{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:30:41Z","timestamp":1762522241029,"version":"build-2065373602"},"reference-count":151,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T00:00:00Z","timestamp":1543363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In the era of the Internet of Things (IoT), drug developers can potentially access a wealth of real-world, participant-generated data that enable better insights and streamlined clinical trial processes. Protection of confidential data is of primary interest when it comes to health data, as medical condition influences daily, professional, and social life. Current approaches in digital trials entail that private user data are provisioned to the trial investigator that is considered a trusted party. The aim of this paper is to present the technical requirements and the research challenges to secure the flow and control of personal data and to protect the interests of all the involved parties during the first phases of a clinical trial, namely the characterization of the potential patients and their possible recruitment. The proposed architecture will let the individuals keep their data private during these phases while providing a useful sketch of their data to the investigator. Proof-of-concept implementations are evaluated in terms of performances achieved in real-world environments.<\/jats:p>","DOI":"10.3390\/s18124175","type":"journal-article","created":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T11:43:44Z","timestamp":1543405424000},"page":"4175","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Towards an Architecture to Guarantee Both Data Privacy and Utility in the First Phases of Digital Clinical Trials"],"prefix":"10.3390","volume":"18","author":[{"given":"Fabio","family":"Angeletti","sequence":"first","affiliation":[{"name":"Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, Sapienza University of Rome, 00185 Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8955-9270","authenticated-orcid":false,"given":"Ioannis","family":"Chatzigiannakis","sequence":"additional","affiliation":[{"name":"Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, Sapienza University of Rome, 00185 Rome, Italy"}]},{"given":"Andrea","family":"Vitaletti","sequence":"additional","affiliation":[{"name":"Department of Computer, Control, and Management Engineering \u201cAntonio Ruberti\u201d, Sapienza University of Rome, 00185 Rome, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/s00779-010-0353-1","article-title":"An internet of things\u2013based personal device for diabetes therapy management in ambient assisted living (AAL)","volume":"15","author":"Jara","year":"2011","journal-title":"Personal Ubiquit. Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1038\/nbt.2786","article-title":"Clinical development success rates for investigational drugs","volume":"32","author":"Hay","year":"2014","journal-title":"Nat. Biotechnol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.jhealeco.2016.01.012","article-title":"Innovation in the pharmaceutical industry: New estimates of R&D costs","volume":"47","author":"DiMasi","year":"2016","journal-title":"J. Health Econ."},{"key":"ref_4","unstructured":"(2018, September 01). Trends, Charts, and Maps at ClinicalTrials.gov, Available online: https:\/\/clinicaltrials.gov\/ct2\/resources\/trends."},{"key":"ref_5","unstructured":"(2018, November 01). The Center for Information and Study on Clinical Research Participation (CISCRP). Available online: https:\/\/www.ciscrp.org."},{"key":"ref_6","unstructured":"Pickard, K.T., and Swan, M. (2014, January 24\u201326). Big Desire to Share Big Health Data: A Shift in Consumer Attitudes toward Personal Health Information. Proceedings of the 2014 AAAI Spring Symposium Series, Palo Alto, CA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"977","DOI":"10.2307\/41409969","article-title":"State of the information privacy literature: Where are we now and where should we go?","volume":"35","author":"Pavlou","year":"2011","journal-title":"MIS Q."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.ijhcs.2005.04.008","article-title":"Keeping ubiquitous computing to yourself: A practical model for user control of privacy","volume":"63","author":"Price","year":"2005","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"ref_9","unstructured":"On Strategies for Responsible Sharing of Clinical Trial Data, Board on Health Sciences Policy, and Institute\u00a0of Medicine (2018, November 01). Sharing Clinical Trial Data: Maximizing Benefits, Minimizing Risk, Available online: https:\/\/www.ncbi.nlm.nih.gov\/books\/NBK285999\/."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"69cm3","DOI":"10.1126\/scitranslmed.3001857","article-title":"Power to the People: Participant Ownership of Clinical Trial Data","volume":"3","author":"Terry","year":"2011","journal-title":"Sci. Transl. Med."},{"key":"ref_11","unstructured":"(2018, November 01). My Data Is Mine Declaration. Available online: http:\/\/www.mydataismine.com\/manifest."