Abstract
Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed. Motivated by the fact of finite coding blocklength in short-packet communications, we attempt to investigate the problem of how many the channel uses utilized for channel training should be allocated to perform secure communications. Based on the finite blocklength information theory, we derive a closed-form expression to approximate the average achievable secrecy throughput. To gain more insights, we also present the asymptotic average secrecy throughput under two special cases, i.e., high signal-to-noise ratio (SNR) and infinite blocklength. Moreover, we determine the optimal channel training length to maximize the average secrecy throughput under the reliability constraint and given blocklength. Numerical results are provided to validate the analysis and demonstrate that the performance gain achieved by the optimal channel training length is remarkable, relative to other benchmark schemes.
1. Introduction
Short-packet communications are recognized as a prominent technique for the fifth generation (5G) and next generation communication networks since they can fulfill two stringent quality-of-service (QoS) requirements, i.e., ultra-low latency and super-high reliability [,,]. The typical size of packet in short-packet communications is only hundreds of bits (e.g., 80–160 bits of industrial manufacturing and control systems []). Due to the limited packet length, the decoding error probability in short-packet communications cannot be reduced to arbitrarily low. Motivated by this, block-error-rate as a proper performance metric was developed in [] to measure the performance of short-packet communication systems, and the block-error-rate of the system increases with the decrease of the blocklength. Since then, short-packet communications have attracted considerable attention from both academia and the industry.
Due to the unchangeable open nature of the wireless transmission medium, security is also a challenging issue for short-packet communications [,]. Conventionally, the security is enhanced by encryption techniques, which are deployed at the network layer of communication systems. However, all cryptographic measures require more overhead for encryption and decryption and increase latency imposed, which may not be applicable for short-packet communications []. As an alternative to cryptography, physical layer security technique is more appealing for short-packet communications since no additional channel uses are needed [].
Physical layer security has been well investigated in the existing literature, where the coding blocklength is sufficiently large for achieving the secrecy capacity [,]. For short-packet communications, ref. [] derived the maximal secret communication rate subject to reliability and security constraints. Subsequently, ref. [] studied the secrecy throughput performance with an external multi-antenna eavesdropper, and found the optimal blocklength to maximize the secrecy throughput under reliability and latency constraints. Moreover, considering both reliability and security, ref. [] established the outage probability and effective throughput to analyze the performance of secure short-packet communications. The authors in [] considered a multiuser downlink network in the presence of an eavesdropper and developed efficient methods to solve the total transmit power minimization and weighted throughput maximization problems. Packet replication and interface diversity schemes were employed in [] to improve the secure spectral efficiency, where eavesdroppers are randomly distributed according to Poisson point processes. In [], the spectrum sensing blocklength and transmission blocklength were jointly optimized to maximize the secrecy throughput. In order to achieve both high spectral efficiency and low communication delay, incorporating short-packet communications with non-orthogonal multiple access (NOMA) networks was investigated in [,,].
It is worth noting that the previous studies on physical layer security with finite blocklength assumed perfect channel state information (CSI) for communications. However, in most realistic scenarios, perfect CSI may not be easy to obtain due to the feedback delay, channel estimation errors, and limited feedback rate. Against this background, ref. [] addressed the secrecy throughput of full-duplex multiuser multiple-input-multiple-output (MIMO) networks with short packets, where the impacts of imperfect CSI, co-channel interference and self interference are jointly considered. In [], the optimal power control policy maximizing achievable secrecy rate under the queueing delay requirement was carried out with channel estimation error. It is noted that these studies in [,] have not considered explicit channel training schemes for channel estimation. In fact, the channel estimation error is closely related to channel training schemes, e.g., pilot length and pilot power. In particular, the pilot length significantly affects the overall performance of short-packet transmission systems []. In [], the authors presented a pilot-assisted secure short-packet communications with randomly distributed eavesdroppers and characterized the reliability and security performance by transmission error probability and intercept probability, respectively. Furthermore, ref. [] optimized the pilot length by an iterative algorithm to maximize the achievable effective secrecy rate of the system. It is further noted that the optimal pilot length that maximizes the secrecy rate has no closed-form solution in []. Although their results provide useful insights, the computational complexity of the iterative search algorithm is relatively high. On the other hand, the impact of the pilot length on the secrecy throughput of short-packet communications has not been examined thus far.
