- 1School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China
- 2Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, China
- 3School of Cyber Science and Technology, Shandong University, Qingdao, China
- 4Pengcheng Lab, Shenzhen, China
- 5China Industrial Control Systems Cyber Emergency Response Team, Beijing, China
In recent years, wirless Internet of Things (IoT) technology has developed rapidly, and the reuse of spectrum resources, network efficiency, and the diversity of multi-communication scenarios have brought great challenges to the existing Internet of Things. And Device to Device (D2D) communication technology in 5th Generation Mobile Communication Technology (5G) has good application prospects in these aspects. Therefore, the combination with D2D can well solve the needs in the wirless Internet of things. However, safe and effective communication has become an urgent problem to be solved. In this paper, this paper proposes a D2D group communication protocol for wireless IoT in 5G. In this protocol, the Chinese remainder theorem is introduced into the protocol design, and a secure and efficient group authentication scheme is constructed based on secret sharing and Chebyshev Polynomials. The formal security proof using Burrows Abadi Needham (BAN) logic and informal security analysis show that our proposed protocol meets the security requirements. Through performance analysis, compared with other related schemes, this scheme not only provides better security, but also has obvious advantages in computation and communication efficiency.
1 Introduction
With the continuous development of technology, the connotation and concept of the wirless IoT are constantly deepening, and the extension is also constantly expanding [1]. To this day, wirless IoT has initially possessed the characteristics of intelligent terminal interconnection, open platform services, and wide network coverage, and is widely used in various fields such as transportation, agriculture, healthcare, education, and finance. As a major scene of today’s communication, mobile communication is formulating 5G to obtain a greater transmission rate [2]. D2D communication which is a traffic offloading technology can directly communicate between neighboring devices, and reduce the burden of base stations carrying network traffic [3]. D2D communication technology, as a 5G key technology, reuses the resources, communicates directly between devices and has the ability to reduce the base station load, lower communication delay, improve the spectrum efficiency of cellular communication system, and adapt to more complex communication environment [4]. And it expands network range and places that cannot be covered by the network. In practical application, D2D communication not only provides traffic unloading technology, but also is used to build the network, and provides relevant location services, content sharing, etc [5].
1.1 Significance and motivation
In view of the conflict between explosive growth of smart devices and scarce spectrum resources, many scholars have tried to solve this contradiction through spectrum resource redistribution, but in fact it is difficult to achieve [6]. Therefore, the combination of wirless IoT technology and 5G network can well solve their business needs [7]. Corresponding to the communication of massive devices, this is the application scenario of 5G D2D communication. In this way, the communication timeliness of resource limited IoT devices can be improved [8]. However, wireless networks are open and heterogeneous, so that they are vulnerable to various security attacks. Attackers can disrupt user communication security through eavesdropping, interception, tampering, and other methods, steal user privacy data, and seriously threaten IoT communication security [9]. In addition, the computing and storage resources of IoT devices are limited, and complex cryptographic primitives cannot be used to protect their security. The devices are vulnerable to attacks and destruction, thereby leaking stored private data [10]. Due to the above reasons, the D2D communication security challenge in the 5G Internet of Things is more critical and more difficult to solve. Therefore, this paper proposes a new protocol for wirless IoT in 5G. The features are as follows:
1) The D2D group communication protocol based on secret sharing is designed for wirless IoT. The Chinese remainder theorem is introduced into the protocol, and a group communication scheme is constructed based on secret sharing technology and Chebyshev polynomials.
2) Formal security verification and analysis using BAN logic show that our proposed protocol meets security requirements. Informal security analysis proves the safety of the protocol.
3) Compared with the existing protocol, our protocol has low the computation and communication overhead.
The rest is organized. Section 2 and Section 3 organize related work and preliminaries. Our proposed group authentication protocol is introduced in Section 4. Section 5 and Section 6 carried out security proof and performance analysis respectively. Section 7 is the conclusion.
2 Related work
Recently, more and more scholars have begun to focus on D2D secure communication. Here we introduce the point-to-point D2D communication and the D2D group communication respectively.
