Submitted:
21 July 2025
Posted:
22 July 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Background and Related Work
2.1. Evolution and Emerging Threats of mHealth
2.2. Vulnerabilities in Wearables, Android, and BLE
2.3. Positioning Our Contribution
3. System Architecture and Attack Surface
4. Methodology
- Reconnaissance—mapping exposed services, BLE profiles, installed applications, and API endpoints;
- Static and dynamic analysis—extracting metadata from firmware and APKs, observing system behaviors and background processes;
- Vulnerability testing—active probing using known attack vectors and detection techniques;
- Reporting and risk rating—correlating findings across layers and quantifying their potential impact.
4.1. Server-Level Audit
4.2. Mobile-Level Audit (Samsung Galaxy A55)
4.3. Wearable Device Testing (Galaxy Watch 7)
5. Results and Comparative Analysis
5.1. Layered Summary of Findings
5.3. Cross-Domain Risk Propagation
5.4. Interpretation and Real-World Implications
6. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| ABE | Attribute-Based Encryption |
| ADB | Android Debug Bridge |
| BLE | Bluetooth Low Energy |
| BYOD | Bring Your Own Device |
| CSC | Customer Software Code |
| EHR | Electronic Health Records |
| GATT | Generic Attribute Profile for BLE |
| GDPR | General Data Protection Regulation |
| HIPAA | Health Insurance Portability and Accountability Act |
| mHealth | Mobile Health |
| PHR | Personal Health Records |
| SDK | Software Development Kit |
| UPnP | Universal Plug and Play |
References
- B. Konda, A. R. Yadulla, V. K. Kasula, M. Yenugula, and C. Adupa, „Enhancing Traceability and Security in mHealth Systems: A Proximal Policy Optimization-Based Multi-Authority Attribute-Based Encryption Approach”, in 2025 29th International Conference on Information Technology (IT), Feb. 2025, pp. 1–6. [CrossRef]
- H. Alzghaibi, „Barriers to the Utilization of mHealth Applications in Saudi Arabia: Insights from Patients with Chronic Diseases”, Healthcare, vol. 13, no. 6, Art. no. 6, Jan. 2025. [CrossRef]
- P. Shojaei, E. Vlahu-Gjorgievska, and Y.-W. Chow, „Enhancing privacy in mHealth Applications: A User-Centric model identifying key factors influencing Privacy-Related behaviours”, Int J Med Inform, vol. 199, p. 105907, Jul. 2025. [CrossRef]
- H. Alzghaibi, „Healthcare Practitioners’ Perceptions of mHealth Application Barriers: Challenges to Adoption and Strategies for Enhancing Digital Health Integration”, Healthcare, vol. 13, no. 5, Art. no. 5, Jan. 2025. [CrossRef]
- A. Jiménez-Zarco et al., „Impact of the COVID-19 pandemic on mHealth adoption: Identification of the main barriers through an international comparative analysis”, Int J Med Inform, vol. 195, p. 105779, Mar. 2025. [CrossRef]
- R. K. Ravi, A. Shiva, J. Jacob, P. Baby, B. Pareek, and K. B. V, „Exploring the factors influencing the intention to use mHealth applications in resource scare settings; a SEM analysis among future nurses”, Global Transitions, vol. 7, pp. 199–210, Jan. 2025. [CrossRef]
- K. M. Kezbers, M. C. Robertson, E. T. Hébert, A. Montgomery, and M. S. Businelle, „Detecting Deception and Ensuring Data Integrity in a Nationwide mHealth Randomized Controlled Trial: Factorial Design Survey Study”, J Med Internet Res, vol. 27, p. e66384, Jan. 2025. [CrossRef]
- S. A. Alharthi, „Bridging the Digital Divide in Health for Older Adults: A Repeated Cross-Sectional Study of mHealth in Saudi Arabia”, IEEE Access, vol. 13, pp. 63757–63773, 2025. [CrossRef]
- S. M. S. Islam, A. Singh, S. V. Moreno, S. Akhter, and J. Chandir Moses, „Perceptions of healthcare professionals and patients with cardiovascular diseases on mHealth lifestyle apps: A qualitative study”, Int J Med Inform, vol. 194, p. 105706, Feb. 2025. [CrossRef]
- K. Katsaliaki, S. Kumar, and P. Galetsi, „Patient and societal indicators for mHealth apps’ evaluation using Health Technology Assessment framework”, Technovation, vol. 140, p. 103143, Feb. 2025. [CrossRef]
- J. J. Su et al., „Real-World Mobile Health Implementation and Patient Safety: Multicenter Qualitative Study”, Journal of Medical Internet Research, vol. 27, no. 1, p. e71086, Apr. 2025. [CrossRef]
- J. Alipour, Y. Mehdipour, S. Zakerabasali, and A. Karimi, „Nurses’ perspectives on using mobile health applications in southeastern Iran: Awareness, attitude, and obstacles”, PLoS One, vol. 20, no. 3, p. e0316631, 2025. [CrossRef]
- I. Islomjon and A. Fazliddin, „EFFICIENCY OF MOBILE APPS IN HEALTHCARE: A CASE STUDY OF MED-UZ AI”, Modern American Journal of Medical and Health Sciences, vol. 1, no. 2, pp. 19–24, May 2025.
