{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:09Z","timestamp":1758987609935,"version":"3.44.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T00:00:00Z","timestamp":1749254400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T00:00:00Z","timestamp":1749254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02023-7","type":"journal-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T22:04:45Z","timestamp":1749247485000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain based deep learning model for the security in industrial internet of things"],"prefix":"10.1007","volume":"18","author":[{"given":"Tejeswara Kumar","family":"M","sequence":"first","affiliation":[]},{"given":"N. V. R.","family":"Vikram G","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,7]]},"reference":[{"key":"2023_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/9065768","volume":"2022","author":"MK Hasan","year":"2022","unstructured":"Hasan MK, Alkhalifah A, Islam S, Babiker NB, Habib AA, Aman AHM, Hossain MA (2022) Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations. Wirel Commun Mob Comput 2022:1\u201326","journal-title":"Wirel Commun Mob Comput"},{"issue":"11","key":"2023_CR2","doi-asserted-by":"publisher","first-page":"8154","DOI":"10.1109\/JIOT.2021.3125190","volume":"9","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Yang C, Choo KKR, Bashir AK, Rodrigues JJ, Sato T (2021) A blockchain-based shamir\u2019s threshold cryptography scheme for data protection in industrial Internet of things settings. IEEE Internet Things J 9(11):8154\u20138167","journal-title":"IEEE Internet Things J"},{"key":"2023_CR3","doi-asserted-by":"publisher","first-page":"107903","DOI":"10.1016\/j.cie.2021.107903","volume":"164","author":"J Wang","year":"2022","unstructured":"Wang J, Chen J, Ren Y, Sharma PK, Alfarraj O, Tolba A (2022) Data security storage mechanism based on blockchain industrial Internet of Things. Comput Ind Eng 164:107903","journal-title":"Comput Ind Eng"},{"issue":"15","key":"2023_CR4","doi-asserted-by":"publisher","first-page":"21867","DOI":"10.1007\/s11227-024-06286-4","volume":"80","author":"A Lahbib","year":"2024","unstructured":"Lahbib A, Toumi K, Laouiti A, Martin S (2024) Blockchain based distributed trust management in IoT and IIoT: a survey. J Supercomput 80(15):21867\u201321919","journal-title":"J Supercomput"},{"issue":"6","key":"2023_CR5","first-page":"7","volume":"34","author":"D Harinath","year":"2024","unstructured":"Harinath D, Bandi M, Patil A, Murthy MR, Raju AVS (2024) Enhanced data security and privacy in IoT devices using blockchain technology and quantum cryptography. J Syst Eng Electron (ISSN NO: 1671-1793) 34(6):7","journal-title":"J Syst Eng Electron (ISSN NO: 1671-1793)"},{"key":"2023_CR6","doi-asserted-by":"publisher","first-page":"205190","DOI":"10.1109\/ACCESS.2020.3036812","volume":"8","author":"CVB Murthy","year":"2020","unstructured":"Murthy CVB, Shri ML, Kadry S, Lim S (2020) Blockchain based cloud computing: Architecture and research challenges. IEEE access 8:205190\u2013205205","journal-title":"IEEE access"},{"key":"2023_CR7","unstructured":"Rahman A, Kundu D, Debnath T, Rahman M, Islam MJ (2024) Blockchain-based AI methods for managing industrial IoT: Recent developments, integration challenges and opportunities. arXiv preprint arXiv:2405.12550"},{"key":"2023_CR8","doi-asserted-by":"publisher","first-page":"34517","DOI":"10.1007\/s11042-020-08776-y","volume":"80","author":"D Lee","year":"2021","unstructured":"Lee D, Park N (2021) Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree. Multimed Tools Appl 80:34517\u201334534","journal-title":"Multimed Tools Appl"},{"issue":"14","key":"2023_CR9","doi-asserted-by":"publisher","first-page":"6376","DOI":"10.3390\/app11146376","volume":"11","author":"SM Umran","year":"2021","unstructured":"Umran SM, Lu S, Abduljabbar ZA, Zhu J, Wu J (2021) Secure data of industrial Internet of things in a cement factory based on a Blockchain technology. Appl Sci 11(14):6376","journal-title":"Appl Sci"},{"issue":"11","key":"2023_CR10","doi-asserted-by":"publisher","first-page":"e4337","DOI":"10.1002\/ett.4337","volume":"32","author":"S Latif","year":"2021","unstructured":"Latif S, Idrees Z, e Huma Z, Ahmad J (2021) Blockchain technology for the industrial internet of things: a comprehensive survey on security challenges, architectures, applications, and future research directions. Transact Emerg Telecommun Technol 32(11):e4337","journal-title":"Transact Emerg Telecommun Technol"},{"issue":"3","key":"2023_CR11","doi-asserted-by":"publisher","first-page":"4029","DOI":"10.32604\/cmc.2024.047468","volume":"78","author":"J