First, we introduce the point-to-point D2D communication. Alam et al. [11] designed a scheme based on XOR operations. However, the key based on XOR operations could be easily extracted, so this scheme could not guarantee secure D2D communication. Shen et al. [12] designed a scheme through WiFi direct connection, which ensured secure key distribution through Diffie-Hellman key exchange mechanism. However, this scheme did not realize real mutual authentication process, and was vulnerable to impersonation attacks. Zhang et al. [13] proposed a protocol, which realized mutual authentication and secure data transmission by means of base stations. However, the excessive participation of the base station leaded to the limitations. Hsu et al. [14] proposed a D2D group communication protocol to achieve anonymity. But this protocol was only for communication between two users. Zhang et al. [15] designed a D2D communication transmission protocol based on certificateless generalized signcryption technology. This protocol could protect sensitive information and was suitable for mobile medical systems. However, this protocol could not be applied to batch verification. Man et al. [16] proposed a secure device discovery and data transmission for 5G D2D devices. It used the associated data authentication encryption. The scheme was computationally light, could be used in any resource-constrained 5G device, and it can withstand a variety of active and passive protocol attacks. However, this scheme provided one-to-one scenario communication. Wang et al. [17] proposed a protocol that could be authenticated in roaming scenarios. Pham et al. [18] proposed a privacy protection protocol. The protocol protected the privacy of related devices and realized the secure communication between devices. However, the computation overhead of this scheme was large. Gaba et al. [19] proposed a key exchange algorithm. The protocol could carry out D2D communication in WiFi direct environment and had strong resistance. Moreover, the above schemes are based on one-to-one communication mode and are not suitable for group communication.
Then, we introduce the D2D group communication. Wang et al. [20] proposed a dynamic group key protocol. It realized secure communication. Since the users of this protocol did not directly participate in the communication with the base station, it was easy to cause internal attacks in the protocol. Mustafa et al. [21] proposed a group key agreement scheme suitable in the medical Internet of Things. This scheme used secret sharing to distribute keys. But this scheme could not achieve dynamic group member management. When the members changed, the forward and backward security of the group could not be guaranteed. Shang et al. [22] proposed a protocol based on certificateless public key encryption. This scheme provided secure and anonymous communication, but this scheme required each group device to verify all signatures in the group. Sun et al. [23] proposed a unified and efficient authentication mechanism for heterogeneous D2D terminals based on unpaired creditless batch signature, prefix encryption of identity and Chinese remainder theorem. Hsu et al. [24] introduced a group-anonymity and accountability mechanism to assist D2D communication authentication and key agreement. The mechanism included two authentication methods, both of which can realize communication. Wang et al. [25] proposed an authentication protocol. It used hash and identity signature. This protocol could be used for privacy protection of D2D communication. However [24, 25], required more overhead.
3 Preliminaries
3.1 System model
The system model adopted in this paper is shown in Figure 1; [11–15, 20–22], which includes gNB, 5G core network, and Internet of Things device (IoTD). The gNB is the infrastructure connecting the core network and device. 5G core network is mainly composed of access and mobility management function (AMF), security anchor function (SEAF), authentication server function (AUSF), authentication credential repository and processing function (ARPF), and unified data management (UDM) [8]. IoTD is an Internet of Things device that needs D2D communication. It is assumed that a group of IoTDs is within the coverage of the same gNB. In our system model, as the registration center of IoTD, ARPF/UDM is mainly responsible for the information registration of IoTD. According to the diameter protocol [26] formulated by 3GPP organization, since the communication of 5G core network nodes is transmitted by using the wired channel between backbone networks, it is reasonable to believe that the communication channel between ARPF/UDM and AMF/SEAF is safe. In order to reduce the bandwidth consumption and communication delay, after the Internet of Things device is registered through ARPF/UDM, it sends the relevant registration information to AMF through the secure channel. AMF acts as a server to complete the authentication with the Internet of Things device.