- S. Siddiqui, A. A. Khan, M. A. Khan Khattak, and R. Sosan, „Mobile Health (m-Health)”, in Connected Health Insights for Sustainable Development: Integrating IoT, AI, and Data-Driven Solutions, Ed., Cham: Springer Nature Switzerland, 2025, pp. 51–68. [CrossRef]
- Insights into the Technological Evolution and Research Trends of Mobile Health: Bibliometric Analysis”. Accessed: Jun 2025. [Online]. Available: https://www.mdpi.com/2227-9032/13/7/740.
- P. Geldsetzer, S. Flores, B. Flores, A. B. Rogers, and A. Y. Chang, „Healthcare provider-targeted mobile applications to diagnose, screen, or monitor communicable diseases of public health importance in low- and middle-income countries: A systematic review”, PLOS Digital Health, vol. 2, no. 10, p. e0000156, Oct. 2023. [CrossRef]
- A. Krbec et al., „Emerging innovations in neonatal monitoring: a comprehensive review of progress and potential for non-contact technologies”, Front Pediatr, vol. 12, p. 1442753, 2024. [CrossRef]
- S. H. Alsamhi et al., „Federated Learning Meets Blockchain in Decentralized Data Sharing: Healthcare Use Case”, IEEE Internet of Things Journal, vol. 11, no. 11, pp. 19602–19615, Jun. 2024. [CrossRef]
- E. Badidi, „Edge AI for Early Detection of Chronic Diseases and the Spread of Infectious Diseases: Opportunities, Challenges, and Future Directions”, Future Internet, vol. 15, no. 11, Art. no. 11, Nov. 2023. [CrossRef]
- A. Boulemtafes, A. Derhab, and Y. Challal, „Privacy-preserving deep learning for pervasive health monitoring: a study of environment requirements and existing solutions adequacy”, Health Technol (Berl), vol. 12, no. 2, pp. 285–304, 2022. [CrossRef]
- L. Fiorina et al., „Artificial intelligence–based electrocardiogram analysis improves atrial arrhythmia detection from a smartwatch electrocardiogram”, European Heart Journal—Digital Health, vol. 5, no. 5, pp. 535–541, Sep. 2024. [CrossRef]
- S. Madanian, T. Chinbat, M. Subasinghage, D. Airehrour, F. Hassandoust, and S. Yongchareon, „Health IoT Threats: Survey of Risks and Vulnerabilities”, Future Internet, vol. 16, no. 11, Art. no. 11, Nov. 2024. [CrossRef]
- A. Forsberg and L. Iwaya, „Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study”, 2024.
- „Sensors | Special Issue : Security and Privacy for IoT and Metaverse”. Accessed: Jun 27, 2025. [Online]. Available: https://www.mdpi.com/journal/sensors/special_issues/security_privacy_IoT_Metaverse.
