{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:38:38Z","timestamp":1725496718810},"reference-count":64,"publisher":"MDPI AG","issue":"17","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"King 544 Saud University, Riyadh, Saudi Arabia","award":["RSPD2024R564"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper introduces a novel approach to securing SDN environments using IOTA 2.0 smart contracts. The proposed system utilizes the IOTA Tangle, a directed acyclic graph (DAG) structure, to improve scalability and efficiency while eliminating transaction fees and reducing energy consumption. We introduce three smart contracts: Authority, Access Control, and DoS Detector, to ensure trusted and secure network operations, prevent unauthorized access, maintain the integrity of control data, and mitigate denial-of-service attacks. Through comprehensive simulations using Mininet and the ShimmerEVM IOTA Test Network, we demonstrate the efficacy of our approach in enhancing SDN security. Our findings highlight the potential of IOTA 2.0 smart contracts to provide a robust, decentralized solution for securing SDN environments, paving the way for the further integration of blockchain technologies in network management.<\/jats:p>","DOI":"10.3390\/s24175716","type":"journal-article","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T16:54:42Z","timestamp":1725296082000},"page":"5716","source":"Crossref","is-referenced-by-count":0,"title":["IOTASDN: IOTA 2.0 Smart Contracts for Securing Software-Defined Networking Ecosystem"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"http:\/\/orcid.org\/0009-0004-0269-3880","authenticated-orcid":false,"given":"Mohamed","family":"Fartitchou","sequence":"first","affiliation":[{"name":"Multidisciplinary Faculty of Nador, Mohammed Premier University, Oujda 60000, Morocco"}]},{"ORCID":"http:\/\/orcid.org\/0009-0009-6532-2573","authenticated-orcid":false,"given":"Ismail","family":"Lamaakal","sequence":"additional","affiliation":[{"name":"Multidisciplinary Faculty of Nador, Mohammed Premier University, Oujda 60000, Morocco"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4704-5364","authenticated-orcid":false,"given":"Yassine","family":"Maleh","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences, Sultan Moulay Slimane University, Beni Mellal 23000, Morocco"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9569-9162","authenticated-orcid":false,"given":"Khalid","family":"El Makkaoui","sequence":"additional","affiliation":[{"name":"Multidisciplinary Faculty of Nador, Mohammed Premier University, Oujda 60000, Morocco"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3146-6423","authenticated-orcid":false,"given":"Zakaria","family":"El Allali","sequence":"additional","affiliation":[{"name":"Multidisciplinary Faculty of Nador, Mohammed Premier University, Oujda 60000, Morocco"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4317-2801","authenticated-orcid":false,"given":"Pawe\u0142","family":"P\u0142awiak","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computer Science and Telecommunications, Cracow University of Technology, Warszawska 24, 31-155 Krakow, Poland"},{"name":"Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Ba\u0142tycka 5, 44-100 Gliwice, Poland"}]},{"given":"Fahad","family":"Alblehai","sequence":"additional","affiliation":[{"name":"Computer Science Department, Community College, King Saud University, Riyadh 11437, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5068-2033","authenticated-orcid":false,"given":"Ahmed","family":"A. Abd El-Latif","sequence":"additional","affiliation":[{"name":"Jadara University Research Center, Jadara University, Irbid 21110, Jordan"},{"name":"Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2013.6553676","article-title":"Are We Ready for SDN? Implementation Challenges for Software-Defined Networks","volume":"51","author":"Sezer","year":"2013","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/COMST.2014.2326417","article-title":"A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation","volume":"16","author":"Hu","year":"2014","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","article-title":"Security in Software Defined Networks: A Survey","volume":"17","author":"Ahmad","year":"2015","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s40860-022-00171-8","article-title":"A Comprehensive Survey on SDN Security: Threats, Mitigations, and Future Directions","volume":"9","author":"Maleh","year":"2022","journal-title":"J. Reliab. Intell. Environ."