Motivated by the above considerations, we investigate the channel training design for secure short-packet communications, where a source transmits pilot symbols before its information transmission to enable channel estimation at a destination. In order to maximize the secrecy throughput of the considered system, the number of channel uses allocated to channel training and data transmission need to be carefully optimized. The main contributions of this paper are summarized as follows:
- Based on the finite blocklength information theory, we derive a closed-form expression to approximate the average achievable secrecy throughput, which provides an efficient means to comprehensively evaluate the impact of key system parameters, e.g., the channel training length and blocklength, on the latency-reliability tradeoff.
- To achieve additional insights on the application of the channel training scheme for secure short-packet communications into the practical design, we also present the asymptotic closed-form expressions for the average secrecy throughput under two special cases, i.e., high signal-to-noise ratio (SNR) and infinite blocklength.
- We determine the optimal channel training length to maximize the average secrecy throughput under the reliability constraint and given blocklength. Numerical results demonstrate the performance gain achieved by the optimal channel training length is remarkable relative to the fixed-ratio channel training length and fixed channel training length schemes.
The remainder of this paper is organized as follows. In Section 2, we describe the secure short-packet communication system based on the channel training scheme. In Section 3, we present the closed-form expression to approximate the average achievable secrecy throughput, provide the high SNR and infinite blocklength analyses for the average secrecy throughput, and determine the optimal channel training length to maximize the average secrecy throughput. Finally, we respectively give numerical results and conclusions in Section 4 and Section 5.
2. System Model
In this paper, we consider a secure short-packet communication system as shown in Figure 1, in which a source sends confidential short packets to a destination in the presence of a passive eavesdropper. Due to size limitation, each node is equipped with a single antenna. The channels from the source to the destination and the eavesdropper are subject to independent quasi-static Rayleigh fading, which means that the channel coefficients remain static during a coherence slot (n channel uses) and vary independently from one coherence slot to the next [,,].
Figure 1.
System model and packet structure for short-packet communications.
In each short-packet transmission, the source conveys L information bits over n channel uses to the destination. In order to support the high reliability requirement, we consider a two-phase training-based transmission scheme, which contains a channel training phase and a data transmission phase. In the channel training phase, the source transmits a predefined pilot sequence of channel uses to enable channel estimation at the receiver. In the data transmission phase, the source utilizes the remaining channel uses for information transmission. Thus, the received signal vectors at the destination and the eavesdropper are, respectively, given by
where is the channel coefficient between the source and the destination, is the channel coefficient between the source and the eavesdropper, is the transmitted signal vector from the source, and are the additive white Gaussian noise (AWGN) with zero-mean and variance at the destination and the eavesdropper, respectively. After receiving the signals, both the destination and the eavesdropper estimate their channels by the minimum mean-square error (MMSE) estimator and then decode the data. As such, the actual channel coefficient can be denoted as the sum of the estimated channel and the estimation error. According to [], we have
where is the estimated value of , is the estimation error of , is the estimated value of , is the estimation error of , and is the average power of the pilot symbols.
The destination and the eavesdropper use the estimated channel for information reception. Thus, in the data transmission phase, the received signal vectors at the destination and the eavesdropper are, respectively, rewritten as
where is the average power of the data symbols, and is the data symbols. The actual instantaneous SNRs for information reception at the destination and the eavesdropper can be, respectively, given by
We assume that the source uses a fraction of the total power for data transmission and the remaining portion for channel training, where is the power allocation factor. Thus, we have
where is the average power of all the transmitted symbols at the source. Then, the instantaneous SNRs at the destination and the eavesdropper can be, respectively, rewritten as
Since the eavesdropper’s estimation error is typically unknown to the source, it is necessary to design a robust approach for the worst-case scenario. That is, there is no estimation error at the eavesdropper. Then, the actual instantaneous SNR at the eavesdropper can be rewritten as
Based on [], the achievable secrecy rate of the considered system with the blocklength n and channel training length for a given constraint on the decoding error probability and a secrecy constraint on the information leakage can be approximated as
where is the secrecy capacity with infinite blocklength, , , is the channel dispersion, and is the inverse Q-function .
