skip to main content
10.1145/3419394.3423666acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments

Published: 27 October 2020 Publication History

Abstract

Due to increasing digitalization, formerly isolated industrial networks, e.g., for factory and process automation, move closer and closer to the Internet, mandating secure communication. However, securely setting up OPC UA, the prime candidate for secure industrial communication, is challenging due to a large variety of insecure options. To study whether Internet-facing OPC UA appliances are configured securely, we actively scan the IPv4 address space for publicly reachable OPC UA systems and assess the security of their configurations. We observe problematic security configurations such as missing access control (on 24% of hosts), disabled security functionality (24%), or use of deprecated cryptographic primitives (25%) on in total 92% of the reachable deployments. Furthermore, we discover several hundred devices in multiple autonomous systems sharing the same security certificate, opening the door for impersonation attacks. Overall, in this paper, we highlight commonly found security misconfigurations and underline the importance of appropriate configuration for security-featuring protocols.

Supplementary Material

MP4 File (imc2020-612-long.mp4)
This is the presentation video to "Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments" [In ACM Internet Measurement Conference (IMC ?20)]. Within this talk, we present our research where we showed that 92% of Internet-facing OPC UA deployments have problematic security configurations, e.g., missing access control (on 44% of hosts), disabled security functionality (24%), or use of deprecated cryptographic primitives (25%). Furthermore, we discover several hundred devices in multiple autonomous systems sharing the same security certificate, opening the door for impersonation attacks. Overall, we underpinned that secure protocols, in general, are no guarantee for secure deployments if they need to be configured correctly following regularly updated guidelines that account for basic primitives losing their security promises.

References

[1]
Johanna Amann, Oliver Gasser, Quirin Scheitle, Lexi Brent, Georg Carle, and Ralph Holz. 2017. Mission Accomplished? HTTPS Security after Diginotar. In Proceedings of the 2017 Internet Measurement Conference (IMC 17). ACM, 325--340. https://doi.org/10.1145/3131365.3131401
[2]
Elaine Barker and Allen Roginsky. 2019. Recommendation for Cryptographic Key Generation. NIST SP 800-133 Rev. 1. (2019).
[3]
Roland Bodenheim, Jonathan Butts, Stephen Dunlap, and Barry Mullins. 2014. Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. International Journal of Critical Infrastructure Protection 7, 2 (2014), 114--123. https://doi.org/10.1016/j.ijcip.2014.03.001
[4]
Olivier Cabana, Amr M. Youssef, Mourad Debbabi, Bernard Lebel, Marthe Kassouf, and Basile L. Agba. 2019. Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems. In Proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 19). Springer, 89--108. https://doi.org/10.1007/978-3-030-22038-9_5
[5]
Jorge Martín Ceron, Justyna Joanna Chromik, José Jair Cardoso de Santanna, and Aiko Pras. 2019. Online Discoverability and Vulnerabilities of ICS/SCADA Devices in the Netherlands. Technical Report. University of Twente.
[6]
Manuel Cheminod, Luca Durante, and Adriano Valenzano. 2013. Review of Security Issues in Industrial Networks. IEEE Transactions on Industrial Informatics 9, 1 (2013), 277--293. https://doi.org/10.1109/TII.2012.2198666
[7]
Taejoong Chung, Yabing Liu, David Choffnes, Dave Levin, Bruce MacDowell Maggs, Alan Mislove, and Christo Wilson. 2016. Measuring and Applying Invalid SSL Certificates: The Silent Majority. In Proceedings of the 2016 Internet Measurement Conference (IMC 16). ACM, 527--541. https://doi.org/10.1145/2987443.2987454
[8]
Kyle Coffey, Richard Smith, Leandros Maglaras, and Helge Janicke. 2018. Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks 2018 (2018). https://doi.org/10.1155/2018/3794603
[9]
COMSYS. 2020. zgrab2 OPC UA scanner plugin. (2020). https://github.com/COMSYS/zgrab2
[10]
Ang Cui and Salvatore J. Stolfo. 2010. A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC 10). ACM, 97--106. https://doi.org/10.1145/1920261.1920276
[11]
Markus Dahlmanns, Johannes Lohmöller, Ina Bernice Fink, Jan Pennekamp, Klaus Wehrle, and Martin Henze. 2020. Dataset to "Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments". (2020). https://doi.org/10.18154/RWTH-2020-09197
[12]
Quynh H. Dang. 2012. Recommendation for Applications Using Approved Hash Algorithms. NIST SP 800-107 Rev. 1. (2012).
[13]
Nicholas DeMarinis, Stefanie Tellex, Vasileios P. Kemerlis, George Konidaris, and Rodrigo Fonseca. 2019. Scanning the Internet for ROS: A View of Security in Robotics Research. In Proceedings of the 2019 International Conference on Robotics and Automation (ICRA 19). IEEE, 8514--8521. https://doi.org/10.1109/ICRA.2019.8794451
[14]
David Dittrich and Erin Kenneally. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Technical Report. U.S. Department of Homeland Security.
[15]
Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, and J Alex Halderman. 2015. A Search Engine Backed by Internet-Wide Scanning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 15). ACM, 542--553. https://doi.org/10.1145/2810103.2813703
[16]
Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast Internet-wide Scanning and Its Security Applications. In Proceedings of the 22nd USENIX Security Symposium (SEC 14). USENIX Association, 605--620.
[17]
Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir Memon, and Mustaque Ahamad. 2017. Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis. In Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS 17). Internet Society. https://doi.org/10.14722/ndss.2017.23149
[18]
Federal Office for Information Secruity. 2020. Cryptographic Mechanisms. BSI TR-02102. (2020).
[19]
Federal Office for Information Security. 2017. OPC UA Security Analysis. Technical Report. Federal Office for Information Security (BSI).
[20]
Xuan Feng, Qiang Li, Haining Wang, and Limin Sun. 2016. Characterizing industrial control system devices on the Internet. In Proceedings of the 2016 IEEE 24th International Conference on Network Protocols (ICNP 16). IEEE. https://doi.org/10.1109/ICNP.2016.7784407
[21]
FreeOpcUA. 2016 (accessed June 2, 2020). FreeOpcUa Example Implementation. https://github.com/FreeOpcUa/python-opcua/tree/master/examples. (2016 (accessed June 2, 2020)).
[22]
Oliver Gasser, Benjamin Hof, Max Helm, Maciej Korczynski, Ralph Holz, and Georg Carle. 2018. In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements. In Proceedings of the 19th International Conference on Passive and Active Measurement (PAM 18). Springer, 173--185. https://doi.org/10.1007/978-3-319-76481-8_13
[23]
Oliver Gasser, Ralph Holz, and Georg Carle. 2014. A deeper understanding of SSH: Results from Internet-wide scans. In Proceedings of the 2014 IEEE Network Operations and Management Symposium (NOMS 14). IEEE. https://doi.org/10.1109/NOMS.2014.6838249
[24]
Béla Genge and Călin Enăchescu. 2016. ShoVAT: Shodan-Based Vulnerability Assessment Tool for Internet-Facing Services. Security and Communication Networks 9, 15 (2016), 2696--2714. https://doi.org/10.1002/sec.1262
[25]
Adam Hansson, Mohammad Khodari, and Andrei Gurtov. 2018. Analyzing Internet-connected industrial equipment. In Proceedings of the 2018 International Conference on Signals and Systems (ICSigSys 18). IEEE, 29--35. https://doi.org/10.1109/ICSIGSYS.2018.8372775
[26]
Kevin E. Hemsley and Ronald E. Fisher. 2018. History of Industrial Control System Cyber Incidents. Technical Report. Idaho National Laboratory. https://doi.org/10.2172/1505628
[27]
Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2012. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 205--220. https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/heninger
[28]
Martin Henze. 2020. The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation. In Proceedings of the 2020 IEEE Conference on Communications and Network Security (CNS 20). IEEE.
[29]
Jens Hiller, Jan Pennekamp, Markus Dahlmanns, Martin Henze, Andriy Panchenko, and Klaus Wehrle. 2019. Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. In Proceedings of the 2019 IEEE 27th International Conference on Network Protocols (ICNP 19). IEEE. https://doi.org/10.1109/ICNP.2019.8888033
[30]
Filip Holik, Josef Horalek, Ondrej Marik, Sona Neradova, and Stanislav Zitta. 2014. Effective penetration testing with Metasploit framework and methodologies. In Proceedings of the 2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI 14). IEEE, 237--242. https://doi.org/10.1109/CINTI.2014.7028682
[31]
Ralph Holz, Johanna Amann, Olivier Mehani, Matthias Wachs, and Mohamed Ali Kaafar. 2016. TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. Proceedings 23rd Annual Network and Distributed System Security Symposium (NDSS 16) (2016). https://doi.org/10.14722/ndss.2016.23055
[32]
Ralph Holz, Lothar Braun, Nils Kammenhuber, and Georg Carle. 2011. The SSL Landscape: A Thorough Analysis of the x.509 PKI Using Active and Passive Measurements. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC 11). ACM, 427--444. https://doi.org/10.1145/2068816.2068856
[33]
Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-Physical Systems Security---A Survey. IEEE Internet of Things Journal 4, 6 (2017), 1802--1831. https://doi.org/10.1109/JIOT.2017.2703172
[34]
René Hummen, Hanno Wirtz, Jan Henrik Ziegeldorf, Jens Hiller, and Klaus Wehrle. 2013. Tailoring end-to-end IP security protocols to the Internet of Things. In Proceedings of the 2013 21st IEEE International Conference on Network Protocols (ICNP 13). IEEE. https://doi.org/10.1109/ICNP.2013.6733571
[35]
Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, and Pavel Čeleda. 2018. Assessing Internet-Wide Cyber Situational Awareness of Critical Sectors. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 18). ACM. https://doi.org/10.1145/3230833.3230837
[36]
Karl-Heinz John and Michael Tiegelkamp. 2010. IEC 61131-3: Programming Industrial Automation Systems Concepts and Programming Languages, Requirements for Programming Systems, Decision-Making Aids (2nd ed.). Springer. https://doi.org/10.1007/978-3-642-12015-2
[37]
Timo Kiravuo, Seppo Tiilikainen, Mikko Särelä, and Jukka Manner. 2015. Peeking Under the Skirts of a Nation: Finding ICS Vulnerabilities in the Critical Digital Infrastructure. In Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS 15). ACPI, 137--144.
[38]
Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, and Michael Bailey. 2018. Tracking Certificate Misissuance in the Wild. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 785--798. https://doi.org/10.1109/SP.2018.00015
[39]
Heiner Lasi, Peter Fettke, Hans-Georg Kemper, Thomas Feld, and Michael Hoffmann. 2014. Industry 4.0. Business & Information Systems Engineering 6, 4 (2014), 239--242. https://doi.org/10.1007/s12599-014-0334-4
[40]
Éireann P. Leverett. 2011. Quantitatively Assessing and Visualising Industrial System Attack Surfaces. Masters thesis. University of Cambridge.
[41]
Wolfgang Mahnke, Stefan-Helmut Leitner, and Matthias Damm. 2009. OPC Unified Architecture. Springer. https://doi.org/10.1007/978-3-540-68899-0
[42]
Antonio Mangino, Morteza Safaei Pour, and Elias Bou-Harb. 2020. Internet-Scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective. ACM Transactions on Management Information Systems (2020). https://doi.org/10.1145/3394504
[43]
Bill Miller and Dale Rowe. 2012. A survey SCADA of and critical infrastructure incidents. In Proceedings of the 1st Annual Conference on Research in Information Technology (RIIT 12). ACM, 51--56. https://doi.org/10.1145/2380790.2380805
[44]
Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, and Michael Bailey. 2016. An Internet-wide view of ICS devices. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST 16). IEEE, 96--103. https://doi.org/10.1109/PST.2016.7906943
[45]
Marcin Nawrocki, Thomas C. Schmidt, and Matthias Wählisch. 2020. Uncovering Vulnerable Industrial Control Systems from the Internet Core. In Proceedings of the 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 20). IEEE.
[46]
Nataliia Neshenko, Elias Bou-Harb, Jorge Crichigno, Georges Kaddoum, and Nasir Ghani. 2019. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Communications Surveys & Tutorials 21, 3 (2019), 2702--2733. https://doi.org/10.1109/COMST.2019.2910750
[47]
OPC Foundation. 2016. OPC UA LDS-ME! The official UA Local Discovery Server with Multicast Extensions from the OPC Foundation. https://opcfoundation.github.io/UA-LDS/. (2016).
[48]
OPC Foundation. 2017. OPC Unified Architecture --- Part 4: Services. OPC 10000-4: OPC Unified Architecture. (2017).
[49]
OPC Foundation. 2017. OPC Unified Architecture --- Part 7: Profiles. OPC 10000-7: OPC Unified Architecture. (2017).
[50]
OPC Foundation. 2018. OPC Unified Architecture --- Part 2: Security Model. OPC 10000-2: OPC Unified Architecture. (2018).
[51]
Jan Pennekamp, René Glebke, Martin Henze, Tobias Meisen, Christoph Quix, Rihan Hai, Lars Gleim, Philipp Niemietz, Maximilian Rudack, Simon Knape, Alexander Epple, Daniel Trauth, Uwe Vroomen, Thomas Bergs, Christian Brecher, Andreas Bührig-Polaczek, Matthias Jarke, and Klaus Wehrle. 2019. Towards an Infrastructure Enabling the Internet of Production. In 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS).31--37.
[52]
Uwe Pohlmann and Axel Sikora. 2018. Practical Security Recommendations for building OPC UA Applications. Industrial Ethernet Book 106 (2018).
[53]
Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea Maria Zanchettin, and Stefano Zanero. 2017. An Experimental Security Analysis of an Industrial Robot Controller. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP 17). IEEE, 268--286. https://doi.org/10.1109/SP.2017.20
[54]
Jingjing Ren, Daniel J. Dubois, David Choffnes, Anna Maria Mandalari, Roman Kolcun, and Hamed Haddadi. 2019. Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach. In Proceedings of the 2019 Internet Measurement Conference (IMC 19). ACM, 267--279. https://doi.org/10.1145/3355369.3355577
[55]
Linus Roepert, Markus Dahlmanns, Ina Berenice Fink, Jan Pennekamp, and Martin Henze. 2020. Assessing the Security of OPC UA Deployments. In Proceedings of the 1st ITG Workshop on IT Security (ITSec 20). University of Tübingen. https://doi.org/10.15496/publikation-41813
[56]
Ahmad-Reza Sadeghi, Christian Wachsmann, and Michael Waidner. 2015. Security and Privacy Challenges in Industrial Internet of Things. In Proceedings of the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC 15). ACM. https://doi.org/10.1145/2744769.2747942
[57]
Nayanamana Samarasinghe and Mohammad Mannan. 2019. Another look at TLS ecosystems in networked devices vs. Web servers. Computers & Security 80 (2019), 1--13. https://doi.org/10.1016/j.cose.2018.09.001
[58]
Farooq Shaikh, Elias Bou-Harb, Nataliia Neshenko, Andrea P. Wright, and Nasir Ghani. 2018. Internet of Malicious Things: Correlating Active and Passive Measurements for Inferring and Characterizing Internet-Scale Unsolicited IoT Devices. IEEE Communications Magazine 56, 9 (2018), 170--177. https://doi.org/10.1109/MCOM.2018.1700685
[59]
Shodan. 2013. Shodan. https://www.shodan.io. (2013).
[60]
Siemens AG - Division Digital Factory. 2018. SINUMERIK 840D sl/828D / OPC UA - Projektierungshandbuch. Technical Report. Siemens AG.
[61]
Drew Springall, Zakir Durumeric, and J. Alex Halderman. 2016. Measuring the Security Harm of TLS Crypto Shortcuts. In Proceedings of the 2016 Internet Measurement Conference (IMC 16). ACM, 33--47. https://doi.org/10.1145/2987443.2987480
[62]
Ioannis Stellios, Panayiotis Kotzanikolaou, Mihalis Psarakis, Cristina Alcaraz, and Javier Lopez. 2018. A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services. IEEE Communications Surveys & Tutorials 20, 4 (2018), 3453--3495. https://doi.org/10.1109/COMST.2018.2855563
[63]
Keith Stouffer, Victoria Pillitteri, Suzanne Lightman, Marshall Abrams, and Adam Hahn. 2015. Guide to Industrial Control Systems (ICS) Security. NIST SP 800-82 Rev. 2. (2015).