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Polat, H., Polat, O., and Cetin, A. (2020). Detecting DDoS Attacks in Software-Defined Networks Through Feature Selection Methods and Machine Learning Models. Sustainability, 12.","DOI":"10.3390\/su12031035"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Bahashwan, A.A., Anbar, M., Manickam, S., Al-Amiedy, T.A., Aladaileh, M.A., and Hasbullah, I.H. (2023). A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking. Sensors, 23.","DOI":"10.3390\/s23094441"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Kovacs, R., Buzura, S., Iancu, B., Dadarlat, V., Peculea, A., and Cebuc, E. (2024). Practical Implementation of a Blockchain-Enabled SDN for Large-Scale Infrastructure Networks. Appl. Sci., 14.","DOI":"10.3390\/app14051914"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"100067","DOI":"10.1016\/j.bcra.2022.100067","article-title":"A Survey on Blockchain Technology and Its Security","volume":"3","author":"Guo","year":"2022","journal-title":"Blockchain Res. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Krichen, M., Ammi, M., Mihoub, A., and Almutiq, M. (2022). Blockchain for Modern Applications: A Survey. Sensors, 22.","DOI":"10.3390\/s22145274"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yang, S., Li, S., Chen, W., and Zhao, Y. (2024). A Redactable Blockchain-Based Data Management Scheme for Agricultural Product Traceability. Sensors, 24.","DOI":"10.3390\/s24051667"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Lee, S., Kim, Y., and Cho, S. (2024). Searchable Blockchain-Based Healthcare Information Exchange System to Enhance Privacy Preserving and Data Usability. Sensors, 24.","DOI":"10.3390\/s24051582"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kongsen, J., Chantaradsuwan, D., Koad, P., Thu, M., and Jandaeng, C. (2024). A Secure Blockchain-Enabled Remote Healthcare Monitoring System for Home Isolation. J. Sens. Actuator Netw., 13.","DOI":"10.3390\/jsan13010013"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Taherdoost, H. (2024). Blockchain Integration and Its Impact on Renewable Energy. Computers, 13.","DOI":"10.3390\/computers13040107"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"64679","DOI":"10.1109\/ACCESS.2023.3289598","article-title":"A Systematic Literature Review on Blockchain-Based Systems for Academic Certificate Verification","volume":"11","author":"Rustemi","year":"2023","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.procs.2022.03.015","article-title":"Digital Certifications in Moroccan Universities: Concepts, Challenges, and Solutions","volume":"201","author":"Litoussi","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Biswas, K., Chowdhury, M.J.M., and Usman, M. (2024). Blockchain of Things: Benefits, Challenges and Future Directions. Sensors, 24.","DOI":"10.3390\/s24030934"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ahakonye, L.A.C., Nwakanma, C.I., and Kim, D.-S. (2024). Tides of Blockchain in IoT Cybersecurity. Sensors, 24.","DOI":"10.3390\/s24103111"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Arachchige, K.G., Branch, P., and But, J. (2024). An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks. Sensors, 24.","DOI":"10.3390\/s24103083"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"29800","DOI":"10.1109\/ACCESS.2023.3260777","article-title":"A Promising Integration of SDN and Blockchain for IoT Networks: A Survey","volume":"11","author":"Turner","year":"2023","journal-title":"IEEE Access"},{"key":"ref_20","first-page":"100663","article-title":"A Comprehensive Survey on SDN and Blockchain-Based Secure Vehicular Networks","volume":"44","author":"Varma","year":"2023","journal-title":"Veh. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"103838","DOI":"10.1016\/j.jnca.2024.103838","article-title":"Exploring Blockchain-Driven Security in SDN-Based IoT Networks","volume":"224","author":"Indrason","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_22","first-page":"260","article-title":"Load Balancing in Blockchain Networks: A Survey","volume":"13","author":"Wijesekara","year":"2024","journal-title":"Int. J. Electr. Electron. Eng. Telecommun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"10288","DOI":"10.1109\/JIOT.2020.3004273","article-title":"Bitcoin and Blockchain: Security and Privacy","volume":"7","author":"Zaghloul","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1007\/s11187-019-00286-y","article-title":"Blockchain, Bitcoin, and ICOs: A Review and Research Agenda","volume":"56","author":"Kher","year":"2020","journal-title":"Small Bus. Econ."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"6605","DOI":"10.1109\/ACCESS.2021.3140091","article-title":"Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract","volume":"10","author":"Kushwaha","year":"2022","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.1007\/s10664-019-09796-5","article-title":"An Exploratory Study of Smart Contracts in the Ethereum Blockchain Platform","volume":"25","author":"Oliva","year":"2020","journal-title":"Empir. Softw. Eng."