{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:55:00Z","timestamp":1770288900595,"version":"3.49.0"},"reference-count":66,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T00:00:00Z","timestamp":1603929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["RGP-1437-35"],"award-info":[{"award-number":["RGP-1437-35"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback of asymmetric cryptography is the sizeable computation and space requirements. However, elliptic curve cryptography (ECC) is widely used in constrained environments for asymmetric cryptography due its superiority in generating a powerful encryption mechanism with small key sizes. ECC increases device performance and lowers power consumption, meaning it is suitable for diverse applications ranging from the IoT to wireless sensor network (WSN) devices. To ensure the confidentiality and security of data and communications, it is necessary to implement ECC robustly. A special area of focus in this regard is the mapping phase. This study\u2019s objective was to propose a tested and trusted scheme that offers authenticated encryption (AE) via enhancing the mapping phase of a plain text to an elliptic curve to resist several encryption attacks such as Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA). The proposed scheme also undertakes evaluation and analysis related to security requirements for specific encryption attributes. Finally, results from a comparison of the proposed scheme and other schemes are presented, evaluating each one\u2019s security characteristics and performance measurements. Our scheme is efficient in a way that makes so suitable to the IoT, and in particular to the Industrial IoT and the new Urbanization where the demands for services are huge.<\/jats:p>","DOI":"10.3390\/s20216158","type":"journal-article","created":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T21:21:00Z","timestamp":1604006460000},"page":"6158","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4556-1392","authenticated-orcid":false,"given":"Hisham","family":"AlMajed","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8253-9709","authenticated-orcid":false,"given":"Ahmad","family":"AlMogren","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Labrado, C., Thapliyal, H., Prowell, S., and Kuruganti, T. (2019). Use of thermistor temperature sensors for cyber-physical system security. Sensors, 19.","DOI":"10.3390\/s19183905"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Abdullah, A., Kaur, H., and Biswas, R. (2020). Universal Layers of IoT Architecture and Its Security Analysis. New Paradigm in Decision Science and Management, Springer.","DOI":"10.1007\/978-981-13-9330-3_30"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ram, R.S., Kumar, M.V., Ramamoorthy, S., Balaji, B.S., and Kumar, T.R. (2020). An Efficient Hybrid Computing Environment to Develop a Confidential and Authenticated IoT Service Model. Wireless Personal Communications, Springer.","DOI":"10.1007\/s11277-020-07056-0"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Pasupuleti, S.K., and Varma, D. (2020). Lightweight ciphertext-policy attribute-based encryption scheme for data privacy and security in cloud-assisted IoT. Real-Time Data Analytics for Large Scale Sensor Data, Elsevier.","DOI":"10.1016\/B978-0-12-818014-3.00005-X"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Vishnoi, P., Shimi, S., and Kumar, A. (2020). Symmetric Cryptography and Hardware Chip Implementation on FPGA. Intelligent Communication, Control and Devices, Springer.","DOI":"10.1007\/978-981-13-8618-3_99"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., and Samaddar, S.G. (2020). A robust lightweight ECC-based three-way authentication scheme for IoT in cloud. Smart Computing Paradigms: New Progresses and Challenges, Springer.","DOI":"10.1007\/978-981-13-9680-9_7"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Moghadam, M.F., Mohajerzdeh, A., Karimipour, H., Chitsaz, H., Karimi, R., and Molavi, B. (2020). A privacy protection key agreement protocol based on ECC for smart grid. Handbook of Big Data Privacy, Springer.","DOI":"10.1007\/978-3-030-38557-6_4"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yuen, K.K.F. (2019, January 11\u201313). Towards a Cybersecurity Investment Assessment method using Primitive Cognitive Network Process. Proceedings of the 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Okinawa, Japan.","DOI":"10.1109\/ICAIIC.2019.8668842"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Biswas, C., Gupta, U.D., and Haque, M.M. (2019, January 7\u20139). An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography. Proceedings of the 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox\u2019sBazar, Bangladesh.","DOI":"10.1109\/ECACE.2019.8679136"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MCOM.2018.1701047","article-title":"Lightweight Security Architecture Based on Embedded Virtualization and Trust Mechanisms for IoT Edge Devices","volume":"57","author":"Tiburski","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.optlaseng.2018.12.010","article-title":"An optical asymmetric encryption scheme with biometric keys","volume":"116","author":"Verma","year":"2019","journal-title":"Opt. Lasers Eng."