{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:50:36Z","timestamp":1775620236350,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T00:00:00Z","timestamp":1732320000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T00:00:00Z","timestamp":1732320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100022230","name":"Deanship of Scientific Research, Princess Nourah Bint Abdulrahman University","doi-asserted-by":"publisher","award":["PNURSP2024R234"],"award-info":[{"award-number":["PNURSP2024R234"]}],"id":[{"id":"10.13039\/501100022230","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"DOI":"10.1186\/s13638-024-02417-w","type":"journal-article","created":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T16:26:06Z","timestamp":1732379166000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Advanced security framework for low Earth orbit satellites in space information network"],"prefix":"10.1186","volume":"2024","author":[{"given":"Mohammed","family":"Abdrabou","sequence":"first","affiliation":[]},{"given":"Fayez","family":"Gebali","sequence":"additional","affiliation":[]},{"given":"Mahmoud A.","family":"Shawky","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6829-9705","authenticated-orcid":false,"given":"Ala S.","family":"Alluhaidan","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Mansour","sequence":"additional","affiliation":[]},{"given":"Sahar A.","family":"El-Rahman","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Al-ahwal","sequence":"additional","affiliation":[]},{"given":"Tamer","family":"Shamseldin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,23]]},"reference":[{"issue":"6","key":"2417_CR1","doi-asserted-by":"publisher","first-page":"3673","DOI":"10.1109\/TWC.2020.2975781","volume":"19","author":"K Xue","year":"2020","unstructured":"K. Xue, W. Meng, H. Zhou, D.S. Wei, M. Guizani, A lightweight and secure group key based handover authentication protocol for the software-defined space information network. IEEE Trans. Wireless Commun. 19(6), 3673\u20133684 (2020)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"2","key":"2417_CR2","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1109\/TIFS.2018.2854740","volume":"14","author":"Q Yang","year":"2018","unstructured":"Q. Yang, K. Xue, J. Xu, J. Wang, F. Li, N. Yu, Anfra: anonymous and fast roaming authentication for space information network. IEEE Trans. Inf. Forensics Secur. 14(2), 486\u2013497 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2417_CR3","doi-asserted-by":"crossref","unstructured":"M. A. Abdrabou, Robust pre-authentication protocol for wireless network. In: International computer engineering conference, Cairo, Egypt, pp. 331\u2013336 (2017)","DOI":"10.1109\/ICENCO.2017.8289809"},{"key":"2417_CR4","doi-asserted-by":"crossref","unstructured":"M. A. Abdrabou, E. Abd\u00a0El-Wanis, A. D. Elbayoumy, Security enhancement for LTE authentication protocol (EPS-AKA). In: International conference on aerospace sciences and aviation technology, Cairo, Egypt (2015)","DOI":"10.1109\/IntelCIS.2015.7397256"},{"issue":"3","key":"2417_CR5","doi-asserted-by":"publisher","first-page":"5485","DOI":"10.1109\/JIOT.2019.2902907","volume":"6","author":"K Xue","year":"2019","unstructured":"K. Xue, W. Meng, S. Li, D.S. Wei, H. Zhou, N. Yu, A secure and efficient access and handover authentication protocol for Internet of Things in space information networks. IEEE Internet Things J. 6(3), 5485\u20135499 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"2417_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/JIOT.2019.2943900","volume":"7","author":"B Li","year":"2019","unstructured":"B. Li, Z. Fei, C. Zhou, Y. Zhang, Physical-layer security in space information networks: a survey. IEEE Internet Things J. 7(1), 33\u201352 (2019)","journal-title":"IEEE Internet Things J."