{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T05:17:09Z","timestamp":1719033429557},"reference-count":74,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2016,1,6]],"date-time":"2016-01-06T00:00:00Z","timestamp":1452038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA\/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.<\/jats:p>","DOI":"10.3390\/s16010037","type":"journal-article","created":{"date-parts":[[2016,1,6]],"date-time":"2016-01-06T15:05:59Z","timestamp":1452092759000},"page":"37","source":"Crossref","is-referenced-by-count":4,"title":["Design and Development of Layered Security: Future Enhancements and Directions in Transmission"],"prefix":"10.3390","volume":"16","author":[{"given":"Aamir","family":"Shahzad","sequence":"first","affiliation":[{"name":"Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea"}]},{"given":"Malrey","family":"Lee","sequence":"additional","affiliation":[{"name":"Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea"}]},{"given":"Suntae","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Chon Buk National University, 664-14, 1Ga, Deokjin-Dong, Jeonju, Chonbuk 561-756, Korea"}]},{"given":"Kangmin","family":"Kim","sequence":"additional","affiliation":[{"name":"Division of Biotechnology, College of Environmental & Bioresource Sciences, Chonbuk National University, Iksan 570-752, Korea"}]},{"given":"Jae-Young","family":"Choi","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Korea"}]},{"given":"Younghwa","family":"Cho","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Korea"}]},{"given":"Keun-Kwang","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Beauty Arts Care, Koguryeo College, Naju 520-930, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2016,1,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1002\/sec.698","article-title":"SCADA communication and security issues","volume":"7","author":"Gao","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_2","unstructured":"(2004). National Communications System, Supervisory Control and Data Acquisition (SCADA) Systems. Technical Information Bulletin 04-1."},{"key":"ref_3","unstructured":"Stouffer, J., and Kent, K. (2006). Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, NIST. Recommendations of the National Institute of Standards and Technology."},{"key":"ref_4","unstructured":"Juniper Networks (2010). Architecture for Secure SCADA and Distributed Control System Networks, Juniper Networks, Inc. White Paper."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Musa, S., Shahzad, A., and Aborujilah, A. (2013, January 17\u201319). Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security. Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, Kota Kinabalu, Malaysia.","DOI":"10.1145\/2448556.2448588"},{"key":"ref_6","unstructured":"Nasim, B.M., Jelena, M., Vojislav, B.M., and Hamzeh, K. (2012). A framework for intrusion detection system in advanced metering infrastructure. Secur. Commun. Netw., 7."},{"key":"ref_7","unstructured":"Shahzad, A., Malrey, L., Changhoon, L., Naixue, X., Suntae, K., Young, L., Kangmin, K., Seon, W., and Gisung, J. (2015). The protocol design and New approach for SCADA security enhancement during sensors broadcasting system. Multimedia Tools and Applications, 1\u201328."},{"key":"ref_8","unstructured":"DNP Users Group DNP3 Application Layer Specification, DNP Organization. Version 2.00.2005."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Clarke, G., Reynders, D., and Wright, E. (2004). Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems, Elsevier.","DOI":"10.1016\/B978-075065799-0\/50019-X"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Zhu, B., Joseph, A., and Sastry, S. (2011, January 19). A Taxonomy of Cyber Attacks on SCADA Systems. Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, Washington, DC, USA.","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Hong, S., and Lee, M. (2010, January 11\u201314). Challenges and Direction toward Secure Communication in the SCADA System. Proceedings of the 8th Annual Communication Networks and Services Research Conference, Montreal, QC, Canada.","DOI":"10.1109\/CNSR.2010.52"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Badra, M., and Zeadally, S. (2014). Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy. IEEE Trans. Inf. Forensics Secur., 9.","DOI":"10.1109\/TIFS.2013.2296441"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"4837","DOI":"10.3390\/s150304837","article-title":"The Past, Present and Future of Cyber-Physical Systems: A Focus on Models","volume":"15","author":"Lee","year":"2015","journal-title":"Sensors"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Patel, S.C., Bhatt, G.D., and Graham, J.H. (2009). Improving the cyber security of SCADA communication networks. Commun. ACM, 52.","DOI":"10.1145\/1538788.1538820"},{"key":"ref_15","unstructured":"Patel, S.C., and Graham, J.H. (2006). Secure Internet-Based Communication Protocol for Scada Networks, University of Louisville."