3.2 Threat model
In the communication, because it is an open wireless channel, an attacker can monitor the channel without worrying about eavesdropping being discovered, and at the same time, the intercepted data can be used for traffic analysis. In addition, attackers can also construct D2D masquerading nodes and interfere with network security authentication and key agreement. The scene characteristics of this communication are similar to the Dolev-Yao model [27]. Therefore, we define that the attacker in this scenario has similar attack capabilities to the attacker in the Dolev-Yao model. The attacker can monitor, intercept, and store all the conversations between devices, establish a connection with the device by constructing a disguised node and perform security authentication and key agreement protocols, and can replay intercepted messages.
3.3 Security requirements
The protocol needs to meet the following requirements to ensure the security of the protocol [16–18, 24, 25].
1) Mutual authentication: in order to prevent attackers from interfering with the data flow process, the identity of the IoTD is determined through mutual authentication [28–30].
2) Session key agreement: the IoTD generates a session key through session key agreement and uses the session key to encrypt data, thereby ensuring the security of data transmission.
3) Identity anonymity: in the D2D communication process, the security of the IoTD identity must always be guaranteed.
4) Resist attacks: the protocol proposed in this paper should be able to resist all kinds of active and passive attacks [31–33].
3.4 Chebyshev polynomials
The definition of n-order Chebyshev polynomial is shown in the following equation [34]:
The recurrence relation of Chebyshev polynomials is shown in the following equation:
Where:
Chebyshev polynomials have semigroup propertie:
Definition 1. chaotic map-based computational Diffie Hellman problem (CCDH problem): given a Chebyshev polynomial
3.5 Chinese remainder theorem
The Chinese remainder theorem can solve any system of Congruence Equations to obtain the same solution [37]. The theorem is introduced as follows.
Suppose there are coprime positive integers
Where:
3.6 Secret sharing algorithm
The secret sharing algorithm [38] divides the secret value s into n secret shares through relevant algorithms and distributes them to n users for sharing, and each user saves one secret share. If users want to recover the shared secret value, they only need any t or more users to provide their own secret share, and the secret value will be reconstructed. It mainly includes secret share distribution and secret reconstruction.
1) Secret share distribution
The distributor selects any finite field
Where p is a large prime number, the secret value D =
Then it randomly generates n different integers
2) Secret reconstruction
Suppose a total of m users participate in secret reconstruction, and the secret value is calculated by formula (6). If the reconstructed secret value satisfies
4 Proposed scheme
Based on [11–25], this paper proposes a lightweight and secure D2D group authentication protocol. This section describes flow chart and the protocol process in Figures 2, 3; Table 1 lists the symbols used in the protocol.
4.1 System setup
At this stage, ARPF/UDM chooses two relatively prime large prime numbers p and q. Then ARPF/UDM selects the anti-collision hash function
4.2 IoTD registration
1)
2) After receiving the message, ARPF/UDM randomly selects a value
4.3 Device discovery and authentication phase
Here, we assume that n devices communicate with each other through the D2D discovery process [27]. At this time, the devices need to verify their identity through AMF.
1)
2) AMF sets a time timer to wait for n devices to be received. If the information of all devices is received, the authentication continues, otherwise, the authentication process is terminated. AMF checks whether the received timestamp
3) After receiving the message,
At this time, if the verification is passed, then the devices start mutual authentication and group session key negotiation. If the verification fails, the verification is terminated.
1)
2) When
3) After receiving the message, AMF checks whether the information of n devices is received. If the information of all devices is received, the authentication continues; otherwise, the authentication process is terminated. AMF checks whether the received timestamp
4) When
5 Security evaluation
5.1 Proof of security
This section uses BAN logic [39] to formally analyze the proposed protocol, and theoretically prove the safety. The logic rules and symbols are shown in Table 2. Here, we only prove the mutual authentication and key negotiation of IoTD.
1) Protocol idealization
2) Protocol goal
3) Initial hypothesis
4) Proof of protocol
The security proof of this scheme is as follows:
From the message
From
From
From
Given
From
According to the message
According to
From
According to
From
Given
Through
5.2 Security analysis
This section uses informal security analysis to prove that the proposed authentication protocol can support a variety of security attributes and effectively resist known security attacks.
