Добірка наукової літератури з теми "Constrained application protocol (CoAP)"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Constrained application protocol (CoAP)".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Constrained application protocol (CoAP)":

1

Levä, Tapio, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar, and Oleksiy Mazhelis. "Adoption of Constrained Application Protocol." International Journal of Innovation in the Digital Economy 7, no. 1 (January 2016): 38–53. http://dx.doi.org/10.4018/ijide.2016010104.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodological framework. Based on eleven expert interviews complemented with a literature survey, the paper identifies potential deployment challenges for CoAP, both technical and business-related, and suggests approaches to overcome them. The findings should facilitate the uptake of CoAP by supporting the potential adopters of the protocol in their decision-making.
2

Tariq, Muhammad Ashar, Murad Khan, Muhammad Toaha Raza Khan, and Dongkyun Kim. "Enhancements and Challenges in CoAP—A Survey." Sensors 20, no. 21 (November 9, 2020): 6391. http://dx.doi.org/10.3390/s20216391.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Engineering Task (IETF) developed a lighter application protocol (Constrained Application Protocol (CoAP)) for the constrained IoT devices operating in lossy environments. Based on UDP, CoAP is a lightweight and efficient protocol compared to other IoT protocols such as HTTP, MQTT, etc. CoAP also provides reliable communication among nodes in wireless sensor networks in addition to features such as resource observation, resource discovery, congestion control, etc. These capabilities of CoAP have enabled the implementation of CoAP in various domains ranging from home automation to health management systems. The use of CoAP has highlighted its shortcomings over the time. To overcome shortcomings of CoAP, numerous enhancements have been made in basic CoAP architecture. This survey highlights the shortcomings of basic CoAP architecture and enhancements made in it throughout the time. Furthermore, existing challenges and issue in the current CoAP architecture are also discussed. Finally, some applications with CoAP implementation are mentioned in order to realize the viability of CoAP in real world use cases.
3

Islam, Hasan, Dmitrij Lagutin, Antti Ylä-Jääski, Nikos Fotiou, and Andrei Gurtov. "Transparent CoAP Services to IoT Endpoints through ICN Operator Networks." Sensors 19, no. 6 (March 17, 2019): 1339. http://dx.doi.org/10.3390/s19061339.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for constrained networks and devices. CoAP and its extensions (e.g., CoAP observe and group communication) provide the potential for developing novel applications in the Internet-of-Things (IoT). However, a full-fledged CoAP-based application may require significant computing capability, power, and storage capacity in IoT devices. To address these challenges, we present the design, implementation, and experimentation with the CoAP handler which provides transparent CoAP services through the ICN core network. In addition, we demonstrate how the CoAP traffic over an ICN network can unleash the full potential of the CoAP, shifting both overhead and complexity from the (constrained) endpoints to the ICN network. The experiments prove that the CoAP Handler helps to decrease the required computation complexity, communication overhead, and state management of the CoAP server.
4

Ukil, Arijit, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal, and Tulika Bose. "Lightweight security scheme for IoT applications using CoAP." International Journal of Pervasive Computing and Communications 10, no. 4 (October 28, 2014): 372–92. http://dx.doi.org/10.1108/ijpcc-01-2014-0002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose – The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained characteristics of IoT systems have ushered in compelling requirements for lightweight application protocol and security suites. CoAP has already been established as the candidate protocol for IoT systems. However, low overhead security scheme for CoAP is still an open problem. Existing security solutions like Datagram Transport Layer Security (DTLS) is not suitable, particularly due to its expensive handshaking, public key infrastructure (PKI)-based authentication and lengthy ciphersuite agreement process. Design/methodology/approach – This paper proposes a lightweight security scheme in CoAP using Advanced Encryption Standard (AES) 128 symmetric key algorithm. The paper presents an object security (payload embedded)-based robust authentication mechanism with integrated key management. The paper introduces few unique modifications to CoAP header to optimize security operation and minimize communication cost. Findings – It is resilient to number of security attacks like replay attack, meet-in-the-middle attack and secure under chosen plaintext attack. This scheme is generic in nature, applicable for gamut of IoT applications. The paper proves efficacy of our proposed scheme for vehicle tracking application in emulated laboratory setup. Specifically, it compares with DTLS-enabled CoAP to establish the lightweight feature of our proposed solution. Research limitations/implications – This paper mainly focuses on implementing in-vehicle tracking systems as an IoT application and used CoAP as the application protocol. Practical implications – Such a lightweight security scheme would provide immense benefit in IoT systems so that resource constraint-sensing devices and nodes can be made secure. This would impact IoT eco systems to a large extent. Originality/value – Such kind of security suite that provides both robustness and lightweight feature is hitherto not known to the authors, particularly in CoAP for IoT applications.
5

