{"id":"https://openalex.org/W4414841148","doi":"https://doi.org/10.1002/spy2.70115","title":"A Secure IOT\u2010Based Cluster Formation and Optimal Path Selection Using Fuzzy Rules and Metaheuristic Optimization","display_name":"A Secure IOT\u2010Based Cluster Formation and Optimal Path Selection Using Fuzzy Rules and Metaheuristic Optimization","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W4414841148","doi":"https://doi.org/10.1002/spy2.70115"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70115","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70115","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019117698","display_name":"D. J. Joel Devadass Daniel","orcid":"https://orcid.org/0000-0002-3058-8074"},"institutions":[{"id":"https://openalex.org/I1330855593","display_name":"Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology","ror":"https://ror.org/05bc5bx80","country_code":"IN","type":"education","lineage":["https://openalex.org/I1330855593"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"D. J. Joel Devadass Daniel","raw_affiliation_strings":["Department of ECE Vel Tech Rangarajan Dr. Sagunthala R&amp;D Institute of Science and Technology  Chennai India"],"raw_orcid":"https://orcid.org/0000-0002-3058-8074","affiliations":[{"raw_affiliation_string":"Department of ECE Vel Tech Rangarajan Dr. Sagunthala R&amp;D Institute of Science and Technology  Chennai India","institution_ids":["https://openalex.org/I1330855593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057929352","display_name":"S. Jagadeesh","orcid":null},"institutions":[{"id":"https://openalex.org/I1330855593","display_name":"Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology","ror":"https://ror.org/05bc5bx80","country_code":"IN","type":"education","lineage":["https://openalex.org/I1330855593"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Jagadeesh","raw_affiliation_strings":["Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&amp;D Institute of Science and Technology  Chennai India"],"raw_orcid":"https://orcid.org/0000-0001-8907-4433","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&amp;D Institute of Science and Technology  Chennai India","institution_ids":["https://openalex.org/I1330855593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114313097","display_name":"L. Brighty Ebenezer","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"L. Brighty Ebenezer","raw_affiliation_strings":["School of Electronics Engineering Vellore Institute of Technology  Chennai India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering Vellore Institute of Technology  Chennai India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009206070","display_name":"S. Ebenezer Juliet","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Ebenezer Juliet","raw_affiliation_strings":["Department of Analytics, School of Computer Science and Engineering Vellore Institute of Technology  Vellore India","School of Electronics Engineering Vellore Institute of Technology  Chennai India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Analytics, School of Computer Science and Engineering Vellore Institute of Technology  Vellore India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Electronics Engineering Vellore Institute of Technology  Chennai India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5019117698"],"corresponding_institution_ids":["https://openalex.org/I1330855593"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30824144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5116999745368958},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5001000165939331},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.46799999475479126},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4528000056743622},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4465999901294708},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.43799999356269836},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3847000002861023},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.38449999690055847},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.3668999969959259}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7971000075340271},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5116999745368958},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5001000165939331},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.46799999475479126},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4657000005245209},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4528000056743622},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4465999901294708},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.43799999356269836},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43059998750686646},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3847000002861023},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.38449999690055847},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3668999969959259},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.36399999260902405},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.35510000586509705},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.31380000710487366},{"id":"https://openalex.org/C59201141","wikidata":"https://www.wikidata.org/wiki/Q46904","display_name":"GSM","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2849999964237213},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.2815999984741211},{"id":"https://openalex.org/C49020025","wikidata":"https://www.wikidata.org/wiki/Q1059099","display_name":"Chaining","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.2754000127315521},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.2736999988555908},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.26409998536109924},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70115","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70115","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1967031301","https://openalex.org/W1987436594","https://openalex.org/W2105103777","https://openalex.org/W2737530998","https://openalex.org/W2955917816","https://openalex.org/W2980960237","https://openalex.org/W3021401058","https://openalex.org/W3034664369","https://openalex.org/W3037068305","https://openalex.org/W3042306991","https://openalex.org/W3046323586","https://openalex.org/W3046996261","https://openalex.org/W3088460350","https://openalex.org/W3092333758","https://openalex.org/W3176857556","https://openalex.org/W4200316270","https://openalex.org/W4281558202","https://openalex.org/W4407364648","https://openalex.org/W4409512263","https://openalex.org/W4409513158","https://openalex.org/W4411504497"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"IoT":[1,37,70,102,127,168],"is":[2,13,25,162],"the":[3,28,33,87,101,115,120,126,131,140,145,152,158,165,174,179,188,191,213],"most":[4],"valuable":[5],"and":[6,47,90,123,147,170,177,193,206],"trending":[7],"technology":[8,16],"in":[9,27,69,139,164,190],"recent":[10],"times.":[11],"It":[12],"an":[14],"embedded":[15],"which":[17,161],"comprises":[18],"different":[19],"things":[20],"or":[21],"objects.":[22],"Mostly,":[23],"it":[24,208],"applicable":[26],"network":[29,192],"field.":[30],"Due":[31],"to":[32,52,93,100,114,151],"inclusion":[34],"of":[35,98,125,167,173,227],"several":[36],"nodes,":[38],"there":[39],"might":[40],"occur":[41],"computational":[42,64,91,180],"complexity,":[43],"delay,":[44],"packet":[45,194,203],"losses,":[46],"consume":[48],"more":[49],"energy.":[50,230],"So,":[51],"overcome":[53],"these":[54],"issues,":[55],"we":[56],"propose":[57],"a":[58,95,111,201],"novel":[59],"Mutual":[60],"authentication":[61],"with":[62,77],"less":[63],"complexity":[65],"for":[66,84],"secure":[67],"communication":[68],"nodes.":[71,103],"The":[72,104,154,182,217],"Parallel":[73],"Advanced":[74],"Encryption":[75],"Standard":[76],"Cipher":[78],"Block":[79],"Chaining":[80],"(PAES\u2010CBC)":[81],"algorithm":[82],"used":[83,163],"encryption":[85],"reduces":[86,178],"ciphertext":[88],"size":[89],"time":[92],"yield":[94],"higher":[96],"level":[97],"security":[99],"Physically":[105],"Unclonable":[106],"Function":[107],"(PUF)":[108],"serves":[109],"as":[110],"crucial":[112],"element":[113],"cryptography":[116],"concept":[117],"by":[118,130],"securing":[119],"secret":[121],"ID":[122],"key":[124],"node":[128],"generated":[129],"trusted":[132],"authority.":[133],"ANY":[134],"attack":[135],"that":[136],"takes":[137],"place":[138],"PUF":[141],"will":[142],"permanently":[143],"disrupt":[144],"operation":[146],"serve":[148],"no":[149],"purpose":[150],"attacker.":[153],"proposed":[155,198],"work":[156,199],"exploits":[157],"LFD\u2010HGSO":[159],"algorithm,":[160],"formulation":[166],"clusters":[169],"optimal":[171,183],"selection":[172,185],"cluster":[175],"head":[176],"complexity.":[181],"routing":[184],"can":[186],"reduce":[187],"traffic":[189],"loss.":[195],"Thus,":[196],"our":[197],"ensures":[200],"high":[202],"delivery":[204],"ratio,":[205],"therefore":[207],"has":[209],"better":[210],"performance":[211],"than":[212],"other":[214],"existing":[215],"approaches.":[216],"Proposed":[218],"Method":[219],"significantly":[220],"outperforms":[221],"all":[222],"others,":[223],"consuming":[224],"only":[225],"2.32%":[226],"its":[228],"initial":[229]},"counts_by_year":[],"updated_date":"2025-11-19T23:35:23.961156","created_date":"2025-10-10T00:00:00"}
