{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:32:06Z","timestamp":1767677526649,"version":"3.48.0"},"reference-count":59,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T00:00:00Z","timestamp":1767398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004561","name":"Ministry of Education and Science of the Republic of Kazakhstan","doi-asserted-by":"crossref","award":["BR24992975"],"award-info":[{"award-number":["BR24992975"]}],"id":[{"id":"10.13039\/501100004561","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Industrial Internet of Things (IIoT) deployments increasingly rely on low-cost microcontrollers and single-board computers to stream operational telemetry for monitoring, control, and predictive maintenance, yet the canonical \u201cTLS-to-broker\u201d model does not protect message content from a compromised or curious MQTT broker. This study therefore designs and implements a practical, application-layer end-to-end (E2E) encryption pipeline spanning an ESP32 data client (C++\/mbedTLS), an untrusted MQTT broker, and a Raspberry Pi gateway (Python\/PyCryptodome) using AES-256-GCM with Additional Authenticated Data (AAD). Sensor measurements are serialized as compact JSON, encrypted and authenticated on the ESP32, framed into a binary record, Base64-encoded for MQTT payload carriage, and verified\/decrypted only at the gateway. Experiments on ESP32-WROOM-32 and Raspberry Pi 4 show an average ESP32 packet-preparation latency of 41.754 ms (JSON 1.0 ms; AES-GCM 29.5 ms; Base64 11.2 ms), robust rejection of ciphertext tampering and unauthorized devices via MAC verification and whitelist checks, and 99.72% decrypt-and-store success over a one-hour run (718\/720 messages). These results indicate that commodity IIoT hardware can support practical and replicable E2E confidentiality and integrity without sacrificing operational throughput, while eliminating the MQTT broker as a de facto man-in-the-middle.<\/jats:p>","DOI":"10.3390\/info17010033","type":"journal-article","created":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T10:53:50Z","timestamp":1767610430000},"page":"33","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight, End-to-End Encrypted Data Pipeline for IIoT: An AES-GCM Implementation for ESP32, MQTT, and Raspberry Pi"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3933-5476","authenticated-orcid":false,"given":"Gulshat","family":"Amirkhanova","sequence":"first","affiliation":[{"name":"Faculty of Information Technology and Artificial Intelligence, Al-Farabi Kazakh National University, Almaty 050040, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0634-8765","authenticated-orcid":false,"given":"Syrym","family":"Ismailov","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology and Artificial Intelligence, Al-Farabi Kazakh National University, Almaty 050040, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3708-3153","authenticated-orcid":false,"given":"Alikhan","family":"Amirkhanov","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology and Artificial Intelligence, Al-Farabi Kazakh National University, Almaty 050040, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1768-064X","authenticated-orcid":false,"given":"Saltanat","family":"Adilzhanova","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology and Artificial Intelligence, Al-Farabi Kazakh National University, Almaty 050040, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7510-5948","authenticated-orcid":false,"given":"Meiramkul","family":"Zhasuzakova","sequence":"additional","affiliation":[{"name":"Faculty of Information Technologies and Artificial Intelligence, Almaty Technological University, Almaty 050012, Kazakhstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2690-3588","authenticated-orcid":false,"given":"Siming","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Data Science, Fudan University, Shanghai 200437, China"}]}],"member":"1968","published-online":{"date-parts":[[2026,1,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cruz, C., Palomar, E., Bravo, I., and Gardel, A. (2020). Cooperative Demand Response Framework for a Smart Community Targeting Renewables: Testbed Implementation and Performance Evaluation. Energies, 13.","DOI":"10.3390\/en13112910"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Herrera, V.A.S., de Ara\u00fajo, H.P., Penteado, C.G., Gazziro, M., and Carmo, J.P. (2025). Low-Cost Embedded System Applications for Smart Cities. Big Data Cogn. Comput., 9.","DOI":"10.3390\/bdcc9020019"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1515\/cdbme-2021-2129","article-title":"Development and Implementation of an Open Source IoT Platform, Network and Data Warehouse for Privacy-Compliant Applications in Research and Industry","volume":"7","author":"Stadler","year":"2021","journal-title":"Curr. Dir. Biomed. Eng."