Wet-Spun Trojan Horse Cell Constructs for Engineering Muscle

Engineering of 3D regenerative skeletal muscle tissue constructs (skMTCs) using hydrogels containing muscle precursor cells (MPCs) is of potential benefit for repairing Volumetric Muscle Loss (VML) arising from trauma (e.g., road/industrial accident, war injury) or for restoration of functional muscle mass in disease (e.g., Muscular Dystrophy, muscle atrophy). Additive Biofabrication (AdBiofab) technologies make possible fabrication of 3D regenerative skMTCs that can be tailored to specific delivery requirements of VML or functional muscle restoration. Whilst 3D printing is useful for printing constructs of many tissue types, the necessity of a balanced compromise between cell type, required construct size and material/fabrication process cyto-compatibility can make the choice of 3D printing a secondary alternative to other biofabrication methods such as wet-spinning. Alternatively, wet-spinning is more amenable to formation of fibers rather than (small) layered 3D-Printed constructs. This study describes the fabrication of biosynthetic alginate fibers containing MPCs and their use for delivery of dystrophin-expressing cells to dystrophic muscle in the mdx mouse model of Duchenne Muscular Dystrophy (DMD) compared to poly(DL-lactic-co-glycolic acid) copolymer (PLA:PLGA) topically-seeded with myoblasts. In addition, this study introduces a novel method by which to create 3D layered wet-spun alginate skMTCs for bulk mass delivery of MPCs to VML lesions. As such, this work introduces the concept of “Trojan Horse” Fiber MTCs (TH-fMTCs) and 3d Mesh-MTCs (TH-mMTCs) for delivery of regenerative MPCs to diseased and damaged muscle, respectively.

[1]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[2]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[3]  Wee,et al.  Protein release from alginate matrices. , 1998, Advanced drug delivery reviews.

[4]  R. Kapsa,et al.  Leukemia inhibitory factor ameliorates muscle fiber degeneration in the mdx mouse , 2000, Muscle & nerve.

[5]  R. Kapsa,et al.  In vivo and in vitro correction of the mdx dystrophin gene nonsense mutation by short-fragment homologous replacement. , 2001, Human gene therapy.

[6]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[7]  Andrew P. Weir,et al.  Function and genetics of dystrophin and dystrophin-related proteins in muscle. , 2002, Physiological reviews.

[8]  A. Emery,et al.  The muscular dystrophies , 2002, The Lancet.

[9]  Sheila Frankel,et al.  The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.

[10]  R. Kapsa,et al.  For Personal Use. Only Reproduce with Permission from the Lancet Publishing Group. Molecular Pathology of Dmd Novel Therapies for Dmd Novel Therapies for Duchenne Muscular Dystrophy , 2022 .

[11]  Yimin Qin A comparison of alginate and chitosan fibres. , 2004, Medical device technology.

[12]  David Pointcheval,et al.  Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.

[13]  J. Bouchard,et al.  Dystrophin expression in myofibers of Duchenne muscular dystrophy patients following intramuscular injections of normal myogenic cells. , 2004, Molecular therapy : the journal of the American Society of Gene Therapy.

[14]  David von Oheimb The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .

[15]  R. Kapsa,et al.  DNA electroporation in vivo targets mature fibres in dystrophic mdx muscle , 2005, Neuromuscular Disorders.

[16]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[17]  J. Bouchard,et al.  Dystrophin Expression in Muscles of Duchenne Muscular Dystrophy Patients After High-Density Injections of Normal Myogenic Cells , 2006, Journal of neuropathology and experimental neurology.

[18]  D. Mooney,et al.  Regulating activation of transplanted cells controls tissue regeneration. , 2006, Proceedings of the National Academy of Sciences of the United States of America.

[19]  K. Takeda,et al.  A Product Based Security Model for Smart Home Appliances , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[20]  David J Mooney,et al.  Alginate hydrogels as biomaterials. , 2006, Macromolecular bioscience.

[21]  Kim-Kwang Raymond Choo Key establishment : proofs and refutations , 2006 .

[22]  S. Picken,et al.  Orientational order and mechanical properties of poly(amide-block-aramid) alternating block copolymer films and fibers , 2006 .

[23]  M. Cook,et al.  Effective detection of corrected dystrophin loci in mdx mouse myogenic precursors , 2007, Human mutation.

[24]  Yi Hong,et al.  Covalently crosslinked chitosan hydrogel: properties of in vitro degradation and chondrocyte encapsulation. , 2007, Acta biomaterialia.

[25]  Elisa Bertino,et al.  An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting , 2008, IEEE Transactions on Dependable and Secure Computing.

[26]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[27]  Yimin Qin,et al.  Alginate fibres: an overview of the production processes and applications in wound management , 2008 .

[28]  Jongpil Jeong,et al.  Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[29]  Joselito M. Razal,et al.  Wet‐Spun Biodegradable Fibers on Conducting Platforms: Novel Architectures for Muscle Regeneration , 2009 .