Jin, Wenquan, and DoHyeun Kim. "A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things." JOIV : International Journal on Informatics Visualization 1, no. 4 (November 4, 2017): 110. http://dx.doi.org/10.30630/joiv.1.4.37.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Internet Engineering Task Force (IETF) have developed Constrained Application Protocol (CoAP) to enable communication between sensor or actuator nodes in constrained environments, such as small amount of memory, and low power. IETF CoAP and HTTP are used to monitor or control environments in Internet of Things (IoT) and Machine-to-Machine (M2M). In this paper, we present a sleep-awake scheme based on CoAP for energy efficiency in Internet of Things. This scheme supports to increase energy efficiency of IoT nodes using CoAP protocol. We have slightly modified the IoT middleware to improve CoAP protocol to conserve energy in the IoT nodes. Also, the IoT middleware includes some functionality of the CoRE Resource Directory (RD) and the Message Queue (MQ) broker with IoT nodes to synchronize sleepy status.
6

Kwon, Jung-Hyok, Sol-Bee Lee, Jaehoon Park, Kyu-Sung Hwang, Yongseok Lim, and Eui-Jik Kim. "Adaptive Resource Observation for Congestion Alleviation using Constrained Application Protocol." International Journal of Engineering & Technology 7, no. 4.38 (December 3, 2018): 885. http://dx.doi.org/10.14419/ijet.v7i4.38.27601.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper presents an adaptive resource observation (ARO) for congestion alleviation using constrained application protocol (CoAP), which prevents buffer overflow of the client by adjusting observing period of the associated servers. The operation of ARO consists of two main phases; 1) buffer overflow estimation, 2) observing period adaptation. In the former, the client estimates whether buffer overflow will occur by comparing its service rate with packet arrival rate, then it determines the new observing period that can prevent buffer overflow of the client. The latter is used to adjust the observing period of servers considering the predefined the minimum and maximum queue threshold. ARO can significantly reduce the number of dropped packets caused by buffer overflow. The simulation results show that ARO achieves a higher network performance than legacy CoAP.
7

Viel, Felipe, Luis Augusto Silva, Valderi Reis Quietinho Leithardt, Juan Francisco De Paz Santana, Raimundo Celeste Ghizoni Teive, and Cesar Albenes Zeferino. "An Efficient Interface for the Integration of IoT Devices with Smart Grids." Sensors 20, no. 10 (May 17, 2020): 2849. http://dx.doi.org/10.3390/s20102849.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The evolution of computing devices and ubiquitous computing has led to the development of the Internet of Things (IoT). Smart Grids (SGs) stand out among the many applications of IoT and comprise several embedded intelligent technologies to improve the reliability and the safety of power grids. SGs use communication protocols for information exchange, such as the Open Smart Grid Protocol (OSGP). However, OSGP does not support the integration with devices compliant with the Constrained Application Protocol (CoAP), a communication protocol used in conventional IoT systems. In this sense, this article presents an efficient software interface that provides integration between OSGP and CoAP. The results obtained demonstrate the effectiveness of the proposed solution, which presents low communication overhead and enables the integration between IoT and SG systems.
8

Jung, Joong-Hwa, Moneeb Gohar, and Seok-Joo Koh. "CoAP-Based Streaming Control for IoT Applications." Electronics 9, no. 8 (August 16, 2020): 1320. http://dx.doi.org/10.3390/electronics9081320.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Constrained Application Protocol (CoAP) is a representative messaging protocol for Internet of Things (IoT) applications. It is noted that a lot of IoT-based streaming applications have been recently deployed. Typically, CoAP uses User Datagram Protocol (UDP) as its underlying protocol for lightweight messaging. However, it cannot provide reliability, since it is based on UDP. Thus, the CoAP over Transmission Control Protocol (TCP) was recently proposed so as to provide reliability. However, the existing schemes do not provide the error handling and flow controls suitably for IoT-based streaming applications. This tends to induce throughput degradation in wireless lossy networks. In this paper, we propose a CoAP-based streaming control (CoAP-SC) scheme, which is an extension of CoAP over UDP with error handling and flow control for throughput enhancement. The proposed CoAP-SC scheme is designed by considering the sequence number of data message, the use of ACK messages, and the buffer size of sending buffer. To do this, a new CoAP option is defined. For performance analysis, the proposed scheme is implemented and compared with the existing schemes. From the testbed experimentations in various network environments, we see that the proposed CoAP-SC scheme can provide better throughput than the existing CoAP-based schemes by performing the error handling and flow control operations effectively.
9

