Results 41 to 50 of about 13,790 (272)
Transparent CoAP Services to IoT Endpoints through ICN Operator Networks
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for constrained networks and devices.
Hasan Mahmood Aminul Islam+4 more
doaj +1 more source
Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol
Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing
S. G. Oliver, T. Purusothaman
semanticscholar +1 more source
A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things
Internet Engineering Task Force (IETF) have developed Constrained Application Protocol (CoAP) to enable communication between sensor or actuator nodes in constrained environments, such as small amount of memory, and low power. IETF CoAP and HTTP are used
Wenquan Jin, DoHyeun Kim
doaj +1 more source
CoAP Protocol for Constrained Networks [PDF]
This paper discusses the Constrained Application Protocol (CoAP), an application layer protocol introduced by Internet Engineering Task Force (IETF) Constrained RESTful environment (CoRE) Working Group for use with low power and resource constrained nodes in the internet of things.
Manveer Joshi, Bikram Pal Kaur
openaire +1 more source
TCP in the Internet of Things: from ostracism to prominence [PDF]
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Arcia Moret, Andrés+2 more
core +1 more source
Leveraging upon standards to build the Internet of things [PDF]
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols ...
Carels, David+7 more
core +3 more sources
Security of IoT Application Layer Protocols: Challenges and Findings
IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are often not properly
Giuseppe Nebbione+1 more
doaj +1 more source
Securing Name Resolution in the IoT: DNS over CoAP [PDF]
In this paper, we present the design, implementation, and analysis of DNS over CoAP~(DoC), a new proposal for secure and privacy-friendly name resolution of constrained IoT devices.
Martine S. Lenders+5 more
semanticscholar +1 more source
Bindings and RESTlets: a novel set of CoAP-based application enablers to build IoT applications [PDF]
Sensors and actuators are becoming important components of Internet of Things (IoT) applications. Today, several approaches exist to facilitate communication of sensors and actuators in IoT applications.
Demeester, Piet+4 more
core +2 more sources
Performance Evaluation of CoAP and MQTT_SN in an IoT Environment
The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things.
Mónica Martí+2 more
doaj +1 more source