- M. Anjum, N. Kraiem, H. Min, A. K. Dutta, Y. I. Daradkeh, and S. Shahab, „Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning”, Sci Rep, vol. 15, no. 1, p. 7589, Mar. 2025. [CrossRef]
- W. Zhang, J. Xing, and X. Li, „Penetration Testing for System Security: Methods and Practical Approaches”, May 2025, arXiv: arXiv:2505.19174. [CrossRef]
- G. Kołaczek, „Internet of Things (IoT) Technologies in Cybersecurity: Challenges and Opportunities”, Applied Sciences, vol. 15, no. 6, Art. no. 6, Jan. 2025. [CrossRef]
- P. Krawiec, R. Janowski, J. Mongay Batalla, E. Andrukiewicz, W. Latoszek, and C. X. Mavromoustakis, „On providing multi-level security assurance based on Common Criteria for O-RAN mobile network equipment. A test case: O-RAN Distributed Unit”, Computers & Security, vol. 150, p. 104271, Mar. 2025. [CrossRef]
- A .K. B. Arnob, R. R. Chowdhury, N. A. Chaiti, S. Saha, and A. Roy, „A comprehensive systematic review of intrusion detection systems: emerging techniques, challenges, and future research directions”, Journal of Edge Computing, vol. 4, no. 1, May 2025. [CrossRef]
- T. Mirzoev, M. Miller, S. Lasker, and M. Brannon, „Mobile Application Threats and Security”, Feb. 2025, arXiv: arXiv:2502.05685. [CrossRef]
- A .Alanda, D. Satria, H. A. Mooduto, and B. Kurniawan, „Mobile Application Security Penetration Testing Based on OWASP”, IOP Conference Series: Materials Science and Engineering, vol. 846, p. 012036, May 2020. [CrossRef]
- S. Bojjagani and V. Sastry, VAPTAi: A Threat Model for Vulnerability Assessment and Penetration Testing of Android and iOS Mobile Banking Apps. 2017, p. 86. [CrossRef]
- V. Singla, A. Singh, and G. Bhathal, „Navigating blockchain-based clinical data sharing: An interoperability review”, 2024, pp. 402–408. [CrossRef]
- „Edge Computing in Healthcare: Innovations, Opportunities, and Challenges”. Accessed: Jun 28, 2025. [Online]. Available: https://www.mdpi.com/1999-5903/16/9/329.
- Patil et al., „Federated Learning in Real-Time Medical IoT: Optimizing Privacy and Accuracy for Chronic Disease Monitoring”, Journal of Electrical Systems, vol. 19, no. 3, Art. no. 3, 2023. [CrossRef]
- K. Davis and T. Ruotsalo, „Physiological Data: Challenges for Privacy and Ethics”, Computer, vol. 58, no. 1, pp. 33–44, Jan. 2025. [CrossRef]
- B. Martínez-Pérez, I. de la Torre-Díez, and M. López-Coronado, „Privacy and security in mobile health apps: a review and recommendations”, J Med Syst, vol. 39, no. 1, p. 181, Jan. 2015. [CrossRef]
- Ravinder, M. Khan, and J. Singh, „Security Challenges in Mobile Cloud Computing”, 2024, p. 9. [CrossRef]
- U. Zaman, Imran, F. Mehmood, N. Iqbal, J. Kim, and M. Ibrahim, „Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications”, Electronics, vol. 11, no. 12, Art. no. 12, Jan. 2022. [CrossRef]
- G. Özsezer and Ş. Dağhan, „Effectiveness of wearable technologies used in the monitoring of cardiovascular diseases in the community: A systematic review of randomized controlled trials”, Computers in Biology and Medicine, vol. 189, p. 110013, May 2025. [CrossRef]
- S. Messinis, N. Temenos, N. E. Protonotarios, I. Rallis, D. Kalogeras, and N. Doulamis, „Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review”, Computers in Biology and Medicine, vol. 170, p. 108036, Mar. 2024. [CrossRef]
- P. Xi, X. Zhang, L. Wang, W. Liu, and S. Peng, „A Review of Blockchain-Based Secure Sharing of Healthcare Data”, Applied Sciences, vol. 12, no. 15, Art. no. 15, Jan. 2022. [CrossRef]
- M. N. Alruwaill, S. P. Mohanty, and E. Kougianos, „hChain 4.0: A Secure and Scalable Permissioned Blockchain for EHR Management in Smart Healthcare”, May 20, 2025, arXiv: arXiv:2505.13861. [CrossRef]
- D. A. P. Subiramaniyam N. P., „IoT-Enabled Smart Health Monitoring System with Deep Learning Models for Anomaly Detection and Predictive Health Risk Analytics Integrated with LoRa Technology”, International Journal of Engineering Trends and Technology—IJETT, Accessed: Jun 28, 2025. [Online]. Available: https://ijettjournal.org/, https://ijettjournal.org//archive/ijett-v73i1p102.
- D. Farahmandazad and K. Danesh, „ML-Driven Approaches to Combat Medicare Fraud: Advances in Class Imbalance Solutions, Feature Engineering, Adaptive Learning, and Business Impact”, Feb. 21, 2025, arXiv: arXiv:2502.15898. [CrossRef]
- M. Mohammadi, R. Javan, M. Beheshti-Atashgah, and M. R. Aref, „SCALHEALTH: Scalable Blockchain Integration for Secure IoT Healthcare Systems”, Mar. 12, 2024, arXiv: arXiv:2403.08068. [CrossRef]
- U. Zaman, Imran, F. Mehmood, N. Iqbal, J. Kim, and M. Ibrahim, „Towards Secure and Intelligent Internet of Health Things: A Survey of Enabling Technologies and Applications”, Electronics, vol. 11, no. 12, Art. no. 12, Jan. 2022. [CrossRef]
- J. Wang, S. Wang, and Y. Zhang, „Deep learning on medical image analysis”, CAAI Transactions on Intelligence Technology, vol. 10, no. 1, pp. 1–35, 2025. [CrossRef]
- H. F. Atlam and Y. Yang, „Enhancing Healthcare Security: A Unified RBAC and ABAC Risk-Aware Access Control Approach”, Future Internet, vol. 17, no. 6, Art. no. 6, Jun. 2025. [CrossRef]
- H. Zhao, D. Sui, Y. Wang, L. Ma, and L. Wang, „Privacy-Preserving Federated Learning Framework for Multi-Source Electronic Health Records Prognosis Prediction”, Sensors, vol. 25, no. 8, Art. no. 8, Jan. 2025. [CrossRef]
- M. Queipo, J. Barbado, A. M. Torres, and J. Mateo, „Approaching Personalized Medicine: The Use of Machine Learning to Determine Predictors of Mortality in a Population with SARS-CoV-2 Infection”, Biomedicines, vol. 12, no. 2, p. 409, Feb. 2024. [CrossRef]
- M. Rahmati, „Towards Explainable and Lightweight AI for Real-Time Cyber Threat Hunting in Edge Networks”, Apr. 18, 2025, arXiv: arXiv:2504.16118. [CrossRef]
- I. Pekaric, C. Sauerwein, S. Laichner, and R. Breu, „How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided Information”, Apr. 19, 2025, arXiv: arXiv:2504.14421. [CrossRef]
- G. Olson et al., „The Impact of AI on the Development of Multimodal Wearable Devices in Musculoskeletal Medicine”, HSS Journal, Jun. 2025. [CrossRef]
- N. Kaur et al., „Securing fog computing in healthcare with a zero-trust approach and blockchain”, EURASIP Journal on Wireless Communications and Networking, vol. 2025, no. 1, p. 5, Feb. 2025. [CrossRef]
- S. Inshi, R. Chowdhury, H. Ould-Slimane, and C. Talhi, „Secure Adaptive Context-Aware ABE for Smart Environments”, IoT, vol. 4, no. 2, Art. no. 2, Jun. 2023. [CrossRef]
- S. Mekruksavanich and A. Jitpattanakul, „Wearable Sensor-Based Behavioral User Authentication Using a Hybrid Deep Learning Approach with Squeeze-and-Excitation Mechanism”, Computers, vol. 13, no. 12, Art. no. 12, Dec. 2024. [CrossRef]
- M. Kapsecker and S. M. Jonas, „Cross-device federated unsupervised learning for the detection of anomalies in single-lead electrocardiogram signals”, PLOS Digital Health, vol. 4, no. 4, p. e0000793, Apr. 2025. [CrossRef]
- V. Vakhter, B. Soysal, P. Schaumont, and U. Guler, „Security for Emerging Miniaturized Wireless Biomedical Devices: Threat Modeling with Application to Case Studies”, IEEE Internet Things J., vol. 9, no. 15, pp. 13338–13352, Aug. 2022. [CrossRef]
- S. M. Ali et al., „Wearable and Flexible Sensor Devices: Recent Advances in Designs, Fabrication Methods, and Applications”, Sensors, vol. 25, no. 5, Art. no. 5, Jan. 2025. [CrossRef]