Sudaryanto, Eko, Asep Suryanto, and Susatyo Adhi Pramono. "PENERAPAN SISTEM PEMANTAUAN KELEMBAPAN DAN SUHU LABORATORIUM DENGAN METODE CONSTRAINED APPLICATION PROTOCOL (CoAP)." Teodolita: Media Komunkasi Ilmiah di Bidang Teknik 23, no. 1 (June 26, 2022): 56–61. http://dx.doi.org/10.53810/jt.v23i1.439.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstrak Dalam pelaksanaan kegiatan perkuliahan praktikum, laboratorium banyak digunakan oleh mahasiswa. Alat-alat elektronika banyak digunakan sebagai pendukung dalam kegiatan praktikum.Untuk menjaga agar peralatan elektronik tersebut tidak rusak maka diperlukan pengaturan suhu dan kelembapan udara. Suhu ruang sebaiknya diatur pada suhu antara 18oC –28oC dan kelembapan ruang berkisar antara 40% - 60%.Tujuan penelitian ini adalah menerapkan sistem pemantauan kelembapan dan suhu laboratorium dengan metode Constrained Application Protocol (CoAP). Metode penelitian yang digunakan adalah metode waterfall yang terdiri dari analisis kebutuhan, design dan implementasi. Pada penelitian ini dirancang peralatan berbasis Internet of Things (IoT) dengan mikrokontroller NodeMCU ESP-8266 V3 dan sensor DHT11. Dari penelitian ini dihasilkan sistem pemantauan kelembapan dan suhu laboratorium menggunakan protocol CoAP. Kata Kunci : CoAP, Kelembapan, Suhu
10

Yun Kang, Jeong, Nathali Silva, and Kijun Han. "CoAP Monitoring System Using Logical Grouping Technique." International Journal of Engineering & Technology 7, no. 4.4 (September 15, 2018): 46. http://dx.doi.org/10.14419/ijet.v7i4.4.19901.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Most of IoT devices will have constraints in terms of memory add power. IETF proposed light-weight base Constrained Application Protocol (CoAP) at the application level. It supports two important features, observe and group communication. However, these two features are unable to work at the same time. In this paper, we propose a CoAP grouping technique using a gateway. Gateway generates device groups with resource type and saves groups’ information in Database. It helps perform operations on the observed results and user can easily manage system.

Дисертації з теми "Constrained application protocol (CoAP)":

1

Oudishu, Ramcin, and Pethrus Gärdborn. "A CoAP Publish-Subscribe Broker for More Resource-Efficient Wireless Sensor Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232076.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the rapid development of the Internet of Things, Wireless Sensor Networks (WSNs) are deployed increasingly all over the world, providing data that can help increase sustainable development. Currently in Uppsala, Sweden, the GreenIoT project monitors air pollution by using WSNs. The resource constrained nature of WSNs demand that special care is taken in the design of communication models and communication protocols. The publish-subscribe (pub/sub) model suits WSNs very well since it puts an intermediary the broker server between sensor nodes and clients, thus alleviating the workload of the sensor nodes. The IETF (Internet Engineering Task Force) is currently in the process of standardizing a pub/sub extension to the Constrained Application Protocol (CoAP). Since the extension is such a recent addition to CoAP and not yet standardized, there are very few actual implementations of it and little is known of how it would work in practice. The GreenIoT project is considering replacement of their current pub/sub broker with the CoAP pub/sub broker since its underlying implementation is likely to be more energy efficient and the standardizing organization behind CoAP is the well-esteemed IETF. On a general level, this report offers an investigation of the problems and challenges faced when implementing the CoAP pub/sub extension with respect to design choices, implementation and protocol ambiguities. More specifically, a CoAP pub/sub broker is implemented for the GreenIoT project. By means of carefully analyzing the CoAP protocol and CoAP pub/sub draft as well as other necessary protocols, then proceeding to make decisions of what programming language to use as well as what existing CoAP library to use, a broker server was implemented and tested iteratively as the work proceeded. The implementation gave rise to several questions regarding the pub/sub draft which are also discussed in the report.
Den hastiga utvecklingen av Sakernas Internet över hela världen har medfört ett ökat användande av trådlösa sensornätverk vars datainsamling kan bidra till en mer hållbar utveckling. För närvarande använder sig GreenIoT-projektet i Uppsala av trådlösa sensornätverk för att övervaka halterna av luftföroreningar. Resursbegränsningarna för dylika nätverk medför att särskild hänsyn måste tas vid design av såväl kommunikationsmodeller som kommunikationsprotokoll. Modellen Publicera-Prenumerera (pub/pre) passar ypperligt för trådlösa sensornätverk då en mellanhand placeras mellan klient och server en s.k. broker vilket får den positiva effekten att att sensornoderna avlastas. För närvarande är IETF (Internet Engineering Task Force) i färd med att standardisera en pub/pre-utvidgning av det redan standardiserade CoAP (Constrained Application Protocol). Eftersom att utvidgningen är så pass ny finns ytterst få implementationer av den och man vet därmed väldigt lite om hur den faktiskt fungerar i praktiken. GreenIoT-projektet överväger att ersätta sin nuvarande pub/pre-broker med en CoAP pub/pre-broker eftersom att energianvändningen kan antas bli lägre samt att standardiseringsorganisationen bakom CoAP är det välrenommerade IETF. Sett ur ett större perspektiv erbjuder denna rapport en undersökning av de problem och utmaningar man ställs inför vid implementation av CoAP pub/pre-utvidgningen med avseende på designval, implementationsval, och protokolltvetydigheter. Mer konkret implementeras en CoAP pub/pre-broker åt GreenIoT-projektet. Genom att först noggrant analysera CoAP-protokollet, CoAP pub/pre-utkastet, liksom andra nödvändiga protokoll, för att därefter bestämma vilket programmeringsspråk och vilket existerande CoAP-bibliotek som skulle användas, implementerades en broker server som testades iterativt under processens gång. Ett flertal frågor som uppstod rörande pub/pre-utkastet presenteras och diskuteras i rapporten.
2

Amaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things." Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Dans l'Internet des objets (IoT), les données sont gérées et stockées par un logiciel appelé middleware (situé sur un serveur). L'évolution du concept IoT a conduit à la construction de nombreux intergiciels IoT, des logiciels qui jouent un rôle clé car ils prennent en charge la communication entre les appareils, les utilisateurs et les applications. Plusieurs aspects peuvent impacter les performances d'un middleware. Basée sur une revue approfondie de la littérature associée et sur la proposition d'un modèle de référence pour le middleware IoT, cette thèse propose un nouveau middleware IoT, appelé In.IoT, une solution middleware évolutive, sécurisée et innovante basée sur une revue approfondie du état de l'art et suivant l'architecture middleware de référence proposée dans le cadre de ce travail de recherche. In.IoT répond aux préoccupations middleware des solutions les plus populaires (sécurité, convivialité et performances) qui ont été évaluées, démontrées et validées tout au long de cette étude, et il est prêt et disponible à l'utilisation. Les recommandations et les exigences architecturales d'In.IoT sont détaillées et peuvent être reproduites par des solutions nouvelles et disponibles. Il prend en charge les protocoles de couche application les plus populaires (MQTT, CoAP et HTTP). Ses performances sont évaluées en comparaison avec les solutions les plus prometteuses disponibles dans la littérature et les résultats obtenus par la solution proposée sont extrêmement prometteurs. De plus, cette thèse étudie l'impact du langage de programmation sous-jacent sur les performances globales de la solution grâce à une étude d'évaluation des performances incluant Java, Python et Javascript, identifiant que globalement, Java s'avère être le choix le plus robuste pour le middleware IoT. Les appareils IoT communiquent avec le middleware via un protocole de couche application qui peut différer de ceux pris en charge par le middleware, en particulier lorsque l'on considère que les ménages auront divers appareils de différentes marques. La thèse offre une alternative pour de tels cas, en proposant une passerelle de couche application, appelée MiddleBridge. MiddleBridge traduit les messages CoAP, MQTT, DDS et Websockets en HTTP (HTTP est pris en charge par la plupart des intergiciels IoT). Avec MiddleBridge, les appareils peuvent envoyer un message plus petit à un intermédiaire (MiddleBridge), qui le restructure et le transmet à un middleware, réduisant ainsi le temps qu'un appareil passe à transmettre. Les solutions proposées ont été évaluées par rapport à d'autres solutions similaires disponibles dans la littérature, en tenant compte des métriques liées à la taille des paquets, aux temps de réponse, aux requêtes par seconde et au pourcentage d'erreur, démontrant leurs meilleurs résultats et leur énorme potentiel. En outre, l'étude a utilisé XGBoost (une technique d'apprentissage automatique) pour détecter l'occurrence d'attaques de réplication lorsqu'un attaquant obtient les informations d'identification de l'appareil, en l'utilisant pour générer de fausses données et perturber l'environnement IoT. Les résultats obtenus sont extrêmement prometteurs. Ainsi, il est conclu que l'approche proposée contribue à l'état de l'art des solutions middleware IoT
In Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
3