Identity Anonymity Protection. In this scheme, the user registers by using a temporary identity
Mutual Authentication. In the scheme, the device generates the authentication value
Resist Counterfeiting Attacks. In this scheme, Chebyshev Polynomials is used to generate the verification value
Resist Replay Attacks. In this scheme, the timestamp
Resisting MitM Attacks. During the execution of the protocol, the attacker may eavesdrop on the communication information {
Perfect Forward Secrecy. In this scheme,
5.3 Security comparison
To prove the security of the protocol, the research work with similar functions in recent years is selected for comparison. Table 3 shows the comparison results of security attributes and functions with those in the same type of protocols. The proposed protocol can meet all the security attributes in the table, while other authentication protocols could not meet.
6 Performance analysis
This section will analyze the computation overhead and communication overhead. In addition, this section will also compare the proposed protocol with the research work of [22, 23].
6.1 Computation overhead
In order to quantify the calculation time of each algorithm, through simulation on 64-bit Windows 10 system, we tested the calculation time of ecc-based scalar multiplication
6.2 Communication overhead
The communication overhead considered in this paper mainly comes from device authentication. Assume that the length of ECC algorithm, identity information, timestamp, hash value and random number are respectively 256, 128, 32, 128, 64 bits. Both chebyshev polynomial and lagrangian interpolation are 160 and 128 bits. The calculation results of relevant communication overhead in this paper are shown in Table 5 and Figure 5. From the analysis in Figure 5, it can be seen that because the scheme [23] is aimed at a one-to-many scenario, the communication overhead is small. As shown in the figure, compared with [22], the proposed scheme has less communication overhead. And as the number of IoTD increases, the advantages become more obvious.
7 Conclusion
Due to the openness of wireless communication environment and the large number of IoT equipment nodes, security and efficiency are the key factors for the development of wireless IoT. In addition, D2D communication technology in 5G is a resource reuse technology, and the terminal equipment can communicate directly without passing through the base station. Therefore, the combination of Internet of things technology and 5G network can well solve their business needs. Currently, their combination leads to more complex environment and more security challenges. Therefore, we propose a D2D group communication protocol for wirless IoT in 5G. This protocol not only realizes identity privacy protection and group authentication, but also can resist malicious attacks, so as to ensure the security of D2D communication in wirless IoT. Compared with other D2D communication related schemes, this scheme can achieve more security objectives and availability in complex communication scenarios. According to BAN logic proof and Informal security analysis, it can be seen that our scheme meets the security requirements required in this paper. Finally, through the analysis of communication overhead and computation overhead, we can see that our scheme has better performance advantages. In the future, we plan to introduce blockchain and physical unclonable function to design a more lightweight and secure group authentication protocol for wirless IoT.
Data availability statement
The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding author.
Author contributions
JM: study conception and administration. JM, ML, and ZW: methodology and validation. XX and MW: experimental work and manuscript drafting. XX and JL: manuscript review and editing. All authors contributed to the article and approved the submitted version.
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
1. Medaglia AS. An overview of privacy and security issues in the Internet of things. Berlin, Germany: The Internet of Things (2010). p. 389–95.
2. Shen X. Device-to-device communication in 5G cellular networks. IEEE Netw (2015) 29(2):2–3. doi:10.1109/mnet.2015.7064895
3. Asadi A, Wang Q, Mancuso V. A survey on device-to-device communication in cellular networks. Commun Surv Tutorials (2014) 16(4):1801–19. doi:10.1109/comst.2014.2319555
4. Doppler K, Rinne M, Wijting C, Ribeiro CB, Hugl K. Device-to-device communication as an underlay to lte-advanced networks. Mod Sci Tech Telecommunications (2010) 47(12):42–9. doi:10.1109/mcom.2009.5350367
5. Haus M, Waqas M, Ding AY, Li Y, Tarkoma S, Ott J. Security and privacy in device-to-device (D2D) communication: A review. IEEE Commun Surv Tutorials (2017) 19(2):1054–79. doi:10.1109/comst.2017.2649687
6. Saqlain J. IoT and 5G: History evolution and its architecture their compatibility and future. Helsinki, Finland: Subtitle Metropolia University of Applied Sciences (2018).
