Results 181 to 190 of about 4,569 (223)
Some of the next articles are maybe not open access.
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 2015
The wide range of IoT applications creates a demand for various types of communication. While both types of communication, unreliable and reliable, are important, it is crucial to extend scalable congestion control in the Internet to cover IoT communication also.
Ilpo Jarvinen, Laila Daniel, Markku Kojo
openaire +1 more source
The wide range of IoT applications creates a demand for various types of communication. While both types of communication, unreliable and reliable, are important, it is crucial to extend scalable congestion control in the Internet to cover IoT communication also.
Ilpo Jarvinen, Laila Daniel, Markku Kojo
openaire +1 more source
2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 2019
Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at ...
Felix Seidel +2 more
openaire +1 more source
Devices on the Internet of Things (IoT) are usually battery-powered and have limited resources. Hence, energy-efficient and lightweight protocols were designed for IoT devices, such as the popular Constrained Application Protocol (CoAP). Yet, CoAP itself does not include any defenses against denial-of-sleep attacks, which are attacks that aim at ...
Felix Seidel +2 more
openaire +1 more source
Performance analysis of constrained application protocol (CoAP)
AIP Conference Proceedings, 2023Hadeel Hussein Azeez +1 more
openaire +1 more source
2018 International Conference on Computing, Networking and Communications (ICNC), 2018
In this paper, we leverage the well-known Californium CoAP code set maintained by the Eclipse Foundation, as well as the Negative-Acknowledgment Oriented Reliable Multicast (NORM) code set implemented by the US Naval Research Laboratory (NRL), and propose a reliable MANET transport protocol denoted CoAP over NORM (CoNORM).
James Nguyen, Wei Yu, Daniel Ku
openaire +1 more source
In this paper, we leverage the well-known Californium CoAP code set maintained by the Eclipse Foundation, as well as the Negative-Acknowledgment Oriented Reliable Multicast (NORM) code set implemented by the US Naval Research Laboratory (NRL), and propose a reliable MANET transport protocol denoted CoAP over NORM (CoNORM).
James Nguyen, Wei Yu, Daniel Ku
openaire +1 more source
IoT Security Using Lightweight Cipher Suites in Constrained Application Protocols (CoAP)
The rapid expansion of the Internet of Things (IoT) ecosystem has intensified the need for lightweight, yet robust security mechanisms tailored to constrained environments. This book chapter presents a comprehensive investigation into the integration of lightweight cipher suites within the Constrained Application Protocol (CoAP), focusing on ...Reena Shinde, Bramah Hazela
openaire +1 more source
2016
Service Discovery is a process of identifying the compatible resources of a transaction to result it in a comfort zone. The environment of Internet of Things would be a mixture of hardware and software independent components. Offering a service in an IoT architecture is challenging problem based on participant registration and logs.
S. Umamaheswari, K. Vanitha
openaire +1 more source
Service Discovery is a process of identifying the compatible resources of a transaction to result it in a comfort zone. The environment of Internet of Things would be a mixture of hardware and software independent components. Offering a service in an IoT architecture is challenging problem based on participant registration and logs.
S. Umamaheswari, K. Vanitha
openaire +1 more source
Concise Problem Details for Constrained Application Protocol (CoAP) APIs
2022T. Fossati, C. Bormann
openaire +1 more source
Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing
2022C. Amsüss +2 more
openaire +1 more source
Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)
2021A. Minaburo, L. Toutain, R. Andreasen
openaire +1 more source

