Abstract

At present, Wi-Fi is a common medium for connecting smart devices to networks in factories. The application of mobile Internet in smart manufacturing system (SMIS) speeds up the process of smart manufacturing but also increases SMIS vulnerability to worm attack from mobile networks. In this paper, we propose a new SLBQR (susceptible-latent-breaking out-quarantined-recovered) model considering vaccination strategies with temporary immunity and quarantined strategies. Based on basic reproduction number, we give expression of quarantined rate and obtain the threshold of quarantined rate such that the worm-free equilibrium is asymptotically stable when , implying that the worm dies out eventually and its attack remains under control; the endemic equilibrium is asymptotically stable when , namely, the worm is always persistent and spreading within a population. Hence, we give the quarantined strategy to suppress the spread of virus. In addition, by theoretical analysis, we can conclude that even if the immunity time is unlimited, endemic equilibrium will not become worm-free. In other words, there is a mutation in the virus, which proves that there is no vaccination strategy with permanent immunity. Finally, we simulate our model with different temporary immune time and quarantine rates, and the results verify our theorem.

1. Introduction

Today’s world is at the beginning of the period of communication and universal processing. In this period, society is guided towards the always connected pattern. With the introduction of new technologies, the coverage of networks has been widened and the number of smart objects that are connected to the network has also been increased. A new pattern called the Internet of things (IoT) increases the amount of information generated on the Internet through connecting people and smart objects [1]. In industrial production, the connection mode between smart objects is through wireless sensor network, and the connection between smart objects and people is through the SMIS. Although, the new generation of IoT has been created to achieve quality of service (QoS), in practical industrial applications, the two connection modes of wireless sensor networks and information systems face many challenges. In the research of wireless sensor networks, the limited energy of wireless sensors is a big challenge of wireless sensor networks; hence, resource allocation and optimization is the hotspot and difficulty of research. In this research, Kumar Sangaiah et al. [1] used the total communication cost minimum as the objective function and used whale optimization algorithm (WOA) to solve the RA problem and reduce the total communication cost between resources and gateways. Sangaiah et al. [2] used bat algorithm (BA) to select the optimum monitoring sensor node and resulted path to extend the network lifetime through extending the lifetime of operating sensors as well transferring gathered data from supernode to the sink.

Since the manufacturing equipment is fixed, the connection between the smart objects through the wireless sensor network is in a relatively fixed environment. However, due to the flexibility of the operator, the connection between smart objects and people is in a changing environment. Therefore, compared with the wireless sensor network used for the connection of things, the information system used for the connection of people and things is more vulnerable, and once the manufacturing information system fails, it will bring greater disaster to the manufacturing enterprise. In addition, the application of IoT [3] enables enterprises to accomplish their tasks in a mobile way through mobile devices. For example, based on the mobile Internet, employees of manufacturing enterprises can monitor the production status at the time and place they expect, process orders, release work updates, read logs, review financial statements, and so on. With the increase of mobile network in industrial application, the scale of SMIS continues to expand. On the one hand, the growth of mobile devices and the rapid growth of applications installed on these devices have allowed the mobile Internet to scale up SMIS by adding data, mobile devices, and applications. On the other hand, the IoT enables SMIS and its subsystems to run in more places with less time constraints, thus expanding the scale of SMIS. Therefore, the application of IoT makes the traditional manufacturing information systems into smart manufacturing information system. Although it greatly promotes the development of manufacturing enterprises, it also exposes the information system to the threat of cyberattacks. Therefore, from the above analysis, we can find that it is very necessary to study the security of SMIS under cyberattacks.

Cyberattacks’ threat to SMIS is mainly reflected in information security and equipment security. Among them, information security is mainly reflected in the communication link layer. In this aspect of research, Sangaiah et al. [4] focused on aspects of conserving position and information confidentiality and proposed an energy-aware green adversary model for its use in smart industrial environment through achieving confidentiality. In addition, traditional information systems rely on stationary workstations, which can only operate in a fixed position. The SMIS makes the operation of the system that has the characteristics of mobility, ubiquity, timeliness, and convenience [5] as shown in Figure 1, so position-based confidentiality becomes a problem that cannot be ignored; in order to solve this problem, Sangaiah et al. [6] proposed machine learning techniques for conserving position confidentiality of roaming PBS users and further used mobile edge computing to offer position confidentiality and low latency by means of networking and computing services at the vicinity of roaming users.

