Results 21 to 30 of about 327,438 (330)
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +5 more sources
An Enhanced CoAP Scheme Using Fuzzy Logic With Adaptive Timeout for IoT Congestion Control
Congestion management in the Internet of Things (IoT) is one of the most challenging tasks in improving the quality of service (QoS) of a network.
Phet Aimtongkham +2 more
doaj +1 more source
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a ...
A.-R. Sadeghi +16 more
core +8 more sources
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy ...
Balkis Bettoumi, Ridha Bouallegue
doaj +1 more source
Block-Wise Transfers in the Constrained Application Protocol (CoAP) [PDF]
Carsten Bormann
openaire +2 more sources
The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns.
Wen-Chung Tsai +3 more
doaj +1 more source
The Constrained Application Protocol (CoAP) [PDF]
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have ...
Z. Shelby, K. Hartke, C. Bormann
openaire +1 more source
EC-IoT : an easy configuration framework for constrained IoT devices [PDF]
Connected devices offer tremendous opportunities. However, their configuration and control remains a major challenge in order to reach widespread adoption by less technically skilled people.
Dalipi, Enri +4 more
core +2 more sources
Facilitating the creation of IoT applications through conditional observations in CoAP [PDF]
With the advent of IPv6, the world is getting ready to incorporate smart objects to the current Internet to realize the idea of Internet of Things.
Demeester, Piet +3 more
core +2 more sources
Fog Computing, Cloud Computing and IoT Environment: Advanced Broker Management System
Cloud computing is a massive amount of dynamic ad distributed resources that are delivered on request to clients over the Internet. Typical centralized cloud computing models may have difficulty dealing with challenges caused by IoT applications, such as
Mohammed Al Masarweh +2 more
doaj +1 more source

