Results 131 to 140 of about 765 (197)

Constrained Application Protocol (CoAP) Hop-Limit Option

open access: closed, 2020
The presence of Constrained Application Protocol (CoAP) proxies may lead to infinite forwarding loops, which is undesirable. To prevent and detect such loops, this document specifies the Hop-Limit CoAP option.
M. Boucadair, T. Reddy.K, J. Shallow
openaire   +2 more sources

VE-CoAP: A constrained application layer protocol for IoT video transmission

open access: closedJournal of Network and Computer Applications, 2021
Abstract Regarding the advantages of video for communications, it is expected that video transmission becomes an inseparable part of most IoT solutions which raises numerous challenges especially over LLNs (Low Power Lossy Networks). Considering these challenges and video transmission requirements for IoT applications, utilizing a proper application ...
Arvin Ghotbou, Mohammad Khansari
openaire   +2 more sources

Sensor Observation Service (SOS)/Constrained Application Protocol (CoAP) proxy design

open access: closed2016 18th Mediterranean Electrotechnical Conference (MELECON), 2016
Sensor networks have expanded their scope and capabilities, becoming a fundamental part of the Internet of Things (IoT). To be able to affront the interoperability needs that this rise brings, it is necessary to have a repository with standard interfaces and messages. This has been addressed through the creation of the Sensor Observation Service (SOS).
J. Pradilla   +3 more
openaire   +2 more sources

Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers

open access: closed2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 2019
Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at ...
Felix Seidel   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy