Results 131 to 140 of about 765 (197)
Efficient Data Management in Agricultural IoT: Compression, Security, and MQTT Protocol Analysis. [PDF]
Has M +3 more
europepmc +1 more source
Modified grey wolf optimization for energy-efficient internet of things task scheduling in fog computing. [PDF]
Alsadie D, Alsulami M.
europepmc +1 more source
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices. [PDF]
Karmous N +4 more
europepmc +1 more source
Constrained Application Protocol (CoAP) Hop-Limit Option
The presence of Constrained Application Protocol (CoAP) proxies may lead to infinite forwarding loops, which is undesirable. To prevent and detect such loops, this document specifies the Hop-Limit CoAP option.
M. Boucadair, T. Reddy.K, J. Shallow
openaire +2 more sources
VE-CoAP: A constrained application layer protocol for IoT video transmission
Abstract Regarding the advantages of video for communications, it is expected that video transmission becomes an inseparable part of most IoT solutions which raises numerous challenges especially over LLNs (Low Power Lossy Networks). Considering these challenges and video transmission requirements for IoT applications, utilizing a proper application ...
Arvin Ghotbou, Mohammad Khansari
openaire +2 more sources
Sensor Observation Service (SOS)/Constrained Application Protocol (CoAP) proxy design
Sensor networks have expanded their scope and capabilities, becoming a fundamental part of the Internet of Things (IoT). To be able to affront the interoperability needs that this rise brings, it is necessary to have a repository with standard interfaces and messages. This has been addressed through the creation of the Sensor Observation Service (SOS).
J. Pradilla +3 more
openaire +2 more sources
Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at ...
Felix Seidel +2 more
openaire +2 more sources