Wang","year":"2024","unstructured":"Wang J, Huang G, Sherratt RS, Huang D, Ni J (2024) Data secure storage mechanism for IIoT based on blockchain. Comput Mater Continua 78(3):4029\u20134048","journal-title":"Comput Mater Continua"},{"key":"2023_CR12","doi-asserted-by":"crossref","unstructured":"Jiang D, Wang Z, Wang Y, Tan L, Wang J, Zhang P (2024) A blockchain-reinforced federated intrusion detection architecture for IIoT. IEEE Int Things J 11(16):26793\u201326805","DOI":"10.1109\/JIOT.2024.3406602"},{"issue":"11","key":"2023_CR13","doi-asserted-by":"publisher","first-page":"7650","DOI":"10.1109\/TII.2021.3051607","volume":"17","author":"X Cai","year":"2021","unstructured":"Cai X, Geng S, Zhang J, Wu D, Cui Z, Zhang W, Chen J (2021) A sharding scheme-based many-objective optimization algorithm for enhancing security in blockchain-enabled industrial Internet of things. IEEE Trans Industr Inf 17(11):7650\u20137658","journal-title":"IEEE Trans Industr Inf"},{"key":"2023_CR14","doi-asserted-by":"crossref","unstructured":"Puri V, Priyadarshini I, Kumar R, Kim LC (2020) Blockchain meets IIoT: An architecture for privacy preservation and security in IIoT. In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) 1\u20137. IEEE","DOI":"10.1109\/ICCSEA49143.2020.9132860"},{"key":"2023_CR15","doi-asserted-by":"crossref","unstructured":"Ali G, Samuel A, Kabiito SP, Morish Z, Thomas A, Robert W, ... Dhoska, K (2025) Integration of artificial intelligence, blockchain, and quantum cryptography for securing the Industrial Internet of Things (IIoT): Recent advancements and future trends. Appl Data Sci Analysis 2025:19-82","DOI":"10.58496\/ADSA\/2025\/004"},{"issue":"1","key":"2023_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1002\/int.22293","volume":"36","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Li Y, Wang R, Liu L, Tan YA, Hu J (2021) Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things. Int J Intell Syst 36(1):94\u2013111","journal-title":"Int J Intell Syst"},{"key":"2023_CR17","doi-asserted-by":"publisher","first-page":"100087","DOI":"10.1016\/j.csa.2025.100087","volume":"3","author":"V Kumar","year":"2025","unstructured":"Kumar V, Das SK (2025) Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain. Cyber Secur Appl 3:100087","journal-title":"Cyber Secur Appl"},{"issue":"7","key":"2023_CR18","doi-asserted-by":"publisher","first-page":"5041","DOI":"10.1109\/TII.2020.3012508","volume":"17","author":"Y Gao","year":"2020","unstructured":"Gao Y, Chen Y, Hu X, Lin H, Liu Y, Nie L (2020) Blockchain based IIoT data sharing framework for SDN-enabled pervasive edge computing. IEEE Trans Industr Inf 17(7):5041\u20135049","journal-title":"IEEE Trans Industr Inf"},{"key":"2023_CR19","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.future.2019.08.005","volume":"102","author":"EK Wang","year":"2020","unstructured":"Wang EK, Liang Z, Chen CM, Kumari S, Khan MK (2020) PoRX: A reputation incentive scheme for blockchain consensus of IIoT. Futur Gener Comput Syst 102:140\u2013151","journal-title":"Futur Gener Comput Syst"},{"key":"2023_CR20","doi-asserted-by":"crossref","unstructured":"Tyagi AK (2024) Blockchain and artificial intelligence for cyber security in the era of internet of things and industrial internet of things applications. In AI and blockchain applications in industrial robotics. IGI Global Scientific Publishing, pp 171\u2013199","DOI":"10.4018\/979-8-3693-0659-8.ch007"},{"issue":"3","key":"2023_CR21","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1108\/JGOSS-08-2021-0056","volume":"15","author":"R Kumar","year":"2022","unstructured":"Kumar R, Sindhwani R, Singh PL (2022) IIoT implementation challenges: Analysis and mitigation by blockchain. J Global Oper Strateg Sourcing 15(3):363\u2013379","journal-title":"J Global Oper Strateg Sourcing"},{"key":"2023_CR22","doi-asserted-by":"crossref","unstructured":"Rajawat AS, Rawat R, Barhanpurkar K, Shaw RN, Ghosh A (2021) Blockchain-based model for expanding IoT device data security. Advances in Applications of Data-Driven Computing,\u00a0 1319:61\u201371","DOI":"10.1007\/978-981-33-6919-1_5"},{"key":"2023_CR23","first-page":"102952","volume":"61","author":"H Zhu","year":"2021","unstructured":"Zhu H, Guo Y, Zhang L (2021) An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme. J Inf Secur Appl 61:102952","journal-title":"J Inf Secur Appl"},{"key":"2023_CR24","doi-asserted-by":"crossref","unstructured":"Usman M, Sarfraz MS, Aftab MU, Habib U, Javed S (2024) A blockchain based scalable domain access control framework for industrial internet of things. IEEE Access 