},{"key":"ref_4","first-page":"4849","article-title":"Node-RED Web-based Monitor and Control of Power System Using Modbus and Message Queuing Telemetry Transport Communication in Raspberry Pi Embedded Platform","volume":"36","author":"Lin","year":"2024","journal-title":"Sens. Mater."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Jornet-Monteverde, J.A., and Galiana-Merino, J.J. (2020). Low-Cost Conversion of Single-Zone HVAC Systems to Multi-Zone Control Systems Using Low-Power Wireless Sensor Networks. Sensors, 20.","DOI":"10.3390\/s20133611"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Rouillard, J., and Vannobel, J.-M. (2023). Multimodal Interaction for Cobot Using MQTT. Multimodal Technol. Interact., 7.","DOI":"10.3390\/mti7080078"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"69","DOI":"10.58346\/JOWUA.2024.I4.006","article-title":"Innovative Applications of IoT in Smart Home Systems: Enhancing Environmental Monitoring with Integrated Sensor Technologies and MQTT Protocol","volume":"15","author":"Zhu","year":"2024","journal-title":"JoWUA"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Patel, J., and Gamess, E. (2024, January 15\u201316). A Study of the Resilience of the Mosquitto MQTT Broker Running on Raspberry Pi Against Fuzzy DDoS Attacks. Proceedings of the 2024 Latin America Networking Conference, Bahia Blanca, Argentina.","DOI":"10.1145\/3685323.3685326"},{"key":"ref_9","first-page":"223","article-title":"Denial-of-Service Attack Analysis by MQTT Protocol","volume":"20","author":"Dikii","year":"2020","journal-title":"Sci. Tech. J. Inf. Technol. Mech. Opt."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijcnc.2022.14201","article-title":"Performance Evaluation of Different Raspberry Pi Models as MQTT Servers and Clients","volume":"14","author":"Ford","year":"2022","journal-title":"IJCNC"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Gentile, A.F., Macr\u00ec, D., Carn\u00ec, D.L., Greco, E., and Lamonaca, F. (2024). A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on IoT with Constrained Hardware and Open Source Infrastructures. Sensors, 24.","DOI":"10.3390\/s24092781"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Gavriilidis, N.O., Halkidis, S.T., and Petridou, S. (2025). Empirical Evaluation of TLS-Enhanced MQTT on IoT Devices for V2X Use Cases. Appl. Sci., 15.","DOI":"10.3390\/app15158398"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Machado, R., Pinheiro, L., Santos, V., and Salgado, B. (2025). PlugID: A Platform for Authenticated Energy Consumption to Enhance Accountability and Efficiency in Smart Buildings. Energies, 18.","DOI":"10.20944\/preprints202507.1952.v1"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez-Guti\u00e9rrez, C.A., Delgado-Del-Carpio, M., Zebad\u00faa-Chavarr\u00eda, L.A., Hern\u00e1ndez-De-Le\u00f3n, H.R., Escobar-G\u00f3mez, E.N., and Quevedo-L\u00f3pez, M. (2023). IoT-Enabled System for Detection, Monitoring, and Tracking of Nuclear Materials. Electronics, 12.","DOI":"10.3390\/electronics12143042"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Guill\u00e9n-Fern\u00e1ndez, O., Tlelo-Cuautle, E., de la Fraga, L.G., Sandoval-Ibarra, Y., and Nu\u00f1ez-Perez, J.-C. (2022). An Image Encryption Scheme Synchronizing Optimized Chaotic Systems Implemented on Raspberry Pis. Mathematics, 10.","DOI":"10.3390\/math10111907"},{"key":"ref_16","first-page":"2189","article-title":"Information Security in Wireless Water Flow and Leakage Alarm System","volume":"34","author":"Chang","year":"2022","journal-title":"Sens. Mater."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"29056","DOI":"10.1038\/s41598-025-13465-7","article-title":"Developing Real-Time IoT-Based Public Safety Alert and Emergency Response Systems","volume":"15","author":"Zhang","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_18","first-page":"754","article-title":"Fleet Control with IoT Using TLS Certificates and SIM7000G GPS Device","volume":"6","author":"Cruz","year":"2024","journal-title":"J. Appl. Eng. Technol. Sci."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1007\/s10796-023-10383-9","article-title":"Analysis of the Cryptographic Algorithms in IoT Communications","volume":"26","author":"Silva","year":"2023","journal-title":"Inf. Syst. Front."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"260","DOI":"10.3390\/network4030013","article-title":"Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0","volume":"4","author":"Gebremariam","year":"2024","journal-title":"Network"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Sarasa Laborda, V., Hern\u00e1ndez-\u00c1lvarez, L., Hern\u00e1ndez Encinas, L., S\u00e1nchez Garc\u00eda, J.I., and Queiruga-Dios, A. (2025). Study About the Performance of Ascon in Arduino Devices. Appl. Sci., 15.","DOI":"10.3390\/app15074071"},{"key":"ref_22","first-page":"290","article-title":"Tailoring AES for Resource-Constrained IoT Devices","volume":"36","author":"Saleh","year":"2024","journal-title":"Indones. J. Electr. Comput. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"25746","DOI":"10.48084\/etasr.12204","article-title":"A Comparison of Lightweight Cryptographic Protocols for Energy-Efficient and Sustainable IoMT Authentication","volume":"15","author":"Naser","year":"2025","journal-title":"Eng. Technol. Appl. Sci. Res."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"25133","DOI":"10.48084\/etasr.10367","article-title":"Lightweight Cryptographic and Scalable IoT Systems for Encryption across GSM-MQTT Architectures in Resource-Constrained Aquaculture Environment","volume":"15","author":"Shete","year":"2025","journal-title":"Eng. Technol. Appl. Sci. Res."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Nagy, N., Alnemer, S., Alshuhail, L.M., Alobiad, H., Almulla, T., Alrumaihi, F.A., Ghadra, N., and Nagy, M. (2025). Module-Lattice-Based Key-Encapsulation Mechanism Performance Measurements. Sci, 7.","DOI":"10.3390\/sci7030091"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Satrya, G.B., Agus, Y.M., and Ben Mnaouer, A. (2023). A Comparative Study of Post-Quantum Cryptographic Algorithm Implementations for Secure and Efficient Energy Systems Monitoring. Electronics, 12.","DOI":"10.3390\/electronics12183824"},{"key":"ref_27","first-page":"1","article-title":"Secure Edge-Based IoMT Framework for ICU Monitoring with TinyML and Post-Quantum Cryptography","volume":"15","author":"Khan","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_28","first-page":"36195","article-title":"Hybrid Cryptographic Approach for Strengthening IoT and 5G\/B5G Network Security","volume":"15","author":"Kumar","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"\u00d6zt\u00fcrk, G., \u00c7imen, M.E., \u00c7avu\u015fo\u011flu, \u00dc., Eldo\u011fan, O., and Karayel, D. (2025). Secure and Efficient Data Encryption for Internet of Robotic Things via Chaos-Based Ascon. Appl. Sci., 15.","DOI":"10.3390\/app151910641"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"19103","DOI":"10.1038\/s41598-025-04061-w","article-title":"Secure IoV Communications for Smart Fleet Systems Empowered with ASCON","volume":"15","author":"Kaythry","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"942","DOI":"10.14569\/IJACSA.2025.0160989","article-title":"Chaotic Compressed Sensing for Secure Image Transmission in LoRa IoT Systems","volume":"16","author":"Wannaboon","year":"2025","journal-title":"IJACSA"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.11591\/ijece.v10i1.pp1035-1042","article-title":"DNA Computing-Based Stream Cipher for Internet of Things Using MQTT Protocol","volume":"10","author":"Hussein","year":"2020","journal-title":"IJECE"},{"key":"ref_33","first-page":"105","article-title":"On-Sensor Stream Cipher Encryption for Protecting Smart City Sensor Data Directly on Resource-Constrained IoT Sensors","volume":"48","author":"Seedorf","year":"2025","journal-title":"ISPRS Arch."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Pearson, B., Luo, L., Zou, C., Crain, J., Jin, Y., and Fu, X. (November, January 31). Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory. Proceedings of the Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA.","DOI":"10.1007\/978-3-030-43605-6_17"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ala-Laurinaho, R., Autiosalo, J., and Tammi, K. (2020). Open Sensor Manager for IIoT. J. Sens. Actuator Netw., 9.","DOI":"10.3390\/jsan9020030"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"D\u00edaz, A.F., Blokhin, I., Anguita, M., Ortega, J., and Escobar, J.J. (2020). Multiprotocol Authentication Device for HPC and Cloud Environments Based on Elliptic Curve Cryptography. Electronics, 9.","DOI":"10.3390\/electronics9071148"},{"key":"ref_37","unstructured":"Microchip Technology Inc. (2018). AVR-IoT WG Development Board User Guide, Microchip Technology Inc."},{"key":"ref_38","first-page":"1123","article-title":"A Centralized Federated Learning Algorithm Based Multi Classification Predictive Maintenance in IIoT System","volume":"58","author":"Abdalah","year":"2025","journal-title":"J. Eur. Syst\u00e8mes Autom."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"707","DOI":"10.58346\/JOWUA.2025.I2.043","article-title":"A Context-Aware IoT and Edge Computing Framework for Wireless Plant Disease Diagnosis Using Compressed MaskRCNN and ResNet-50","volume":"16","author":"Sowmiya","year":"2025","journal-title":"JoWUA"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Khan, T. (2025). A Deep Learning-Based Gunshot Detection IoT System with Enhanced Security Features and Testing Using Blank Guns. IoT, 6.","DOI":"10.3390\/iot6010005"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Villafuerte, N., Manzano, S., Ayala, P., and Garc\u00eda, M.V. (2023). Artificial Intelligence in Virtual Telemedicine Triage: A Respiratory Infection Diagnosis Tool with Electronic Measuring Device. Future Internet, 15.","DOI":"10.3390\/fi15070227"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"De Side, G.N., Putra, G.M.D., and Setiawati, D.A. (2025). IoT