The above information security of SMIS is based on the assumption that the communication equipment is in a healthy state. However, with the development of the IoT technology, Wi-Fi makes it one of the most widely used Internet connections between mobile devices in the industry. However, the application of mobile Internet exposes the smart devices to the dangerous environment. In mobile Internet environment, the biggest threat of these devices is computer worms as shown in Figure 2. Worms are independent programs that run without the intervention of a computer user. They spread by constantly gaining some or all control over computers with holes in the network and can cause network congestion [7]. Most mobile devices in manufacturing companies do not have any effective way to prevent worm attacks, which makes them vulnerable to such attacks. Mobile devices infected by the worm can cause huge losses to manufacturers, including corporate strategy leaks, information system disruptions, and financial losses. Common computer worms include the Code Red worm [8], the Witty worm [9], and the Slammer worm [10]. Therefore, our research of worm attack of SMIS in Wi-Fi environment is very important to the research of SMIS equipment security. This is also the basis of information security.

The research on the attack of worms on equipment of SMIS mainly focuses on the problem of virus transmission between equipment. Over the past few decades, researchers have come up with many different mathematical models to analyze the dynamic behavior and characteristics of worm propagation. The modeling of computer viruses was started by Kephart and White in 1991 [11]. In the follow-up studies, scholars used a series of biological virus transmission models to conduct studies. Martin et al. [12] applied the SIS model to study the impact of mobile malware on cell phones. Feng et al. [13] proposed a time-delayed SIRS model which introduced two parameters: temporal immunity and variable infection rate, and explored the impact of the variable infection rate on the scale of malware outbreak. However, it is unreasonable for the above models to assume that susceptible nodes will immediately become infected nodes. In fact, it takes a certain amount of time for infected nodes to send copies of the worm to susceptible nodes. Therefore, in order to overcome the above deficiency, some researchers introduced exposure status (E) in the model and proposed some new models. Signes-Pont et al. [14] took propagation dynamics of worms in smart phones as example, proposed susceptible-exposed-infected-diagnosed-recovered (SEIDR). Xia et al. [15] built a theoretical model based on five compartments susceptible-exposed-infected-recovered-dormancy (SEIRD) for the Bluetooth and MMS hybrid spread mode. Jia and Jing [16] considered immune time and established SEIRS model with time delay.

Different from above models, in the Wi-Fi environment, base station (BS) can block worm propagation by disconnecting the mobile device from the mobile network. That is, BS can quarantine infected nodes. An important quarantine strategy was taken into account in the DQ model [17], PWDQ model [18], SEIQV model [19], SEIQRS model [20], and SEIQR model [21]. Mishra and Jha [22] proposed a susceptible-exposed-infectious-quarantined-recovered (SEIQR) model for the transmission of malicious objects in computer network. Wang et al. [23] proposed a novel epidemic model which combines both vaccinations and dynamic quarantine methods (SEIQV). Due to the high similarity between network worms and biological viruses, vaccination by installing efficient antivirus software or immunization procedures has been an effective defense mechanism to control the attack of worms, and the vaccination is assumed to have full efficacy and permanent immunity [24, 25].

Through the analysis of the above literature, we find that the application of Wi-Fi has caused scholars to widely consider the impact of the quarantined state on the spread of worms between information system equipment. However, the existing research has the following problems:(1)They only introduce the quarantined state and do not further consider the impact of different quarantined strategies on the spread of worms and what kind of quarantined strategy is adopted to completely suppress the spread of the virus.(2)Although the vaccination strategy is considered, the vaccination strategy is assumed to have full efficacy and permanent immunity, but in reality, the efficacy of antivirus software does not reach 100%.

In order to solve the shortcomings of the existing research, this paper considers how to obtain the expression of the quarantined rate under the vaccination strategy with temporary immunity and how to obtain the threshold of the quarantined rate through the analysis of worm transmission and then gives quarantined strategies to suppress the spread of viruses.

Our research on the above issues has important academic value for subsequent scholars to study such issues. First of all, our research proves that there is no vaccination strategy for permanent immunity. Secondly, the application of Wi-Fi makes the quarantined state have an important impact on the propagation of worms among information system equipment. Therefore, a quarantined strategy that suppresses the spread of viruses can help manufacturers to isolate equipment reasonably and reduce economic losses. Finally, our research provides an important research direction for the follow-up research: how to give the optimal strategy of quarantined under consideration of the minimum economic loss of the enterprise.

