{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T06:25:36Z","timestamp":1770531936803,"version":"3.49.0"},"reference-count":147,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Spanish Ministry of Science, Innovation and Universities (all with European Regional Development Fund (ERDF) funds) through the projects PERSEIDES","award":["TIN2017-86885-R"],"award-info":[{"award-number":["TIN2017-86885-R"]}]},{"DOI":"10.13039\/100004735","name":"Guardian Life Insurance Company of America","doi-asserted-by":"publisher","award":["TSI-100110-2019-20"],"award-info":[{"award-number":["TSI-100110-2019-20"]}],"id":[{"id":"10.13039\/100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"5GHuerta","award":["EQC2019-006364-P"],"award-info":[{"award-number":["EQC2019-006364-P"]}]},{"DOI":"10.13039\/501100003329","name":"Seneca Foundation in Murcia Region under FPI","doi-asserted-by":"publisher","award":["20751\/FPI\/18"],"award-info":[{"award-number":["20751\/FPI\/18"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003329","name":"Industrial Doctorate from Ministerio de Econom\u00eda y Empresa","doi-asserted-by":"publisher","award":["DI-16-08432"],"award-info":[{"award-number":["DI-16-08432"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"name":"PEANA","award":["UNMU13-2E-2536"],"award-info":[{"award-number":["UNMU13-2E-2536"]}]},{"DOI":"10.13039\/501100000780","name":"European Commission through the INSPIRE-5Gplus Project","doi-asserted-by":"publisher","award":["871808"],"award-info":[{"award-number":["871808"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Plug-n-Harvest Project","award":["768735"],"award-info":[{"award-number":["768735"]}]},{"name":"SerIoT Project","award":["780139"],"award-info":[{"award-number":["780139"]}]},{"name":"Fed4IoT Project","award":["814918"],"award-info":[{"award-number":["814918"]}]},{"name":"EU IoTrust Project","award":["825618"],"award-info":[{"award-number":["825618"]}]},{"name":"PHOENIX Project","award":["893079"],"award-info":[{"award-number":["893079"]}]},{"name":"PRECEPT Project","award":["958284"],"award-info":[{"award-number":["958284"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3041057","type":"journal-article","created":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T20:23:51Z","timestamp":1606508631000},"page":"216437-216460","source":"Crossref","is-referenced-by-count":35,"title":["Integrating LPWAN Technologies in the 5G Ecosystem: A Survey on Security Challenges and Solutions"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2673-3790","authenticated-orcid":false,"given":"Jesus","family":"Sanchez-Gomez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0803-1672","authenticated-orcid":false,"given":"Dan Garcia","family":"Carrillo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0069-3017","authenticated-orcid":false,"given":"Ramon","family":"Sanchez-Iborra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7697-116X","authenticated-orcid":false,"given":"Jose L.","family":"Hernandez-Ramos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6714-1164","authenticated-orcid":false,"given":"Jorge","family":"Granjal","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Marin-Perez","sequence":"additional","affiliation":[]},{"given":"Miguel A.","family":"Zamora-Izquierdo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4962"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7296"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5448"},{"key":"ref32","year":"0","journal-title":"Security architecture and procedures for 5G System"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.13052\/jicts2245-800X.619"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4301"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700462"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/9781119247111"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3748"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5216"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.01.015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.07.026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICMDCS.2017.8211551"},{"key":"ref20","article-title":"What is it LoRaWAN&#x2014;A technical overview of LoRa and LoRaWAN","author":"alliance","year":"2015"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/9781119226444"},{"key":"ref21","author":"zuniga","year":"2016","journal-title":"SIGFOX system description"},{"key":"ref24","author":"farahani","year":"2011","journal-title":"ZigBee Wireless Networks and Transceivers"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.3012353"},{"key":"ref101","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"Proc 44th ACM\/IEEE Design Autom Conf"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2815678"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.3390\/s20030882"},{"key":"ref25","volume":"43","author":"shelby","year":"2011","journal-title":"6LoWPAN The Wireless Embedded Internet"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377168"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422888"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409219"},{"key":"ref147","year":"2020","journal-title":"A Cybersecurity Platform for Virtualised 5G Cyber Range Services (SPIDER)"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07346-7"},{"key":"ref58","author":"holma","year":"2016","journal-title":"LTE Small Cell Optimization 3GPP Evolution to Release 13"},{"key":"ref57","year":"2017","journal-title":"LoRaWAN 1 1 Specification"},{"key":"ref56","year":"2015","journal-title":"LoRa Specification 1 