},{"key":"2417_CR7","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.1109\/OJCOMS.2021.3103735","volume":"2","author":"L Mucchi","year":"2021","unstructured":"L. Mucchi, S. Jayousi, S. Caputo, E. Panayirci, S. Shahabuddin, J. Bechtold, I. Morales, R.-A. Stoica, G. Abreu, H. Haas, Physical-layer security in 6G networks. IEEE Open J. Commun. Soc. 2, 1901\u20131914 (2021)","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"8","key":"2417_CR8","doi-asserted-by":"publisher","first-page":"4843","DOI":"10.1109\/TWC.2021.3062658","volume":"20","author":"R Deng","year":"2021","unstructured":"R. Deng, B. Di, H. Zhang, L. Kuang, L. Song, Ultra-dense LEO satellite constellations: how many LEO satellites do we need? IEEE Trans. Wireless Commun. 20(8), 4843\u20134857 (2021)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"4","key":"2417_CR9","doi-asserted-by":"publisher","first-page":"3717","DOI":"10.1109\/TAES.2022.3155711","volume":"58","author":"Z Lin","year":"2022","unstructured":"Z. Lin, H. Niu, K. An, Y. Wang, G. Zheng, S. Chatzinotas, Y. Hu, Refracting RIS-aided hybrid satellite-terrestrial relay networks: joint beamforming design and optimization. IEEE Trans. Aerosp. Electron. Syst. 58(4), 3717\u20133724 (2022)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"4","key":"2417_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/IOTM.001.2300201","volume":"7","author":"L You","year":"2024","unstructured":"L. You, Y. Zhu, X. Qiang, C.G. Tsinos, W. Wang, Z. Gao, B. Ottersten, Ubiquitous integrated sensing and communications for massive MIMO LEO satellite systems. IEEE Internet of Things Magazine 7(4), 30\u201335 (2024)","journal-title":"IEEE Internet of Things Magazine"},{"key":"2417_CR11","doi-asserted-by":"crossref","unstructured":"O.A. Topal, G.K. Kurt, Physical layer authentication for LEO satellite constellations. In: IEEE wireless communications and networking conference, Austin, TX, USA (2022)","DOI":"10.1109\/WCNC51071.2022.9771727"},{"issue":"22","key":"2417_CR12","doi-asserted-by":"publisher","first-page":"19861","DOI":"10.1109\/JIOT.2023.3282214","volume":"10","author":"M Abdrabou","year":"2023","unstructured":"M. Abdrabou, T.A. Gulliver, Adaptive physical layer authentication for IoT in MIMO communication systems using support vector machine. IEEE Internet Things J. 10(22), 19861\u201319873 (2023)","journal-title":"IEEE Internet Things J."},{"key":"2417_CR13","doi-asserted-by":"crossref","unstructured":"H. Cruickshank, A security system for satellite networks. In: International conference on satellite systems for mobile communications and navigation, London, UK, pp. 187\u2013190 (1996)","DOI":"10.1049\/cp:19960437"},{"issue":"4","key":"2417_CR14","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/958965.958970","volume":"37","author":"M-S Hwang","year":"2003","unstructured":"M.-S. Hwang, C.-C. Yang, C.-Y. Shiu, An authentication scheme for mobile satellite communication systems. ACM SIGOPS Oper. Syst. Rev. 37(4), 42\u201347 (2003)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"issue":"1","key":"2417_CR15","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1044552.1044560","volume":"39","author":"Y-F Chang","year":"2005","unstructured":"Y.-F. Chang, C.-C. Chang, An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper. Syst. Rev. 39(1), 70\u201384 (2005)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"issue":"1","key":"2417_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1002\/sat.993","volume":"30","author":"C-C Lee","year":"2012","unstructured":"C.-C. Lee, C.-T. Li, R.-X. Chang, A simple and efficient authentication scheme for mobile satellite communication systems. Int. J. Satell. Commun. Network. 30(1), 29\u201338 (2012)","journal-title":"Int. J. Satell. Commun. Network."