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"7172","DOI":"10.3390\/s150407172","article-title":"Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring","volume":"15","author":"Ali","year":"2015","journal-title":"Sensors"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"997","DOI":"10.3390\/sym6040997","article-title":"MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats","volume":"6","author":"Moon","year":"2014","journal-title":"Symmetry"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.3390\/sym6041011","article-title":"Privacy-Enhancing Security Protocol in LTE Initial Attack","volume":"6","author":"Jang","year":"2014","journal-title":"Symmetry"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Davis, C.M., Tate, J.E., Okhravi, H., Grier, C., Overbye, T.J., and Nicol, D. (2006, January 17\u201319). SCADA Cyber Security Testbed Development. Proceedings of the 38th North American Power Symposium, NAPS 2006, Carbondale, IL, USA.","DOI":"10.1109\/NAPS.2006.359615"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"4134","DOI":"10.3390\/s150204134","article-title":"Efficient Evaluation of Wireless Real-Time Control Networks","volume":"15","author":"Horvath","year":"2015","journal-title":"Sensors"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C., and Zhao, Y. (2014). Privacy-Preserving Authenticated Key-Exchange over Internet. IEEE Trans. Inf. Forensics Secur., 9.","DOI":"10.1109\/TIFS.2013.2293457"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zio, E., and Sansavini, G. (2013). Vulnerability of Smart Grids with Variable Generation and Consumption: A System of Systems Perspective. IEEE Trans. Syst. Man Cybern. Syst., 43.","DOI":"10.1109\/TSMCA.2012.2207106"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Kang, D.-J., and Kim, H.-M. (2009, January 18\u201322). Development of test-bed and security devices for SCADA communication in electric power system. Proceedings of the 31st International Telecommunications Energy Conference, INTELEC 2009, Incoeon, Korea.","DOI":"10.1109\/INTLEC.2009.5351774"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"10974","DOI":"10.5897\/AJBM12.229","article-title":"Hiding solution for internet-based supervisory control and data acquisition (SCADA) system threats management","volume":"6","author":"Kim","year":"2012","journal-title":"Afr. J. Bus. Manag."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Kang, D.-J., and Kim, H.-M. (2007). A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network. Future Gen. Commun. Netw. (FGCN 2007), 2.","DOI":"10.1109\/FGCN.2007.36"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Backes, M., and Pfitzmann, B. (2004). A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol. IEEE J. Sel. Areas Commun., 22.","DOI":"10.1109\/JSAC.2004.836016"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Almalawi, A., Tari, Z., Khalil, I., and Fahad, A. (2013, January 21\u201324). SCADAVT-A framework for SCADA security testbed based on virtualization technology. Proceedings of the 2013 IEEE 38th Conference on Local Computer Networks (LCN), Sydney, NSW, Australia.","DOI":"10.1109\/LCN.2013.6761301"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/978-3-642-28920-0_7","article-title":"Security Aspects of SCADA and DCS Environments","volume":"Volume 7130","author":"Alcaraz","year":"2012","journal-title":"Critical Infrastructure Protection"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2006","DOI":"10.3844\/jcssp.2014.2006.2019","article-title":"The security survey and anaylsis on supervisory control and data acquisition communication","volume":"10","author":"Shahzad","year":"2014","journal-title":"J. Comput. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Lim, I.H., Hong, S., Choi, M.S., Lee, S.J., Lee, S.W., and Ha, B.N. (2008, January 21\u201324). Applying security algorithms against cyber attacks in the distribution automation system. Proceedings of the Transmission and Distribution Conference and Exposition, Chicago, IL, USA.","DOI":"10.1109\/TDC.2008.4517289"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Laih, C.S., Ding, L., and Huang, Y.M. (2005). Password-only authenticated key establishment protocol without public key cryptography. Electron. Lett., 41.","DOI":"10.1049\/el:20057114"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Queiroz, C., Mahmood, A., Hu, J., Tari, Z., and Yu, X. (2009, January 19\u201321). Building a SCADA Security Testbed. Proceedings of the Third International Conference on Network and System Security, NSS\u201909, Gold