0"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.04.001"},{"key":"ref54","first-page":"838","article-title":"IoT based smart agriculture","volume":"5","author":"gondchawar","year":"2016","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"ref53","author":"alliance","year":"2018","journal-title":"Wi-SUN Alliance and FAN&#x2013;Secure Large-Scale IoT Networking for Today and Tomorrow"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8376"},{"key":"ref40","year":"0","journal-title":"Service Requirements for Next Generation New Services and Markets"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916177"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883151"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767333"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00557-9"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139208857"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2652320"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948888"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8576"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/s17112646"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.93"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.08.002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7250"},{"key":"ref41","author":"sethi","year":"2020","journal-title":"Secure IoT Bootstrapping A Survey Internet Engineering Task Force Internet-Draft Draft-Sarikaya-t2trg-Sbootstrapping-08"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2018.8581763"},{"key":"ref43","author":"aura","year":"2020","journal-title":"Nimble out-of-Band Authentication for EAP (EAP-NOOB) Internet Engineering Task Force Internet-Draft Draft-Aura-Eap-Noob-08"},{"key":"ref127","author":"warden","year":"2019","journal-title":"Tinyml Machine Learning with tensorflow Lite on Arduino and Ultra-Low-Power Microcontrollers"},{"key":"ref126","author":"mattsson","year":"2020","journal-title":"Comparison of CoAP Security Protocols &#x201D; Internet Engineering Task Force Internet-Draft Draft-Ietf-LWIG-Security-Protocol-Comparison-04"},{"key":"ref125","volume":"1","author":"alliance","year":"2015","journal-title":"5G White Paper"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2018.1700063"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.3390\/s17112646"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"key":"ref129","author":"rescorla","year":"2020","journal-title":"Compact TLS 1 3 Internet Engineering Task Force Internet-Draft Draft-Rescorla-TLS-CTLS-04"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883657"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2020.3005467"},{"key":"ref70","author":"selander","year":"2020","journal-title":"Ephemeral Diffie-Hellman Over COSE (EDHOC)"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/s16030358"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2018.8725633"},{"key":"ref77","author":"garcia-carrillo","year":"2017","journal-title":"LoRaWAN Authentication in RADIUS Internet Engineering Task Force Internet-Draft Draft-Garcia-Radext-Radius-LoRaWAN-03"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5247"},{"key":"ref133","year":"0","journal-title":"Study on security aspect of 5G network management slicing"},{"key":"ref134","year":"0","journal-title":"Study on security aspects of the 5G Service Based Architecture (SBA)"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET.2018.8336252"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4005"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-9554-0.ch009"},{"key":"ref79","author":"garcia-carrillo","year":"2016","journal-title":"LoRaWAN Authentication in Diameter Internet Engineering Task Force Internet-Draft Draft-Garcia-Dime-Diameter-LoRaWAN-00"},{"key":"ref136","article-title":"Applying SDN architecture to 5G slicing","year":"2016"},{"key":"ref135","article-title":"CYBER; Application of attribute ased Encryption (ABE) for PII and personal data protection on IoT devices, WLAN, cloud and mobile services&#x2013;High level requirements, version 1.1.1","year":"2018"},{"key":"ref138","article-title":"EU coordinated risk assessment of the cybersecurity of 5G networks","year":"2019"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959428"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846803"},{"key":"ref139","article-title":"ENISA threat landscape for 5G networks","author":"louren\u00e7o","year":"2019"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2931724"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2361626"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2016SCI0002"},{"key":"ref64","article-title":"Electromagnetic compatibility and Radio spectrum Matters (ERM); Short Range Devices; Smart metering wireless access protocol; Part 2: Data link layer (MAC Sub-layer), version 1.1.1","year":"2013"},{"key":"ref140","year":"2020","journal-title":"European Core Technologies for Future Connectivity Systems and Components (COREnect)"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6590713"},{"key":"ref141","year":"2020","journal-title":"5G Creating Opportunities for LOGistics Supply Chain INNOVation (5G-LOGINNOV)"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/s18061888"},{"key":"ref142","year":"2020","journal-title":"5G for Cooperative & Connected Automated MOBIility on X-Border Corridors (5G-MOBIX)"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.11.052"},{"key":"ref143","year":"2020","journal-title":"Integrating 5G enabling technologies in a holistic service to physical layer 5G system platform (Int5Gent)"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6347"},{"key":"ref144","year":"2020","journal-title":"5G-DIVE eDge Intelligence for Vertical Experimentation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.3390\/s18061833"},{"key":"ref145","year":"2020","journal-title":"A Unified Network Computational and Storage Resource Management Framework Targeting End-to-End Performance Optimization for Secure 5G Multi-Technology and Multi-Tenancy Environments (5G-COMPLETE)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"ref109","first-page":"3","article-title":"ChaCha, a variant of Salsa20","volume":"8","author":"bernstein","year":"2008","journal-title":"Proc Workshop Rec SASC"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2998416"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232805"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700625"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9291506"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/6GSUMMIT49458.2020.9083800"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845183"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3126973.3126980"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.010"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.3390\/s20113068"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.3390\/fi9030031"},{"key":"ref90","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2018.00106"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2019.8905295"},{"key":"ref111","author":"moan","year":"2020","journal-title":"Z&#x00C9;RO G Le R&#x00E9;seau Mondial de Connexion des Objets va Changer le Monde"},{"key":"ref112","article-title":"Artificial intelligence and machine learning in 5G network security: Opportunities, advantages, and future research trends","author":"haider","year":"2020","journal-title":"arXiv 2007 04490"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2011.583711"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936123"},{"key":"ref99","first-page":"1","article-title":"A certificateless aggregate signcryption scheme without bilinear pairing","volume":"27","author":"wang","year":"2017","journal-title":"Computer Technology and Development"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107592"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2944811"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2951818"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2933899"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106871"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107345"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-818880-4.00018-1"},{"key":"ref15","first-page":"1","article-title":"NB-IoT system for M2M communication","author":"ratasuk","year":"2016","journal-title":"Proc IEEE Wireless Commun Netw Conf"},{"key":"ref118","author":"gimenez","year":"2020","journal-title":"Static Context Header Compression (SCHC) over LoRaWAN Internet Engineering Task Force Internet-Draft Draft-Ietf-LPWAN-SCHC-Over-LoRaWAN-08"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2016.7785170"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2040034"},{"key":"ref117","author":"z\u00fa\u00f1iga","year":"2020","journal-title":"SCHC over Sigfox LPWAN Internet Engineering Task Force Internet-Draft Draft-Ietf-LPWAN-SCHC-Over-Sigfox-03"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600510CM"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.202"},{"key":"ref18","first-page":"1","author":"schlienz","year":"2016","journal-title":"Narrowband Internet of Things whitepaper"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.73"},{"key":"ref119","author":"ramos","year":"2020","journal-title":"SCHC over NB-IoT Internet Engineering Task Force Internet-Draft Draft-Ietf-Lpwan-Schc-Over-Nbiot-03"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600418"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39887-5_23"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1600002ST"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS49054.2020.9119644"},{"key":"ref116","author":"minaburo","year":"2020","journal-title":"LPWAN Static Context Header Compression (SCHC) for CoAP Internet Engineering Task Force Internet-Draft Draft-Ietf-LPWAN-CoAP-Static-Context-HC-15"},{"key":"ref80","first-page":"1","article-title":"Analysis of LoRaWAN v1. 1 security","author":"butun","year":"2018","journal-title":"Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8724"},{"key":"ref120","author":"vu?ini?","year":"2020","journal-title":"Requirements for a Lightweight AKE for OSCORE Internet Engineering Task Force Internet-Draft Draft-Ietf-Lake-Reqs-04"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756673"},{"key":"ref121","first-page":"13","article-title":"Tackling contention through cooperation: A distributed federation in LoRaWAN space","author":"delbruel","year":"2020","journal-title":"Proc Int Conf Embedded Wireless Syst Netw"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169860"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.3390\/s19020264"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3013117"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3163058.3163064"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2789121"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09272765.pdf?arnumber=9272765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:15Z","timestamp":1639770915000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9272765\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":147,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3041057","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}