Inspired by the above references, we propose a new SLBQR (susceptible-latent-breaking out-quarantined-recovered) model which focuses on the dynamics of the worm propagation and the quarantined strategies for worm attack. Firstly, based on basic reproduction number, we give expression of quarantined rate, and then by deriving the local and global stabilities in both the worm-free and endemic equilibrium, we prove the worm-free equilibrium is locally and globally asymptotically stable if , whereas the endemic equilibrium is locally asymptotically stable if . Hence, we give the threshold of quarantined rate and quarantined strategies for the worm attacks. Meanwhile, some numerical simulations are carried out to illustrate the feasibility of our theoretical results and the effectiveness of quarantined strategies. Novelty and contribution of the study are as follows:(1)We consider a vaccination strategy with temporary immunity. Through theoretical analysis and simulation experiments, it is concluded that even if the immunity time is unlimited, endemic equilibrium will not become worm-free. In other words, there is a mutation in the virus, which proves that there is no vaccination strategy with permanent immunity.(2)Based on basic reproduction number, we give expression of quarantined rate, give the threshold of the quarantined rate to the spread of virus, and then give the quarantined strategy to suppress the spread of virus.

The rest of this paper is arranged as follows. In Section 2, we establish SEIQR model considering time delay and quarantined rate and obtain specific expression of quarantined rate. In Section 3, we give the effects of different quarantined rates on worm propagation stability and get quarantined policy to block worm propagation. In Section 4, we use numerical simulations to verify our results. In the end, the paper is summarized and discussed with some future works.

2. SLBQR Model

Recently, Liu and Yang [19] defined the quarantined status (Q) to represent the infected nodes quarantined by the BS and then established the SEIQR model. This model can describe the dynamic behaviors and characteristics of the worm spreading in a Wi-Fi environment. But in practice, the scenario described in the SEIQR model does not coincide with a real mobile network. Particularly, there are two problematical issues.

Firstly, the recovered mobile device is considered to have permanent immunity. This assumption is very unrealistic. Generally speaking, when a mobile device is affected by worm virus, the corresponding antivirus software for a certain type of worm will make the devices gain immunity. But as time goes on, the worm will mutate, so the antivirus software will fail. Therefore, the immunity obtained by the mobile device is temporary immunity, not permanent immunity. Secondly, we just consider quarantined measures and do not consider vaccination measures. In fact, besides the quarantine strategy, the vaccination strategy with antivirus treatment is usually employed to protect from the worm propagation among mobile devices and decrease the intensity of worm attacks in mobile networks. Also, the effects of other control strategies are analyzed on the latency and breaking-out status to prevent worm propagation in a short period immediately after detecting the worm attack, which greatly mitigates the possibility of worm outbreak in early stage among mobile devices.

The arguments above motivate us to develop a more suitable SLBQR model, where we take temporary immunity, vaccination, and quarantined strategies into account for mobile devices and propose control strategy to prevent the worm propagation in mobile networks. The status of mobile devices is defined as follows: susceptible status (S) includes those devices which are vulnerable to worm attacks in mobile networks; latency status (L) includes those devices which are exposed to the attacks and have been infected, but not actively infectious due to the latent time requirement; breaking-out status (B) includes those exposed devices which are actively searching and targeting new victims; quarantined status (Q) includes those infectious devices which are quarantined by the BS station; recovered status (R) includes those devices which gained one or more security countermeasures, providing the devices with a temporary immunity against the malicious worms. Obviously, . The block diagram of SLBQS model status transition and model parameters involved are shown in Figure 3. Table 1 shows notation used in this paper and baseline parameter. Table 2 shows a summary of the status transitions and rates of devices in the SLBQR model. Combining Figure 3 and Tables 1 and 2, the status transitions of devices in SLBQR model are detailed as follows.

