{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:32Z","timestamp":1740140552928,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T00:00:00Z","timestamp":1576540800000},"content-version":"vor","delay-in-days":16,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>We investigate the transmission of a secret message from Alice to Bob in the presence of an eavesdropper (Eve) and many of decode-and-forward relay nodes. Each link comprises a set of parallel channels, modeling for example an orthogonal frequency division multiplexing transmission. We consider the impact of efficient implementations, including discrete constellations and finite-length coding, defining an achievable secrecy rate under a constraint on the equivocation rate at Eve. Then, we propose a power and channel allocation algorithm that maximizes the achievable secrecy rate by resorting to two coupled Gale-Shapley algorithms for stable matching problem. We consider the scenarios of both full and partial channel state information at Alice. In the latter case, we only guarantee an<jats:italic>outage<\/jats:italic>secrecy rate, i.e., the rate of a message that remains secret with a given probability. Numerical results are provided for Rayleigh fading channels in terms of average outage secrecy rate, showing that practical schemes achieve a performance quite close to that of ideal ones.<\/jats:p>","DOI":"10.1186\/s13638-019-1603-1","type":"journal-article","created":{"date-parts":[[2019,12,17]],"date-time":"2019-12-17T19:03:02Z","timestamp":1576609382000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Resource allocation for secure Gaussian parallel relay channels with finite-length coding and discrete constellations"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8798-4588","authenticated-orcid":false,"given":"Linda","family":"Senigagliesi","sequence":"first","affiliation":[]},{"given":"Marco","family":"Baldi","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Tomasin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,17]]},"reference":[{"key":"1603_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985","volume-title":"Physical-Layer Security. From Information Theory to Security Engineering","author":"M. Bloch","year":"2011","unstructured":"M. Bloch, J. Barros, Physical-Layer Security. From Information Theory to Security Engineering (Cambridge University Press, Cambridge, 2011)."},{"issue":"5","key":"1603_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2013.2265141","volume":"30","author":"W. K. Harrison","year":"2013","unstructured":"W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, J. Barros, Coding for secrecy: an overview of error-control coding techniques for physical-layer security. IEEE Signal Process. Mag.30(5), 41\u201350 (2013).","journal-title":"IEEE Signal Process. Mag."},{"key":"1603_CR3","doi-asserted-by":"publisher","unstructured":"S. Tomasin, in Proc. IEEE Conference on Communications and Network Security (CNS). A Gale-Shapley algorithm for allocation of relayed parallel wiretap coding channels, (2015), pp. 119\u2013124. https:\/\/doi.org\/10.1109\/CNS.2015.7346819.","DOI":"10.1109\/CNS.2015.7346819"},{"key":"1603_CR4","doi-asserted-by":"publisher","unstructured":"C. -L. Wang, T. -N. Cho, K. -J. Yang, in Proc. 75th IEEE Vehicular Technology Conference (VTC Spring). A new cooperative transmission strategy for physical-layer security with multiple eavesdroppers, (2012), pp. 1\u20135. https:\/\/doi.org\/10.1109\/VETECS.2012.6240269.","DOI":"10.1109\/VETECS.2012.6240269"},{"key":"1603_CR5","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-94-007-6996-0_41","volume-title":"Information Technology Convergence","author":"Y. Shen","year":"2013","unstructured":"Y. Shen, X. Jiang, J. Ma, W. Shi, in Information Technology Convergence, ed. by J. J. J. H. Park, L. Barolli, F. Xhafa, and H. -Y. Jeong. Secure and reliable transmission with cooperative relays in two-hop wireless networks (SpringerDordrecht, 2013), pp. 397\u2013406."},{"key":"1603_CR6","doi-asserted-by":"publisher","unstructured":"S. Luo, H. Godrich, A. Petropulu, H. V. Poor, in Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP). A knapsack problem formulation for relay selection in secure cooperative wireless communication, (2011), pp. 2512\u20132515. https:\/\/doi.org\/10.1109\/ICASSP.2011.5946995.","DOI":"10.1109\/ICASSP.2011.5946995"},{"issue":"6","key":"1603_CR7","doi-asserted-by":"publisher","first-page":"2842","DOI":"10.1109\/TVT.2012.2197032","volume":"61","author":"Zhiguo Ding","year":"2012","unstructured":"Z. Ding, M. Xu, J. Lu, F. Liu, Improving wireless security for bidirectional communication scenarios. IEEE Trans. Veh. Technol.61(6), 2842\u20132848 (2012). https:\/\/doi.org\/10.1109\/TVT.2012.2197032.