Results 1 to 10 of about 2,276 (160)

CoAP_UAD: CoAP under attack dataset — A comprehensive dataset for CoAP-based IoT security researchfigshare [PDF]

open access: goldData in Brief
Internet of Things (IoT) systems increasingly rely on lightweight protocols such as the Constrained Application Protocol (CoAP), which are designed for resource-constrained devices but open new avenues for protocol-level attacks.
Jose Aveleira-Mata   +5 more
doaj   +3 more sources

Development of CoAP protocol for communication in mobile robotic systems using IoT technique [PDF]

open access: yesScientific Reports
This paper proposes a novel design methodology of Constrained Application Protocol (CoAP) protocol for an IoT-enabled mobile robot system to operate remotely and access wirelessly.
Chandra Sarkar   +2 more
doaj   +2 more sources

Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks [PDF]

open access: yesSensors, 2022
The Internet of Things (IoT) connects billions of sensors to share and collect data at any time and place. The Advanced Metering Infrastructure (AMI) is one of the most important IoT applications.
Nasr Abosata   +2 more
doaj   +2 more sources

IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials

open access: yesFuture Internet, 2022
Many IoT use cases can benefit from group communication, where a user requests an IoT resource and this request can be handled by multiple IoT devices, each of which may respond back to the user.
Nikos Fotiou   +3 more
doaj   +1 more source

Enhancements and Challenges in CoAP—A Survey

open access: yesSensors, 2020
The Internet of Engineering Task (IETF) developed a lighter application protocol (Constrained Application Protocol (CoAP)) for the constrained IoT devices operating in lossy environments.
Muhammad Ashar Tariq   +3 more
doaj   +1 more source

Fuzzy Congestion Control and Avoidance for CoAP in IoT Networks

open access: yesIEEE Access, 2022
In Internet of Things (IoT) networks, congestion is growing with the increasing number of devices, and a large amount of collected data must be transferred. Congestion control is one of the most significant challenges for such networks.
Thieu Nga Pham   +2 more
doaj   +1 more source

CoAP and Its Performance Evaluation

open access: yesSakarya Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2020
ConstrainedApplication Protocol (CoAP) is one of the lightest IoT connectivity protocol.It has been developed for IoT devices that has constrained resources such asmemory, processing power, battery etc. CoAP protocol is built on RESTarchitecture.
Ünal Çavuşoğlu   +3 more
doaj   +1 more source

IoT Security: Threats and Possible Solutions [PDF]

open access: yesInformatică economică, 2022
Despite IoT being in the spotlight for several years now, Gartner still predicts a five time increase in number of devices from 2018 to 2028 [1], up to 1.9 billion units, which further intensifies the need for security among IoT nodes. Through the years,
Andrei-Robert CAZACU
doaj   +1 more source

RCOAP: A Rate Control Scheme for Reliable Bursty Data Transfer in IoT Networks

open access: yesIEEE Access, 2021
The Internet Engineering Task Force (IETF) standardized the Constrained Application Protocol (CoAP) for Internet of Things (IoT) devices to meet the demands of IoT applications.
Dang Hai Hoang, Thi Thuy Duong Le
doaj   +1 more source

A Comparative Analysis for Congestion Mechanism in COAP and COCOA [PDF]

open access: yesEngineering and Technology Journal, 2018
Internet of things (IoT) is the paradigm for internetworking devices for data exchange and control. One of the important problems facing the IoT networks is the congestion; many researchers have discussed this problem.
Hamid Hasan, Ahmed Ahmed
doaj   +1 more source

Home - About - Disclaimer - Privacy