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Paar, C., and Pelzl, J. (2009). Understanding Cryptography: A Textbook for Students and Practitioners, Springer Science & Business Media.","DOI":"10.1007\/978-3-642-04101-3"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"51039","DOI":"10.1109\/ACCESS.2019.2909557","article-title":"A Resilient Smart Body Sensor Network Through Pyramid Interconnection","volume":"7","author":"Almajed","year":"2019","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/TIFS.2017.2749982","article-title":"Low-cost security of iot sensor nodes with rakeness-based compressed sensing: Statistical and known-plaintext attacks","volume":"13","author":"Mangia","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.optlaseng.2016.03.015","article-title":"Security enhancement of the phase-shifting interferometry-based cryptosystem by independent random phase modulation in each exposure","volume":"89","author":"Liao","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_16","first-page":"111","article-title":"Semi-Order Preserving Encryption Technique for Numeric Database","volume":"9","author":"Ahmed","year":"2019","journal-title":"Int. J. Netw. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Davoli, L., Veltri, L., Ferrari, G., and Amadei, U. (2019). Internet of Things on Power Line Communications: An Experimental Performance Analysis. Smart Grids and Their Communication Systems, Springer.","DOI":"10.1007\/978-981-13-1768-2_13"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Debnath, S., Nunsanga, M.V., and Bhuyan, B. (2019). Study and Scope of Signcryption for Cloud Data Access Control. Advances in Computer, Communication and Control, Springer.","DOI":"10.1007\/978-981-13-3122-0_12"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"AlMajed, H.N., and AlMogren, A.S. (2019). Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks. Sensors, 19.","DOI":"10.3390\/s19081909"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Yin, Y., Wu, L., Peng, Q., and Zhang, X. (2018, January 9\u201311). A Novel SPA on ECC with Modular Subtraction. Proceedings of the 2018 12th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), Xiamen, China.","DOI":"10.1109\/ICASID.2018.8693138"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/s11128-018-2023-6","article-title":"Computational problems in supersingular elliptic curve isogenies","volume":"17","author":"Galbraith","year":"2018","journal-title":"Quantum Inf. Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/s13389-019-00211-9","article-title":"Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs","volume":"9","author":"Wu","year":"2019","journal-title":"J. Cryptogr. Eng."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1109\/TCSI.2018.2883557","article-title":"Low-Latency Double Point Multiplication Architecture Using Differential Addition Chain Over GF (2m)","volume":"66","author":"Shahroodi","year":"2019","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Mrabet, A., El-Mrabet, N., Lashermes, R., Rigaud, J.B., Bouallegue, B., Mesnager, S., and Machhout, M. (2016). High-performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication. International Conference on Risks and Security of Internet and Systems, Springer.","DOI":"10.1007\/978-3-319-54876-0_15"},{"key":"ref_26","first-page":"11","article-title":"Secure Method for Text Encryption using Elliptic Curve Cryptography","volume":"3","author":"Ganesh","year":"2018","journal-title":"Int. J."},{"key":"ref_27","unstructured":"Mahto, D. (2018). Data Communication Security Modeling Using Elliptic Curve Cryptography and Biometrics. [Ph.D. Thesis, Nit Jamshedpur]."