3. Secrecy Performance Analysis
In this section, we investigate the average secrecy throughput performance of the short-packet communication system with the channel training scheme. Then, we focus on the asymptotic analysis for the average secrecy throughput. Finally, we determine the optimal channel training length to maximize the average secrecy throughput under the reliability constraint and given blocklength.
3.1. Secrecy Throughput Approximation
The secrecy throughput in short-packet communications is defined as the average secrecy rate where the data packet is reliably transmitted subject to a certain secrecy constraint. Mathematically, the average secrecy throughput of the considered system is formulated as
where is the average decoding error probability. When , the decoding error probability at the destination can be characterized by . When , the achievable secrecy rate is zero and we set . The average secrecy throughput in (14) can be further derived as
where , is the conditional decoding error probability conditioned on , and is the probability density function (PDF) of . In order to calculate the double integral in (15), we propose to use the first-order approximation of as follows
where and .
Based on the fact that when , the integral can be further simplified by changing the lower limit from y to 0. Therefore, we have
where and are respectively the cumulative distribution function (CDF) and PDF of . It is important to point out that is an increasing function of n. When n is in the moderate blocklength region, i.e., , which is really important to short-packet communications, the integral interval is generically small. Therefore, with the help of the first order Riemann integral approximation, we further approximate (17) as
By applying (18)–(20) into (15), we have
where , and is a sufficiently large parameter to ensure when .
By leveraging Gaussian-Chebyshev quadrature, the integral can be approximated as
where is a parameter for the complexity accuracy tradeoff, with , and .
According to [] (3.352.2), the integral can be derived as
where is the exponential integral function, and .
3.2. High SNR Regime
To further characterize the impact of key system parameters on the average secrecy throughput, we focus on the asymptotic average secrecy throughput in the high SNR regime, where the average transmit power at the source approaches infinity. When , we know that the estimation error approaches zero and approaches infinity. According to (21), the average secrecy throughput in the high SNR regime of the considered system with finite blocklength can be simplified as
where . An important observation from (24) is that the average decoding error probability cannot reduce to zero even when the transmit power at the source approaches infinity. This is because not only the destination but also the eavesdropper will benefit from increasing the transmit power. Moreover, we know that the average secrecy throughput in the high SNR regime is dependent on the power allocation factor between channel training and data transmission.
3.3. The Class Case with Infinite Blocklength
To further understand the connection between finite blocklength and infinite blocklength, we turn our attention to the classical case with infinite blocklength. When , we know that as long as (otherwise ). Thus, the average secrecy throughput of the considered system with infinite blocklength can be expressed as
From (25), it is worth noting that due to the fact that as . This is because the transmission rate as . However, when , the secrecy capacity of the considered system is not zero.
3.4. Optimal Transmission Design
To maximize the average secrecy throughput, the designers have to choose the suitable channel training length in a coherence slot. This is due to the fact that the channel estimation becomes more accurate and the destination can decode more information bits reliably as the channel training length increases. However, this will reduce the duration for data transmission at the same time, which leads to the degradation of the average secrecy throughput. The optimization of maximizing the average secrecy throughput under the reliability constraint and given blocklength can be formulated as
where denotes the non-negative integer set and (26b) denotes the system’s reliability constraint.
In the following, we show that is a convex increasing function of and T is a quasi-concave function of . Based on the Leibniz integral rule, the monotonicity of with respect to is consistent with that of with respect to . Taking the first and second derivative of on , we have
and
where . For short-packet communications, is generally much smaller than . Hence, we have , and . Then, we need to check the sign of and . To facilitate analysis, we approximate and , which is very accurate in the high SNR regime []. Then, we have and . Therefore, we state that is a convex increasing function of and T is a quasi-concave function of .
When , the optimal channel training length for problem (26) is given by
When , the optimal channel training length for problem (26) is given by
where is the solution of , is the solution of , and and are the ceiling and floor operations, respectively.
Proof.
