Results 181 to 190 of about 4,597 (215)
Some of the next articles are maybe not open access.
Performance analysis of constrained application protocol (CoAP)
AIP Conference Proceedings, 2023Hadeel Hussein Azeez +1 more
openaire +1 more source
2018 International Conference on Computing, Networking and Communications (ICNC), 2018
In this paper, we leverage the well-known Californium CoAP code set maintained by the Eclipse Foundation, as well as the Negative-Acknowledgment Oriented Reliable Multicast (NORM) code set implemented by the US Naval Research Laboratory (NRL), and propose a reliable MANET transport protocol denoted CoAP over NORM (CoNORM).
James Nguyen, Wei Yu, Daniel Ku
openaire +1 more source
In this paper, we leverage the well-known Californium CoAP code set maintained by the Eclipse Foundation, as well as the Negative-Acknowledgment Oriented Reliable Multicast (NORM) code set implemented by the US Naval Research Laboratory (NRL), and propose a reliable MANET transport protocol denoted CoAP over NORM (CoNORM).
James Nguyen, Wei Yu, Daniel Ku
openaire +1 more source
IoT Security Using Lightweight Cipher Suites in Constrained Application Protocols (CoAP)
The rapid expansion of the Internet of Things (IoT) ecosystem has intensified the need for lightweight, yet robust security mechanisms tailored to constrained environments. This book chapter presents a comprehensive investigation into the integration of lightweight cipher suites within the Constrained Application Protocol (CoAP), focusing on ...Reena Shinde, Bramah Hazela
openaire +1 more source
2016
Service Discovery is a process of identifying the compatible resources of a transaction to result it in a comfort zone. The environment of Internet of Things would be a mixture of hardware and software independent components. Offering a service in an IoT architecture is challenging problem based on participant registration and logs.
S. Umamaheswari, K. Vanitha
openaire +1 more source
Service Discovery is a process of identifying the compatible resources of a transaction to result it in a comfort zone. The environment of Internet of Things would be a mixture of hardware and software independent components. Offering a service in an IoT architecture is challenging problem based on participant registration and logs.
S. Umamaheswari, K. Vanitha
openaire +1 more source
Concise Problem Details for Constrained Application Protocol (CoAP) APIs
2022T. Fossati, C. Bormann
openaire +1 more source
Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing
2022C. Amsüss +2 more
openaire +1 more source
Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)
2021A. Minaburo, L. Toutain, R. Andreasen
openaire +1 more source
On the design of efficient congestion control for the Constrained Application Protocol in IoT
Computer Networks, 2022Nabil Makarem
exaly
CoAP Acceleration on FPSoC for Resource Constrained Internet of Things Devices
IEEE Internet of Things Journal, 2021Burak Batmaz, Atakan Doğan
exaly
Constrained Application Protocol (CoAP) Transfer for the Certificate Management Protocol
2023openaire +1 more source