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Kumar, R. (2018). Cryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers. Knowledge Computing and Its Applications, Springer.","DOI":"10.1007\/978-981-10-6680-1_10"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TIFS.2018.2856123","article-title":"IoT-NUMS: Evaluating NUMS elliptic curve cryptography for IoT platforms","volume":"14","author":"Liu","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Shah, D.P., and Shah, P.G. (April, January 6). Revisting of elliptical curve cryptography for securing Internet of Things (IOT). Proceedings of the 2018 Advances in Science and Engineering Technology International Conferences (ASET), Abu Dhabi, UAE.","DOI":"10.1109\/ICASET.2018.8376830"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.micpro.2018.07.003","article-title":"Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures","volume":"64","author":"Fournaris","year":"2019","journal-title":"Microprocess. Microsyst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1007\/s12652-018-0716-4","article-title":"A Privacy Preserving three-factor authenticated key agreement protocol for client\u2013server environment","volume":"10","author":"Reddy","year":"2019","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"106","DOI":"10.23851\/mjs.v29i2.438","article-title":"Elliptic Curve Video Encryption in Mobile Phone Based on Multi-Keys and Chaotic Map","volume":"29","author":"AlSaad","year":"2018","journal-title":"Al-Mustansiriyah J. Sci."},{"key":"ref_34","first-page":"1","article-title":"Implementation of Digital Signature Algorithm by using Elliptical Curve p-192","volume":"1","author":"Shah","year":"2019","journal-title":"Aust. J. Wirel. Technol. Mobil. Secur."},{"key":"ref_35","first-page":"122","article-title":"Security Improvement in Elliptic Curve Cryptography","volume":"9","author":"Abdullah","year":"2018","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Hu, X., Zheng, X., Zhang, S., Li, W., Cai, S., and Xiong, X. (2019). A High-Performance Elliptic Curve Cryptographic Processor of SM2 over GF (p). Electronics, 8.","DOI":"10.3390\/electronics8040431"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"7","DOI":"10.18576\/isl\/070102","article-title":"Text message encoding based on elliptic curve cryptography and a mapping methodology","volume":"7","author":"Reyad","year":"2018","journal-title":"Inf. Sci. Lett."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Kanchan, S., and Chaudhari, N.S. (2019). Signcrypting the Group Signature with Non-transitive Proxy Re-encryption in VANET. Recent Findings in Intelligent Computing Techniques, Springer.","DOI":"10.1007\/978-981-10-8639-7_2"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Chen, F.L., Wang, Z.H., and Hu, Y.M. (2019). A New Quantum Blind Signature Scheme with BB84-State. Entropy, 21.","DOI":"10.3390\/e21040336"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Li, Z., Hu, F., and Li, F. (2019). Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption. Information Technology and Applied Mathematics, Springer.","DOI":"10.1007\/978-981-10-7590-2_1"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/s12652-019-01289-z","article-title":"A trust model based batch verification of digital signatures in IoT","volume":"11","author":"Kittur","year":"2019","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2469","DOI":"10.1007\/s10623-019-00633-w","article-title":"A probabilistic analysis on a lattice attack against DSA","volume":"87","author":"Gomez","year":"2019","journal-title":"Des. Codes Cryptogr."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1007\/s10766-018-0610-x","article-title":"Memory Tampering Attack on Binary GCD Based Inversion Algorithms","volume":"47","author":"Aldaya","year":"2018","journal-title":"Int. J. Parallel Program."},{"key":"ref_44","unstructured":"Zuccherato, R. (2000). Elliptic Curve Cryptography Support in Entrust, Entrust Ltd."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Tyagi, M., Manoria, M., and Mishra, B. (2019). A Framework for Data Storage Security with Efficient Computing in Cloud. International Conference on Advanced Computing Networking and Informatics, Springer.","DOI":"10.1007\/978-981-13-2673-8_13"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Louw, J., Niezen, G., Ramotsoela, T., and Abu-Mahfouz, A.M. (2016, January 19\u201321). A key distribution scheme using elliptic curve cryptography in wireless sensor networks. Proceedings of the 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), Poitiers, France.","DOI":"10.1109\/INDIN.2016.7819342"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Kanda, G., Antwi, A.O., and Ryoo, K. (2018). Hardware Architecture Design of AES Cryptosystem with 163-Bit Elliptic Curve. Advanced Multimedia and Ubiquitous Engineering, Springer.","DOI":"10.1007\/978-981-13-1328-8_55"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/3284554","article-title":"Fog-based Secure Communications for Low-power IoT Devices","volume":"19","author":"Ferretti","year":"2019","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"ref_49","first-page":"151","article-title":"Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve Cryptography","volume":"1333","author":"Albalas","year":"2018","journal-title":"Power"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Khan, S., and Khan, R. (2018). Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids. Energies, 11.","DOI":"10.3390\/en11040759"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.micpro.2018.05.005","article-title":"Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level","volume":"62","author":"Ay","year":"2018","journal-title":"Microprocess. Microsyst."},{"key":"ref_52","first-page":"343","article-title":"Fast elliptic curve scalar multiplication for resisting against SPA","volume":"17","author":"Liu","year":"2018","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Ezzouak, S., and Azizi, A. (2018). On the Efficiency of Scalar Multiplication on the Elliptic Curves. International Conference Europe Middle East & North Africa Information Systems and Technologies to Support Learning, Springer.","DOI":"10.1007\/978-3-030-03577-8_44"},{"key":"ref_54","first-page":"290","article-title":"A New Modification for Menezes-Vanstone Elliptic Curve Cryptosystem","volume":"85","author":"Dawahdeh","year":"2016","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Das, P., and Giri, C. (2018, January 14\u201315). An Efficient Method for text Encryption using Elliptic Curve Cryptography. Proceedings of the 2018 IEEE 8th International Advance Computing Conference (IACC), Greater Noida, India.","DOI":"10.1109\/IADCC.2018.8692087"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Keerthi, K., and Surendiran, B. (2017, January 20\u201321). Elliptic curve cryptography for secured text encryption. Proceedings of the 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Kollam, India.","DOI":"10.1109\/ICCPCT.2017.8074210"},{"key":"ref_57","first-page":"1904","article-title":"Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz\u2019s method","volume":"2","author":"Bh","year":"2010","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_58","first-page":"54","article-title":"Fast mapping method based on matrix approach for elliptic curve cryptography","volume":"1","author":"Amounas","year":"2012","journal-title":"Int. J. Inf. Netw. Secur. (IJINS)"},{"key":"ref_59","unstructured":"Muthukuru, J., and Sathyanarayana, B. (2012). Fixed and Variable Size Text Based Message Mapping Technique Using ECC. Glob. J. Comput. Sci. Technol., Available online: https:\/\/computerresearch.org\/index.php\/computer\/article\/view\/448."},{"key":"ref_60","first-page":"7","article-title":"DNA Encoded Elliptic Curve Cryptography System for IoT Security","volume":"2","author":"Barman","year":"2019","journal-title":"Int. J. Comput. Intell."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Duarah, D., and Uma, V. (2019). Securing IoT Using Machine Learning and Elliptic Curve Cryptography. International Conference on Emerging Current Trends in Computing and Expert Technology, Springer.","DOI":"10.1007\/978-3-030-32150-5_46"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Joglekar, J., Bhutani, S., Patel, N., and Soman, P. (2019). Lightweight Elliptical Curve Cryptography (ECC) for Data Integrity and User Authentication in Smart Transportation IoT System. International Conference on Sustainable Communication Networks and Application, Springer.","DOI":"10.1007\/978-3-030-34515-0_28"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"175865","DOI":"10.1109\/ACCESS.2019.2957943","article-title":"SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography","volume":"7","author":"Almajed","year":"2019","journal-title":"IEEE Access"},{"key":"ref_64","first-page":"169","article-title":"Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF (2n)","volume":"8","author":"King","year":"2009","journal-title":"IJ Netw. Secur."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2140\/obs.2019.2.293","article-title":"Faster integer multiplication using short lattice vectors","volume":"2","author":"Harvey","year":"2019","journal-title":"Open Book Ser."},{"key":"ref_66","unstructured":"Bazlur Rahman, A.N.M. (2020, October 15). We Don\u2019t Need StringBuilder for Simple Concatenation\u2014DZone Java. Available online: https:\/\/dzone.com\/articles\/string-concatenation-performacne-improvement-in-ja."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6158\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:26:15Z","timestamp":1760178375000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,29]]},"references-count":66,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["s20216158"],"URL":"https:\/\/doi.org\/10.3390\/s20216158","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,29]]}}}