},{"key":"ref_12","unstructured":"Smith, A. (2015, April 01). U.S. Smartphone Use in 2015. PewResearchCenter. Available online: http:\/\/www.pewinternet.org\/2015\/04\/01\/us-smartphone-use-in-2015\/."},{"key":"ref_13","unstructured":"Edney, A., and Chen, C. (2015, September 14). Big Pharma Hands Out Fitbits to Collect Better Personal Data. Bloomberg. Available online: http:\/\/www.bloomberg.com\/news\/articles\/2015-09-14\/big-pharma-hands-out-fitbits-to-collect-better-personal-data."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.chb.2015.07.025","article-title":"Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses","volume":"53","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1016\/j.ijhcs.2013.09.002","article-title":"Guide to measuring privacy concern: Review of survey and observational instruments","volume":"71","author":"Preibusch","year":"2013","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1177\/1461444807072219","article-title":"Internet privacy and institutional trust: Insights from a national survey","volume":"9","author":"Turow","year":"2007","journal-title":"New Media Soc."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1177\/1461444806069650","article-title":"The right not to be identified: Privacy and anonymity in the interactive media environment","volume":"8","author":"Woo","year":"2006","journal-title":"New Media Soc."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1016\/j.chb.2012.01.004","article-title":"Affect, cognition and reward: Predictors of privacy protection online","volume":"28","author":"Park","year":"2012","journal-title":"Comput. Hum. Behav."},{"key":"ref_19","unstructured":"Trepte, S., Dienlin, T., and Reinecke, L. (2013). Privacy, Self-Disclosure, Social Support, and Social Network Site Use, University of Hohenheim."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1111\/j.1745-6606.2009.01146.x","article-title":"Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents","volume":"43","author":"Youn","year":"2009","journal-title":"J. Consum. Aff."},{"key":"ref_21","unstructured":"Westin, A. (2007, March 02). Improving Access and Protecting Privacy. Connecting Americans to Their Health Care. Available online: http:\/\/www. phrconference.org\/conf_resources\/presentations\/dec7\/improving_access.pdf."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.dss.2010.01.010","article-title":"The Impact of Personal Dispositions on Information Sensitivity, Privacy Concern and Trust in Disclosing Health Information Online","volume":"49","author":"Bansal","year":"2010","journal-title":"Decis. Support Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"979","DOI":"10.1377\/hlthaff.25.4.979","article-title":"Using local health information to promote public health","volume":"25","author":"Luck","year":"2006","journal-title":"Health Aff."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1136\/jamia.1996.96236282","article-title":"Privacy, Confidentiality, and Electronic Medical Records","volume":"3","author":"Barrows","year":"1996","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1055\/s-0038-1635062","article-title":"Privacy: A real-world problem with fuzzy boundaries","volume":"32","author":"Lincoln","year":"1993","journal-title":"Methods Inf. Med."},{"key":"ref_26","unstructured":"Westin, A.F. (1967). Privacy and Freedom, Atheneum Press."},{"key":"ref_27","unstructured":"IAPP (2011). IAPP Information Privacy Certification, Glossary of Common Privacy Terminology, IAPP."},{"key":"ref_28","first-page":"62","article-title":"Privacy Protection and Compliance in Higher Education: The Role of the CPO","volume":"41","author":"Steinfeld","year":"2006","journal-title":"Educ. Rev."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1287\/orsc.11.1.35.12567","article-title":"Information privacy: Corporate management and national regulation","volume":"11","author":"Milberg","year":"2000","journal-title":"Organ. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"63","DOI":"10.2753\/JOA0091-3367380405","article-title":"Consumer privacy concerns and preference for degree of regulatory control","volume":"38","author":"Okazaki","year":"2009","journal-title":"J. Advert."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: Measuring individuals\u2019 concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Q."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1108\/09564230710778128","article-title":"Causes and consequences of consumer online privacy concern","volume":"18","author":"Wirtz","year":"2007","journal-title":"Int. J. Serv. Ind. Manag."},{"key":"ref_33","first-page":"10","article-title":"Information Privacy Revealed","volume":"48","author":"Lavagnino","year":"2013","journal-title":"Educ. Rev."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1055\/s-0038-1637977","article-title":"Security in medical information systems","volume":"2","author":"Bakker","year":"1993","journal-title":"Yearb. Med. Inform."},{"key":"ref_35","first-page":"29","article-title":"Clinical requirements for the security of the electronic patient record","volume":"35","author":"Bengtsson","year":"1994","journal-title":"Int. J. Bio-Med. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1001\/jama.290.2.259","article-title":"Electronic technology: A spark to revitalize primary care?","volume":"290","author":"Bodenheimer","year":"2003","journal-title":"JAMA"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1001\/jama.285.13.1767-JMS0404-5-1","article-title":"Privacy protections for cybercharts: An update on the law","volume":"285","author":"Cantor","year":"2001","journal-title":"JAMA"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1197\/jamia.M1005","article-title":"Giving patients access to their medical records via the internet: The PCASSO experience","volume":"9","author":"Masys","year":"2002","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.1377\/hlthaff.24.5.1222","article-title":"Strategic action in health information technology: Why the obvious has taken so long","volume":"24","author":"Shortliffe","year":"2005","journal-title":"Health Aff."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","article-title":"An empirical examination of the concern for information privacy instrument","volume":"13","author":"Stewart","year":"2002","journal-title":"Inf. Syst. Res."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1001\/jama.279.15.1200","article-title":"Incidence of adverse drug reactions in hospitalized patients: A meta-analysis of prospective studies","volume":"279","author":"Lazarou","year":"1998","journal-title":"JAMA"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/002224299405800201","article-title":"Determinants of long-term orientation in buyer-seller relationships","volume":"58","author":"Ganesan","year":"1994","journal-title":"J. Mark."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","article-title":"An integrative model of organizational trust","volume":"20","author":"Mayer","year":"1995","journal-title":"Acad. Manag. Rev."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1287\/isre.13.3.334.81","article-title":"Developing and validating trust measures for e-commerce: An integrative typology","volume":"13","author":"McKnight","year":"2002","journal-title":"Inf. Syst. Res."},{"key":"ref_45","unstructured":"Fukuyama, F. (1995). Trust: The Social Virtues and the Creation of Prosperity, Free Press Paperbacks. D10 301 c.1\/c.2."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1057\/ejis.2012.24","article-title":"Trust dynamics in a large system implementation: Six theoretical propositions","volume":"22","author":"Schlichter","year":"2013","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1057\/palgrave.ejis.3000590","article-title":"Privacy calculus model in e-commerce\u2014A study of Italy and the United States","volume":"15","author":"Dinev","year":"2006","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A. (1996, January 17\u201320). The right type of trust for distributed systems. Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA.","DOI":"10.1145\/304851.304877"},{"key":"ref_49","unstructured":"Union, A.C.L. (1994). Toward a New Health Care System: The Civil Liberties Issues; Technical Report, An ACLU Public Policy Report (ISBN O-914031-24-4), ACLU."},{"key":"ref_50","first-page":"515","article-title":"Smart healthcare: From IoT to cloud computing","volume":"43","author":"Ni","year":"2013","journal-title":"Sci. Sin. Inf."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1093\/jigpal\/jzq029","article-title":"Group decision making and Quality-of-Information in e-Health systems","volume":"19","author":"Lima","year":"2011","journal-title":"Logic J. IGPL"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"315","DOI":"10.4258\/hir.2015.21.4.315","article-title":"Are currently available wearable devices for activity tracking and heart rate monitoring accurate, precise, and medically beneficial?","volume":"21","author":"Nounou","year":"2015","journal-title":"Healthc. Inf. Res."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"456","DOI":"10.3109\/03091902.2013.831135","article-title":"Comparison of steps and energy expenditure assessment in adults of Fitbit Tracker and Ultra to the Actical and indirect calorimetry","volume":"37","author":"Spierer","year":"2013","journal-title":"J. Med. Eng. Technol."},{"key":"ref_54","unstructured":"Lee, J.M. (2013). Validity of Consumer-Based Physical Activity Monitors and Calibration of Smartphone for Prediction of Physical Activity Energy Expenditure. [Graduate Theses and Dissertations, Iowa State University]."},{"key":"ref_55","unstructured":"Olgu\u0131n, D.O., and Pentland, A.S. (2006, January 11\u201314). Human activity recognition: Accuracy across common locations for wearable sensors. Proceedings of the 10th IEEE International Symposium on Wearable Computers, Montreux, Switzerland."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/bs.pbr.2015.09.001","article-title":"Neuroscience of opiates for addiction medicine: From stress-responsive systems to behavior","volume":"Volume 223","author":"Zhou","year":"2016","journal-title":"Progress in Brain Research"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","article-title":"DTLS based security and two-way authentication for the Internet of Things","volume":"11","author":"Kothmayr","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_58","unstructured":"Pereira, P.P., Eliasson, J., and Delsing, J. (November, January 29). An authentication and access control framework for CoAP-based Internet of Things. Proceedings of the 40th IEEE Annual Conference on Industrial Electronics Society, Dallas, TX, USA."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., and Ylianttila, M. (2014, January 6\u20139). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey.","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"ref_60","first-page":"15-E","article-title":"A study of encryption algorithms AES, DES and RSA for security","volume":"13","author":"Mahajan","year":"2013","journal-title":"Glob. J. Comput. Sci. Technol."},{"key":"ref_61","unstructured":"Prasithsangaree, P., and Krishnamurthy, P. (2003, January 2\u20134). Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. Proceedings of the Global Telecommunications Conference, Berkeley, CA, USA."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., and Liu, J. (2012, January 23\u201325). Security in the internet of things: A review. Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, China.","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Doukas, C., Maglogiannis, I., Koufi, V., Malamateniou, F., and Vassilacopoulos, G. (2012, January 11\u201313). Enabling data protection through PKI encryption in IoT m-Health devices. Proceedings of the 12th IEEE International Conference on Bioinformatics & Bioengineering (BIBE), Larnaca, Cyprus.","DOI":"10.1109\/BIBE.2012.6399701"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","article-title":"A lightweight attribute-based encryption scheme for the Internet of Things","volume":"49","author":"Yao","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Akribopoulos, O., Chatzigiannakis, I., Tselios, C., and Antoniou, A. (2017, January 4\u20138). On the Deployment of Healthcare Applications over Fog Computing Infrastructure. Proceedings of the 41st IEEE Annual Computer Software and Applications Conference (COMPSAC 2017), Turin, Italy.","DOI":"10.1109\/COMPSAC.2017.178"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Akrivopoulos, O., Amaxilatis, D., Antoniou, A., and Chatzigiannakis, I. (2017, January 5). Design and Evaluation of a Person-Centric Heart Monitoring System over Fog Computing Infrastructure. Proceedings of the First International Workshop on Human-Centered Sensing, Networking, and Systems, Delft, The Netherlands.","DOI":"10.1145\/3144730.3144736"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Bonetto, R., Bui, N., Lakkundi, V., Olivereau, A., Serbanati, A., and Rossi, M. (2012, January 25\u201328). Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples. Proceedings of the 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, CA, USA.","DOI":"10.1109\/WoWMoM.2012.6263790"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Canetti, R., and Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/3-540-44987-6_28"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Schwabe, P., and Stoffelen, K. (2016). All the AES you need on Cortex-M3 and M4. International Conference on Selected Areas in Cryptography, Springer.","DOI":"10.1007\/978-3-319-69453-5_10"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Man, A.S., Zhang, E.S., Lau, V.K., Tsui, C.Y., and Luong, H.C. (2007, January 5\u20136). Low power VLSI design for a RFID passive tag baseband system enhanced with an AES cryptography engine. Proceedings of the 1st Annual RFID Eurasia, Istanbul, Turkey.","DOI":"10.1109\/RFIDEURASIA.2007.4368097"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"11465","DOI":"10.3390\/s150511465","article-title":"A Wearable Context-Aware ECG Monitoring System Integrated with Built-in Kinematic Sensors of the Smartphone","volume":"15","author":"Miao","year":"2015","journal-title":"Sensors"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis, I., Valchinov, E.S., Antoniou, A., Kalogeras, A.P., Alexakos, C.E., and Konstantinopoulos, P. (2015, January 6\u20139). Advanced observation and telemetry heart system utilizing wearable ECG device and a Cloud platform. Proceedings of the IEEE Symposium on Computers and Communication (ISCC 2015), Larnaca, Cyprus.","DOI":"10.1109\/ISCC.2015.7405449"},{"key":"ref_73","unstructured":"Phillips, R., McGarraugh, G., Jurik, F.A., and Underwood, R.D. (1998). Automatic Initiation of a Time Interval for Measuring Glucose Concentration in a Sample of Whole Blood. (5,843,692), U.S. Patent."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1016\/j.adhoc.2005.06.006","article-title":"A Probabilistic Forwarding Protocol for Efficient Data Propagation in Sensor Networks","volume":"4","author":"Chatzigiannakis","year":"2006","journal-title":"J. Ad Hoc Netw."