{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T06:44:55Z","timestamp":1775976295000,"version":"3.50.1"},"reference-count":66,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T00:00:00Z","timestamp":1671840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The design and implementation of secure IoT platforms and software solutions represent both a required functional feature and a performance acceptance factor nowadays. This paper describes relevant cybersecurity problems considered during the proposed microservices architecture development. Service composition mechanisms and their security are affected by the underlying hardware components and networks. The overall speedup of the platforms, which are implemented using the new 5G networks, and the capabilities of new performant IoT devices may be wasted by an inadequate combination of authentication services and security mechanisms, by the architectural misplacing of the encryption services, or by the inappropriate subsystems scaling. Considering the emerging microservices platforms, the Spring Boot alternative is used to implement data generation services, IoT sensor reading services, IoT actuators control services, and authentication services, and ultimately assemble them into a secure microservices architecture. Furthermore, considering the designed architecture, relevant security aspects related to the medical and energy domains are analyzed and discussed. Based on the proposed architectural concept, it is shown that well-designed and orchestrated architectures that consider the proper security aspects and their functional influence can lead to stable and secure implementations of the end user\u2019s software platforms.<\/jats:p>","DOI":"10.3390\/s23010189","type":"journal-article","created":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T02:55:07Z","timestamp":1672109707000},"page":"189","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Relevant Cybersecurity Aspects of IoT Microservices Architectures Deployed over Next-Generation Mobile Networks"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2922-621X","authenticated-orcid":false,"given":"Constantin Lucian","family":"Aldea","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science, Transilvania University of Brasov, 500036 Bra\u0219ov, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6577-1904","authenticated-orcid":false,"given":"Razvan","family":"Bocu","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Transilvania University of Brasov, 500036 Bra\u0219ov, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7904-6727","authenticated-orcid":false,"given":"Anca","family":"Vasilescu","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Transilvania University of Brasov, 500036 Bra\u0219ov, Romania"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.infsof.2015.09.006","article-title":"Software reliability modeling based on ISO\/IEC SQuaRE","volume":"70","author":"Febrero","year":"2016","journal-title":"Inf. Softw. Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.infsof.2008.01.006","article-title":"Empirical studies of agile software development: A systematic review","volume":"50","year":"2008","journal-title":"Inf. Softw. Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1016\/j.infsof.2010.12.010","article-title":"Identifying relevant studies in software engineering","volume":"53","author":"Zhang","year":"2011","journal-title":"Inf. Softw. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.jss.2018.09.082","article-title":"The pains and gains of microservices: A systematic grey literature review","volume":"146","author":"Soldani","year":"2018","journal-title":"J. Syst. Softw."},{"key":"ref_5","unstructured":"(2022, December 06). Open Authorization (OAuth). Available online: https:\/\/oauth.net\/getting-started."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","article-title":"Internet of Things (IoT) cybersecurity research: A review of current research topics","volume":"6","author":"Lu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"e3","DOI":"10.4108\/eai.7-7-2021.170285","article-title":"The future of artificial intelligence in cybersecurity: A comprehensive survey","volume":"8","author":"Tao","year":"2021","journal-title":"EAI Endorsed Trans. Creat. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Rani, V., Kumar, M., Mittal, A., and Kumar, K. (2022). Artificial Intelligence for Cybersecurity: Recent Advancements, Challenges and Opportunities. Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, Springer.","DOI":"10.1007\/978-3-030-96737-6_4"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Champaneria, T., Jardosh, S., and Makwana, A. (2022). Microservices in IoT Middleware Architectures: Architecture, Trends, and Challenges. IoT with Smart Systems. Smart Innovation, Systems and Technologies, Springer.","DOI":"10.1007\/978-981-19-3575-6_39"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Campeanu, G. (2018, January 10\u201314). A mapping study on microservice architectures of Internet of Things and cloud computing solutions. Proceedings of the 7th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro.","DOI":"10.1109\/MECO.2018.8406008"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"e779","DOI":"10.7717\/peerj-cs.779","article-title":"Microservice security: A systematic literature review","volume":"7","author":"Berardi","year":"2022","journal-title":"PeerJ Comput. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Radoglou-Grammatikis, P., Sarigiannidis, P., Efstathopoulos, G., Karypidis, P.A., and Sarigiannidis, A. (2020, January 25\u201328). DIDEROT: An intrusion detection and prevention system for DNP3-based SCADA systems. Proceedings of the 15th International Conference on Availability, Reliability and Security, Virtual, Ireland.","DOI":"10.1145\/3407023.3409314"},{"key":"ref_13","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme, Stanford University."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Carlucci, G., De Cicco, L., and Mascolo, S. (2015, January 13\u201317). HTTP over UDP: An Experimental Investigation of QUIC. Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain.","DOI":"10.1145\/2695664.2695706"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Yan, L., Cao, S., Gong, Y., Han, H., Wei, J., Zhao, Y., and Yang, S. (2019). SatEC: A 5G satellite edge computing framework based on microservice architecture. Sensors, 19.","DOI":"10.3390\/s19040831"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"de Jesus Martins, R., Dalla-Costa, A.G., Wickboldt, J.A., and Granville, L.Z. (2020, January 2\u20136). SWEETEN: Automated Network Management Provisioning for 5G Microservices-Based Virtual Network Functions. Proceedings of the 2020 16th International Conference on Network and Service Management (CNSM), Izmir, Turkey.","DOI":"10.23919\/CNSM50824.2020.9269063"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.jnca.2019.04.019","article-title":"Recent research in cloud radio access network (C-RAN) for 5G cellular systems-A survey","volume":"139","author":"Hossain","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hsieh, C.Y., Chang, Y.W., Chen, C., and Chen, J.C. (2021, January 25\u201329). Design and implementation of a generic 5G user plane function development framework. Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, New Orleans, LA, USA.","DOI":"10.1145\/3447993.3482867"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Xinjian, O., Jingjing, L., Chaofeng, C., Zilin, Y., Xiang, L., and Shukai, H. (2021, January 13\u201316). Research on 5G Microservices Capability Open Architecture and Deterministic Bearing Technology. Proceedings of the IEEE 21st International Conference on Communication Technology (ICCT), Tianjin, China.","DOI":"10.1109\/ICCT52962.2021.9658109"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"106008","DOI":"10.1016\/j.ijepes.2020.106008","article-title":"IEC 61850 based substation automation system: A survey","volume":"120","author":"Aftab","year":"2020","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2015.05.007","article-title":"SoftAir: A software defined networking architecture for 5G wireless systems","volume":"85","author":"Akyildiz","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MVT.2018.2792198","article-title":"A 5G-Enabling Technology: Benefits, Feasibility, and Limitations of In-Band Full-Duplex mMIMO","volume":"13","author":"Xia","year":"2018","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MWC.2017.1700067","article-title":"Extracting and Exploiting Inherent Sparsity for Efficient IoT Support in 5G: Challenges and Potential Solutions","volume":"24","author":"Kal","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1109\/JIOT.2017.2726014","article-title":"A Survey of Clustering Techniques in WSNs and Consideration of the Challenges of Applying Such to 5G IoT Scenarios","volume":"4","author":"Xu","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Spyridis, Y., Lagkas, T., Sarigiannidis, P., Argyriou, V., Sarigiannidis, A., Eleftherakis, G., and Zhang, J. (2021). Towards 6G IoT: Tracing Mobile Sensor Nodes with Deep Learning Clustering in UAV Networks. Sensors, 21.","DOI":"10.3390\/s21113936"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Gholami, A., Rao, K., Hsiung, W.P., Po, O., Sankaradas, M., and Chakradhar, S. (2022). ROMA: Resource Orchestration for Microservices-based 5G Applications. arXiv.","DOI":"10.1109\/NOMS54207.2022.9789821"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Guija, D., and Siddiqui, M.S. (2018, January 27\u201330). Identity and access control for micro-services based 5G NFV platforms. Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany.","DOI":"10.1145\/3230833.3233255"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Soenen, T., Van Rossem, S., Tavernier, W., Vicens, F., Valocchi, D., Trakadas, P., Karkazis, P., Xilouris, G., Eardley, P., and Kolometsos, S. (2018, January 23\u201327). Insights from SONATA: Implementing and integrating a microservice-based NFV service platform with a DevOps methodology. Proceedings of the NOMS 2018\u20142018 IEEE\/IFIP Network Operations and Management Symposium, Taipei, Taiwan.","DOI":"10.1109\/NOMS.2018.8406139"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Orduz, J.S., Orozco, G.D., Tobar-Arteaga, C.H., and Rendon, O.M.C. (2019, January 14\u201317). Microvims: A finer-scalable architecture based on microservices. Proceedings of the IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), Osnabruck, Germany.","DOI":"10.1109\/LCNSymposium47956.2019.9000664"},{"key":"ref_30","unstructured":"Lee, G.M., Um, T.W., and Choi, J.K. (2018, January 26\u201328). AI as a microservice (AIMS) over 5G networks. Proceedings of the 2018 ITU Kaleidoscope: Machine Learning for a 5G Future (ITU K), Santa Fe, Argentina."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/IOTM.0001.2000191","article-title":"Toward blockchain for edge-of-things: A new paradigm, opportunities, and future directions","volume":"4","author":"Prabadevi","year":"2021","journal-title":"IEEE Internet Things Mag."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Gayialis, S.P., Kechagias, E., Papadopoulos, G.A., and Konstantakopoulos, G.D. (2019, January 1\u20135). Design of a blockchain-driven system for product counterfeiting restraint in the supply chain. Proceedings of the IFIP International Conference on Advances in Production Management Systems, Austin, TX, USA.","DOI":"10.1007\/978-3-030-30000-5_59"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Gayialis, S.P., Kechagias, E.P., Papadopoulos, G.A., and Panayiotou, N.A. (2022). A Business Process Reference Model for the Development of a Wine Traceability System. Sustainability, 14.","DOI":"10.3390\/su141811687"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Salhab, N., Rahim, R., and Langar, R. (May, January 29). NFV Orchestration Platform for 5G over On-the-fly provisioned Infrastructure. Proceedings of the IEEE INFOCOM 2019\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France.","DOI":"10.1109\/INFCOMW.2019.8845141"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Costache, C., Machidon, O., Mladin, A., Sandu, F., and Bocu, R. (2014, January 11\u201313). Software-defined networking of linux containers. Proceedings of the IEEE RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference, Chisinau, Moldova.","DOI":"10.1109\/RoEduNet-RENAM.2014.6955310"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MCOM.2016.7378433","article-title":"Management and orchestration challenges in network functions virtualization","volume":"54","author":"Mijumbi","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Rao, K., Coviello, G., Hsiung, W.P., and Chakradhar, S. (2021, January 10\u201313). ECO: Edge-Cloud Optimization of 5G applications. Proceedings of the IEEE\/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Melbourne, Australia.","DOI":"10.1109\/CCGrid51090.2021.00078"},{"key":"ref_38","first-page":"89","article-title":"Microservices-Based Provisioning and Control of Network Services for Heterogeneous Networks","volume":"16","author":"Nadaf","year":"2022","journal-title":"Int. J. Comput. Syst. Eng."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1109\/TNSM.2021.3076922","article-title":"Dynamic microservice allocation for virtual reality distribution with QoE support","volume":"19","author":"Alencar","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/MNET.013.2100087","article-title":"Artificial Intelligence Powered Mobile Networks: From Cognition to Decision","volume":"36","author":"Luo","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kaur, K., Guillemin, F., Rodriguez, V.Q., and Sailhan, F. (2022, January 8\u201311). Latency and network aware placement for cloud-native 5G\/6G services. Proceedings of the IEEE 19th Annual Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49033.2022.9700582"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"107216","DOI":"10.1016\/j.asoc.2021.107216","article-title":"HANSEL: Adaptive horizontal scaling of microservices using Bi-LSTM","volume":"105","author":"Yan","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"100415","DOI":"10.1016\/j.cosrev.2021.100415","article-title":"Securing microservices and microservice architectures: A systematic mapping study","volume":"41","author":"Hannousse","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Huang, Z., Friderikos, V., Dohler, M., and Aghvami, H. (2021). Granular VNF-Based Microservices: Advanced Service Decomposition and the Role of Machine Learning Techniques. Design Innovation and Network Architecture for the Future Internet, IGI Global.","DOI":"10.4018\/978-1-7998-7646-5.ch009"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MIC.2021.3056230","article-title":"AI-Driven Provisioning in the 5G Core","volume":"25","author":"Sheoran","year":"2021","journal-title":"IEEE Internet Comput."