We first relax the integer constraint in problem (26). Then, the optimal channel training length can be derived directly from the fact that is a convex increasing function of and T is a quasi-concave function of . ☐
4. Numerical Results
In this section, we provide simulation and numerical results to demonstrate how the key system parameters, i.e., channel training length and blocklength, impact the average secrecy throughput of the considered system. Unless otherwise stated, the system parameter settings are as follows: , , , and .
Figure 2 shows the average secrecy throughput versus the average transmit power with different channel training length. We first observe that the approximation results in (21) coincide well with the Monte-Carlo simulation points, which corroborates the accuracy of the analytical expressions. Second, we observe that the average secrecy throughput increases as the average transmit power increases, and then converges to a constant when the average transmit power is sufficiently large. This is due to the fact that the average secrecy throughput is independent of the average transmit power in the high SNR regime according to (24). Moreover, we observe that the channel training length is not better when the blocklength is fixed.
Figure 2.
The average secrecy throughput T versus the average transmit power with different channel training length , where , , dB, and dB.
Figure 3 depicts the average secrecy throughput versus the power allocation factor with different channel training length. We observe that the average secrecy throughput increases as the power allocation factor increases from 0 to an optimal value but later, it starts decreasing as the power allocation factor increases from its optimal value. This can be explained as follows. When the power allocation factor is too small, there is less power available for data transmission, which, of course, will result in poor average secrecy throughput. When the power allocation factor is too large, there is less power available for channel training which, consequently, also leads to poor average secrecy throughput. Although an explicit solution for the optimal power allocation factor is intractable due to the complexity of the average secrecy throughput expression, the solution can be obtained offline by numerical search methods, for example, the gradient-based search method.
Figure 3.
The average secrecy throughput T versus the power allocation factor with different channel training length , where , dB, dB, and dB.
Figure 4 demonstrates that the optimal channel training length can significantly improve the average secrecy throughput of the considered system. To obtain comparable results, we provide the following channel training transmission schemes: (1) Fixed-ratio channel training length, in which the channel training length is fixed; (2) Fixed channel training length, in which the channel training length is fixed. It is clear that the average secrecy throughput with the optimal channel training is superior to the two benchmark schemes mentioned above, which implies that the average secrecy throughput of the considered system can be significantly improved via optimizing the channel training length.
Figure 4.
The average secrecy throughput T versus the blocklength n with , dB, dB, and dB, where the optimal channel training length is obtained without reliability constraint.
Figure 5 depicts the optimal channel training length versus the blocklength with different values of . We observe that the optimal channel training length that maximizes the average secrecy throughput increases with the increase of the blocklength. Moreover, from Figure 4, one can observe that the average secrecy throughput with the optimal channel training length increases as the blocklength increases. Thus, we can conclude that when the transmission latency constraint is loose, it is favorable to allocate more channel uses for channel estimation to mitigate the decoding error.
Figure 5.
The optimal channel training length versus the blocklength n with , dB, dB, and dB, where the optimal channel training length is obtained without reliability constraint.
Figure 6 plots the optimal channel training length versus the average transmit power with different values of . We first observe that for a fixed , the optimal channel training length increases as the average transmit power increases. Moreover, we also observe that for a fixed average transmit power, the optimal channel training length increases as increases. This is because when either the average transmit power or the tolerance of the information leakage increases, the probability of decoding error decreases and the optimal channel training length becomes larger in order to support higher transmission rate.
Figure 6.
The optimal channel training length versus the average transmit power with , , dB, and dB, where the optimal channel training length is obtained without reliability constraint.
Figure 7 plots the average secrecy throughput versus the channel training length with different values of . We first observe that strengthening the reliability constraint, i.e., reducing , decreases the average secrecy throughput. We further observe that the optimal channel training length maximizing the average secrecy throughput depends on the value of . In particular, when is small, the average secrecy throughput monotonically increases as the channel training length increases, such that the optimal channel training length is at the right boundary. When becomes larger, the average secrecy throughput first increases and then decreases as the channel training length increases, and the optimal channel training length is the one from that yields the largest average secrecy throughput.
Figure 7.
The average secrecy throughput T versus the channel training length under the reliability constraint, where , , dB, dB, and dB.