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/JSAC.2013.SUP.0513005","article-title":"Interconnection framework for mHealth and remote monitoring based on the internet of things","volume":"31","author":"Jara","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1109\/90.611099","article-title":"The performance of TCP\/IP for networks with high bandwidth-delay products and random loss","volume":"5","author":"Lakshman","year":"1997","journal-title":"IEEE\/ACM Trans. Netw. (ToN)"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s11276-004-4748-7","article-title":"TCP\/IP performance over 3G wireless links with rate and delay variation","volume":"11","author":"Chan","year":"2005","journal-title":"Wirel. Netw."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Wang, R., Chen, Q., Liu, Y., and Qin, W. (2010, January 11\u201313). IoT gateway: Bridgingwireless sensor networks into internet of things. Proceedings of the IEEE\/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, China.","DOI":"10.1109\/EUC.2010.58"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Datta, S.K., Bonnet, C., and Nikaein, N. (2014, January 6\u20138). An IoT gateway centric architecture to provide novel M2M services. Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea.","DOI":"10.1109\/WF-IoT.2014.6803221"},{"key":"ref_80","unstructured":"Chen, H., Jia, X., and Li, H. (2011, January 14\u201316). A brief introduction to IoT gateway. Proceedings of the IET International Conference on Communication Technology and Application (ICCTA 2011), Beijing, China."},{"key":"ref_81","unstructured":"Shang, G., Chen, Y., Zuo, C., and Zhu, Y. (2013, January 20\u201323). Design and implementation of a smart IoT gateway. Proceedings of the IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, Beijing, China."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Akribopoulos, O., Chatzigiannakis, I., Koninis, C., and Theodoridis, E. (2010, January 6\u20138). A Web Services-oriented Architecture for Integrating Small Programmable Objects in the Web of Things. Proceedings of the 2010 Developments in E-systems Engineering, London, UK.","DOI":"10.1109\/DeSE.2010.19"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Chen, J., and Ma, H. (2014, January 10\u201314). Efficient decentralized attribute-based access control for cloud storage with user revocation. Proceedings of the IEEE International Conference on Communications (ICC), Sydney, Australia.","DOI":"10.1109\/ICC.2014.6883910"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TPDS.2013.38","article-title":"Decentralized access control with anonymous authentication of data stored in clouds","volume":"25","author":"Ruj","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1016\/j.future.2017.02.014","article-title":"Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach","volume":"78","author":"Rahmani","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis, I., Hasemann, H., Karnstedt, M., Kleine, O., Kr\u00f6ller, A., Leggieri, M., Pfisterer, D., R\u00f6mer, K., and Truong, C. (2012, January 24\u201326). True self-configuration for the IoT. Proceedings of the 3rd IEEE International Conference on the Internet of Things (IOT 2012), Wuxi, China.","DOI":"10.1109\/IOT.2012.6402298"},{"key":"ref_87","unstructured":"Chatzigiannakis, I., Kinalis, A., and Nikoletseas, S. (2005, January 4\u20136). Power conservation schemes for energy efficient data propagation in heterogeneous wireless sensor networks. Proceedings of the 38th Annual Simulation Symposium, San Diego, CA, USA."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis, I., Kinalis, A., and Nikoletseas, S. (2005, January 18\u201320). An Adaptive Power Conservation Scheme for Heterogeneous Wireless Sensor Networks with Node Redeployment. Proceedings of the Seventeenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, Las Vegas, NV, USA.","DOI":"10.1145\/1073970.1073985"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCOM.2017.1600613","article-title":"Understanding the limits of LoRaWAN","volume":"55","author":"Adelantado","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"3982646","DOI":"10.1155\/2018\/3982646","article-title":"On the Use of LoRaWAN for Indoor Industrial IoT Applications","volume":"2018","author":"Luvisotto","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Marais, J.M., Malekian, R., and Abu-Mahfouz, A.M. (2017, January 18\u201320). LoRa and LoRaWAN testbeds: A review. Proceedings of the 2017 IEEE AFRICON, Cape Town, South Africa.","DOI":"10.1109\/AFRCON.2017.8095703"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis, I., Liagkou, V., and Spirakis, P.G. (2018, January 21\u201322). Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks. Proceedings of the Cyber Security Cryptography and Machine Learning, Beer Sheva, Israel.","DOI":"10.1007\/978-3-319-94147-9_8"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Vejlgaard, B., Lauridsen, M., Nguyen, H., Kov\u00e1cs, I.Z., Mogensen, P., and Sorensen, M. (2017, January 4\u20137). Coverage and capacity analysis of sigfox, lora, gprs, and nb-iot. Proceedings of the 85th IEEE Vehicular Technology Conference (VTC Spring), Sydney, Australia.","DOI":"10.1109\/VTCSpring.2017.8108666"},{"key":"ref_94","unstructured":"Zuniga, J.C., and Ponsard, B. (2016, January 14). Sigfox system description. Proceedings of the LPWAN@ IETF97, Seoul, Korea."