{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T03:17:11Z","timestamp":1774322231334,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01882-w","type":"journal-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T11:05:49Z","timestamp":1734347149000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Design of secure and unique addressing with mutual authentication scheme in IoT networks"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0812-6401","authenticated-orcid":false,"given":"Neha","family":"Sharma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6098-7623","authenticated-orcid":false,"given":"Pankaj","family":"Dhiman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,16]]},"reference":[{"key":"1882_CR1","first-page":"103259","volume":"68","author":"A Gupta","year":"2022","unstructured":"Gupta A, Tripathi M, Muhuri S, Singal G, Kumar N (2022) A secure and lightweight anonymous mutual authentication scheme for wearable devices in medical internet of things. J Inf Sec Appl 68:103259","journal-title":"J Inf Sec Appl"},{"key":"1882_CR2","doi-asserted-by":"crossref","unstructured":"Iqbal W, Abbas H, Deng P, Wan J, Rauf B, Abbas Y, Rashid I (2020) Alam: Anonymous lightweight authentication mechanism for sdn-enabled smart homes. IEEE Internet Things J 8(12):9622\u20139633","DOI":"10.1109\/JIOT.2020.3024058"},{"key":"1882_CR3","doi-asserted-by":"crossref","unstructured":"Shah SH, Yaqoob I (2016) A survey: Internet of things (iot) technologies, applications and challenges. 2016 IEEE Smart Energy Grid Engineering (SEGE), pp 381\u2013385","DOI":"10.1109\/SEGE.2016.7589556"},{"key":"1882_CR4","first-page":"103415","volume":"73","author":"A Msolli","year":"2023","unstructured":"Msolli A, Ajmi N, Helali A, Gassoumi A, Maaref H, Mghaieth R (2023) New key management scheme based on pool-hash for wsn and iot. J Inf Sec Appl 73:103415","journal-title":"J Inf Sec Appl"},{"key":"1882_CR5","first-page":"103435","volume":"73","author":"A Kumar","year":"2023","unstructured":"Kumar A, Somani G (2023) Service separation assisted ddos attack mitigation in cloud targets. J Inf Sec Appl 73:103435","journal-title":"J Inf Sec Appl"},{"issue":"27","key":"1882_CR6","doi-asserted-by":"publisher","first-page":"39367","DOI":"10.1007\/s11042-022-12088-8","volume":"81","author":"D Kaur","year":"2022","unstructured":"Kaur D, Saini KK, Kumar D (2022) Cryptanalysis and enhancement of an authentication protocol for secure multimedia communications in iot-enabled wireless sensor networks. Multimed Tools Appl 81(27):39367\u201339385","journal-title":"Multimed Tools Appl"},{"key":"1882_CR7","volume-title":"How many things are currently connected to the \u2018internet of things(iot)?","author":"R Soderbery","year":"2013","unstructured":"Soderbery R (2013) How many things are currently connected to the \u2018internet of things(iot)? Forbes, Forbes Media, Jersey City, NJ"},{"key":"1882_CR8","doi-asserted-by":"publisher","first-page":"8231","DOI":"10.1007\/s11227-019-03003-4","volume":"75","author":"N Chikouche","year":"2019","unstructured":"Chikouche N, Cayrel P-L, Mboup EHM, Boidje BO (2019) A privacy-preserving code-based authentication protocol for internet of things. J Supercomput 75:8231\u20138261","journal-title":"J Supercomput"},{"issue":"4","key":"1882_CR9","doi-asserted-by":"publisher","first-page":"3057","DOI":"10.1109\/JIOT.2022.3151828","volume":"10","author":"Y Lu","year":"2023","unstructured":"Lu Y, Wang D, Obaidat MS, Vijayakumar P (2023) Edge-assisted intelligent device authentication in cyber-physical systems. IEEE Internet Things J 10(4):3057\u20133070","journal-title":"IEEE Internet Things J"},{"key":"1882_CR10","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1109\/TIFS.2022.3170276","volume":"17","author":"MR Nosouhi","year":"2022","unstructured":"Nosouhi MR, Sood K, Grobler M, Doss R (2022) Towards spoofing resistant next generation iot networks. IEEE Trans Inf Forensics Secur 