Results 21 to 30 of about 327,438 (330)

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +5 more sources

An Enhanced CoAP Scheme Using Fuzzy Logic With Adaptive Timeout for IoT Congestion Control

open access: yesIEEE Access, 2021
Congestion management in the Internet of Things (IoT) is one of the most challenging tasks in improving the quality of service (QoS) of a network.
Phet Aimtongkham   +2 more
doaj   +1 more source

Greater Expectations? [PDF]

open access: yes, 1987
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a ...
A.-R. Sadeghi   +16 more
core   +8 more sources

LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things

open access: yesSensors, 2021
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy ...
Balkis Bettoumi, Ridha Bouallegue
doaj   +1 more source

Automatic Key Update Mechanism for Lightweight M2M Communication and Enhancement of IoT Security: A Case Study of CoAP Using Libcoap Library

open access: yesSensors, 2022
The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns.
Wen-Chung Tsai   +3 more
doaj   +1 more source

The Constrained Application Protocol (CoAP) [PDF]

open access: yes, 2014
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have ...
Z. Shelby, K. Hartke, C. Bormann
openaire   +1 more source

EC-IoT : an easy configuration framework for constrained IoT devices [PDF]

open access: yes, 2016
Connected devices offer tremendous opportunities. However, their configuration and control remains a major challenge in order to reach widespread adoption by less technically skilled people.
Dalipi, Enri   +4 more
core   +2 more sources

Facilitating the creation of IoT applications through conditional observations in CoAP [PDF]

open access: yes, 2013
With the advent of IPv6, the world is getting ready to incorporate smart objects to the current Internet to realize the idea of Internet of Things.
Demeester, Piet   +3 more
core   +2 more sources

Fog Computing, Cloud Computing and IoT Environment: Advanced Broker Management System

open access: yesJournal of Sensor and Actuator Networks, 2022
Cloud computing is a massive amount of dynamic ad distributed resources that are delivered on request to clients over the Internet. Typical centralized cloud computing models may have difficulty dealing with challenges caused by IoT applications, such as
Mohammed Al Masarweh   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy