 2021(1):8868355","journal-title":"Sec Commun Netw"},{"key":"1864_CR19","doi-asserted-by":"crossref","unstructured":"Bagga P, Sutrala AK, Das AK, Vijayakumar P (2020) Blockchain-based batch authentication protocol for internet of vehicles. J Syst Arch 113:101877","DOI":"10.1016\/j.sysarc.2020.101877"},{"key":"1864_CR20","first-page":"103476","volume":"74","author":"MA Shawky","year":"2023","unstructured":"Shawky MA, Usman M, Flynn D, Imran MA, Abbasi Qammer H, Ansari Shuja, Taha Ahmad (2023) Blockchain-based secret key extraction for efficient and secure authentication in VANETs. J Inform Sec Appl 74:103476","journal-title":"J Inform Sec Appl"},{"key":"1864_CR21","doi-asserted-by":"crossref","unstructured":"Wang N, Yang W, Wang X, Wu L, Guan Z, Du X, Guizani M (2022) A blockchain-based privacy-preserving federated learning scheme for Internet of Vehicles. Digit Commun Netw 10:126\u2013134","DOI":"10.1016\/j.dcan.2022.05.020"},{"key":"1864_CR22","doi-asserted-by":"publisher","first-page":"012097","DOI":"10.1088\/1742-6596\/1738\/1\/012097","volume":"1738","author":"C Mao","year":"2021","unstructured":"Mao C, Xie K, Gao L, Wan M, Liu S (2021) Design of Internet of Vehicles Authentication Scheme based on Blockchain. J Phys Conf Ser 1738:012097","journal-title":"J Phys Conf Ser"},{"key":"1864_CR23","doi-asserted-by":"publisher","first-page":"476","DOI":"10.3390\/app12010476","volume":"12","author":"KN Qureshi","year":"2022","unstructured":"Qureshi KN, Shahzad L, Abdelmaboud A, Eisa TAE, Alamri B, Javed IT, Al-Dhaqm A, Crespi N (2022) A Blockchain-based efficient, secure and anonymous conditional privacy-preserving and authentication scheme for the internet of vehicles. Appl Sci 12:476","journal-title":"Appl Sci"},{"key":"1864_CR24","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1007\/s12083-022-01319-2","volume":"15","author":"A Tomar","year":"2022","unstructured":"Tomar A, Tripathi S (2022) BCAV: blockchain-based certificateless authentication system for vehicular network. Peer-to-Peer Netw Appl 15:1733\u20131756","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"6","key":"1864_CR25","first-page":"981","volume":"22","author":"L Wang","year":"2020","unstructured":"Wang L, Zheng D, Guo R, ChenCheng H, Jing C (2020) A blockchain-based privacy-preserving authentication scheme with anonymous identity in vehicular networks. Int J Netw Sec 22(6):981\u2013990","journal-title":"Int J Netw Sec"},{"issue":"6","key":"1864_CR26","doi-asserted-by":"publisher","first-page":"9547","DOI":"10.1109\/JIOT.2023.3324543","volume":"11","author":"W Wang","year":"2023","unstructured":"Wang W, Han Z, Gadekallu TR, Raza S, Tanveer J, Chunhua S (2023) Lightweight blockchain-enhanced mutual authentication protocol for UAVs. IEEE Int Things J 11(6):9547\u20139557","journal-title":"IEEE Int Things J"},{"issue":"3","key":"1864_CR27","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TGCN.2022.3165692","volume":"6","author":"P Kumar","year":"2022","unstructured":"Kumar P, Kumar R, Gupta GP, Tripathi R (2022) BDEdge: blockchain and deep-learning for secure edge-envisioned green CAVs. IEEE Transact Green Commun Netw 6(3):1330\u20131339","journal-title":"IEEE Transact Green Commun Netw"},{"key":"1864_CR28","unstructured":"Randhir K, Aljuhani A, Kumar P, Kumar A, Franklin A, Jolfaei A (2022) Blockchain-enabled secure communication for unmanned aerial vehicle (UAV) networks. In Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond 37\u201342"},{"key":"1864_CR29","doi-asserted-by":"crossref","unstructured":"Prabhat K, Kumar R, Kumar A, Antony Franklin A, Jolfaei A (2022) Blockchain and deep learning empowered secure data sharing framework for softwarized UAVs. In 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 770\u2013775","DOI":"10.1109\/ICCWorkshops53468.2022.9814485"},{"key":"1864_CR30","unstructured":"Guo K, Wu Z, Wang W, Ren S, Zhou X, Gadekallu TR, Luo E, Liu C (2023) GRTR: gradient rebalanced traffic sign recognition for autonomous vehicles. IEEE Transactions on Automation Science and Engineering (Early Access)1\u201313"},{"issue":"4","key":"1864_CR31","doi-asserted-by":"publisher","first-page":"6722","DOI":"10.1109\/JIOT.2023.3312348","volume":"11","author":"Z Lian","year":"2023","unstructured":"Lian Z, Zeng Q, Wang W, Dequan X, Meng W, Chunhua S (2023) Traffic sign recognition using optimized federated learning in internet of vehicles. IEEE Int Things J 11(4):6722\u20136729","journal-title":"IEEE Int Things J"},{"key":"1864_CR32","doi-asserted-by":"publisher","first-page":"35964","DOI":"10.1109\/JIOT.2024.3397652","volume":"11","author":"P Kumar","year":"2024","unstructured":"Kumar P, Kumar R, Jolfaei A, Mohammad N (2024) An automated threat intelligence framework for vehicle road cooperation systems. IEEE Internet Things J 11:35964\u201335974","journal-title":"IEEE Internet Things J"},{"key":"1864_CR33","doi-asserted-by":"publisher","first-page":"109215","DOI":"10.1016\/j.knosys.2022.109215","volume":"251","author":"C Zhong","year":"2022","unstructured":"Zhong C, Li G, Meng Z (2022) Beluga whale optimization: a novel nature-inspired metaheuristic algorithm. Knowl Based Syst 251:109215","journal-title":"Knowl Based Syst"},{"key":"1864_CR34","doi-asserted-by":"crossref","unstructured":"Li Y, Zhou D, Weng J, Li Y, Sun M, Yang Y, Li M (2015) Privacy-preserving and real-time detection of vehicular congestion using multilayer perceptron approach for internet of vehicles. IEEE 71(12):12530\u201312542","DOI":"10.1109\/TVT.2022.3199407"},{"key":"1864_CR35","doi-asserted-by":"publisher","unstructured":"Singh A, Prakash S, Chandrasekaran BK (2016) A comparison of linear discriminant analysis and ridge classifier on twitter\u00a0ICCCA, pp 133\u2013138. https:\/\/doi.org\/10.1007\/s12083-024-01864-ydata","DOI":"10.1007\/s12083-024-01864-ydata"},{"key":"1864_CR36","doi-asserted-by":"crossref","unstructured":"Gaur R, Prakash S, Kumar S, Abhishek K, Msahli M, Wahid A (2022) A machine-learning\u2013blockchain-based authentication using smart contracts for an IoHT system. Sensors 22:9074","DOI":"10.3390\/s22239074"},{"key":"1864_CR37","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s00521-017-3272-5","volume":"30","author":"H Faris","year":"2018","unstructured":"Faris H, Aljarah I, Al-Betar MA, Mirjalili S (2018) Grey wolf optimizer: a review of recent variants and applications. Neural Comput Appl 30:413\u2013435","journal-title":"Neural Comput Appl"},{"key":"1864_CR38","first-page":"332","volume":"31","author":"A Salim","year":"2022","unstructured":"Salim A, Jummar WK, Jasim FM, Yousif M (2022) Eurasian oystercatcher optimiser: new meta-heuristic algorithm. J Intell Syst 31:332\u2013344","journal-title":"J Intell Syst"},{"key":"1864_CR39","first-page":"24","volume":"3","author":"M Yazdani","year":"2016","unstructured":"Yazdani M, Jolai F (2016) Lion optimization algorithm (LOA): a nature-inspired metaheuristic algorithm. J Comput Des Eng 3:24\u201336","journal-title":"J Comput Des Eng"},{"key":"1864_CR40","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.1109\/TNSE.2020.2990984","volume":"7","author":"L Nie","year":"2020","unstructured":"Nie L, Ning Z, Wang X, Hu X, Cheng J, Li Y (2020) Data-driven intrusion detection for intelligent internet of vehicles: a deep convolutional neural network-based method. IEEE Transact Netw Sci Eng 7:2219\u20132230","journal-title":"IEEE Transact Netw Sci Eng"},{"key":"1864_CR41","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.icte.2022.06.003","volume":"9","author":"GO Anyanwu","year":"2023","unstructured":"Anyanwu GO, Nwakanma CI, Lee JM, Kim DS (2023) Novel hyper-tuned ensemble random forest algorithm for the detection of false basic safety messages in internet of vehicles. ICT Express 9:122\u2013129","journal-title":"ICT Express"},{"key":"1864_CR42","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-62238-5_4","volume-title":"Sustainable Cloud and Energy Services: Principles and Practice","author":"F Knirsch","year":"2018","unstructured":"Knirsch F, Unterweger A, Eibl G, Engel D (2018) Privacy-preserving smart grid tariff decisions with blockchain-based smart contracts. Sustainable Cloud and Energy Services: Principles and Practice. Springer International Publishing, Cham, pp 85\u2013116"},{"key":"1864_CR43","doi-asserted-by":"publisher","first-page":"103088","DOI":"10.1016\/j.sysarc.2024.103088","volume":"148","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G, Karimipour H, Parizi RM (2024) Hybrid privacy preserving federated learning against irregular users in next-generation internet of things. J Syst Architect 148:103088","journal-title":"J Syst Architect"},{"key":"1864_CR44","doi-asserted-by":"publisher","first-page":"104775","DOI":"10.1016\/j.jpdc.2023.104775","volume":"183","author":"Wu Guowen","year":"2024","unstructured":"Guowen Wu, Chen X, Gao Z, Zhang H, Shui Yu, Shen S (2024) Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL. J Parallel Distrib Comput 183:104775","journal-title":"J Parallel Distrib Comput"},{"issue":"4","key":"1864_CR45","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/TETC.2023.3296016","volume":"11","author":"J Plusquellic","year":"2023","unstructured":"Plusquellic J, Tsiropoulou EE, Minwalla C (2023) Privacy-preserving authentication protocols for IoT devices using the SiRF PUF. IEEE Transact Emerg Top Comput 11(4):918\u2013933","journal-title":"IEEE Transact Emerg Top Comput"},{"key":"1864_CR46","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.comcom.2022.09.021","volume":"196","author":"M Masud","year":"2022","unstructured":"Masud M, Gaba GS, Kumar P, Gurtov A (2022) A user-centric privacy-preserving authentication protocol for IoT-Am I environments. Comp Commun 196:45\u2013541","journal-title":"Comp Commun"},{"key":"1864_CR47","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.comcom.2022.06.024","volume":"192","author":"HJ Nath","year":"2022","unstructured":"Nath HJ, Choudhury H (2022) A privacy-preserving mutual authentication scheme for group communication in VANET. Comp Commun 192:357\u2013372","journal-title":"Comp Commun"},{"key":"1864_CR48","doi-asserted-by":"publisher","first-page":"12014","DOI":"10.1109\/ACCESS.2017.2717999","volume":"5","author":"U Rajput","year":"2017","unstructured":"Rajput U, Abbas F, Eun H, Oh H (2017) A hybrid approach for efficient privacy-preserving authentication in VANET. IEEE Access 5:12014\u201312030","journal-title":"IEEE Access"},{"issue":"15","key":"1864_CR49","doi-asserted-by":"publisher","first-page":"9003","DOI":"10.3390\/app13159003","volume":"13","author":"N El-Haggar","year":"2023","unstructured":"El-Haggar N, Amouri L, Alsumayt A, Alghamedy FH, Aljameel SS (2023) The effectiveness and privacy preservation of IoT on ubiquitous learning: modern learning paradigm to enhance higher education. Appl Sci 13(15):9003","journal-title":"Appl Sci"},{"key":"1864_CR50","doi-asserted-by":"crossref","unstructured":"Aziz A, Samad F, Siddiqui S (2022) Optimizing privacy preservation in Wireless VANETS. 2022 International Conference on Emerging Trends in Smart Technologies (ICETST), Karachi, Pakistan","DOI":"10.1109\/ICETST55735.2022.9921423"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01864-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01864-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01864-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:31:28Z","timestamp":1746844288000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01864-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1864"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01864-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,17]]},"assertion":[{"value":"29 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}],"article-number":"99"}}