17:1669\u20131683","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1882_CR11","doi-asserted-by":"publisher","first-page":"e3813","DOI":"10.1002\/ett.3813","volume":"33","author":"MF Aziz","year":"2022","unstructured":"Aziz MF, Khan AN, Shuja J, Khan IA, Khan FG, Khan AR (2022) A lightweight and compromise-resilient authentication scheme for iots. Trans Emerg Telecommun Technol 33(3):e3813","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"9","key":"1882_CR12","doi-asserted-by":"publisher","first-page":"6925","DOI":"10.1016\/j.jksuci.2021.07.023","volume":"34","author":"M Saqib","year":"2022","unstructured":"Saqib M, Jasra B, Moon AH (2022) A lightweight three-factor authentication framework for iot-based critical applications. J King Saud Univ Comput Inf Sci 34(9):6925\u20136937","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1882_CR13","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11227-010-0512-1","volume":"63","author":"E-J Yoon","year":"2013","unstructured":"Yoon E-J, Yoo K-Y (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomput 63:235\u2013255","journal-title":"J Supercomput"},{"key":"1882_CR14","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jnca.2017.07.001","volume":"103","author":"X Li","year":"2018","unstructured":"Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo K-KR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194\u2013204","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"1882_CR15","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s11277-019-06869-y","volume":"111","author":"M Nikravan","year":"2020","unstructured":"Nikravan M, Reza A (2020) A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things. Wireless Pers Commun 111(1):463\u2013494","journal-title":"Wireless Pers Commun"},{"key":"1882_CR16","doi-asserted-by":"crossref","unstructured":"Carpenter B, Jiang S (2014) Significance of ipv6 interface identifiers. Technical report","DOI":"10.17487\/rfc7136"},{"issue":"3","key":"1882_CR17","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1109\/JSYST.2014.2322973","volume":"9","author":"J-L Tsai","year":"2015","unstructured":"Tsai J-L, Lo N-W (2015) A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst J 9(3):805\u2013815","journal-title":"IEEE Syst J"},{"key":"1882_CR18","doi-asserted-by":"crossref","unstructured":"Hinden R, Deering S, Nordmark E (2003) Ipv6 global unicast address format. Technical report","DOI":"10.17487\/rfc3587"},{"key":"1882_CR19","doi-asserted-by":"crossref","unstructured":"Hinden R, Haberman B (2005) Unique local ipv6 unicast addresses. Technical report","DOI":"10.17487\/rfc4193"},{"key":"1882_CR20","doi-asserted-by":"crossref","unstructured":"Gont F (2014) A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac). Technical report","DOI":"10.17487\/rfc7217"},{"key":"1882_CR21","doi-asserted-by":"publisher","first-page":"103177","DOI":"10.1016\/j.jnca.2021.103177","volume":"192","author":"AYF Alsahlani","year":"2021","unstructured":"Alsahlani AYF, Popa A (2021) Lmaas-iot: Lightweight multi-factor authentication and authorization scheme for real-time data access in iot cloud-based environment. J Netw Comput Appl 192:103177","journal-title":"J Netw Comput Appl"},{"key":"1882_CR22","doi-asserted-by":"crossref","unstructured":"Gont F, Cooper A, Thaler D, Liu W (2017) Recommendation on stable ipv6 interface identifiers. Technical report","DOI":"10.17487\/RFC8064"},{"key":"1882_CR23","doi-asserted-by":"crossref","unstructured":"Narten T, Draves R, Krishnan S (2007) Privacy extensions for stateless address autoconfiguration in ipv6. Technical report","DOI":"10.17487\/rfc4941"},{"issue":"4","key":"1882_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2012.28","volume":"10","author":"M Dunlop","year":"2012","unstructured":"Dunlop M, Groat S, Urbanski W, Marchany R, Tront J (2012) The blind man\u2019s bluff approach to security using ipv6. IEEE Security & Privacy 10(4):35\u201343","journal-title":"IEEE Security & Privacy"},{"key":"1882_CR25","doi-asserted-by":"publisher","first-page":"102894","DOI":"10.1016\/j.adhoc.2022.102894","volume":"133","author":"K-Y Tsao","year":"2022","unstructured":"Tsao K-Y, Girdler T, Vassilakis VG (2022) A survey of cyber security threats and solutions for uav communications and flying ad-hoc networks. Ad Hoc Netw 133:102894","journal-title":"Ad Hoc Netw"},{"issue":"22","key":"1882_CR26","doi-asserted-by":"publisher","first-page":"16613","DOI":"10.1109\/JIOT.2021.3075158","volume":"8","author":"MA Saleem","year":"2021","unstructured":"Saleem MA, Ghaffar Z, Mahmood K, Das AK, Rodrigues JJPC, Khan MK (2021) Provably secure authentication protocol for mobile clients in iot environment using puncturable pseudorandom function. IEEE Internet Things J 8(22):16613\u201316622","journal-title":"IEEE Internet Things J"},{"issue":"53","key":"1882_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.54905\/disssi\/v20i53\/e22ije1651","volume":"20","author":"FG Siji","year":"2023","unstructured":"Siji FG, Uche OP (2023) An improved model for comparing different endpoint detection and response tools for mitigating insider threat. Indian J Eng 20(53):1\u201313","journal-title":"Indian J Eng"},{"key":"1882_CR28","doi-asserted-by":"crossref","unstructured":"Hinden R, O\u2019Dell M, Deering S (1998) An ipv6 aggregatable global unicast address format. Technical report","DOI":"10.17487\/rfc2374"},{"key":"1882_CR29","doi-asserted-by":"crossref","unstructured":"Hinden R, Deering S (2006) Ip version 6 addressing architecture. Technical report","DOI":"10.17487\/rfc4291"},{"issue":"9","key":"1882_CR30","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inf Forensics Secur 10(9):1953\u20131966","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"1882_CR31","doi-asserted-by":"publisher","first-page":"2242","DOI":"10.1109\/TNET.2021.3084692","volume":"29","author":"J Wei","year":"2021","unstructured":"Wei J, Chen X, Ma J, Hu X, Ren K (2021) Communication-efficient and fine-grained forward-secure asynchronous messaging. IEEE\/ACM Trans Networking 29(5):2242\u20132253","journal-title":"IEEE\/ACM Trans Networking"},{"key":"1882_CR32","doi-asserted-by":"publisher","first-page":"100708","DOI":"10.1016\/j.iot.2023.100708","volume":"22","author":"A Zahoor","year":"2023","unstructured":"Zahoor A, Mahmood K, Shamshad S, Saleem MA, Ayub MF, Conti M, Das AK (2023) An access control scheme in iot-enabled smart-grid systems using blockchain and puf. Internet of Things 22:100708","journal-title":"Internet of Things"},{"issue":"3","key":"1882_CR33","doi-asserted-by":"publisher","first-page":"4938","DOI":"10.1109\/JSYST.2021.3127438","volume":"16","author":"S Zou","year":"2021","unstructured":"Zou S, Cao Q, Wang C, Huang Z, Xu G (2021) A robust two-factor user authentication scheme-based ecc for smart home in iot. IEEE Syst J 16(3):4938\u20134949","journal-title":"IEEE Syst J"},{"key":"1882_CR34","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.cose.2019.06.002","volume":"86","author":"M Shuai","year":"2019","unstructured":"Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for the smart home environment with provable security. Computers & Security 86:132\u2013146","journal-title":"Computers & Security"},{"key":"1882_CR35","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","volume":"129","author":"X Li","year":"2017","unstructured":"Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429\u2013443","journal-title":"Comput Netw"},{"key":"1882_CR36","doi-asserted-by":"publisher","first-page":"100158","DOI":"10.1016\/j.iot.2020.100158","volume":"9","author":"M Fakroon","year":"2020","unstructured":"Fakroon M, Alshahrani M, Gebali F, Traore I (2020) Secure remote anonymous user authentication scheme for smart home environment. Internet of Things 9:100158","journal-title":"Internet of Things"},{"key":"1882_CR37","first-page":"102585","volume":"55","author":"MF Ayub","year":"2020","unstructured":"Ayub MF, Saleem MA, Altaf I, Mahmood K, Kumari S (2020) Fuzzy extraction and puf based three-party authentication protocol using usb as mass storage device. J Inf Sec Appl 55:102585","journal-title":"J Inf Sec Appl"},{"key":"1882_CR38","unstructured":"Ferozkhan AB, Anandharaj G (2021) The embedded framework for securing the internet of things. J Eng Res 9(2)"},{"issue":"4","key":"1882_CR39","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.3390\/s20041215","volume":"20","author":"S Banerjee","year":"2020","unstructured":"Banerjee S, Odelu V, Das AK, Chattopadhyay S, Park Y (2020) An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 20(4):1215","journal-title":"Sensors"},{"key":"1882_CR40","first-page":"102787","volume":"58","author":"D Kaur","year":"2021","unstructured":"Kaur D, Kumar D (2021) Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. J Inf Sec Appl 58:102787","journal-title":"J Inf Sec Appl"},{"key":"1882_CR41","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.future.2019.05.058","volume":"100","author":"V Sureshkumar","year":"2019","unstructured":"Sureshkumar V, Amin R, Vijaykumar VR, Sekar SR (2019) Robust secure communication protocol for smart healthcare system with fpga implementation. Futur Gener Comput Syst 100:938\u2013951","journal-title":"Futur Gener Comput Syst"},{"issue":"9","key":"1882_CR42","doi-asserted-by":"publisher","first-page":"155014771987937","DOI":"10.1177\/1550147719879379","volume":"15","author":"B Yu","year":"2019","unstructured":"Yu B, Li H (2019) Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor internet of things. Int J Distrib Sens Netw 15(9):1550147719879379","journal-title":"Int J Distrib Sens Netw"},{"issue":"3","key":"1882_CR43","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.3390\/app13031424","volume":"13","author":"M Rana","year":"2023","unstructured":"Rana M, Mahmood K, Saleem MA, Al-Turjman F, Kolhar MS, Altrjman C (2023) Towards a provably secure authentication protocol for fog-driven iot-based systems. Appl Sci 13(3):1424","journal-title":"Appl Sci"},{"key":"1882_CR44","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s00530-015-0476-3","volume":"23","author":"F Wu","year":"2017","unstructured":"Wu F, Xu L, Kumari S, Li X (2017) An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Syst 23:195\u2013205","journal-title":"Multimedia Syst"},{"issue":"2","key":"1882_CR45","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1109\/TDSC.2017.2764083","volume":"17","author":"M Wazid","year":"2020","unstructured":"Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2020) Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Dependable Secure Comput 17(2):391\u2013406","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1882_CR46","unstructured":"Siddiqui AU, Singh HK (2015) \u201caadhar\u201d management system"},{"issue":"5","key":"1882_CR47","first-page":"1","volume":"7","author":"M Rao","year":"2014","unstructured":"Rao M, Newe T, Grout I (2014) Secure hash algorithm-3 (sha-3) implementation on xilinx fpgas, suitable for iot applications. Int J Smart Sens Intell Syst 7(5):1\u20136","journal-title":"Int J Smart Sens Intell Syst"},{"key":"1882_CR48","unstructured":"Stallings W (2006) Cryptography and network security, 4\/E. Pearson Education India"},{"key":"1882_CR49","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.jnca.2017.08.017","volume":"97","author":"M Alaa","year":"2017","unstructured":"Alaa M, Zaidan AA, Zaidan BB, Talal M, Kiah MLM (2017) A review of smart home applications based on internet of things. J Netw Comput Appl 97:48\u201365","journal-title":"J Netw Comput Appl"},{"key":"1882_CR50","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.jnca.2016.12.008","volume":"89","author":"F Wu","year":"2017","unstructured":"Wu F, Xu L, Kumari S, Li X, Shen J, Choo K-KR, Wazid M, Das AK (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in iot deployment. J Netw Comput Appl 89:72\u201385","journal-title":"J Netw Comput Appl"},{"key":"1882_CR51","doi-asserted-by":"crossref","unstructured":"Kaur H, Kumar M (2023) Signature