5. Conclusions
In this paper, we investigated the average secrecy throughput of a short-packet communication system with a two-phase training-based transmission scheme. Based on the finite blocklength information theory, the average secrecy throughput has been approximated in closed-form, which quantitatively reveals the impact of channel training length on the the tradeoff between reliability and transmission latency under a secrecy constraint. In addition, we also derived simple asymptotic results for the average secrecy throughput to offer valuable insights into practical design. Finally, the optimal channel training length under the reliability constraint and given blocklength was obtained, and the simulation results demonstrated that the performance gain achieved by the optimal channel training length is remarkable, relative to the fixed-ratio channel training length and fixed channel training length schemes.
Author Contributions
D.C., J.L., J.H. and X.Z. conceived the main proposal of the secure transmission schemes. D.C. and J.L. wrote the original draft. J.H., X.Z. and S.Z. supervised the analysis and numerical simulation of the proposed schemes, reviewed and edited the manuscript. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by the Doctoral Research Start-up Funding of Nanyang Normal University under Grant 2022ZX017, in part by the Cultivating Fund Project for the National Natural Science Foundation of China of Nanyang Normal University under Grant 2022PY024, in part by the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications), Ministry of Education under Grant JZNY202107, in part by the Key Scientific Research Projects of Colleges and Universities in Henan Province of China under Grant 21A520033, 23A520038, and 23A510001, and in part by the Key Scientific and Technological Research Projects in Henan Province under Grant 222102320369.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
The authors extend their gratitude to the anonymous reviewers for their valuable and constructive comments, which have largely improved and clarified this paper.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Parvez, I.; Rahmati, A.; Guvenc, I.; Sarwat, A.I.; Dai, H. A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions. IEEE Commun. Surv. Tutor. 2018, 20, 3098–3130. [Google Scholar] [CrossRef]
- Durisi, G.; Koch, T.; Popovski, P. Toward Massive, Ultrareliable, and Low-Latency Wireless Communication with Short Packets. Proc. IEEE 2016, 104, 1711–1726. [Google Scholar] [CrossRef]
- Feng, D.; She, C.; Ying, K.; Lai, L.; Hou, Z.; Quek, T.Q.S.; Li, Y.; Vucetic, B. Toward Ultrareliable Low-Latency Communications: Typical Scenarios, Possible Solutions, and Open Issues. IEEE Veh. Technol. Mag. 2019, 14, 94–102. [Google Scholar] [CrossRef]
- Ashraf, S.A.; Aktas, I.; Eriksson, E.; Helmersson, K.W.; Ansari, J. Ultra-Reliable and Low-Latency Communication for Wireless Factory Automation: From LTE to 5G. In Proceedings of the 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation, Berlin, Germany, 6–9 September 2016. [Google Scholar]
- Polyanskiy, Y.; Poor, H.V.; Verdu, S. Channel Coding Rate in the Finite Blocklength Regime. IEEE Trans. Inf. Theory 2010, 56, 2307–2359. [Google Scholar] [CrossRef]
- Xiang, Z.; Yang, W.; Cai, Y.; Ding, Z.; Song, Y.; Zou, Y. NOMA-Assisted Secure Short-Packet Communications in IoT. IEEE Wirel. Commun. 2020, 27, 8–15. [Google Scholar] [CrossRef]
- Feng, C.; Wang, H.M. Secure Short-Packet Communications at the Physical Layer for 5G and Beyond. IEEE Commun. Stand. Mag. 2021, 5, 96–102. [Google Scholar] [CrossRef]