- M. A. Akif, I. Butun, A. Williams, and I. Mahgoub, „Hybrid Machine Learning Models for Intrusion Detection in IoT: Leveraging a Real-World IoT Dataset”, Feb 17, 2025, arXiv: arXiv:2502.12382. [CrossRef]
- P. Kasralikar, O. R. Polu, B. Chamarthi, R. Veer Samara Sihman Bharattej Rupavath, S. Patel, and R. Tumati, „Blockchain for Securing AI-Driven Healthcare Systems: A Systematic Review and Future Research Perspectives”, Cureus, vol. 17, no. 4, p. e83136, Apr. 2025. [CrossRef]
- D. Guy et al., „Contact tracing strategies for infectious diseases: A systematic literature review”, PLOS Global Public Health, vol. 5, no. 5, p. e0004579, May 2025. [CrossRef]
- D. Martins, S. Lewerenz, A. Carmo, and H. Martins, „Interoperability of telemonitoring data in digital health solutions: a scoping review”, Front. Digit. Health, vol. 7, Apr. 2025. [CrossRef]
- T. Riahi, M. A. H. Bappy, and M. M. Islam, „ElderFallGuard: Real-Time IoT and Computer Vision-Based Fall Detection System for Elderly Safety”, May 17, 2025, arXiv: arXiv:2505.11845. [CrossRef]
- A. Osa Sanchez, J. Ramos-Martinez-de-Soria, A. Mendez-Zorrilla, I. Ruiz, and B. Zapirain, „Wearable Sensors and Artificial Intelligence for Sleep Apnea Detection: A Systematic Review”, Journal of Medical Systems, vol. 49, May 2025. [CrossRef]
- G. Starke et al., „Finding Consensus on Trust in AI in Health Care: Recommendations From a Panel of International Experts”, J Med Internet Res, vol. 27, p. e56306, Feb. 2025. [CrossRef]
- W. Cho, S. A. Immanuel, J. Heo, and D. Kwon, „Fourier-Modulated Implicit Neural Representation for Multispectral Satellite Image Compression”, Jun 11, 2025, arXiv: arXiv:2506.01234. [CrossRef]
- K. Al-hammuri, F. Gebali, and A. Kanan, „ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Medical Errors in the Era of Generative AI and Cloud-Based Health Information Ecosystems”, AI, vol. 5, no. 3, Art. no. 3, Sep. 2024. [CrossRef]
- H. Kim et al., „Toward Robust Security Orchestration and Automated Response in Security Operations Centers with a Hyper-Automation Approach Using Agentic AI”, Feb. 27, 2025, Preprints: 2025022134. [CrossRef]
- M. Kaya and H. Shahid, „Cross-Border Data Flows and Digital Sovereignty: Legal Dilemmas in Transnational Governance”, Interdisciplinary Studies in Society, Law, and Politics, vol. 4, no. 2, Art. no. 2, Apr. 2025. [CrossRef]
- T.-C. Wu and C.-T. Ho, „Reconstructing Risk Dimensions in Telemedicine: Investigating Technology Adoption and Barriers During the COVID-19 Pandemic in Taiwan”, Journal of Medical Internet Research, vol. 27, no. 1, p. e53306, Feb. 2025. [CrossRef]
- A. Girma and A. Barrett, „Security Challenges and Solutions in 5G-Enabled IoT Networks”, 2024, pp. 632–643. [CrossRef]
- G. Wang, S. Shanker, A. Nag, Y. Lian, and D. John, „ECG Biometric Authentication Using Self-Supervised Learning for IoT Edge Sensors”, IEEE J. Biomed. Health Inform., vol. 28, no. 11, pp. 6606–6618, Nov. 2024. [CrossRef]
- M. A. Allouzi and J. Khan, „Enabling Zero Trust Security in IoMT Edge Network”, Feb. 16, 2024, arXiv: arXiv:2402.10389. [CrossRef]
- S. Bose and D. Marijan, „Secure Traversable Event logging for Responsible Identification of Vertically Partitioned Health Data”, Nov. 28, 2023, arXiv: arXiv:2311.16575. [CrossRef]