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Lauridsen, M., Nguyen, H., Vejlgaard, B., Kov\u00e1cs, I.Z., Mogensen, P., and Sorensen, M. (2017, January 4\u20137). Coverage Comparison of GPRS, NB-IoT, LoRa, and SigFox in a 7800 km2 Area. Proceedings of the 85th IEEE Vehicular Technology Conference (VTC Spring), Sydney, Australia.","DOI":"10.1109\/VTCSpring.2017.8108182"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/JBHI.2014.2310354","article-title":"Low-power wireless ECG acquisition and classification system for body sensor networks","volume":"19","author":"Lee","year":"2015","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_97","first-page":"6","article-title":"ATPC: Adaptive transmission power control for wireless sensor networks","volume":"12","author":"Lin","year":"2016","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"ref_98","unstructured":"Angeletti, F., Paoli, M., Colesanti, U.M., and Vitaletti, A. (2015, January 23\u201328). Wireless sensor networks in structural health monitoring: A modular approach. Proceedings of the 9th International Conference on Sensor Technologies and Applications (SENSORCOMM\u20192015), Venice, Italy."},{"key":"ref_99","first-page":"134","article-title":"A Modular Design for Wireless Structural Health Monitoring Applications","volume":"194","author":"Angeletti","year":"2015","journal-title":"Sens. Transducers"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"1939","DOI":"10.1007\/s10008-017-3610-7","article-title":"Lithium ion, lithium metal, and alternative rechargeable battery technologies: The odyssey for high energy density","volume":"21","author":"Placke","year":"2017","journal-title":"J. Solid State Electrochem."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.future.2014.08.007","article-title":"External integrity verification for outsourced big data in cloud and IoT: A big picture","volume":"49","author":"Liu","year":"2015","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Song, T., Li, R., Mei, B., Yu, J., Xing, X., and Cheng, X. (2016, January 20\u201321). A privacy preserving communication protocol for IoT applications in smart homes. Proceedings of the International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), Beijing, China.","DOI":"10.1109\/IIKI.2016.3"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., and Shieh, S. (2014, January 17\u201319). IoT security: Ongoing challenges and research opportunities. Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), Matsue, Japan.","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Ciriani, V., di Vimercati, S.D.C., Foresti, S., and Samarati, P. (2008). k-Anonymous Data Mining: A Survey. Privacy-Preserving Data Mining: Models and Algorithms, Springer.","DOI":"10.1007\/978-0-387-70992-5_5"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1197\/jamia.M2716","article-title":"Protecting Privacy Using k-Anonymity","volume":"15","author":"Dankar","year":"2008","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., and Venkitasubramaniam, M. (2007). L-diversity: Privacy Beyond K-anonymity. ACM Trans. Knowl. Discov. Data, 1.","DOI":"10.1145\/1217299.1217302"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Preneel, B., Sassone, V., and Wegener, I. (2006). Differential Privacy. Automata, Languages and Programming, Springer.","DOI":"10.1007\/11786986"},{"key":"ref_109","unstructured":"Microsoft Corporation (2018, November 01). Differential Privacy for Everyone. Available online: download.microsoft.com\/download\/D\/1\/...\/Differential_Privacy_for_Everyone.pdf."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Agrawal, M., Du, D., Duan, Z., and Li, A. (2008). Differential Privacy: A Survey of Results. Theory and Applications of Models of Computation, Springer.","DOI":"10.1007\/978-3-540-79228-4"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Lai, X., Zhou, J., and Li, H. (2011). How Much is Enough? Choosing \u03f5 for Differential Privacy. Information Security, Springer.","DOI":"10.1007\/978-3-642-24861-0"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Hsu, J., Gaboardi, M., Haeberlen, A., Khanna, S., Narayan, A., Pierce, B.C., and Roth, A. (2014, January 19\u201322). Differential Privacy: An Economic Method for Choosing Epsilon. Proceedings of the 27th IEEE Computer Security Foundations Symposium, Vienna, Austria.","DOI":"10.1109\/CSF.2014.35"},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Clifton, C., and Tassa, T. (2013, January 8\u201312). On syntactic anonymity and differential privacy. Proceedings of the 29th IEEE International Conference on Data Engineering Workshops (ICDEW), Brisbane, Australia.","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"ref_114","first-page":"35","article-title":"Practicing Differential Privacy in Health Care: A Review","volume":"6","author":"Dankar","year":"2013","journal-title":"Trans. Data Priv."