- Wang, H.M.; Yang, Q.; Ding, Z.; Poor, H.V. Secure Short-Packet Communications for Mission-Critical IoT Applications. IEEE Trans. Wireless Commun. 2019, 18, 2565–2578. [Google Scholar] [CrossRef]
- Ren, H.; Pan, C.; Deng, Y.; Elkashlan, M.; Nallanathan, A. Resource Allocation for Secure URLLC in Mission-Critical IoT Scenarios. IEEE Trans. Wireless Commun. 2020, 68, 5793–5807. [Google Scholar] [CrossRef]
- Hu, J.; Cai, Y.; Yang, N. Secure Transmission Design with Feedback Compression for the Internet of Things. IEEE Trans. Signal Process. 2018, 66, 1580–1593. [Google Scholar] [CrossRef]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
- Yang, W.; Schaefer, R.F.; Poor, H.V. Wiretap channels: Nonasymptotic fundamental limits. IEEE Trans. Inf. Theory 2019, 65, 4069–4093. [Google Scholar] [CrossRef]
- Feng, C.; Wang, H.M.; Poor, H.V. Reliable and Secure Short-Packet Communications. IEEE Trans. Wirel. Commun. 2022, 21, 1913–1926. [Google Scholar] [CrossRef]
- Farhat, J.; Brante, G.; Souza, R.D.; Vilela, J.P. On the Secure Spectral Efficiency of URLLC With Randomly Located Colluding Eavesdroppers. IEEE Internet Things J. 2021, 8, 14672–14682. [Google Scholar] [CrossRef]
- Chen, Y.; Zhang, Y.; Yu, B.; Zhang, T.; Cai, Y. Relay-Assisted Secure Short-Packet Transmission in Cognitive IoT with Spectrum Sensing. China Commun. 2021, 18, 37–50. [Google Scholar] [CrossRef]
- Lai, X.; Wu, T.; Zhang, Q.; Qin, J. Average Secure BLER Analysis of NOMA Downlink Short-Packet Communication Systems in Flat Rayleigh Fading Channels. IEEE Trans. Wirel. Commun. 2021, 20, 2948–2960. [Google Scholar] [CrossRef]
- Lv, S.; Xu, X.; Han, S.; Tao, X.; Zhang, P. Energy-Efficient Secure Short-Packet Transmission in NOMA-Assisted mMTC Networks With Relaying. IEEE Trans. Veh. Technol. 2022, 71, 1699–1712. [Google Scholar] [CrossRef]
- Xiang, Z.; Yang, W.; Cai, Y.; Xiong, J.; Ding, Z.; Song, Y. Secure Transmission in a NOMA-Assisted IoT Network With Diversified Communication Requirements. IEEE Internet Things J. 2020, 7, 11157–11169. [Google Scholar] [CrossRef]
- Wei, L.; Yang, Y.; Jiao, B. Secrecy Throughput in Full-Duplex Multiuser MIMO Short-Packet Communications. IEEE Wirel. Commun. Lett. 2021, 10, 1339–1343. [Google Scholar] [CrossRef]
- Li, C.; She, C.; Yang, N.; Quek, T.Q.S. Secure Transmission Rate of Short Packets With Queueing Delay Requirement. IEEE Trans. Wirel. Commun. 2022, 21, 203–218. [Google Scholar] [CrossRef]
- Xie, Y.; Ren, P.; Xu, D.; Li, Q. Security and Reliability Performance Analysis for URLLC With Randomly Distributed Eavesdroppers. In Proceedings of the 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14–23 June 2021. [Google Scholar]
- Xie, Y.; Ren, P. Optimizing Training and Transmission Overheads for Secure URLLC Against Randomly Distributed Eavesdroppers. IEEE Trans. Veh. Technol. 2022, 71, 11921–11935. [Google Scholar] [CrossRef]
- Li, C.; Yang, N.; Yan, S. Optimal Transmission of Short-Packet Communications in Multiple-Input Single-Output Systems. IEEE Trans. Veh. Technol. 2019, 68, 7199–7203. [Google Scholar] [CrossRef]
- Lee, B.; Park, S.; Love, D.J.; Ji, H.; Shim, B. Packet Structure and Receiver Design for Low Latency Wireless Communications with Ultra-Short Packets. IEEE Trans. Commun. 2018, 66, 796–807. [Google Scholar] [CrossRef]
- Gursoy, M.C. On the capacity and energy efficiency of training-based transmissions over fading channels. IEEE Trans. Inf. Theory 2009, 55, 4543–4567. [Google Scholar] [CrossRef]
- Gradshteyn, I.S.; Ryzhik, I.M. Tables of Integrals, Series, and Products, 7th ed.; Academic Press, Inc.: Cambridge, MA, USA, 2007. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).