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"1603_CR8","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"Lun Dong","year":"2010","unstructured":"L. Dong, Z. Han, A. P. Petropulu, H. V. Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process.58(3), 1875\u20131888 (2010). https:\/\/doi.org\/10.1109\/TSP.2009.2038412.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"10","key":"1603_CR9","doi-asserted-by":"publisher","first-page":"4985","DOI":"10.1109\/TSP.2011.2159598","volume":"59","author":"Jiangyuan Li","year":"2011","unstructured":"J. Li, A. P. Petropulu, S. Weber, On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process.59(10), 4985\u20134997 (2011). https:\/\/doi.org\/10.1109\/TSP.2011.2159598.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"2","key":"1603_CR10","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1109\/COMST.2016.2633387","volume":"19","author":"Xiaoming Chen","year":"2017","unstructured":"X. Chen, D. W. K. Ng, W. H. Gerstacker, H. Chen, A survey on multiple-antenna techniques for physical layer security. IEEE Commun. Surv. Tutor.19(2), 1027\u20131053 (2017). https:\/\/doi.org\/10.1109\/COMST.2016.2633387.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"6","key":"1603_CR11","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1109\/TSP.2012.2235433","volume":"61","author":"Raef Bassily","year":"2013","unstructured":"R. Bassily, S. Ulukus, Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Trans. Signal Process.61(6), 1544\u20131554 (2013). https:\/\/doi.org\/10.1109\/TSP.2012.2235433.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"2","key":"1603_CR12","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TIFS.2012.2185493","volume":"7","author":"Zohaib Hassan Awan","year":"2012","unstructured":"Z. H. Awan, A. Zaidi, L. Vandendorpe, Secure communication over parallel relay channel. IEEE Trans. Inf. Forensic. Secur.7(2), 359\u2013371 (2012). https:\/\/doi.org\/10.1109\/TIFS.2012.2185493.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"10","key":"1603_CR13","doi-asserted-by":"publisher","first-page":"3528","DOI":"10.1109\/TWC.2011.082011.110538","volume":"10","author":"Derrick Wing Kwan Ng","year":"2011","unstructured":"D. W. K. Ng, E. S. Lo, R. Schober, Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks. IEEE Trans. Wirel. Commun.10(10), 3528\u20133540 (2011). https:\/\/doi.org\/10.1109\/TWC.2011.082011.110538.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"1603_CR14","doi-asserted-by":"publisher","unstructured":"D. W. K. Ng, E. S. Lo, R. Schober, in Proc. IEEE Global Telecommunications Conference (GLOBECOM). Resource allocation for secure OFDMA networks with imperfect csit, (2011), pp. 1\u20136. https:\/\/doi.org\/10.1109\/GLOCOM.2011.6133580.","DOI":"10.1109\/GLOCOM.2011.6133580"},{"key":"1603_CR15","doi-asserted-by":"publisher","unstructured":"D. W. K. Ng, R. Schober, in Proc. 12th Canadian Workshop on Information Theory (CWIT). Resource allocation for secure OFDMA decode-and-forward relay networks, (2011), pp. 202\u2013205. https:\/\/doi.org\/10.1109\/CWIT.2011.5872157.","DOI":"10.1109\/CWIT.2011.5872157"},{"key":"1603_CR16","doi-asserted-by":"publisher","unstructured":"Z. Yu, Y. Ma, B. Wang, J. Zhao, in Proc. Int. Conf. on Wireless Communications Signal Processing (WCSP). Optimal resource allocation for OFDM wiretap channel with cooperative jammer, (2012), pp. 1\u20134. https:\/\/doi.org\/10.1109\/WCSP.2012.6542965.","DOI":"10.1109\/WCSP.2012.6542965"},{"key":"1603_CR17","doi-asserted-by":"publisher","unstructured":"C. Jeong, I. -M. Kim, in Proc. 8th Int. Workshop on Multi-Carrier Systems Solutions (MC-SS). Optimal power allocation for secure multi-carrier relay systems, (2011), pp. 1\u20134. https:\/\/doi.org\/10.1109\/MC-SS.2011.5910728.","DOI":"10.1109\/MC-SS.2011.5910728"},{"issue":"11","key":"1603_CR18","doi-asserted-by":"publisher","first-page":"5428","DOI":"10.1109\/TSP.2011.2162956","volume":"59","author":"Cheol Jeong","year":"2011","unstructured":"C. Jeong, I. -M. Kim, Optimal power allocation for secure multicarrier relay systems. IEEE Trans. Signal Process.59(11), 5428\u20135442 (2011). https:\/\/doi.org\/10.1109\/TSP.2011.2162956.