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1145\/3187009.3177733","article-title":"Towards Practical Differential Privacy for SQL Queries","volume":"11","author":"Johnson","year":"2018","journal-title":"Proc. VLDB Endow."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Angeletti, F., Chatzigiannakis, I., and Vitaletti, A. (2017, January 5). Privacy preserving data management in recruiting participants for digital clinical trials. Proceedings of the First International Workshop on Human-Centered Sensing, Networking, and Systems, Delft, The Netherlands.","DOI":"10.1145\/3144730.3144733"},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Angeletti, F., Chatzigiannakis, I., and Vitaletti, A. (2017, January 21\u201323). The role of blockchain and IoT in recruiting participants for digital clinical trials. Proceedings of the 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia.","DOI":"10.23919\/SOFTCOM.2017.8115590"},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/2063176.2063198","article-title":"Flexible experimentation in wireless sensor networks","volume":"55","author":"Coulson","year":"2012","journal-title":"Commun. ACM"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.bjp.2013.12.020","article-title":"SmartSantander: IoT experimentation over a smart city testbed","volume":"61","author":"Sanchez","year":"2014","journal-title":"Comput. Netw."},{"key":"ref_120","unstructured":"(2018, November 01). Certicom Research: SEC 2\u2014Recommended Elliptic Curve Domain Parameters. Available online: http:\/\/www.secg.org\/sec2-v2.pdf."},{"key":"ref_121","unstructured":"Biswas, A.S., Bubna, A., Doss, D., and Scheffler, S. (2016). Privacy Preserving K-Means Clustering, Massachusetts Institute of Technology. Technical Report."},{"key":"ref_122","unstructured":"Samet, S., Miri, A., and Orozco-Barbosa, L. (2007). Privacy Preserving k-Means Clustering in Multi-Party Environment, SECRYPT. INSTICC Press."},{"key":"ref_123","unstructured":"Lichman, M. (2018, November 01). UCI Machine Learning Repository. Available online: https:\/\/archive.ics.uci.edu\/ml\/index.php."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.jare.2012.05.007","article-title":"QRS detection using K-Nearest Neighbor algorithm (KNN) and evaluation on standard ECG databases","volume":"4","author":"Saini","year":"2013","journal-title":"J. Adv. Res."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/51.932724","article-title":"The impact of the MIT-BIH arrhythmia database","volume":"20","author":"Moody","year":"2001","journal-title":"IEEE Eng. Med. Biol. Mag."},{"key":"ref_126","first-page":"2825","article-title":"Scikit-learn: Machine Learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref_127","first-page":"323","article-title":"Randomized controlled trial for assessment of Internet of Things system to guide intensive glucose control in diabetes outpatients: Nagoya Health Navigator Study protocol","volume":"79","author":"Onoue","year":"2017","journal-title":"Nagoya J. Med. Sci."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"2335","DOI":"10.1007\/s10586-016-0669-3","article-title":"Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices","volume":"19","author":"Han","year":"2016","journal-title":"Clust. Comput."},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"156","DOI":"10.4258\/hir.2016.22.3.156","article-title":"Medical internet of things and big data in healthcare","volume":"22","author":"Dimitrov","year":"2016","journal-title":"Healthc. Inform. Res."},{"key":"ref_130","first-page":"783","article-title":"Delivering elder-care environments utilizing TV-channel based mechanisms","volume":"9","author":"Amaxilatis","year":"2017","journal-title":"JAISE"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.smhl.2017.06.001","article-title":"A policy enforcement framework for Internet of Things applications in the smart health","volume":"3","author":"Sicari","year":"2017","journal-title":"Smart Health"},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Shae, Z., and Tsai, J.J. (2017, January 5\u20138). On the design of a blockchain platform for clinical trial and precision medicine. Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA.","DOI":"10.1109\/ICDCS.2017.61"},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"e290","DOI":"10.2196\/jmir.7071","article-title":"The use of Facebook in recruiting participants for health research purposes: A systematic review","volume":"19","author":"Whitaker","year":"2017","journal-title":"J. Med. Internet Res."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"e144","DOI":"10.2196\/jmir.4726","article-title":"Trial Promoter: A Web-Based Tool for Boosting the Promotion of Clinical Research through Social Media","volume":"18","author":"Reuter","year":"2016","journal-title":"J. Med. Internet Res."