},{"issue":"2","key":"2417_CR17","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/sat.1079","volume":"33","author":"Y Zhang","year":"2015","unstructured":"Y. Zhang, J. Chen, B. Huang, An improved authentication scheme for mobile satellite communication systems. Int. J. Satell. Commun. Netw. 33(2), 135\u2013146 (2015)","journal-title":"Int. J. Satell. Commun. Netw."},{"issue":"10","key":"2417_CR18","doi-asserted-by":"publisher","first-page":"1994","DOI":"10.1002\/dac.2448","volume":"27","author":"C-C Chang","year":"2014","unstructured":"C.-C. Chang, T.-F. Cheng, H.-L. Wu, An authentication and key agreement protocol for satellite communications. Int. J. Commun. Syst. 27(10), 1994\u20132006 (2014)","journal-title":"Int. J. Commun. Syst."},{"issue":"12","key":"2417_CR19","doi-asserted-by":"publisher","first-page":"4300","DOI":"10.1002\/dac.2612","volume":"27","author":"Y Zhang","year":"2014","unstructured":"Y. Zhang, J. Chen, B. Huang, Security analysis of an authentication and key agreement protocol for satellite communications. Int. J. Commun. Syst. 27(12), 4300\u20134306 (2014)","journal-title":"Int. J. Commun. Syst."},{"issue":"3","key":"2417_CR20","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1002\/sat.1218","volume":"36","author":"M Qi","year":"2018","unstructured":"M. Qi, J. Chen, An enhanced authentication with key agreement scheme for satellite communication systems. Int. J. Satell. Commun. Netw. 36(3), 296\u2013304 (2018)","journal-title":"Int. J. Satell. Commun. Netw."},{"issue":"7","key":"2417_CR21","doi-asserted-by":"publisher","first-page":"5810","DOI":"10.1109\/JIOT.2022.3152900","volume":"10","author":"Y Liu","year":"2022","unstructured":"Y. Liu, L. Ni, M. Peng, A secure and efficient authentication protocol for satellite-terrestrial networks. IEEE Internet Things J. 10(7), 5810\u20135822 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"2417_CR22","doi-asserted-by":"publisher","first-page":"2564","DOI":"10.1109\/TWC.2012.051512.111481","volume":"11","author":"P Baracca","year":"2012","unstructured":"P. Baracca, N. Laurenti, S. Tomasin, Physical layer authentication over MIMO fading wiretap channels. IEEE Trans. Wireless Commun. 11(7), 2564\u20132573 (2012)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"2417_CR23","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TIFS.2020.3033454","volume":"16","author":"L Senigagliesi","year":"2020","unstructured":"L. Senigagliesi, M. Baldi, E. Gambi, Comparison of statistical and machine learning techniques for physical layer authentication. IEEE Trans. Inf. Forensics Secur. 16, 1506\u20131521 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"2417_CR24","doi-asserted-by":"publisher","first-page":"5420","DOI":"10.1109\/TWC.2020.2993175","volume":"19","author":"H Fang","year":"2020","unstructured":"H. Fang, X. Wang, L. Xu, Fuzzy learning for multi-dimensional adaptive physical layer authentication: a compact and robust approach. IEEE Trans. Wireless Commun. 19(8), 5420\u20135432 (2020)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"2417_CR25","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MWC.001.1900054","volume":"26","author":"H Fang","year":"2019","unstructured":"H. Fang, X. Wang, S. Tomasin, Machine learning for intelligent authentication in 5G and beyond wireless networks. IEEE Wirel. Commun. 26(5), 55\u201361 (2019)","journal-title":"IEEE Wirel. Commun."},{"issue":"10","key":"2417_CR26","doi-asserted-by":"publisher","first-page":"6604","DOI":"10.1109\/TCOMM.2022.3196648","volume":"70","author":"M Abdrabou","year":"2022","unstructured":"M. Abdrabou, T.A. Gulliver, Adaptive physical layer authentication using machine learning with antenna diversity. IEEE Trans. Commun. 70(10), 6604\u20136614 (2022)","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"2417_CR27","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/LWC.2020.3035811","volume":"10","author":"Q-Y Fu","year":"2020","unstructured":"Q.