Results 11 to 20 of about 335,875 (298)
With the wide spread of Internet of Things, efficient communication between the nodes is getting more important. Constrained Application Protocol was developed to accommodate the resource-constrained nodes and low-power communication links.
Jung June Lee +2 more
doaj +2 more sources
Enhanced group communication in constrained application protocol–based Internet-of-things networks
As a lot of sensors are connected to the Internet, many works have been made to support group communication for constrained application protocol. The existing multicast-based group communication may be efficient, but not reliable in wireless sensor ...
Hyung-Woo Kang, Seok-Joo Koh
doaj +2 more sources
As power systems develop rapidly into smarter and more flexible configurations, so too must the communication technologies that support them. Machine-to-machine (M2M) communication in power systems enables information collection by combining sensors and ...
In-Jae Shin +2 more
doaj +3 more sources
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy ...
Balkis Bettoumi, Ridha Bouallegue
doaj +1 more source
Machine Learning-Based DoS Amplification Attack Detection against Constrained Application Protocol
This paper discusses the Internet of Things (IoT) and the security challenges associated with it. IoT is a network of interconnected devices that share information.
Sultan M. Almeghlef +3 more
doaj +1 more source
The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns.
Wen-Chung Tsai +3 more
doaj +1 more source
The Constrained Application Protocol (CoAP) [PDF]
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have ...
Z. Shelby, K. Hartke, C. Bormann
openaire +1 more source
EC-IoT : an easy configuration framework for constrained IoT devices [PDF]
Connected devices offer tremendous opportunities. However, their configuration and control remains a major challenge in order to reach widespread adoption by less technically skilled people.
Dalipi, Enri +4 more
core +2 more sources
Fog Computing, Cloud Computing and IoT Environment: Advanced Broker Management System
Cloud computing is a massive amount of dynamic ad distributed resources that are delivered on request to clients over the Internet. Typical centralized cloud computing models may have difficulty dealing with challenges caused by IoT applications, such as
Mohammed Al Masarweh +2 more
doaj +1 more source
Facilitating the creation of IoT applications through conditional observations in CoAP [PDF]
With the advent of IPv6, the world is getting ready to incorporate smart objects to the current Internet to realize the idea of Internet of Things.
Demeester, Piet +3 more
core +2 more sources