Cited By

View all
  • (2024)SoK: A Reality Check for DNP3 Attacks 15 Years LaterSmart Cities10.3390/smartcities70601547:6(3983-4001)Online publication date: 14-Dec-2024
  • (2024)Towards Identifying Neglected, Obsolete, and Abandoned IoT and OT Devices2024 8th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA62044.2024.10558996(1-10)Online publication date: 21-May-2024
  • (2024)Comparing the Security Approaches of CIP and OPC UAProceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security10.1145/3689930.3695206(27-36)Online publication date: 20-Nov-2024
  • Show More Cited By

Index Terms

  1. Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure Deployments

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IMC '20: Proceedings of the ACM Internet Measurement Conference
      October 2020
      751 pages
      ISBN:9781450381383
      DOI:10.1145/3419394
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. industrial communication
      2. network security
      3. security configuration

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      Conference

      IMC '20
      IMC '20: ACM Internet Measurement Conference
      October 27 - 29, 2020
      Virtual Event, USA

      Acceptance Rates

      IMC '20 Paper Acceptance Rate 53 of 216 submissions, 25%;
      Overall Acceptance Rate 277 of 1,083 submissions, 26%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)89
      • Downloads (Last 6 weeks)9
      Reflects downloads up to 27 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)SoK: A Reality Check for DNP3 Attacks 15 Years LaterSmart Cities10.3390/smartcities70601547:6(3983-4001)Online publication date: 14-Dec-2024
      • (2024)Towards Identifying Neglected, Obsolete, and Abandoned IoT and OT Devices2024 8th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA62044.2024.10558996(1-10)Online publication date: 21-May-2024
      • (2024)Comparing the Security Approaches of CIP and OPC UAProceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security10.1145/3689930.3695206(27-36)Online publication date: 20-Nov-2024
      • (2024)Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol ImplementationsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664506(1-10)Online publication date: 30-Jul-2024
      • (2024)Ten Years of ZMapProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3689012(139-148)Online publication date: 4-Nov-2024
      • (2024)Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00117(2291-2309)Online publication date: 19-May-2024
      • (2024)Protocol Security in the Industrial Internet of ThingsNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575096(1-4)Online publication date: 6-May-2024
      • (2024)Unconsidered Installations: Discovering IoT Deployments in the IPv6 InternetNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10574963(1-8)Online publication date: 6-May-2024
      • (2024)Securing Wireless Communication in Critical Infrastructure: Challenges and OpportunitiesMobile and Ubiquitous Systems: Computing, Networking and Services10.1007/978-3-031-63989-0_17(333-352)Online publication date: 19-Jul-2024
      • (2024)Collectively Enhancing IoT Security: A Privacy-Aware Crowd-Sourcing ApproachFoundations and Practice of Security10.1007/978-3-031-57540-2_2(15-27)Online publication date: 25-Apr-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media