7. Li S, Li DX, Zhao S. 5G internet of things: A survey. J Ind Inf Integration (2018) 10:1–9. doi:10.1016/j.jii.2018.01.005
8. Seok B, Sicato J, Erzhena T, Xuan C, Pan Y, Park JH. Secure D2D communication for 5G IoT network based on lightweight cryptography. Appl Sci (2019) 10(1):217. doi:10.3390/app10010217
9. Chien HY. Two-level-composite-hashing facilitating highly efficient anonymous IoT and D2D authentication. Electronics (2021) 10(7):789. doi:10.3390/electronics10070789
10. Fang H, Qi A, Wang X. Fast authentication and progressive authorization in large-scale IoT: How to leverage AI for security enhancement. IEEE Netw (2020) 34(3):24–9. doi:10.1109/mnet.011.1900276
11. Alam M, Du Y, Rodriguez J, Abd-Alhameed RA. Secure device-to-device communication in lte-a. IEEE Commun Mag (2014) 52(4):66–73. doi:10.1109/mcom.2014.6807948
12. Shen W, Hong W, Cao X, Bo Y, Shila DM, Yu C. Secure key establishment for device-to-device communications. In: proceedings of the 2014 IEEE Global Communications Conference; December 2014; Austin, TX, USA. IEEE.
13. Zhang A, Chen J, Hu RQ, Yi Q. Seds: Secure data sharing strategy for d2d communication in lte-advanced networks. IEEE Trans Vehicular Tech (2016) 65(4):2659–72. doi:10.1109/tvt.2015.2416002
14. Hsu RH, Lee J. Group anonymous d2d communication with end-to-end security in lte-a. In: Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS); September 2015; Florence, Italy. IEEE. p. 451–9.
15. Zhang A, Lei W, Ye X, Lin X. Light-weight and robust security-aware d2d-assist data transmission protocol for mobile health systems. IEEE Trans Inf Forensics Security (2017) 12(3):662–75. doi:10.1109/tifs.2016.2631950
16. Man CC, Ma M. A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks. Comput Electr Eng (2021) 95(4):107375. doi:10.1016/j.compeleceng.2021.107375
17. Wang M, Yan Z, Niemi V. Uaka-d2d: Universal authentication and key agreement protocol in d2d communications. Mobile Networks Appl (2017) 22(3):510–25. doi:10.1007/s11036-017-0870-5
18. Pham C, Dang TK. A lightweight authentication protocol for D2D-enabled IoT systems with privacy. Pervasive Mobile Comput (2021) 74:101399. doi:10.1016/j.pmcj.2021.101399
19. Gaba GS, KumarKim GTH, Monga H, Kumar P. Secure device-to-device communications for 5G enabled internet of things applications. Computer Communications,nol. (2021) 169(4):114–28. doi:10.1016/j.comcom.2021.01.010
20. Wang L, Tian Y, Zhang D, Lu Y. Constant-round authenticated and dynamic group key agreement protocol for d2d group communications. Inf Sci (2019) 503:61–71. doi:10.1016/j.ins.2019.06.067
21. Mustafa U, Philip N. Group-based key exchange for medical iot device-to-device communication (d2d) combining secret sharing and physical layer key exchange. In: Proceedings of the 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3); January 2019; London, UK.
22. Shang Z, Ma M, Li X. A secure group-oriented device-todevice authentication protocol for 5g wireless networks. IEEE Trans Wireless Commun (2020) 99:7021–32. doi:10.1109/twc.2020.3007702
23. Sun Y, Cao J, Ma M, Zhang Y, Niu B. Eapddba: Effcient anonymity proximity device discovery and batch authentication mechanism for massive d2d communication devices in 3gpp 5g hetnet. IEEE Trans Dependable Secure Comput (2020) 99.
