{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:45:35Z","timestamp":1763451935784,"version":"3.45.0"},"reference-count":23,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>IoT is the most valuable and trending technology in recent times. It is an embedded technology which comprises different things or objects. Mostly, it is applicable in the network field. Due to the inclusion of several IoT nodes, there might occur computational complexity, delay, packet losses, and consume more energy. So, to overcome these issues, we propose a novel Mutual authentication with less computational complexity for secure communication in IoT nodes. The Parallel Advanced Encryption Standard with Cipher Block Chaining (PAES\u2010CBC) algorithm used for encryption reduces the ciphertext size and computational time to yield a higher level of security to the IoT nodes. The Physically Unclonable Function (PUF) serves as a crucial element to the cryptography concept by securing the secret ID and key of the IoT node generated by the trusted authority. ANY attack that takes place in the PUF will permanently disrupt the operation and serve no purpose to the attacker. The proposed work exploits the LFD\u2010HGSO algorithm, which is used in the formulation of IoT clusters and optimal selection of the cluster head and reduces the computational complexity. The optimal routing selection can reduce the traffic in the network and packet loss. Thus, our proposed work ensures a high packet delivery ratio, and therefore it has better performance than the other existing approaches. The Proposed Method significantly outperforms all others, consuming only 2.32% of its initial energy.<\/jats:p>","DOI":"10.1002\/spy2.70115","type":"journal-article","created":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T01:59:23Z","timestamp":1759715963000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure IOT\u2010Based Cluster Formation and Optimal Path Selection Using Fuzzy Rules and Metaheuristic Optimization"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3058-8074","authenticated-orcid":false,"given":"D. J. Joel Devadass","family":"Daniel","sequence":"first","affiliation":[{"name":"Department of ECE Vel Tech Rangarajan Dr. Sagunthala R&amp;D Institute of Science and Technology  Chennai India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8907-4433","authenticated-orcid":false,"given":"S.","family":"Jagadeesh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&amp;D Institute of Science and Technology  Chennai India"}]},{"given":"L. Brighty","family":"Ebenezer","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering Vellore Institute of Technology  Chennai India"}]},{"given":"S. Ebenezer","family":"Juliet","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering Vellore Institute of Technology  Chennai India"},{"name":"Department of Analytics, School of Computer Science and Engineering Vellore Institute of Technology  Vellore India"}]}],"member":"311","published-online":{"date-parts":[[2025,10,5]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijast.2015.82.03"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.11.009"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948147"},{"key":"e_1_2_7_6_1","first-page":"2919","article-title":"Seamless Authentication: For IoT\u2010Big Data Technologies in Smart Industrial Application Systems","volume":"17","author":"Fadi A. L.\u2010T.","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3000576"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071172"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20154309"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3028872"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101938"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4902"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp13\u201027"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i2.pp69\u201078"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp39\u201047"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.70004"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2020.08.011"},{"key":"e_1_2_7_18_1","first-page":"19","volume-title":"Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology","author":"Rijmen V.","year":"2001"},{"key":"e_1_2_7_19_1","unstructured":"S.Gueron A.Gradstein andZ.Sperber \u201cMethod and Apparatus for Optimizing Advanced Encryption Standard (AES) Encryption and Decryption in Parallel Modes of Operation \u201d U.S. Patent 8 194 854 issued June 5 2012."},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-009-5106-6"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4020"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/mmce.23048"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014309"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.104952"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:42:04Z","timestamp":1763451724000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":23,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70115"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70115","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2025,10,5]]},"assertion":[{"value":"2025-06-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70115"}}