Coast, QLD, Australia.","DOI":"10.1109\/NSS.2009.82"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Eskicioglu, A.M., and Delp, E.J. (2002). A key transport protocol based on secret sharing applications to information security. IEEE Trans. Consum. Electron., 48.","DOI":"10.1109\/TCE.2003.1196407"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Drahansky, M., and Balitanas, M. (2011). Cipher for Internet-based Supervisory Control and Data Acquisition Architecture. J. Secur. Eng., 8.","DOI":"10.1007\/978-3-642-23141-4_20"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1109\/TIFS.2014.2378592","article-title":"Efficient Public Key Encryption with Equality Test Supporting Flexible Authorization","volume":"10","author":"Ma","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"269","DOI":"10.3390\/sym7010269","article-title":"Study on User Authority Management for Safe Data Protection in Cloud Computing Environments","volume":"7","author":"Kim","year":"2015","journal-title":"Symmetry"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3390\/sym7010105","article-title":"Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting","volume":"7","author":"Nam","year":"2015","journal-title":"Symmetry"},{"key":"ref_38","unstructured":"Shbib, R., Zhou, S., and Alkadhimi, K. (2013). Pervasive Computing and the Networked World, Springer."},{"key":"ref_39","unstructured":"Wang, Y. (2012). World Scientific Review, University of North Carolina."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Robles, R.-J., and Balitanas, M. (2011, January 13\u201315). Comparison of Encryption Schemes as Used in Communication between SCADA Components. Proceedings of the Ubiquitous Computing and Multimedia Applications (UCMA), Daejeon, Korea.","DOI":"10.1109\/UCMA.2011.33"},{"key":"ref_41","unstructured":"Faruk, A. (2008). Testing & Exploring Vulnerabilities of the Applications Implementing DNP3 Protocol. [Master Thesis, KTH]."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-0-387-75462-8_12","article-title":"Intrusion detection and event monitoring in SCADA networks","volume":"Volume 253","author":"Goetz","year":"2007","journal-title":"Critical Infrastructure Protection"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"4269","DOI":"10.1016\/j.comcom.2008.05.043","article-title":"A unified security framework with three key management schemes for wireless sensor networks","volume":"31","author":"Riaz","year":"2008","journal-title":"Comput. Commun."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Kim, S.-J., Cho, D.-E., and Yeo, S.-S. (2014). Secure Model against APT in m-Connected SCADA Network. Int. J. Distrib. Sens. Netw., 2014.","DOI":"10.1155\/2014\/594652"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Nabil, S., and Mohamed, B. (2012, January 24\u201326). Security solution for semantic SCADA optimized by ECC mixed coordinates. Proceedings of the 2012 International Conference on Information Technology and e-Services (ICITeS), Sousse, Tunisia.","DOI":"10.1109\/ICITeS.2012.6216629"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Udagepola, K.P., Lee, Y.-K., Park, S., and Lee, M. (2015). The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission. Int. J. Distrib. Sens. Netw.","DOI":"10.1155\/2015\/738687"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Chikuni, E., and Dondo, M. (2007, January 26\u201328). Investigating the security of electrical power systems SCADA. Proceedings of the AFRICON 2007, Windhoek, South Africa.","DOI":"10.1109\/AFRCON.2007.4401531"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Yeh, H.-T., Sun, H.-M., and Hwang, T. (2001). Security analysis of the generalized key agreement and password authentication protocol. IEEE Commun. Lett., 5.","DOI":"10.1109\/4234.966034"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Irshad, A., Sher, M., and Faisal, M.S. (2014). A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur. Commun. Netw.","DOI":"10.1002\/sec.834"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1109\/JCN.2012.00026","article-title":"Device authentication protocol for smart grid systems using homomorphic hash","volume":"14","author":"Kim","year":"2012","journal-title":"J. Commun. Netw."},{"key":"ref_51","first-page":"56","article-title":"Public Key Cryptography Based Approach for Securing SCADA Communications","volume":"142","author":"Saxena","year":"2011","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"2487","DOI":"10.3923\/jas.2014.2487.2497","article-title":"Deployment of New Dynamic Cryptography Buffer for SCADA Security Enhancement","volume":"14","author":"Shahzad","year":"2014","journal-title":"J. Appl. Sci."