The basic assumptions in concern with our model are presented below.(1)All newly connected computers and mobile devices are all virus free.(2)External computers and mobile devices are connected to the Internet at positive constant rate . Also, internal computers and mobile devices are disconnected from the Internet at the same rate .(3)The infected computers and mobile devices are divided into two statuses: latent status and breaking-out status.(4)Each virus-free computer and mobile device gets in contact with an infected computer or mobile device at a bilinear incidence rate , where is positive constant.(5)Latent computers and mobile devices are recovered by vaccination antivirus software at non-negative constant rate .(6)The virus breaking-out rate in latent computers and mobile devices is non-negative constant rate .(7)The quarantined rate in breaking-out computers and mobile devices is non-negative constant rate .(8)By using antivirus software and system reinstallation on the quarantined devices, the recovered rate is non-negative constant .(9)Recovered computers and mobile devices can gain temporarily immune period , where is constant.(10)Immune time in the infective including latent status and breaking-out status is exponentially distributed.

The details of the SLBQR model are as follows:(1)The application of mobile networks in the intelligent manufacturing process exposes some mobile devices to worms and turns them into susceptible status. Worm attack makes devices move form S-status to the L-status, where denotes the normal function rate, denotes the infection force when the worm is entering a latent population, is the number of susceptible groups that are infected, and denotes the number of infected groups with normal function rate.(2)"By vaccination strategies, all mobile devices are installed antivirus software. Hence, their immunity capability to worm is improved. However, antivirus software cannot guarantee that all devices are protected from worm attacks, so the injection of antivirus software is partial efficiency. Namely, there are . Latent devices move to the R-status, where denotes vaccination effective rate for normal function group. When , the vaccination strategy has no effect at all; when , the vaccination strategy is perfectly effective.(3)The remaining fraction of latent devices has no immunity to worm attacks and then has to go to the B-status or fall into dysfunctional status. In other words, latent devices transition to the B-status, where denotes the rate when the worm begins actively scanning the networks for new victim.(4)Considering the quarantine strategy imposed in the B-status, the infectious devices can be quarantined into the Q-status with a transfer rate , where denotes quarantined effective rate for normal function group. When , the quarantine strategy is not considered, and no infectious device is quarantined.(5)Considering system reinstall strategy, some mobile devices can be selected for system reinstallation, which makes devices move form Q-status to R-status, where denotes recovery effective rate for normal function group.(6)Considering the variation of the virus, antivirus software is only temporary immune function. After the temporary immunization period , devices will lose immunization and move from R-status to S-status.(7)Device dysfunction occurs in all statuses because of the natural death; its death rate in the total devices is denoted by .

According to different status transition relationships, we can formulate the SLBQR model by the following differential equations:

The feasible region of the system (1) can be described aswhich is a positively invariant set. By calculating system (1), we can obtain easily that system (1) always has a worm-free equilibrium, . According to the theory of the next generation operator in [26], we can calculate the basic reproduction number as follows.

Let ; then, , where . Thus,where . Subsequently, we can give specific expression of basic reproduction number :

Further, we can give the expression for quarantined rate :

3. Stability Analysis for Equilibrium

In this section, firstly, we calculate system (1) and give expression of the worm-free equilibrium and the endemic equilibrium of system (1). Secondly, we investigate the effects of different quarantined rates on worm propagation and give the stability theorem of worm-free equilibrium and the endemic equilibrium in different in quarantined rates. In the end, we give the effects of immune duration on worm transmission and optimal quarantined strategy.

3.1. Equilibriums

Theorem 1. System (1) exists in the unique worm-free equilibrium:and the unique endemic equilibrium:where

Proof. Solving the following equation:When , we can obtain the unique worm-free equilibrium ; otherwise, we can obtain the unique endemic equilibrium . The proof is completed.

3.2. Stability of the Worm-Free Equilibrium

Theorem 2. If , is locally asymptotically stable with respect to ; otherwise, it is unstable.

Proof. According to Theorem 1, system (1) has a unique worm-free equilibrium . The Jacobian matrix at the worm-free equilibrium isWe can obtain the characteristic equation of :That is,So, we calculate the eigenvalues of : , where are the roots of equation (14) as follows:where .
Then, we can obtainBecause , we can obtain ; hence, .
By referring to the Hurwitz criterion [27], we know that all roots of equation (14) have negative real parts. That is, all real parts of roots of equation (13) are negative. Hence, by referring to stability theory [27], if , we can know is locally asymptotically stable. Otherwise, is unstable. Thus, the theory is proved.

Theorem 3. If , is globally asymptotically stable with respect to ; otherwise, is unstable.

