the entropy of system state was used to generate IID, thereby overcoming the centralised calculation of CGA, reducing address generation time, and preventing privacy leaks. DAD-h uses the hash method to hide the target field of NS during DAD and prevent malicious nodes from launching DoS attacks