-Y. Fu, Y.-H. Feng, H.-M. Wang, P. Liu, Initial satellite access authentication based on Doppler frequency shift. IEEE Wireless Commun. Lett. 10(3), 498\u2013502 (2020)","journal-title":"IEEE Wireless Commun. Lett."},{"key":"2417_CR28","unstructured":"G. Oligeri, S. Raponi, S. Sciancalepore, R. Di\u00a0Pietro, PAST-AI: physical-layer authentication of satellite transmitters via deep learning. arXiv preprint arXiv:2010.05470 (2020)"},{"key":"2417_CR29","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/JRFID.2021.3077756","volume":"5","author":"OA Topal","year":"2021","unstructured":"O.A. Topal, K. Kurt, H. Yanikomeroglu, Securing the inter-spacecraft links: physical layer key generation from Doppler frequency shift. IEEE J. Radio Freq. Identif. 5, 232\u2013243 (2021)","journal-title":"IEEE J. Radio Freq. Identif."},{"key":"2417_CR30","doi-asserted-by":"crossref","unstructured":"E. Jedermann, M. Strohmeier, M. Sch\u00e4fer, J. Schmitt, V. Lenders, Orbit-based authentication using TDOA signatures in satellite networks. In: ACM conference on security and privacy in wireless and mobile networks, Abu Dhabi, United Arab Emirates, pp. 175\u2013180 (2021)","DOI":"10.1145\/3448300.3469132"},{"issue":"9","key":"2417_CR31","doi-asserted-by":"publisher","first-page":"6345","DOI":"10.1109\/TCOMM.2021.3088898","volume":"69","author":"Z Lin","year":"2021","unstructured":"Z. Lin, M. Lin, B. Champagne, W.-P. Zhu, N. Al-Dhahir, Secrecy-energy efficient hybrid beamforming for satellite-terrestrial integrated networks. IEEE Trans. Commun. 69(9), 6345\u20136360 (2021)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"2417_CR32","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.1109\/TAES.2018.2874151","volume":"55","author":"Z Wu","year":"2018","unstructured":"Z. Wu, R. Liu, H. Cao, Ecdsa-based message authentication scheme for BeiDou-II navigation satellite system. IEEE Trans. Aerosp. Electron. Syst. 55(4), 1666\u20131682 (2018)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"2","key":"2417_CR33","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1109\/TAES.2017.2765258","volume":"54","author":"KD Wesson","year":"2017","unstructured":"K.D. Wesson, J.N. Gross, T.E. Humphreys, B.L. Evans, GNSS signal authentication via power and distortion monitoring. IEEE Trans. Aerosp. Electron. Syst. 54(2), 739\u2013754 (2017)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"5","key":"2417_CR34","first-page":"30","volume":"4","author":"S Lo","year":"2009","unstructured":"S. Lo, D. De Lorenzo, P. Enge, D. Akos, P. Bradley, Signal authentication: a secure civil gnss for today. Inside GNSS 4(5), 30\u201339 (2009)","journal-title":"Inside GNSS"},{"key":"2417_CR35","doi-asserted-by":"crossref","unstructured":"O. Pozzobon, L. Canzian, M. Danieletto, A. Dalla\u00a0Chiara, Anti-spoofing and open GNSS signal authentication with signal authentication sequences. In: ESA workshop on satellite navigation technologies and European workshop on GNSS signals and signal processing (2010). IEEE","DOI":"10.1109\/NAVITEC.2010.5708065"},{"key":"2417_CR36","unstructured":"H. Wen, J. Zhang, L. Runfa, J. Tang, F. Pan, Cross-layer authentication method based on radio frequency fingerprint. Google Patents. US Patent 10,251,058 (2019)"},{"issue":"7","key":"2417_CR37","doi-asserted-by":"publisher","first-page":"8738","DOI":"10.1109\/TVT.2023.3244077","volume":"72","author":"MA Shawky","year":"2023","unstructured":"M.A. Shawky, M. Bottarelli, G. Epiphaniou, P. Karadimas, An efficient cross-layer authentication scheme for secure communication in vehicular Ad-Hoc networks. IEEE Trans. Veh. Technol. 