Proof. Firstly, we construct a Lyapunov function:Then,Becausewe can obtainHence, with . By referring to LaSalle invariance principle [28], we can prove Theorem 3.

3.3. Stability of the Endemic Equilibrium

Now, we will analyze the stability of the endemic equilibrium: , where

Obviously, ; thus , so we can obtain . Then, multiply both sides of this inequality by , and we can obtain . Further, we can obtain .

Theorem 4. is locally asymptotically stable with respect to if , .

Proof. Because , we can obtain the Jacobian matrix at as follows:We can obtain the characteristic equation of :That is,So, we can calculate the eigenvalues of : , where are the roots of equation (24) as follows:whereFor any , when , we can obtain . Further, we can obtainBy referring to the Hurwitz criterion, we can know all real parts of roots of equation (24) are negative. That is, all real parts of roots of equation (23) are negative. Hence, by referring to stability theory, if , we can know is locally asymptotically stable. Otherwise, is unstable. Thus, the theory is proved.

3.4. Immune Time and Quarantined Strategy

Theorem 5. The dynamic system (1) can just obtain temporary immunity time. The longer the immunity time is, the smaller the impact on the value of the endemic equilibrium is.

Proof. Obviously, according to equation (13), the time delay has no effect on the stability at P0. According to equation (24), when , whether H1, H2, and H3 are greater than 0 is not affected by the value. Therefore, the value of will not affect the stability of . Further, through the expression of , , , , and , we find that the value of does not affect the value of . With the increase of , the smaller the change of is, the smaller the impact on , , , and is. Thus, the theory is proved.

Theorem 6. is the threshold of quarantined rate, and when , is globally asymptotically stable with respect to .

Proof. By Theorems 24, we know that is the boundary between the stability of the two fixed points, and thus is the threshold of quarantined rate. Next, we prove the stability of . Because , we can obtain .
When , we can obtain . That is, equation (1) only has one fixed point. It is worth noting that the stability of equation (1) at the above fixed point cannot be judged by Theorems 3 and 4. So, next we linearize equation (1) at and obtain the following characteristic matrix:According to , we can obtain characteristic equation:Further, we can obtain characteristic roots:However, because there are zero characteristic roots, we cannot judge the stability of the equations in . Therefore, we can only give the stability of equation (1) in by qualitative analysis. First, we choose an infinitesimal constant , satisfyingThen, let ; we can obtain . According to Theorem 3, is globally asymptotically stable. Finally, let , and we can obtain . According to Theorem 4, is local asymptotically stable. So, when , is globally asymptotically stable.

Theorem 7. Under mobile Internet, the base station should keep the quarantined rate within the range . Within this range, the evolution of nonlinear dynamical systems (1) meets the company's ideal requirements.

Proof. See Theorems 2, 3, and 6 for proof.

4. Simulation

We use the first experiment to verify Theorem 2 and 3. We suppose that the number of susceptible, latent, breaking-out, quarantined, and recovered nodes is

And the parameters of system (1) are references [19]:

According to the threshold expression of the quarantined rate, we can calculate

Obviously, . From Figure 4, we can see that worm propagation eventually stabilizes in the status P0. That is, if , status is stable, which verifies Theorems 2 and 3.

Compared with Jia and Jing [16], the worm-free equilibrium in [16] will stabilize to susceptible and recovered statuses. First of all, their simulation results contradicted their conclusions. In their research, they pointed out that the system should be stable in a susceptible status; however, the final simulation results are stable in the susceptible status and recovery status. Second, this conclusion is unrealistic because the virus is constantly mutating, so the device can only obtain temporary immunity. Finally, even if their assumption is reasonable, that is, the device can obtain permanent immunity, then the system evolution should be stable in the recovery status rather than two statuses. Different from them, our simulation results show that in the case of temporary immune mechanism, the recovery status is only a transition status because with the continuous mutation of the virus, the recovery status will gradually become susceptible, which is consistent with the actual situation.

In the second experiment, we want to verify Theorems 4 and 5. Similar to the first experiment, we suppose that the number of susceptible, latent, breaking-out, quarantined, and recovered nodes is

And the parameters of system (1) are

Now, we can calculate ; obviously, . From Figure 5, we can see that worm propagation eventually stabilizes in the status . That is, if , with the development of time, the system is always stable to , which verifies Theorem 4.