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Sommestad, T., Ericsson, G.N., and Nordlander, J. (2010, January 25\u201329). SCADA system cyber security\u2014A comparison of standards. Proceedings of the 2010 IEEE Power and Energy Society General Meeting, Minneapolis, MN, USA.","DOI":"10.1109\/PES.2010.5590215"},{"key":"ref_54","first-page":"313","article-title":"Burst-Based Anomaly Detection on the DNP3 Protocol","volume":"6","author":"Yun","year":"2013","journal-title":"Int. J. Control Autom."},{"key":"ref_55","unstructured":"Jin, D., Nicol, D.M., and Yan, G. (2011, January 11\u201314). An event buffer flooding attack in DNP3 controlled SCADA systems. Proceedings of the Winter Simulation Conference (WSC\u201811), Phoenix, AZ, USA."},{"key":"ref_56","unstructured":"Lee, D., Kim, H., Kim, K., and Yoo, P.D. (2011, January 21\u201324). Simulated Attack on DNP3 Protocol in SCADA System. Proceedings of the 31st Symposium on Cryptography and Information Security Kagoshima, Kagoshima, Japan."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"East, S., Butts, J., Papa, M., and Shenoi, S. (2009). A Taxonomy of Attacks on the DNP3 Protocol, Springer Berlin Heidelberg. Critical Infrastructure Protection III.","DOI":"10.1007\/978-3-642-04798-5_5"},{"key":"ref_58","unstructured":"DNP Users Group (2013). DNP3 Specification, Secure Authentication, DNP Organization. Version 5 Overview."},{"key":"ref_59","unstructured":"Majdalawieh, M., Parisi-Presicce, F., and Wijesekera, D. (2006). Advances in Computer, Information, and Systems Sciences, and Engineering, Springer."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Palmer, C., and Shenoi, S. (2009, January 23\u201325). Critical Infrastructure Protection III. Proceedings of the Third IFIP WG 11.10 International Conference, Hanover, NH, USA.","DOI":"10.1007\/978-3-642-04798-5"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Lee, M., Lee, Y.K., Kim, S., Xiong, N., Choi, J.Y., and Cho, Y. (2015). Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information. Symmetry, 7.","DOI":"10.3390\/sym7031176"},{"key":"ref_62","unstructured":"Pinkas, B., and Sander, T. Securing Passwords Against Dictionary Attacks. Available online: http:\/\/www.pinkas.net\/PAPERS\/pwdweb.pdf."},{"key":"ref_63","unstructured":"An Ettercap Primer. Available online: http:\/\/www.sans.org\/reading-room\/whitepapers\/tools\/ettercap-primer-1406."},{"key":"ref_64","unstructured":"Ethereal. Available online: http:\/\/www.engr.siu.edu\/~weng\/ece553\/wireshark-tutorial.pdf."},{"key":"ref_65","unstructured":"Aircrack. Available online: http:\/\/www.aircrack-ng.org\/doku.php?id=cracking_wpa."},{"key":"ref_66","unstructured":"Air Snort. Available online: http:\/\/www.scribd.com\/doc\/50711790\/airsnort-tutorial#scribd."},{"key":"ref_67","unstructured":"Packet Sniffer. Available online: https:\/\/www.mikrotik.com\/testdocs\/ros\/2.9\/tools\/sniffer.pdf."},{"key":"ref_68","unstructured":"Dniffer. Available online: http:\/\/www.giac.org\/paper\/gsec\/810\/introduction-dsniff\/101714."},{"key":"ref_69","unstructured":"Airpwn. Available online: http:\/\/airpwn.sourceforge.net\/Documentation.html."},{"key":"ref_70","unstructured":"File2air. Available online: http:\/\/www.willhackforsushi.com\/?page_id=126."},{"key":"ref_71","unstructured":"Son, S., McKinley, K.S., and Shmatikov, V. Diglossia: Detecting Code Injection Attackswith Precision and Efficiency. Available online: https:\/\/www.cs.utexas.edu\/~shmat\/shmat_ccs13.pdf."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Da Silva Pereira, C.C., Shinoda, A.A., de Oliveira, R., do Nascimento, V.E., and Ferreira, E.W.T. (2014, January 4\u20136). A NS-2 simulation model for DNP3 protocol over IEEE 802.15.4 wireless protocol toward low cost simulation of Smart Grid applications. Proceedings of the 2014 IEEE Colombian Conference on Communications and Computing (COLCOM), Bogota, Columbia.","DOI":"10.1109\/ColComCon.2014.6860433"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14257\/ijsh.2013.7.5.01","article-title":"Wireless Communications for SCADA Systems Utilizing Mobile Nodes","volume":"7","author":"Choi","year":"2013","journal-title":"Int. J. Smart Home"},{"key":"ref_74","unstructured":"Pietraszek, T., and Berghe, C.V. (2005, January 7\u20139). Defending against injection attacks through context-sensitive string evaluation. Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection (RAID\u201905), Seattle, WA, USA."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/1\/37\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T08:01:49Z","timestamp":1717488109000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/1\/37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,6]]},"references-count":74,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2016,1]]}},"alternative-id":["s16010037"],"URL":"https:\/\/doi.org\/10.3390\/s16010037","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,6]]}}}