[30]  V Mironov,et al.  Biofabrication: a 21st century manufacturing paradigm , 2009, Biofabrication.

[31]  C. Chiu,et al.  Fabrication of Porous Gelatin Microfibers Using an Aqueous Wet Spinning Process , 2009, Artificial cells, blood substitutes, and immobilization biotechnology.

[32]  Athina Lazakidou Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications , 2010 .

[33]  J. Mendell,et al.  Dystrophin immunity in Duchenne's muscular dystrophy. , 2010, The New England journal of medicine.

[34]  Palash Sarkar,et al.  A Simple and Generic Construction of Authenticated Encryption with Associated Data , 2010, TSEC.

[35]  Carles Gomez,et al.  Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.

[36]  Dimitrios Makrakis,et al.  Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[37]  Hyun Jung Kim,et al.  AUTHHOTP - HOTP Based Authentication Scheme over Home Network Environment , 2011, ICCSA.

[38]  K. Draget,et al.  Chemical, physical and biological properties of alginates and their biomedical implications , 2011 .

[39]  Kefei Chen,et al.  An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.

[40]  H. Vandenburgh,et al.  The role of multifunctional delivery scaffold in the ability of cultured myoblasts to promote muscle regeneration. , 2011, Biomaterials.

[41]  Sang-Hoon Lee,et al.  Microfluidic wet spinning of chitosan-alginate microfibers and encapsulation of HepG2 cells in fibers. , 2011, Biomicrofluidics.

[42]  Jong Hyuk Park,et al.  Robust one-time password authentication scheme using smart card for home network environment , 2011, Comput. Commun..

[43]  Sanjay Singh,et al.  Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication , 2012, 2012 International Conference on Innovations in Information Technology (IIT).

[44]  G. Wallace,et al.  Organic Bionics: WALLACE:ORGANIC BIONICS O-BK , 2012 .

[45]  Daniel Mossé,et al.  Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes , 2012, 2012 Eighth International Conference on Intelligent Environments.

[46]  Taeshik Shon,et al.  A novel secure key paring protocol for RF4CE ubiquitous smart home systems , 2012, Personal and Ubiquitous Computing.

[47]  D. Mooney,et al.  Alginate: properties and biomedical applications. , 2012, Progress in polymer science.

[48]  Juin-Yih Lai,et al.  Evolution of polymeric hollow fibers as sustainable technologies: Past, present, and future , 2012 .

[49]  Cheng-Chi Lee,et al.  Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices , 2013, IET Comput. Digit. Tech..

[50]  Yue Li,et al.  Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[51]  G. Wallace,et al.  In vitro growth and differentiation of primary myoblasts on thiophene based conducting polymers. , 2013, Biomaterials science.

[52]  Johnson H. Y. Chung,et al.  Bio-ink properties and printability for extrusion printing living cells. , 2013, Biomaterials science.

[53]  J. Huard,et al.  Development of Biological Approaches to Improve Muscle Healing After Injury and Disease , 2013 .

[54]  M. Falzarano,et al.  Biodistribution and Molecular Studies on Orally Administered Nanoparticle-AON Complexes Encapsulated with Alginate Aiming at Inducing Dystrophin Rescue in mdx Mice , 2013, BioMed research international.

[55]  G. Wallace,et al.  Engineering a multimodal nerve conduit for repair of injured peripheral nerve , 2013, Journal of neural engineering.

[56]  Li Xu,et al.  Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.

[57]  Robert Simon Sherratt,et al.  Enhanced three-factor security protocol for consumer USB mass storage devices , 2014, IEEE Transactions on Consumer Electronics.

[58]  Vanga Odelu,et al.  A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.

[59]  Freddy K. Santoso,et al.  Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).

[60]  Ashok Kumar Das,et al.  A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems , 2015, Journal of Medical Systems.

[61]  Yasir Saleem,et al.  Network Simulator NS-2 , 2015 .

[62]  David Thaler,et al.  Architectural Considerations in Smart Object Networking , 2015, RFC.

[63]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[64]  Chin-Chen Chang,et al.  A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[65]  Xiong Li,et al.  Provably secure user authentication and key agreement scheme for wireless sensor networks , 2016, Secur. Commun. Networks.

[66]  Ashok Kumar Das,et al.  A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..

[67]  Vanga Odelu,et al.  SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms , 2016, IEEE Transactions on Consumer Electronics.

[68]  R. David Hawkins,et al.  Muscle-specific CRISPR/Cas9 dystrophin gene editing ameliorates pathophysiology in a mouse model for Duchenne muscular dystrophy , 2017, Nature Communications.

[69]  Ashok Kumar Das,et al.  A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..

[70]  Athanasios V. Vasilakos,et al.  Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment , 2018, IEEE Transactions on Dependable and Secure Computing.

[71]  By Ciarán Morrison What is a ‘ Smart Home ’ ? , 2019 .