Then, by comparing Figures 5 and 6, we can see that mobile devices with temporary immunity will affect the number of different statuses, for example, the number of mobile devices in the infection status (latent status and breaking-out status) decreased. That is, vaccination strategies with temporary immunity can protect some devices from worm attacks. Next, by comparing Figures 68, we can see that when the immune time increases to a certain extent, it will not affect the status of the infection and the immune status. This is the reality because when the immune time is very long, the virus will mutate, so the immune effect of the mobile device will fail, which verifies Theorem 5.

Compared with Jia and Jing [16], the figure of stability of the endemic equilibrium is wrong in [16] because in the figure of stability of the endemic equilibrium, they point out that the system eventually maintains a susceptible status, which means . Obviously, this is contrary to their conclusions. Our results not only validate the stability of the endemic equilibrium but also point out the variability of the virus because we can see that the longer the temporary immunization time, the smaller the impact on the evolution of the virus, which means that the virus will mutate.

In the last experiment, in order to research the influence of the different configuring quarantine policy to worm propagation considering time delay, different quarantined rates are used to observe the number of infected nodes in the evolution process of system (1). Similar to the above two experiments, we suppose that the number of susceptible, latent, breaking-out, quarantined, and recovered nodes is

And the parameters of system (1) are

In this experiment, there were three situations:Situation 1: .Situation 2: .Situation 3: .

The result is shown in Figure 9. Through the second subgraph of Figure 9, we can see that when our quarantined rate is less than the threshold , the worm cannot be completely removed, and the infected mobile device amount eventually stabilizes at about 750. Through the first subgraph, the third subgraph, and the fourth subgraph, we can see that when our quarantined rate is not less than the threshold , the worm can be completely removed. This result also verifies Theorems 6 and 7.

Compared with Jia and Jing [16], we give specific quarantined strategies and quarantined thresholds and verify that when the quarantined value of the system is near the threshold, it will not cause the system to fork or chaos.

5. Discussion

In this paper, we mainly solve the following problems:(1)We prove that the vaccination strategy is impossible to have full efficacy and permanent immunity.(2)We give the expression of the quarantined rate of expression, discuss the impact of different quarantined strategies on the spread of worms, and give what kind of quarantined strategy is to be adopted to completely suppress the spread of the virus.(3)Existing literature ignores when they calculate the basic reproduction number ; we discuss the situation .

In solving the above problems, the research methods we adopted are as follows:(1)Based on basic reproduction number, we give expression of quarantined rate .(2)By deriving the local and global stabilities in both the worm-free and endemic equilibrium, we prove the worm-free equilibrium is locally and globally asymptotically stable if , whereas the endemic equilibrium is locally asymptotically stable if . The worm-free equilibrium is asymptotically stable, implying that the worm dies out eventually and its attack remains under control; the endemic equilibrium is asymptotically stable, implying that the worm is always persistent and spreading within a population. Hence, we can give threshold expression .(3)First, we choose an infinitesimal constant , satisfyingThen, let , and we can obtain . According to Theorem 3, is globally asymptotically stable. Finally, let , and we can obtain . According to Theorem 4, is local asymptotically stable. So, when , is globally asymptotically stable.

6. Conclusion

In this paper, we established the SLBQR model for worm propagation in mobile Internet considering time delay and quarantined rate. Our research has important academic value for subsequent scholars to study such issues. First of all, our research proves that there is no vaccination strategy for permanent immunity. Secondly, a quarantined strategy that suppresses the spread of viruses can help manufacturers to isolate equipment reasonably and reduce economic losses. Finally, our research provides an important research direction for the follow-up research: how to give the optimal strategy of quarantine under consideration of the minimum economic loss of the enterprise.

However, our research still has the following disadvantages:(1)In this paper, we just introduce vaccination effective rate, and there is no discussion and analysis of the specific vaccination strategy. In this regard, we will conduct a specific analysis of the vaccination effective rate by introducing a vaccination rate in subsequent studies.(2)We only give the threshold of immunity and simple quarantined strategy, without considering the impact of quarantined cost. Our future work will explore how to determine the appropriate quarantined rate with the least cost of quarantine.

Data Availability

The data used in this study are included in this article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This study was sponsored by the Guangdong Provincial National Science Foundation Project (2018A030313079) and 2018 Guangzhou Philosophy and Social Science Development “13th Five Year Plan” (2018GZYB16).