- T. Hama et al., „Enhancing Patient Outcome Prediction Through Deep Learning With Sequential Diagnosis Codes From Structured Electronic Health Record Data: Systematic Review”, Journal of Medical Internet Research, vol. 27, no. 1, p. e57358, Mar. 2025. [CrossRef]
- M. J. T. Tan and P. V. Benos, „Addressing Intersectionality, Explainability, and Ethics in AI-Driven Diagnostics: A Rebuttal and Call for Transdiciplinary Action”, Jan 15, 2025, arXiv: arXiv:2501.08497. [CrossRef]


| Layer | Tool / Technique | Purpose | Output Type |
| Backend | Trivy, OpenVAS, Nikto | Container and web vulnerability scanning | CVEs, misconfigurations, open ports |
| Docker Bench for Security | Compliance auditing and Docker hardening | CIS benchmark results | |
| Mobile (A55) | ADB, dumpsys, pm list | Device inspection, app enumeration | Package list, permission mapping |
| Frida, MobSF | Hooking, reverse engineering, APK static analysis | API calls, behavior flows, weaknesses | |
| Wireshark | Network and BLE capture from mobile device | PCAPs, session metadata | |
| Wearable | btmon, BLEAH, GATT Tool | BLE profile inspection, sniffing, replay attempts | GATT table, cleartext payloads |
| nRF Connect | Manual inspection of characteristics | BLE UUIDs and real-time reads |
| CVE ID | Affected Component | Severity | Impact Summary |
Affected Images |
| CVE-2023-45853 | Zlib | Critical | Heap-based buffer overflow during decompression | viewer, CRUD, ETL |
| CVE-2024-26462 | Kerberos (GSSAPI) | High | Memory leak in KDC GSSAPI; may lead to DoS or auth issues | gateway, CRUD |
| CVE-2023-7104 | SQLite | Critical | Heap overflow triggered by malformed SQL parsing | CRUD, viewer |
| CVE-2024-45490 | libexpat | Critical | Integer overflow in XML parser | ETL, gateway |
| CVE-2024-45491 | libexpat | Critical | Memory corruption via recursive entity expansion | ETL, gateway |
| CVE-2024-45492 | libexpat | Critical | Heap exhaustion leading to crash | ETL |
| CVE-2024-5535 | OpenSSL | Medium | TLS buffer overread; risk of session leakage | all |
| UUID | Characteristic | Access Level | Risk Summary |
| 0x180D | Heart Rate Measurement | Readable | Unencrypted heart data exposed via BLE |
| 0x2A53 | Step Count | Readable | Physical activity profile externally visible |
| 0x2A6E | Temperature | Readable | Allow passive monitoring of environment |
| 0x2A37 | Energy Expenditure | Readable | Could be used for profiling behavior |
| 0x2902 | Client Config Descriptor | Writable | Susceptible to spoofed notification triggers |
| Layer | Key Attack Vectors | Likelihood | Impact | Exploitability | Recommended Mitigations |
| Server | Unpatched CVEs (zlib, SQLite, libexpat), exposed ports | High | Critical | Moderate-High | Regular image scanning (Trivy), base image hardening |
| Legacy services (UPnP, Zeus Admin) | Medium | High | Moderate | Port minimization, firewall, TLS enforcement | |
| Mobile (A55) | token persistence, overprivileged system apps | High | High | High | Remove unused apps, enforce SELinux, audit permissions |
| Non-EU firmware, permissive SELinux | Medium | Moderate | Moderate | Flash verified firmware, enforce runtime policies | |
| Wearable (GW7) | BLE GATT readouts, advertising active, no auth on BLE | High | Moderate | High | Secure pairing, GATT access control, disable BLE adv |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).