{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T22:53:52Z","timestamp":1773183232258,"version":"3.50.1"},"reference-count":65,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2018,6,8]],"date-time":"2018-06-08T00:00:00Z","timestamp":1528416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"'The Cross-Ministry Giga KOREA Project' grant funded by the Korea government (MSIT)","award":["GK18N0300, Development of Indoor DAS Technology based on IFoF for 5G Mobile Communication"],"award-info":[{"award-number":["GK18N0300, Development of Indoor DAS Technology based on IFoF for 5G Mobile Communication"]}]},{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","award":["Research Fund"],"award-info":[{"award-number":["Research Fund"]}],"id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows\u2013Abadi\u2013Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).<\/jats:p>","DOI":"10.3390\/s18061888","type":"journal-article","created":{"date-parts":[[2018,6,8]],"date-time":"2018-06-08T11:19:31Z","timestamp":1528456771000},"page":"1888","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"first","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan 31538, Korea"}]},{"given":"Soonhyun","family":"Kwon","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan 31538, Korea"}]},{"given":"Gaurav","family":"Choudhary","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan 31538, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7470-6506","authenticated-orcid":false,"given":"Vishal","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan 31538, Korea"}]},{"given":"Jung Taek","family":"Seo","sequence":"additional","affiliation":[{"name":"Department of Information Security Engineering, Soonchunhyang University, Asan 31538, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2018,6,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MCOM.2015.7263372","article-title":"Publish\/subscribe-enabled software defined networking for efficient and scalable IoT communications","volume":"53","author":"Hakiri","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/MCOM.2017.1600437CM","article-title":"Efficient IoT Gateway over 5G Wireless: A New Design with Prototype and Implementation Results","volume":"55","author":"Saxena","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1049\/el.2016.3487","article-title":"UAV-assisted content-based sensor search in IoTs","volume":"53","author":"Sharma","year":"2017","journal-title":"Electron. Lett."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Jayaraman, P.P., Yavari, A., Georgakopoulos, D., Morshed, A., and Zaslavsky, A. (2016). Internet of things platform for smart farming: Experiences and lessons learnt. Sensors, 16.","DOI":"10.3390\/s16111884"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/JIOT.2017.2647881","article-title":"IoT Considerations, Requirements, and Architectures for Smart Buildings x2014; Energy Optimization and Next-Generation Building Management Systems","volume":"4","author":"Minoli","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhang, J., Li, L., Zhang, Y., and Yang, G. (2017). Monitoring citrus soil moisture and nutrients using an iot based system. Sensors, 17.","DOI":"10.3390\/s17030447"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Sun, X., and Ansari, N. (2017). Traffic Load Balancing among Brokers at the IoT Application Layer. IEEE Trans. Netw. Serv. Manag.","DOI":"10.1109\/TNSM.2017.2787859"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Pratama, A.Y.N., Zainudin, A., and Yuliana, M. (2017, January 26\u201327). Implementation of IoT-based passengers monitoring for smart school application. Proceedings of the 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), Surabaya, Indonesia.","DOI":"10.1109\/ELECSYM.2017.8240371"},{"key":"ref_9","first-page":"21","article-title":"Application-aware and Dynamic Security Function Chaining for Mobile Networks","volume":"7","author":"Li","year":"2017","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jnca.2017.11.004","article-title":"Secure and efficient protocol for fast handover in 5G mobile Xhaul networks","volume":"102","author":"Sharma","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1109\/JIOT.2014.2346513","article-title":"Privacy-Preserving Channel Access for Internet of Things","volume":"1","author":"Banerjee","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_12","first-page":"41","article-title":"Application Vulnerabilities in Risk Assessment and Management","volume":"7","author":"Baiardi","year":"2016","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"key":"ref_13","first-page":"48","article-title":"A Space Information Service Forwarding Mechnism Based on Software Defined Network","volume":"7","author":"Wei","year":"2017","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1109\/COMST.2017.2694469","article-title":"A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues","volume":"19","author":"Verma","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Balid, W., and Refai, H.H. (November, January 29). On the development of self-powered iot sensor for real-time traffic monitoring in smart cities. Proceedings of the 2017 IEEE SENSORS, Glasgow, UK.","DOI":"10.1109\/ICSENS.2017.8234157"},{"key":"ref_16","first-page":"1","article-title":"Agent-Oriented Cooperative Smart Objects: From IoT System Design to Implementation","volume":"PP","author":"Fortino","year":"2017","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_17","unstructured":"Sharma, V., You, I., and Kumar, R. (2007). Resource-based mobility management for video users in 5G using catalytic computing. Comput. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MCOM.2017.1600701CM","article-title":"Gesture Detection Using Passive RFID Tags to Enable People-Centric IoT Applications","volume":"55","author":"Parada","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1692","DOI":"10.1109\/TMTT.2017.2650911","article-title":"A review on recent progress of portable short-range noncontact microwave radar systems","volume":"65","author":"Li","year":"2017","journal-title":"IEEE Trans. Microwave Theory Tech."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MCOM.2017.1600422CM","article-title":"Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: Overview, design, and challenges","volume":"55","author":"Kong","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"48597","DOI":"10.1039\/C7RA07191D","article-title":"Inkjet printed nanomaterial based flexible radio frequency identification (RFID) tag sensors for the internet of nano things","volume":"7","author":"Singh","year":"2017","journal-title":"RSC Adv."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Wu, X., and Li, F. (2017). A multi-domain trust management model for supporting RFID applications of IoT. PLoS ONE, 12.","DOI":"10.1371\/journal.pone.0181124"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Pet\u00e4j\u00e4j\u00e4rvi, J., Mikhaylov, K., H\u00e4m\u00e4l\u00e4inen, M., and Iinatti, J. (2016, January 20\u201323). Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring. Proceedings of the 2016 10th International Symposium on Medical Information and Communication Technology (ISMICT), Worcester, MA, USA.","DOI":"10.1109\/ISMICT.2016.7498898"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Bardyn, J.P., Melly, T., Seller, O., and Sornin, N. (2016, January 12\u201315). IoT: The era of LPWAN is starting now. Proceedings of the 2016: 42nd European Solid-State Circuits Conference, Lausanne, Switzerland.","DOI":"10.1109\/ESSCIRC.2016.7598235"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Garcia-Carrillo, D., Marin-Lopez, R., Kandasamy, A., and Pelov, A. (2017). A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP. Sensors, 17.","DOI":"10.3390\/s17112646"},{"key":"ref_26","first-page":"45","article-title":"Integrating LP-WAN Communications within the Vehicular Ecosystem","volume":"7","author":"Gamez","year":"2017","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"ref_27","first-page":"41","article-title":"Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems","volume":"7","author":"Alcarria","year":"2016","journal-title":"JoWUA"},{"key":"ref_28","first-page":"60","article-title":"Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System","volume":"7","author":"Desnitsky","year":"2016","journal-title":"JoWUA"},{"key":"ref_29","first-page":"20","article-title":"Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions","volume":"7","author":"Carniani","year":"2016","journal-title":"JoWUA"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","article-title":"Identity-based encryption with outsourced revocation in cloud computing","volume":"64","author":"Li","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.future.2017.02.006","article-title":"Multi-key privacy-preserving deep learning in cloud computing","volume":"74","author":"Li","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Li, P., Li, J., Huang, Z., Gao, C.Z., Chen, W.B., and Chen, K. (2017). Privacy-preserving outsourced classification in cloud computing. Clust. Comput.","DOI":"10.1007\/s10586-017-0849-9"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","article-title":"Secure attribute-based data sharing for resource-limited users in cloud computing","volume":"72","author":"Li","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Huang, Z., Liu, S., Mao, X., Chen, K., and Li, J. (2017). Insight of the Protection for Data Security under Selective Opening Attacks. Inf. Sci.","DOI":"10.1016\/j.ins.2017.05.031"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Bankov, D., Khorov, E., and Lyakhov, A. (2017, January 12\u201315). Mathematical model of LoRaWAN channel access. Proceedings of the 2017 IEEE 18th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Macau, China.","DOI":"10.1109\/WoWMoM.2017.7974300"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Lanza, J., S\u00e1nchez, L., Mu\u00f1oz, L., Galache, J.A., Sotres, P., Santana, J.R., and Guti\u00e9rrez, V. (2015). Large-Scale Mobile Sensing Enabled Internet-of-Things Testbed for Smart City Services. Int. J. Distrib. Sens. Netw., 11.","DOI":"10.1155\/2015\/785061"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Park, S., Park, S., Byun, J., and Park, S. (2016). Design of a mass-customization-based cost-effective Internet of Things sensor system in smart building spaces. Int. J. Distrib. Sens. Netw., 12.","DOI":"10.1177\/1550147716660895"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCOM.2017.1600613","article-title":"Understanding the limits of LoRaWAN","volume":"55","author":"Adelantado","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_39","unstructured":"Zulian, S. (2017, December 26). Security Threat Analysis and Countermeasures for LoRaWAN Join Procedure. Available online: https:\/\/labs.mwrinfosecurity.com\/publications\/lo\/."},{"key":"ref_40","unstructured":"Miller, R. (2017, December 26). LoRa Security: Building a Secure LoRa Solution. Available online: https:\/\/labs.mwrinfosecurity.com\/publications\/lo\/."},{"key":"ref_41","unstructured":"Na, S., Hwang, D., Shin, W.S., and Kim, K.H. (2017, January 11\u201313). Scenario and Countermeasure for Replay Attack Using Join Request Messages in LoRaWAN. Proceedings of the 2017 International Conference on Information Networking (ICOIN), Da Ning, Vietnam."