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1049\/wss2.12031","article-title":"A Survey of Blockchain Technologies Applied to Software-defined Networking: Research Challenges and Solutions","volume":"11","author":"Nguyen","year":"2021","journal-title":"IET Wirel. Sens. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"45820","DOI":"10.1109\/ACCESS.2022.3168972","article-title":"SDN Security Review: Threat Taxonomy, Implications, and Open Challenges","volume":"10","author":"Rahouti","year":"2022","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Lamriji, Y., Kasri, M., El Makkaoui, K., and Beni-Hssane, A. (2023, January 18\u201319). A comparative study of consensus algorithms for blockchain. Proceedings of the 2023 IEEE 3rd International Conference on Innovative Research in Applied Science, Engineering and Technology, Mohammedia, Morocco.","DOI":"10.1109\/IRASET57153.2023.10153031"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"79626","DOI":"10.1109\/ACCESS.2024.3408868","article-title":"A Survey of Blockchain Based Systems: Scalability Issues and Solutions, Applications and Future Challenges","volume":"12","author":"Alghamdi","year":"2024","journal-title":"IEEE Access"},{"key":"ref_31","first-page":"964","article-title":"IOTA: Feeless and free","volume":"6","author":"Popov","year":"2019","journal-title":"IEEE Blockchain Technical Briefs"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1080\/07366981.2023.2293322","article-title":"Iota tangle 2.0: An overview","volume":"68","author":"Fartitchou","year":"2023","journal-title":"Edpacs"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"101066","DOI":"10.1016\/j.iot.2024.101066","article-title":"A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA","volume":"25","author":"Gilani","year":"2024","journal-title":"Internet Things"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1007\/s12243-023-01005-1","article-title":"Bringing Privacy, Security and Performance to the Internet of Things Using IOTA and Usage Control","volume":"79","author":"Denis","year":"2024","journal-title":"Ann. Telecommun."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Zhao, L., Ferraro, P., and Shorten, R. (2024). A Smart Mask to Enforce Social Contracts Based on IOTA Tangle. PLoS ONE, 19.","DOI":"10.1371\/journal.pone.0292850"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Lin, I.-C., Tseng, P.-C., Chen, P.-H., and Chiou, S.-J. (2024). Enhancing Data Preservation and Security in Industrial Control Systems through Integrated IOTA Implementation. Processes, 12.","DOI":"10.20944\/preprints202403.1859.v1"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Gligoric, N., Escu\u00edn, D., Polo, L., Amditis, A., Georgakopoulos, T., and Fraile, A. (2024). IOTA-Based Distributed Ledger in the Mining Industry: Efficiency, Sustainability and Transparency. Sensors, 24.","DOI":"10.20944\/preprints202401.0650.v1"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.future.2023.10.014","article-title":"Enabling Federated Learning at the Edge through the IOTA Tangle","volume":"152","author":"Mazzocca","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_39","unstructured":"Weng, J.-S., Weng, J., Liu, J.-N., and Zhang, Y. (2019). Secure Software-Defined Networking Based on Blockchain. arXiv."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"99573","DOI":"10.1109\/ACCESS.2019.2930345","article-title":"An Efficient Forensics Architecture in Software-Defined Networking-IoT Using Blockchain Technology","volume":"7","author":"Pourvahab","year":"2019","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"101629","DOI":"10.1016\/j.cose.2019.101629","article-title":"P4-to-Blockchain: A Secure Blockchain-Enabled Packet Parser for Software Defined Networking","volume":"88","author":"Yazdinejad","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MNET.001.1900151","article-title":"BlockSDN: Blockchain-as-a-Service for Software Defined Networking in Smart City Applications","volume":"34","author":"Aujla","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"e178","DOI":"10.1002\/spy2.178","article-title":"SDN-chain: Privacy-preserving Protocol for Software Defined Networks Using Blockchain","volume":"4","author":"Shashidhara","year":"2021","journal-title":"Secur. Priv."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Algarni, S., Eassa, F., Almarhabi, K., Algarni, A., and Albeshri, A. (2022). BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking. Electronics, 11.","DOI":"10.3390\/electronics11070996"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"e5300","DOI":"10.1002\/cpe.5300","article-title":"A Comprehensive Survey of Security Threats and Their Mitigation Techniques for Next-generation SDN Controllers","volume":"32","author":"Han","year":"2020","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"102595","DOI":"10.1016\/j.jnca.2020.102595","article-title":"Security in SDN: A Comprehensive Survey","volume":"159","author":"Chica","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"7372","DOI":"10.1109\/JSEN.2020.2979031","article-title":"Latency and Performance Analyses of Real-World Wireless IoT-Blockchain Application","volume":"20","author":"Alrubei","year":"2020","journal-title":"IEEE Sens. J."