12:56554\u201356570","DOI":"10.1109\/ACCESS.2024.3390842"},{"issue":"2","key":"2023_CR25","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10586-024-04835-3","volume":"28","author":"AM Tripathi","year":"2025","unstructured":"Tripathi AM, Umrao LS (2025) Integrated fuzzy decision tree based blockchain federated safety-as-a-service for IIoT. Clust Comput 28(2):95","journal-title":"Clust Comput"},{"key":"2023_CR26","doi-asserted-by":"crossref","unstructured":"Samanta S, Sarkar A (2024) Blockchain integrated DFL model for IIoT data security in smart cities. Int J Inf Technol 17:911\u2013923","DOI":"10.1007\/s41870-024-02354-3"},{"key":"2023_CR27","doi-asserted-by":"publisher","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149:102481","journal-title":"J Netw Comput Appl"},{"key":"2023_CR28","doi-asserted-by":"crossref","unstructured":"Alruwaili FF (2021) Intrusion detection and prevention in Industrial IoT: A technological survey. In\u00a02021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), pp 1\u20135. IEEE","DOI":"10.1109\/ICECCME52200.2021.9590961"},{"issue":"4","key":"2023_CR29","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3390\/jsan11040071","volume":"11","author":"G Rathee","year":"2022","unstructured":"Rathee G, Kerrache CA, Ferrag MA (2022) A blockchain-based intrusion detection system using viterbi algorithm and indirect trust for iiot systems. J Sens Actuator Netw 11(4):71","journal-title":"J Sens Actuator Netw"},{"key":"2023_CR30","doi-asserted-by":"publisher","first-page":"117995","DOI":"10.1016\/j.eswa.2022.117995","volume":"207","author":"RF Mansour","year":"2022","unstructured":"Mansour RF (2022) Blockchain assisted clustering with intrusion detection system for industrial Internet of things environment. Expert Syst Appl 207:117995","journal-title":"Expert Syst Appl"},{"issue":"21","key":"2023_CR31","doi-asserted-by":"publisher","first-page":"2662","DOI":"10.3390\/electronics10212662","volume":"10","author":"H Vargas","year":"2021","unstructured":"Vargas H, Lozano-Garzon C, Montoya GA, Donoso Y (2021) Detection of security attacks in industrial IoT networks: A blockchain and machine learning approach. Electronics 10(21):2662","journal-title":"Electronics"},{"issue":"14","key":"2023_CR32","doi-asserted-by":"publisher","first-page":"3119","DOI":"10.3390\/s19143119","volume":"19","author":"A Derhab","year":"2019","unstructured":"Derhab A, Guerroumi M, Gumaei A, Maglaras L, Ferrag MA, Mukherjee M, Khan FA (2019) Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors 19(14):3119","journal-title":"Sensors"},{"issue":"4","key":"2023_CR33","doi-asserted-by":"publisher","first-page":"e4222","DOI":"10.1002\/ett.4222","volume":"32","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R (2021) DBTP2SF: a deep blockchain-based trustworthy privacy-preserving secured framework in industrial Internet of things systems. Trans Emerg Telecommun Technol 32(4):e4222","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"4","key":"2023_CR34","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/TSC.2020.2966970","volume":"13","author":"A Yazdinejad","year":"2020","unstructured":"Yazdinejad A, Parizi RM, Dehghantanha A, Zhang Q, Raymond Choo KK (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans Serv Comput 13(4):625\u2013638","journal-title":"IEEE Trans Serv Comput"},{"issue":"3","key":"2023_CR35","doi-asserted-by":"publisher","first-page":"772","DOI":"10.3390\/s21030772","volume":"21","author":"H Honar Pajooh","year":"2021","unstructured":"Honar Pajooh H, Rashid M, Alam F, Demidenko S (2021) Multi-layer blockchain-based security architecture for Internet of things. Sensors 21(3):772","journal-title":"Sensors"},{"key":"2023_CR36","doi-asserted-by":"publisher","first-page":"117266","DOI":"10.1109\/ACCESS.2020.3004486","volume":"8","author":"AS Hosen","year":"2020","unstructured":"Hosen AS, Singh S, Sharma PK, Ghosh U, Wang J, Ra IH, Cho GH (2020) Blockchain-based transaction validation protocol for a secure distributed IoT network. IEEE Access 8:117266\u2013117277","journal-title":"IEEE Access"},{"key":"2023_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8836214","volume":"2020","author":"M Yavari","year":"2020","unstructured":"Yavari M, Safkhani M, Kumari S, Kumar S, Chen CM (2020) An improved blockchain-based authentication protocol for IoT network management. Secur Commun Netw 2020:1\u201316","journal-title":"Secur Commun Netw"},{"key":"2023_CR38","doi-asserted-by":"publisher","first-page":"36978","DOI":"10.1109\/ACCESS.2022.3164081","volume":"10","author":"Z Ullah","year":"2022","unstructured":"Ullah Z, Raza B, Shah H, Khan S, Waheed A (2022) Towards blockchain-based secure storage and trusted data sharing scheme for IoT environment. IEEE