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Mateo-Forn\u00e9s, J., Pag\u00e8s-Bernaus, A., Pl\u00e0-Aragon\u00e9s, L.M., Castells-Gasia, J.P., and Babot-Gaspa, D. (2021). An Internet of Things Platform Based on Microservices and Cloud Paradigms for Livestock. Sensors, 21.","DOI":"10.3390\/s21175949"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Ying, F., Zhao, S., and Deng, H. (2022). Microservice Security Framework for IoT by Mimic Defense Mechanism. Sensors, 22.","DOI":"10.3390\/s22062418"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1:1","DOI":"10.1147\/JRD.2017.2755524","article-title":"A homomorphic encryption-based system for securely managing personal health metrics data","volume":"62","author":"Bocu","year":"2018","journal-title":"IBM J. Res. Dev."},{"key":"ref_49","first-page":"67","article-title":"FitPi: Wearable IoT solution for a daily smart life","volume":"10","author":"Pruna","year":"2020","journal-title":"Int. J. Adv. Stat. IT&C Econ. Life Sci."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Kim, S., Kim, J., Kim, M.J., Jung, W., Kim, J., Rhu, M., and Ahn, J.H. (2022, January 18\u201322). BTS: An accelerator for bootstrappable fully homomorphic encryption. Proceedings of the 49th Annual International Symposium on Computer Architecture, New York, NY, USA.","DOI":"10.1145\/3470496.3527415"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Altaha, M., and Hong, S. (2022). Anomaly Detection for SCADA System Security Based on Unsupervised Learning and Function Codes Analysis in the DNP3 Protocol. Electronics, 11.","DOI":"10.3390\/electronics11142184"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"156484","DOI":"10.1109\/ACCESS.2020.3019112","article-title":"Experimenting with digital signatures over a DNP3 protocol in a multitenant cloud-based SCADA architecture","volume":"8","author":"Marian","year":"2020","journal-title":"IEEE Access"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"384","DOI":"10.3390\/make1010022","article-title":"Encrypted DNP3 traffic classification using supervised machine learning algorithms","volume":"1","author":"Torrisi","year":"2019","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1109\/JSAC.2020.3000365","article-title":"Peekaboo: Learning-based multipath scheduling for dynamic heterogeneous environments","volume":"38","author":"Wu","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Kelli, V., Radoglou-Grammatikis, P., Sesis, A., Lagkas, T., Fountoukidis, E., Kafetzakis, E., Giannoulakis, I., and Sarigiannidis, P. (June, January 30). Attacking and Defending DNP3 ICS\/SCADA Systems. Proceedings of the 2022 18th International Conference on Distributed Computing in Sensor Systems (DCOSS), Los Angeles, CA, USA.","DOI":"10.1109\/DCOSS54816.2022.00041"},{"key":"ref_56","unstructured":"(2022, December 06). Java Development Kit 17. Available online: https:\/\/jdk.java.net\/17."},{"key":"ref_57","unstructured":"Apache Maven (2022, December 06). Software Project Management and Comprehension Tool. Available online: https:\/\/maven.apache.org."},{"key":"ref_58","unstructured":"The Community for Open Innovation and Collaboration (2022, December 06). Eclipse Foundation. Available online: https:\/\/www.eclipse.org."},{"key":"ref_59","unstructured":"Open Source Object-Relational Database System (2022, December 06). PostgreSQL. Available online: https:\/\/www.postgresql.org."},{"key":"ref_60","unstructured":"(2022, December 06). API to Generate JVM-Based Projects. Available online: https:\/\/start.spring.io."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Jones, M., Bradley, J., Sakimura, N., and JSON Web Signature (JWS) (2022, December 06). RFC 7515, May 2015. Available online: https:\/\/rfc-editor.org\/rfc\/rfc7515.txt.","DOI":"10.17487\/RFC7515"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Jarwar, M.A., Kibria, M.G., Ali, S., and Chong, I. (2018). Microservices in Web Objects Enabled IoT Environment for Enhancing Reusability. Sensors, 18.","DOI":"10.3390\/s18020352"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Inayat, U., Zia, M.F., Mahmood, S., Khalid, H.M., and Benbouzid, M. (2022). Learning-Based Methods for Cyber Attacks Detection in IoT Systems: A Survey on Methods, Analysis, and Future Prospects. Electronics, 11.","DOI":"10.3390\/electronics11091502"},{"key":"ref_64","unstructured":"(2022, December 06). Smart Metering. Available online: https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/Smart-metering\/smart-metering_node.html."},{"key":"ref_65","unstructured":"Federal Statistical Office of Germany (2022, December 06). Press Release No. 455 of 27 October 2022. Available online: https:\/\/www.destatis.de\/EN\/Press\/2022\/10\/PE22_455_63.html."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Inayat, U., Zia, M.F., Mahmood, S., Berghout, T., and Benbouzid, M. (2022). Cybersecurity Enhancement of Smart Grid: Attacks, Methods, and Prospects. Electronics, 11.","DOI":"10.3390\/electronics11233854"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/1\/189\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:50:11Z","timestamp":1760147411000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/1\/189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,24]]},"references-count":66,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["s23010189"],"URL":"https:\/\/doi.org\/10.3390\/s23010189","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,24]]}}}