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"1","key":"1603_CR19","doi-asserted-by":"publisher","first-page":"476797","DOI":"10.1155\/2008\/476797","volume":"2008","author":"B. Gui","year":"2008","unstructured":"B. Gui, L. J. Cimini, Bit loading algorithms for cooperative OFDM systems. EURASIP J. Wirel. Commun. Netw.2008(1), 476797 (2008).","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"1603_CR20","doi-asserted-by":"publisher","unstructured":"L. Vandendorpe, J. Louveaux, O. Oguz, A. Zaidi, Rate-optimized power allocation for DF-relayed OFDM transmission under sum and individual power constraints. EURASIP J. Wirel. Commun. Netw.2009(1), 814278 (2009). https:\/\/doi.org\/10.1155\/2009\/814278.","DOI":"10.1155\/2009\/814278"},{"issue":"8","key":"1603_CR21","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1109\/JSAC.2011.110906","volume":"29","author":"T. Wang","year":"2011","unstructured":"T. Wang, L. Vandendorpe, Sum rate maximized resource allocation in multiple DF relays aided OFDM transmission. IEEE J. Sel. Areas Commun.29(8), 1559\u20131571 (2011).","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"1603_CR22","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TWC.2011.011111.091682","volume":"10","author":"K. Bakanoglu","year":"2011","unstructured":"K. Bakanoglu, S. Tomasin, E. Erkip, Resource allocation for the parallel relay channel with multiple relays. IEEE Trans. Wirel. Commun.10(3), 792\u2013802 (2011).","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1603_CR23","doi-asserted-by":"publisher","unstructured":"N. Laurenti, S. Tomasin, F. Renna, in Proc. IEEE Int. Conf. Commun. (ICC). Resource allocation for secret transmissions on parallel Rayleigh channels, (2014). https:\/\/doi.org\/10.1109\/icc.2014.6883651.","DOI":"10.1109\/icc.2014.6883651"},{"issue":"11","key":"1603_CR24","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1109\/TIFS.2014.2348915","volume":"9","author":"Marco Baldi","year":"2014","unstructured":"M. Baldi, F. Chiaraluce, N. Laurenti, S. Tomasin, F. Renna, Secrecy transmission on parallel channels: theoretical limits and performance of practical codes. IEEE Trans. Inf. Forensic. Secur.9(11), 1765\u20131779 (2014). https:\/\/doi.org\/10.1109\/TIFS.2014.2348915.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"1603_CR25","doi-asserted-by":"publisher","first-page":"1700","DOI":"10.1109\/TIFS.2016.2551685","volume":"11","author":"J. Chen","year":"2016","unstructured":"J. Chen, X. Chen, W. H. Gerstacker, D. W. K. Ng, Resource allocation for a massive MIMO relay aided secure communication. IEEE Trans. Inf. Forensic. Secur.11(8), 1700\u20131711 (2016).","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"1603_CR26","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.amc.2016.10.022","volume":"296","author":"H. Fang","year":"2017","unstructured":"H. Fang, L. Xu, K. -K. R. Choo, Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Appl. Math. Comput.296:, 153\u2013167 (2017).","journal-title":"Appl. Math. Comput."},{"issue":"1","key":"1603_CR27","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TWC.2015.2466091","volume":"15","author":"Jong-Ho Lee","year":"2016","unstructured":"J. H. Lee, Optimal power allocation for physical layer security in multi-hop DF relay networks. IEEE Trans. Wirel. Commun.15(1), 28\u201338 (2016). https:\/\/doi.org\/10.1109\/TWC.2015.2466091.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"1603_CR28","doi-asserted-by":"publisher","first-page":"1726","DOI":"10.3390\/s16101726","volume":"16","author":"J. -H. Lee","year":"2016","unstructured":"J. -H. Lee, I. Sohn, Y. -H. Kim, Transmit power allocation for physical layer security in cooperative multi-hop full-duplex relay networks. Sensors. 16(10), 1726 (2016).","journal-title":"Sensors"},{"issue":"2","key":"1603_CR29","doi-asserted-by":"publisher","first-page":"1822","DOI":"10.1109\/TVT.2016.2566298","volume":"66","author":"Kecheng Zhang","year":"2017","unstructured":"K. Zhang, M. Peng, P. Zhang, X. Li, Secrecy-optimized resource allocation for device-to-device communication underlaying heterogeneous networks. IEEE Trans. Veh. Technol.66(2), 1822\u20131834 (2017). https:\/\/doi.org\/10.1109\/TVT.2016.2566298.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"6","key":"1603_CR30","doi-asserted-by":"publisher","first-page":"e3289","DOI":"10.1002\/ett.3289","volume":"29","author":"Waqas Aman","year":"2018","unstructured":"W. Aman, G. A. S. Sidhu, H. M. Furqan, Z. Ali, Enhancing physical layer security in AF relay-assisted multicarrier wireless transmission. Trans. Emerg. Telecommun. Technol.29(6), 1\u201314 (2018). https:\/\/doi.org\/10.1002\/ett.3289.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"2","key":"1603_CR31","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/TWC.2016.2633336","volume":"16","author":"Mohammad Reza Abedi","year":"2017","unstructured":"M. R. Abedi, N. Mokari, H. Saeedi, H. Yanikomeroglu, Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: active adversary. IEEE Trans. Wirel. Commun.16(2), 885\u2013899 (2017). https:\/\/doi.org\/10.1109\/TWC.2016.2633336.