24. Hsu RH, Lee J, Quek T, Chen JC. Graad: Group anonymous and accountable d2d communication in mobile networks. IEEE Trans Inf Forensics Security (2017) 13(2):449–64. doi:10.1109/tifs.2017.2756567
25. Wang M, Yan Z. Privacy-preserving authentication and key agreement protocols for d2d group communications. IEEE Trans Ind Inform (2017) 14:3637–47. doi:10.1109/tii.2017.2778090
26.3rd generation partnership project(3gpp)ts33.501-f10, “Tech Specification Group Serv Syst Aspects,” Security architecture procedures 5G Syst, 2018.
27. Dolev D, Yao CC. On the security of public key protocols,Symposium on Foundations of Computer Science. In: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981); October 1981; Nashville, TN, USA. IEEE.
28. Nour B, Sharif K, Li F, Wang Y. Security and privacy challenges in information-centric wireless internet of things networks. IEEE Security & Privacy (2019) 18(2):35–45. doi:10.1109/msec.2019.2925337
29. Asghar Z, Ali N, Waqas M, Nazeer M, Khan WA. Locomotion of an efficient biomechanical sperm through viscoelastic medium. Biomech Model Mechanobiology (2020) 19:2271–84. doi:10.1007/s10237-020-01338-z
30. Asghar Z, Ali N, Javid K, Waqas M, Khan WA. Dynamical interaction effects on soft-bodied organisms in a multi-sinusoidal passage. The Eur Phys J Plus (2021) 136:693–17. doi:10.1140/epjp/s13360-021-01669-5
31. Jan S, Musa S, Ali T, Nauman M, Anwar S, Ali Tanveer T, et al. Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models. Expert Syst (2021) 38(4):e12611. doi:10.1111/exsy.12611
32. Ali T, Khan Y, Ali T, Faizullah S, Alghamdi T, Anwar S. An automated permission selection framework for android platform. J Grid Comput (2020) 18:547–61. doi:10.1007/s10723-018-9455-1
33. Anwar S, Al-Obeidat F, Tubaishat A, Din S, Ahmad A, Khan FA, et al. Countering malicious URLs in internet of things using a knowledge-based approach and a simulated expert. IEEE Internet Things J (2019) 7(5):4497–504. doi:10.1109/jiot.2019.2954919
34. Qiu S, Wang D, Xu G, Kumari S. Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Trans Dependable Secure Comput (2020) 19(2):1338–1351. doi:10.1109/TDSC.2020.3022797
35. Zhang L. Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons & Fractals (2008) 37(3):669–74. doi:10.1016/j.chaos.2006.09.047
36. RoyChatterjeeDas SSAK, Chattopadhyay S, Kumari S, Jo M. Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet Things J (2018) 5(4):2884–95. doi:10.1109/jiot.2017.2714179
37. Zhang J, Cui J, Zhong H, Chen Z, Liu L PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans Dependable Secure Comput (2019) 18. doi:10.1109/TDSC.2019.2904274
38. Fuyou M, Yan X, Xingfu W, Badawy M Randomized component and its application to (t,m,n) group oriented secret sharing. IEEE Trans Inf Forensics Security (2017) 10(5):889–99.
Keywords: authentication, communication, Device to Device, security, wireless IoT
Citation: Miao J, Wang Z, Xue X, Wang M, Lv J and Li M (2023) Lightweight and secure D2D group communication for wireless IoT. Front. Phys. 11:1210777. doi: 10.3389/fphy.2023.1210777
Received: 23 April 2023; Accepted: 24 May 2023;
Published: 14 June 2023.
Edited by:
Bo Rong, Communications Research Centre Canada (CRC), CanadaReviewed by:
Meet Kumari, Chandigarh University, IndiaZeeshan Asghar, Prince Sultan University, Saudi Arabia
Sajid Anwar, Institute of Management Sciences, Pakistan
Copyright © 2023 Miao, Wang, Xue, Wang, Lv and Li. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Min Li, limintomato@163.com