},{"key":"ref_42","first-page":"6590713","article-title":"A Dual Key-Based Activation Scheme for Secure LoRaWAN","volume":"2017","author":"Kim","year":"2017","journal-title":"Hindawi Wirel. Commun. Mob. Comput."},{"key":"ref_43","unstructured":"Garcia, D., Marin, R., Kandasamy, A., and Pelov, A. (2017, December 26). LoRaWAN Authentication in Diameter Draft-Garcia-Dime-Diameter-Lorawan-00. Available online: https:\/\/tools.ietf.org\/html\/draft-garcia-dime-diameter-lorawan-00."},{"key":"ref_44","unstructured":"Garcia, D., Marin, R., Kandasamy, A., and Pelov, A. (2017, December 26). LoRaWAN Authentication in RADIUS Draft-Garcia-Radext-Radius-Lorawan-03. Available online: https:\/\/www.ietf.org\/archive\/id\/draft-garcia-radext-radius-lorawan-03.txt."},{"key":"ref_45","unstructured":"Fossati, T., and Tschofenig, H. (2018, May 01). Transport Layer Security (TLS)\/Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things. Available online: https:\/\/tools.ietf.org\/html\/rfc7925."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","article-title":"Automated Security Protocol Analysis with the AVISPA Tool","volume":"155","year":"2006","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Koulamas, C., Giannoulis, S., and Fournaris, A. (2017). IoT Components for Secure Smart Building Environments. Components and Services for IoT Platforms, Springer.","DOI":"10.1007\/978-3-319-42304-3_17"},{"key":"ref_49","unstructured":"Farrell, S. (2018, May 01). LPWAN Overview: Draft-ietf-lpwan-overview-01. Available online: https:\/\/tools.ietf.org\/html\/draft-ietf-lpwan-overview-01."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Casals, L., Mir, B., Vidal, R., and Gomez, C. (2017). Modeling the Energy Performance of LoRaWAN. Sensors, 17.","DOI":"10.3390\/s17102364"},{"key":"ref_51","unstructured":"Sornin, N.M., Luis, T.E.T.K., and Hersent, O. (2018, May 01). LoRaWAN Specification V1.0.2. Available online: https:\/\/lora-alliance.org\/resource-hub\/lorawantm-specification-v102."},{"key":"ref_52","unstructured":"Girard, P. (2017, December 26). Low Power Wide Area Networks Security. Available online: https:\/\/docbox.etsi.org\/Workshop\/2015\/201512_M2MWORKSHOP\/S04_WirelessTechnoforIoTandSecurityChallenges\/GEMALTO_GIRARD.pdf."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Avoine, G., and Ferreira, L. (2018, May 15). Rescuing LoRaWAN 1.0. Available online: https:\/\/fc18.ifca.ai\/preproceedings\/13.pdf.","DOI":"10.1007\/978-3-662-58387-6_14"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","article-title":"Use of Elliptic Curves in Cryptography","volume":"Volume 218","author":"Miller","year":"1985","journal-title":"Advances in Cryptology\u2014CRYPTO\u201985 Proceedings"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/s102070100002","article-title":"The Elliptic Curve Digital Signature Algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"Int. J. Inf. Secur."},{"key":"ref_56","first-page":"26","article-title":"Enhancing SVO Logic for Mobile IPv6 Security Protocols","volume":"2","author":"You","year":"2011","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"11100","DOI":"10.1109\/ACCESS.2017.2710379","article-title":"Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks","volume":"5","author":"Shin","year":"2017","journal-title":"IEEE Access"},{"key":"ref_58","unstructured":"Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A. (1996). Handbook of Applied Cryptography, CRC Press."},{"key":"ref_59","unstructured":"Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P., Mantovani, J., M\u00f6dersheim, S., and Vigneron, L. (2004, January 20\u201324). A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. Proceedings of the Workshop on Specification and Automated Processing of Security Requirements, Linz, Austria."},{"key":"ref_60","first-page":"61","article-title":"OFMC: A symbolic model checker for security protocols","volume":"4","author":"Basin","year":"2005","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"ref_61","first-page":"730","article-title":"SATMC: A SAT-Based Model Checker for Security Protocols","volume":"Volume 3229","author":"Alferes","year":"2004","journal-title":"European Workshop on Logics in Artificial Intelligence\u2014JELIA 2004: Logics in Artificial Intelligence"},{"key":"ref_62","first-page":"277","article-title":"SATMC: A SAT-Based Model Checker for Security Protocols","volume":"Volume 4098","author":"Turuani","year":"2006","journal-title":"International Conference on Rewriting Techniques and Applications\u2014RTA 2006: Term Rewriting and Applications"},{"key":"ref_63","unstructured":"Boichut, Y., Heam, P.C., Kouchnarenko, O., and Oehl, F. (2004, January 3\u20134). Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols. Proceedings of the ETAPS 2004 Workshop on Automated Verification of Infinite States Systems (AVIS 2004), Barcelona, Spain."},{"key":"ref_64","unstructured":"Guan, J., Sharma, V., You, I., and Atiquzzaman, M. (arXiv, 2017). Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover, arXiv."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/MWC.2013.6664487","article-title":"Distributed IP mobility management from the perspective of the IETF: Motivations, requirements, approaches, comparison, and challenges","volume":"20","author":"Lee","year":"2013","journal-title":"IEEE Wirel. Commun."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/6\/1888\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:07:57Z","timestamp":1760195277000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/6\/1888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,8]]},"references-count":65,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2018,6]]}},"alternative-id":["s18061888"],"URL":"https:\/\/doi.org\/10.3390\/s18061888","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,8]]}}}