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.addbeh.2016.10.011","article-title":"Using Facebook ads with traditional paper mailings to recruit adolescent girls for a clinical trial","volume":"65","author":"Schwinn","year":"2017","journal-title":"Addict. Behav."},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Melikyan, Z.A., Greenia, D.E., Corrada, M.M., Hester, M.M., Kawas, C.H., and Grill, J.D. (2018). Recruiting the Oldest-old for Clinical Research. Alzheimer Dis. Assoc. Disord.","DOI":"10.1097\/WAD.0000000000000260"},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.cct.2015.04.002","article-title":"Clinical trial management of participant recruitment, enrollment, engagement, and retention in the SMART study using a Marketing and Information Technology (MARKIT) model","volume":"42","author":"Gupta","year":"2015","journal-title":"Contemp. Clin. Trials"},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Hiremath, S., Yang, G., and Mankodiya, K. (2014, January 3\u20135). Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare. Proceedings of the 4th EAI International Conference on Wireless Mobile Communication and Healthcare (Mobihealth), Athens, Greece.","DOI":"10.4108\/icst.mobihealth.2014.257440"},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"2297","DOI":"10.2147\/NDT.S169469","article-title":"Prescreening clinical trial volunteers using an online personality questionnaire","volume":"14","author":"Patrick","year":"2018","journal-title":"Neuropsychiatr. Dis. Treat."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Al-Majeed, S.S., Al-Mejibli, I.S., and Karam, J. (2015, January 3\u20136). Home telehealth by internet of things (IoT). Proceedings of the 28th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Halifax, NS, USA.","DOI":"10.1109\/CCECE.2015.7129344"},{"key":"ref_141","first-page":"1530","article-title":"How Advances in the Internet of Things (IoT) Devices and Wearable Technology Will Impact the Pharmaceutical Industry","volume":"4","author":"Tehrani","year":"2018","journal-title":"Res. Anal. J."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis, I., and Strikos, A. (2007, January 25\u201328). A decentralized intrusion detection system for increasing security of wireless sensor networks. Proceedings of the IEEE Conference on Emerging Technologies and Factory Automation, Patras, Greece.","DOI":"10.1109\/EFTA.2007.4416949"},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis, I., Pyrgelis, A., Spirakis, P.G., and Stamatiou, Y.C. (2011, January 17\u201322). Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. Proceedings of the 8th IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), Valencia, Spain.","DOI":"10.1109\/MASS.2011.77"},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.entcs.2006.11.007","article-title":"Design, analysis and performance evaluation of group key establishment in wireless sensor networks","volume":"171","author":"Chatzigiannakis","year":"2007","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.comcom.2016.03.014","article-title":"A privacy-preserving smart parking system using an IoT elliptic curve based security platform","volume":"89","author":"Chatzigiannakis","year":"2016","journal-title":"Comput. Commun."},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Preneel, B., and Ikonomou, D. (2014). Privacy-Preserving Computation. Privacy Technologies and Policy, Springer.","DOI":"10.1007\/978-3-642-54069-1"},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Vu, D., and Slavkovic, A. (2009, January 6). Differential Privacy for Clinical Trial Data: Preliminary Evaluations. Proceedings of the IEEE International Conference on Data Mining Workshops, Miami, FL, USA.","DOI":"10.1109\/ICDMW.2009.52"},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Kenthapadi, K., Korolova, A., Mironov, I., and Mishra, N. (arXiv, 2012). Privacy via the Johnson-Lindenstrauss Transform, arXiv.","DOI":"10.29012\/jpc.v5i1.625"},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.compbiolchem.2016.09.010","article-title":"Comparison among dimensionality reduction techniques based on Random Projection for cancer classification","volume":"65","author":"Xie","year":"2016","journal-title":"Comput. Biol. Chem."},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TKDE.2006.14","article-title":"Random projection-based multiplicative data perturbation for privacy preserving distributed data mining","volume":"18","author":"Liu","year":"2006","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/TIFS.2015.2493982","article-title":"Analysis of one-time random projections for privacy preserving compressed sensing","volume":"11","author":"Bianchi","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/12\/4175\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:33:08Z","timestamp":1760196788000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/12\/4175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,28]]},"references-count":151,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,12]]}},"alternative-id":["s18124175"],"URL":"https:\/\/doi.org\/10.3390\/s18124175","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,11,28]]}}}