72(7), 8738\u20138754 (2023)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2417_CR38","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/OJVT.2022.3218609","volume":"4","author":"M Abdrabou","year":"2022","unstructured":"M. Abdrabou, T.A. Gulliver, Authentication for satellite communication systems using physical characteristics. IEEE Open J. Veh. Technol. 4, 48\u201360 (2022)","journal-title":"IEEE Open J. Veh. Technol."},{"issue":"7","key":"2417_CR39","doi-asserted-by":"publisher","first-page":"4604","DOI":"10.1109\/TWC.2020.2985681","volume":"19","author":"I Hadj-Kacem","year":"2020","unstructured":"I. Hadj-Kacem, H. Braham, S.B. Jemaa, SINR and rate distributions for downlink cellular networks. IEEE Trans. Wireless Commun. 19(7), 4604\u20134616 (2020)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"2417_CR40","volume-title":"Satellite Communications","author":"T Pratt","year":"2020","unstructured":"T. Pratt, J.E. Allnutt, Satellite Communications (John Wiley & Sons, New Delhi, 2020)"},{"key":"2417_CR41","doi-asserted-by":"crossref","unstructured":"Y. Cui, C. Wang, W. Liu, Y. Yu, M. O\u2019Neill, F. Lombardi, Low-cost configurable ring oscillator PUF with improved uniqueness. In: IEEE international symposium on circuits and systems, pp. 558\u2013561 (2016)","DOI":"10.1109\/ISCAS.2016.7527301"},{"key":"2417_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-984-2","volume-title":"Security with Noisy Data: On Private Biometrics Secure Key Storage and Anti-counterfeiting","author":"P Tuyls","year":"2007","unstructured":"P. Tuyls, B. \u0160koric, T. Kevenaar, Security with Noisy Data: On Private Biometrics Secure Key Storage and Anti-counterfeiting (Springer, New York, 2007)"},{"key":"2417_CR43","doi-asserted-by":"crossref","unstructured":"F. Gebali, M. Mamun, SRAM physically unclonable functions for smart home iot telehealth environments. Cybersecurity in smart Homes: architectures, solutions and technologies, 125\u2013154 (2022)","DOI":"10.1002\/9781119987451.ch3"},{"key":"2417_CR44","doi-asserted-by":"crossref","unstructured":"D. Wang, A. Elzanaty, M.-S. Alouini, Coded frequency hopping for direct-to-satellite IoT systems: design and analysis. IEEE Internet of Things J. (2024)","DOI":"10.1109\/JIOT.2024.3404093"},{"key":"2417_CR45","doi-asserted-by":"publisher","first-page":"96125","DOI":"10.1109\/ACCESS.2021.3094129","volume":"9","author":"A Gaffar","year":"2021","unstructured":"A. Gaffar, A.B. Joshi, S. Singh, V.N. Mishra, H.G. Rosales, L. Zhou, A. Dhaka, L.N. Mishra, A technique for securing multiple digital images based on 2D linear congruential generator, silver ratio, and galois field. IEEE Access 9, 96125\u201396150 (2021)","journal-title":"IEEE Access"},{"key":"2417_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-74437-7","volume-title":"Analysis of Computer and Communication Networks","author":"F Gebali","year":"2008","unstructured":"F. Gebali, Analysis of Computer and Communication Networks (Springer, New York, USA, 2008)"},{"key":"2417_CR47","doi-asserted-by":"crossref","unstructured":"C.J. Cremers, The scyther tool: Verification, falsification, and analysis of security protocols. In: International conference on computer aided verification, pp. 414\u2013418 (2008). Springer","DOI":"10.1007\/978-3-540-70545-1_38"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02417-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-024-02417-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02417-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T17:02:35Z","timestamp":1732381355000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-024-02417-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,23]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["2417"],"URL":"https:\/\/doi.org\/10.1186\/s13638-024-02417-w","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,23]]},"assertion":[{"value":"31 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"87"}}