identification and verification techniques: state-of-the-art work. J Ambient Intell Humaniz Comput 14(2):1027\u20131045","DOI":"10.1007\/s12652-021-03356-w"},{"key":"1882_CR52","doi-asserted-by":"crossref","unstructured":"Nimmy K, Dilraj M, Sankaran S, Achuthan K (2022) Leveraging power consumption for anomaly detection on iot devices in smart homes. J Ambient Int Humanized Comput 1\u201312","DOI":"10.1007\/s12652-022-04110-6"},{"issue":"2","key":"1882_CR53","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"1882_CR54","doi-asserted-by":"crossref","unstructured":"Abdalla M, Fouque P-A, Pointcheval D (2006) Password-based authenticated key exchange in the three-party setting. IEE Proceedings-Information Security 153(1):27\u201339","DOI":"10.1049\/ip-ifs:20055073"},{"key":"1882_CR55","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"1882_CR56","unstructured":"Von\u00a0Oheimb D (2005) The high-level protocol specification language hlpsl developed in the eu project avispa. In: Proceedings of APPSEM 2005 workshop, pp 1\u201317. APPSEM\u201905, Tallinn, Estonia"},{"key":"1882_CR57","unstructured":"AVISPA (2016) Automated validation of internet security protocols and applications"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01882-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01882-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01882-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:32:58Z","timestamp":1747474378000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01882-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,16]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1882"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01882-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,16]]},"assertion":[{"value":"19 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no conflicts of interest with the authors of this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors of this article have not conducted any research on humans or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All participants in the study received complete information about the research, including its objective, procedures, potential risks, and benefits. Confidentiality and anonymity were guaranteed, and data was used solely for research. Written informed consent was obtained from all participants, with the option to deny permission to disseminate data or personally identifiable information.I, Neha Sharma, permit the Journal of Peer-to-Peer Networking and Applications to publish the paper \"Design of Secure and Unique Addressing with Mutual Authentication Scheme in IoT Networks,\" which Neha Sharma and Dr. Pankaj Dhiman authored in a future edition.I confirm that I was involved in creating this work, have reviewed the final version, and have approved it for publication. I understand that once published, the manuscript will be accessible to the public and may be reproduced per the journal\u2019s guidelines. Additionally, I confirm that all co-authors listed on the manuscript have consented to its submission and publication in the Journal of Peer-to-Peer Networking and Applications.Signed, Neha Sharma Jaypee University of Information Technology, Waknaghat Solan (H.P), India","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"There is no competing interest in the declaration.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Ethics Approval: Jaypee University of Information Technology reviewed and approved the study\u2019s research procedure. All study operations followed the ethical criteria outlined in guidelines or regulations.Consent to Participate: All participants provided informed consent. They were informed about the research\u2019s purpose, procedures, potential risks and benefits, confidentiality precautions, and the right to withdraw without penalty. Before they participated in the study, all subjects signed consent forms.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}}],"article-number":"50"}}