},{"key":"ref_48","unstructured":"Helmer, L., and Penzkofer, A. (2022). Report on the Energy Consumption of the IOTA 2.0 Prototype Network (GoShimmer 0.8.3) under Different Testing Scenarios. arXiv."},{"key":"ref_49","unstructured":"Popov, S. (2024, June 03). IOTA Tangle Whitepaper. Available online: https:\/\/assets.ctfassets.net\/r1dr6vzfxhev\/2t4uxvsIqk0EUau6g2sw0g\/45eae33637ca92f85dd9f4a3a218e1ec\/iota1_4_3.pdf."},{"key":"ref_50","unstructured":"Dr\u0105sutis, E. (2024, June 03). IOTA Smart Contracts. Available online: https:\/\/raw.githubusercontent.com\/iotaledger\/wasp\/develop\/documentation\/ISC_WP_Nov_10_2021.pdf."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"105807","DOI":"10.1109\/ACCESS.2022.3211422","article-title":"Tangle 2.0 Leaderless Nakamoto Consensus on the Heaviest DAG","volume":"10","author":"Penzkofer","year":"2022","journal-title":"IEEE Access"},{"key":"ref_52","unstructured":"(2024, June 03). IOTA Wiki. Available online: https:\/\/wiki.iota.org\/learn\/protocols\/introduction\/."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"103383","DOI":"10.1016\/j.jnca.2022.103383","article-title":"A Survey on Security Challenges and Solutions in the IOTA","volume":"203","author":"Conti","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3616022","article-title":"Reality-Based UTXO Ledger","volume":"2","author":"Penzkofer","year":"2023","journal-title":"Distrib. Ledger Technol. Res. Pract."},{"key":"ref_55","unstructured":"Popov, S., Moog, H., Camargo, D., Capossele, A., Dimitrov, V., Gal, A., Greve, A., Kusmierz, B., Mueller, S., and Penzkofer, A. (2024, June 03). The Coordicide. Available online: https:\/\/files.iota.org\/papers\/20200120_Coordicide_WP.pdf."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"5492","DOI":"10.1109\/TAC.2024.3372458","article-title":"Feedback Control for Distributed Ledgers: An Attack Mitigation Policy for DAG-Based DLTs","volume":"69","author":"Ferraro","year":"2024","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MC.2023.3303315","article-title":"Distributed Ledger Technologies for Electronic Health Care: IOTA-Based Remote Patient Monitoring and Telemedicine System","volume":"56","author":"Minhas","year":"2023","journal-title":"Computer"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Niebla-Montero, \u00c1., Froiz-M\u00edguez, I., Varela-Barbeito, J., Fraga-Lamas, P., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2023). IOTA and Smart Contract Based IoT Oxygen Monitoring System for the Traceability and Audit of Confined Spaces in the Shipbuilding Industry. Eng. Proc., 58.","DOI":"10.3390\/ecsa-10-16226"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Akhtar, M.M., Rizvi, D.R., Ahad, M.A., Kanhere, S.S., Amjad, M., and Coviello, G. (2021). Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy. Sensors, 21.","DOI":"10.3390\/s21134354"},{"key":"ref_60","unstructured":"Sealey, N., Aijaz, A., and Holden, B. (December, January 29). IOTA Tangle 2.0: Toward a Scalable, Decentralized, Smart, and Autonomous IoT Ecosystem. Proceedings of the International Conference on Smart Applications, Communications and Networking (SmartNets), Palapye, Botswana."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Apatu, E., and Goudar, P. (2024). Bitcoin Use Cases: A Scoping Review. Challenges, 15.","DOI":"10.3390\/challe15010015"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"57037","DOI":"10.1109\/ACCESS.2022.3169902","article-title":"Ethereum Smart Contract Analysis Tools: A Systematic Review","volume":"10","author":"Kushwaha","year":"2022","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"67156","DOI":"10.1109\/ACCESS.2023.3291618","article-title":"Performance and Scalability Analysis of Ethereum and Hyperledger Fabric","volume":"11","author":"Ucbas","year":"2023","journal-title":"IEEE Access"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s40860-023-00203-x","article-title":"MSDN-IoT multicast group communication in IoT based on software defined networking","volume":"10","author":"Baddi","year":"2024","journal-title":"J. Reliab. Intell. Environ."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/17\/5716\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:27:35Z","timestamp":1725424055000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/17\/5716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":64,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["s24175716"],"URL":"https:\/\/doi.org\/10.3390\/s24175716","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2024,9,2]]}}}