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"7","key":"1603_CR32","doi-asserted-by":"publisher","first-page":"4302","DOI":"10.1109\/TWC.2018.2822286","volume":"17","author":"A. Kuhestani","year":"2018","unstructured":"A. Kuhestani, A. Mohammadi, K. Wong, P. L. Yeoh, M. Moradikia, M. R. A. Khandaker, Optimal power allocation by imperfect hardware analysis in untrusted relaying networks. IEEE Trans. Wirel. Commun.17(7), 4302\u20134314 (2018).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"6","key":"1603_CR33","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/TCOMM.2018.2802951","volume":"66","author":"A. Kuhestani","year":"2018","unstructured":"A. Kuhestani, A. Mohammadi, P. L. Yeoh, Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer. IEEE Trans. Commun.66(6), 2671\u20132684 (2018).","journal-title":"IEEE Trans. Commun."},{"key":"1603_CR34","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.phycom.2018.03.007","volume":"28","author":"Mohanad Obeed","year":"2018","unstructured":"M. Obeed, W. Mesbah, Efficient algorithms for physical layer security in two-way relay systems. Phys. Commun.28:, 78\u201388 (2018). https:\/\/doi.org\/10.1016\/j.phycom.2018.03.007.","journal-title":"Physical Communication"},{"issue":"2","key":"1603_CR35","first-page":"341","volume":"13","author":"A. Kuhestani","year":"2018","unstructured":"A. Kuhestani, A. Mohammadi, M. Mohammadi, Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers. IEEE Trans. Inf. Forensic. Secur.13(2), 341\u2013355 (2018).","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"issue":"12","key":"1603_CR36","doi-asserted-by":"publisher","first-page":"3816","DOI":"10.1109\/TCOMM.2012.091212.110199","volume":"60","author":"Shafi Bashar","year":"2012","unstructured":"S. Bashar, Z. Ding, C. Xiao, On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input. IEEE Trans. Commun.60(12), 3816\u20133825 (2012). https:\/\/doi.org\/10.1109\/TCOMM.2012.091212.110199.","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"1603_CR37","first-page":"195","volume":"63","author":"Z. Mheich","year":"2015","unstructured":"Z. Mheich, F. Alberge, P. Duhamel, Achievable secrecy rates for the broadcast channel with confidential message and finite constellation inputs. IEEE Trans. Commun.63(1), 195\u2013205 (2015).","journal-title":"IEEE Trans. Commun."},{"key":"1603_CR38","doi-asserted-by":"publisher","unstructured":"X. Liu, D. Ma, J. Xiong, W. Li, L. Cheng, in 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall). Power allocation for an-aided beamforming design in MISO wiretap channels with finite-alphabet signaling, (2016), pp. 1\u20136. https:\/\/doi.org\/10.1109\/vtcfall.2016.7881170.","DOI":"10.1109\/vtcfall.2016.7881170"},{"issue":"5","key":"1603_CR39","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.1109\/TIT.2012.2236382","volume":"59","author":"Y. Polyanskiy","year":"2013","unstructured":"Y. Polyanskiy, Saddle point in the minimax converse for channel coding. IEEE Trans. Inf. Theory. 59(5), 2576\u20132595 (2013).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1603_CR40","doi-asserted-by":"publisher","unstructured":"N. Varnica, X. Ma, A. Kavcic, in Global Telecommunications Conference, 2002. GLOBECOM \u201902. IEEE, 2. Capacity of power constrained memoryless AWGN channels with fixed input constellations, (2002), pp. 1339\u201313432. https:\/\/doi.org\/10.1109\/GLOCOM.2002.1188416.","DOI":"10.1109\/GLOCOM.2002.1188416"},{"key":"1603_CR41","doi-asserted-by":"publisher","unstructured":"E. A. Jorswieck, A. Wolf, in Proc. of Int. Workshop on Multiple Access Communications (MACOM). Resource allocation for the wire-tap multi-carrier broadcast channel (Saint Petersburg, 2008). https:\/\/doi.org\/10.1109\/ictel.2008.4652697.","DOI":"10.1109\/ictel.2008.4652697"},{"key":"1603_CR42","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1080\/00029890.1962.11989827","volume":"69","author":"D. Gale","year":"1962","unstructured":"D. Gale, L. S. Shapley, College admissions and the stability of marriage. Am. Math. Mon.69:, 9\u201315 (1962).","journal-title":"Am. Math. Mon."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1603-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1603-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1603-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T20:51:19Z","timestamp":1613163079000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1603-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1603"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1603-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"22 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"276"}}