Results 1 to 10 of about 335,875 (298)

Experimental Evaluation of Unicast and Multicast CoAP Group Communication [PDF]

open access: yesSensors, 2016
The Internet of Things (IoT) is expanding rapidly to new domains in which embedded devices play a key role and gradually outnumber traditionally-connected devices. These devices are often constrained in their resources and are thus unable to run standard
Isam Ishaq   +3 more
doaj   +7 more sources

CoAP_UAD: CoAP under attack dataset — A comprehensive dataset for CoAP-based IoT security researchfigshare [PDF]

open access: yesData in Brief
Internet of Things (IoT) systems increasingly rely on lightweight protocols such as the Constrained Application Protocol (CoAP), which are designed for resource-constrained devices but open new avenues for protocol-level attacks.
Jose Aveleira-Mata   +5 more
doaj   +2 more sources

Congestion Control Algorithm for Ubiquitous Electric IoT Based on CoAP Protocol [PDF]

open access: yesJisuanji gongcheng, 2021
Ubiquitous electric IoT is characterized by massive access nodes and limited device resources.When providing reliable transmission service, ubiquitous electric IoT tend to suffer from congestion, resulting in loss of power information flow and excessive ...
REN Zhi, WU Benyuan, ZHOU Zhou, SU Xin
doaj   +1 more source

Techno-economic feasibility analysis of constrained application protocol [PDF]

open access: yes2014 IEEE World Forum on Internet of Things (WF-IoT), 2014
Constrained Application Protocol (CoAP) has been developed as an alternative to the HyperText Transfer protocol (HTTP) to connect resource-limited devices to the Web. In addition to technical advantages, the success of Internet protocols depends also on their economic feasibility for the stakeholders involved in protocol deployment.
Ilaghi, Mahya, Levä, Tapio, Komu Miika
openaire   +5 more sources

Fuzzy Congestion Control and Avoidance for CoAP in IoT Networks

open access: yesIEEE Access, 2022
In Internet of Things (IoT) networks, congestion is growing with the increasing number of devices, and a large amount of collected data must be transferred. Congestion control is one of the most significant challenges for such networks.
Thieu Nga Pham   +2 more
doaj   +1 more source

Performance Evaluation of Triangular Number Sequence Backoff Algorithm for Constrained Application Protocol

open access: yesInternational Journal of Technology, 2023
In the of the Internet of Things (IoT) realm, congestion is considered a serious issue affecting network throughput due to the requirement of multiple nodes for message exchange.
Chanon Jangkajit, Chanwit Suwannapong
doaj   +1 more source

RCOAP: A Rate Control Scheme for Reliable Bursty Data Transfer in IoT Networks

open access: yesIEEE Access, 2021
The Internet Engineering Task Force (IETF) standardized the Constrained Application Protocol (CoAP) for Internet of Things (IoT) devices to meet the demands of IoT applications.
Dang Hai Hoang, Thi Thuy Duong Le
doaj   +1 more source

An Enhanced CoAP Scheme Using Fuzzy Logic With Adaptive Timeout for IoT Congestion Control

open access: yesIEEE Access, 2021
Congestion management in the Internet of Things (IoT) is one of the most challenging tasks in improving the quality of service (QoS) of a network.
Phet Aimtongkham   +2 more
doaj   +1 more source

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +5 more sources

Greater Expectations? [PDF]

open access: yes, 1987
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a ...
A.-R. Sadeghi   +16 more
core   +8 more sources

Home - About - Disclaimer - Privacy