Microclimate Monitoring System Using Node-RED Platform at Plant Factory. IOP Conference Series: Earth and Environmental Science, IOP Publishing.","DOI":"10.1088\/1755-1315\/1441\/1\/012012"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Sebti, M.R., Dakhia, Z., Carabetta, S., Di Sanzo, R., Russo, M., and Merenda, M. (2025). Real-Time Classification of Ochratoxin A Contamination in Grapes Using AI-Enhanced IoT. Sensors, 25.","DOI":"10.3390\/s25030784"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Concei\u00e7\u00e3o, G., Coelho, T., Mota, A., Briga-S\u00e1, A., and Valente, A. (2025). Smart Matter-Enabled Air Vents for Trombe Wall Automation and Control. Electronics, 14.","DOI":"10.3390\/electronics14183741"},{"key":"ref_45","first-page":"895","article-title":"Smart Object Detection and Home Appliances Control System in Smart Cities","volume":"67","author":"Khan","year":"2021","journal-title":"Comput. Mater. Contin."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"012109","DOI":"10.1088\/1742-6596\/2096\/1\/012109","article-title":"Internet of Things (IoT) Security Alarms on ESP32-CAM","volume":"2096","author":"Salikhov","year":"2021","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_47","first-page":"526","article-title":"Secure Vehicle-to-Vehicle Voice Chat Based on MQTT and CoAP IoT Protocol","volume":"19","author":"Hussein","year":"2020","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Rashid, H.A., Chowdhury, O., Hossain, M.M., Rahman, M.M., Muhammad, G., AlQahtani, S.A., Alrashoud, M., Yassine, A., and Hossain, M.S. (2023). IoT-Based Medical Image Monitoring System Using HL7 in a Hospital Database. Healthcare, 11.","DOI":"10.3390\/healthcare11010139"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Serepas, F., Papias, I., Christakis, K., Dimitropoulos, N., and Marinakis, V. (2025). Lightweight Embedded IoT Gateway for Smart Homes Based on an ESP32 Microcontroller. Computers, 14.","DOI":"10.3390\/computers14090391"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Arcenegui, J., Arjona, R., Rom\u00e1n, R., and Baturone, I. (2021). Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart NFTs Using PUFs. Sensors, 21.","DOI":"10.3390\/s21093119"},{"key":"ref_51","first-page":"6861","article-title":"About One Lightweight Encryption Algorithm Ensuring the Security of Data Transmission and Communication Between IoT Devices","volume":"14","author":"Atanov","year":"2024","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_52","first-page":"1","article-title":"A Unified Approach to a Secure and Lightweight Mutual Authentication Protocol Using Pre-Characterized COTS SRAM ICs for IoT Applications","volume":"24","author":"Gupta","year":"2025","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"14","DOI":"10.35784\/acs-2021-10","article-title":"Application for Functionality and Registration in the Cloud of a Microcontroller Development Board for IoT in AWS","volume":"17","author":"Araiza","year":"2021","journal-title":"Appl. Comput. Sci."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Chiu, J.-C., Lee, G.-Y., Hsieh, C.-Y., and Lin, Q.-Y. (2024). Design and Implementation of Nursing-Secure-Care System with mmWave Radar by YOLO-v4. Appl. Syst. Innov., 7.","DOI":"10.3390\/asi7010010"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"724","DOI":"10.14569\/IJACSA.2025.0160273","article-title":"Lightweight Parabola Chaotic Keyed Hash Using SRAM-PUF for IoT Authentication","volume":"16","author":"Jiteurtragool","year":"2025","journal-title":"IJACSA"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"59","DOI":"10.63180\/jsrm.thestap.2025.1.3","article-title":"Responsive Machine Learning Framework and Lightweight Utensil of Prevention of Evasion Attacks in the IoT-Based IDS","volume":"2025","year":"2025","journal-title":"STAP J. Secur. Risk Manag."},{"key":"ref_57","unstructured":"Liu, T. (2010). Digital-Output Relative Humidity & Temperature Sensor\/Module DHT22 (AM2302), Aosong Electronics Co., Ltd."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Thota, Y.R., Nixon, J.S., Chandran, B., and Nikoubin, T. (July, January 30). TinyML-Based Biometric Authentication Using PPG Signals for Edge Devices. Proceedings of the Great Lakes Symposium on VLSI 2025, New Orleans, LA, USA.","DOI":"10.1145\/3716368.3735271"},{"key":"ref_59","first-page":"1351","article-title":"Smart Home Solutions Using Wi-Fi-Based Hardware","volume":"27","author":"Hercog","year":"2020","journal-title":"Teh. Vjesn."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/17\/1\/33\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:27:43Z","timestamp":1767677263000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/17\/1\/33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,3]]},"references-count":59,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["info17010033"],"URL":"https:\/\/doi.org\/10.3390\/info17010033","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2026,1,3]]}}}