access 10:36978\u201336994","journal-title":"IEEE access"},{"key":"2023_CR39","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In\u00a02015 military communications and information systems conference (MilCIS). IEEE, pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"1\u20133","key":"2023_CR40","first-page":"18","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa N, Slay J (2016) The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf Secur J: Glob Perspect 25(1\u20133):18\u201331","journal-title":"Inf Secur J: Glob Perspect"},{"key":"2023_CR41","unstructured":"Moustafa N (2017) Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic\u00a0(Doctoral dissertation, UNSW Sydney)"},{"issue":"19","key":"2023_CR42","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.3390\/app12199572","volume":"12","author":"I Tareq","year":"2022","unstructured":"Tareq I, Elbagoury BM, El-Regaily S, El-Horbaty ESM (2022) Analysis of ton-iot, unw-nb15, and edge-iiot datasets using dl in cybersecurity for iot. Appl Sci 12(19):9572","journal-title":"Appl Sci"},{"issue":"2","key":"2023_CR43","first-page":"e1520","volume":"14","author":"A Heidari","year":"2024","unstructured":"Heidari A, Jafari Navimipour N, Dag H, Unal M (2024) Deepfake detection using deep learning methods: A systematic and comprehensive review. Wiley Interdiscip Rev: Data Min Knowl Discovery 14(2):e1520","journal-title":"Wiley Interdiscip Rev: Data Min Knowl Discovery"},{"issue":"3","key":"2023_CR44","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1007\/s12559-024-10255-7","volume":"16","author":"A Heidari","year":"2024","unstructured":"Heidari A, Navimipour NJ, Dag H, Talebi S, Unal M (2024) A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn Comput 16(3):1073\u20131091","journal-title":"Cogn Comput"},{"issue":"6","key":"2023_CR45","doi-asserted-by":"publisher","first-page":"7521","DOI":"10.1007\/s10586-024-04351-4","volume":"27","author":"A Heidari","year":"2024","unstructured":"Heidari A, Shishehlou H, Darbandi M, Navimipour NJ, Yalcin S (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Clust Comput 27(6):7521\u20137539","journal-title":"Clust Comput"},{"issue":"27","key":"2023_CR46","doi-asserted-by":"publisher","first-page":"e8252","DOI":"10.1002\/cpe.8252","volume":"36","author":"A Heidari","year":"2024","unstructured":"Heidari A, Amiri Z, Jamali MAJ, Jafari N (2024) Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults. Concurr Comput: Pract Experience 36(27):e8252","journal-title":"Concurr Comput: Pract Experience"},{"issue":"15","key":"2023_CR47","doi-asserted-by":"publisher","first-page":"e5886","DOI":"10.1002\/dac.5886","volume":"37","author":"K Zanbouri","year":"2024","unstructured":"Zanbouri K, Darbandi M, Nassr M, Heidari A, Navimipour NJ, Yalc\u0131n S (2024) A GSO-based multi-objective technique for performance optimization of blockchain-based industrial Internet of things. Int J Commun Syst 37(15):e5886","journal-title":"Int J Commun Syst"},{"issue":"16","key":"2023_CR48","doi-asserted-by":"publisher","first-page":"e8091","DOI":"10.1002\/cpe.8091","volume":"36","author":"A Vakili","year":"2024","unstructured":"Vakili A, Al-Khafaji HMR, Darbandi M, Heidari A, Jafari Navimipour N, Unal M (2024) A new service composition method in the cloud-based internet of things environment using a grey wolf optimization algorithm and MapReduce framework. Concurr Comput: Pract Experience 36(16):e8091","journal-title":"Concurr Comput: Pract Experience"},{"issue":"10","key":"2023_CR49","doi-asserted-by":"publisher","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari A, Navimipour NJ, Unal M (2023) A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J 10(10):8445\u20138454","journal-title":"IEEE Internet Things J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02023-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02023-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02023-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:38Z","timestamp":1758986498000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02023-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,7]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2023"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02023-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,6,7]]},"assertion":[{"value":"2 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All the authors involved have agreed to participate in this submitted article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the authors involved in this manuscript give full consent for publication of this submitted article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"203"}}