Kallsäby, Mattias. "Modular MiniTest Tester." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-65101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
RealTest is a company located in V¨aster˚as, Sweden, that works with embedded systems and test systems. RealTest had a need for a new test system for one of their products, the MiniTester (MT) mk2 that is used to test Drive Control Units (DCUs) used on trains. The problems that had to be solved were, finding out the most common faults of the product, make the test system modifiable and scalable, have a software running on a Windows PC with a working GUI and test logic and design a hardware component measurement unit to generate and measure signals. The system described in this report is the software parts of the developed MiniTest tester that runs on a Windows PC as well as the hardware design. The programming of the measurement unit and the testing of that unit is not covered by this report. The hardware consist of custom PCBs and Arduino boards. The Windows PC programs implemented a GUI and test logic according to the goals with a few exceptions left for further work. These programs have been evaluated by emulating the hardware. The system is shown to be modifiable in practice by implementation and scalable in theory
4

Huang, Lum-Pin, and 黃倫斌. "IOT Communication and CoAP (Constrained Application Protocol) Research in Teaching and Implementation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/50926914231944227468.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
碩士
健行科技大學
資訊工程所
101
The development and applications of smart home networks has been promoted by Internet of Things. The Constrained Application Protocol (CoAP) is regarded as the key protocol for machine-to-machine communication. It provides constrained environments with very low overhead and low power consumption web service and integrate smart objects with the web. It describes CoAP and the differences with HTTP in performance. At last, it reports the results of the experiment showing the benefits of CoAP in teaching and transmission efficiency compared to HTTP in constrained environments.
5

Pancev, I. Gede Darko, and 易英戈. "Design and Implementation of a Lightweight Wireless Embedded Internet Platform With the Constrained Application Protocol." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/44919609580770400143.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
碩士
國立臺灣科技大學
自動化及控制研究所
104
The Internet has been a great success over the past 20 years, growing from small academic networks into global networks used regularly by over 1.4 billion people. Another Internet revolution, known as Internet of Things (IoT), has been going on with the maturing of the net communication in routers, servers and personal computers. The vision behind the IoT is that embedded devices are universally becoming IP (Internet Protocol) enabled and an integral part of Internet. The scale of the IoT has already been estimated to be immense, with the potential of trillion of devices becoming IP-enabled. The impact of IoT will be significant with the promise of better environment monitoring, energy saving, smart grids, more efficient factories, better logistic, better healthcare systems, and smart homes. However, one of the greatest potential growth of IoT comes from low power embedded devices that until now have not been IP-enabled. A new paradigm, known as Wireless Embedded Internet, is needed to enable low-power wireless devices with limited processing capabilities to participate in the IoT. Until now only powerful embedded devices and networks are able to natively participate in the Internet. Direct communication with traditional IP networks requires many Internet protocols, and an operating system to deal with complexity and maintainability. These requirements have in practice limited the IoT linking to devices with a powerful processor, an operating system with a full TCP/IP stack, and an IP-capable communication link. The main contribution of this study is to investigate a reliable way of future IoT networking by designing and implementing a lightweight wireless embedded platform, which equips with the characteristics of low power consumption, memory-constrained, small size, low cost IP-enabled wireless embedded device and the constrained application protocol. As a result, the embedded device with Low Power Wireless Connectivity, called “Lowvy,” was born, and a newest version of IP standard called IPv6 was successfully enabled on Lowvy wireless embedded devices with low-power consumption, thus enabling end-to-end IP networking, and wide range of wireless embedded IoT applications. Internet integration of Lowvy wireless embedded platform has been tested by creating an online environment-monitoring system which periodically published the measurement results of environment-monitoring applications (e.g., temperature, humidity, air quality, and ambient light) to Ubidots Cloud service. Therefore, by the designed system, we are able to access the applications from anywhere in the world through Internet connectivity.

Частини книг з теми "Constrained application protocol (CoAP)":

1

Dong, Yuji, Kaiyu Wan, Yong Yue, and Xin Huang. "Support Context-Adaptation in the Constrained Application Protocol (CoAP)." In Lecture Notes in Computer Science, 294–305. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17642-6_25.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Umamaheswari, S., and K. Vanitha. "Interaction Model of Service Discovery Using Visa Processing Algorithm and Constrained Application Protocol (CoAP)." In Digital Connectivity – Social Impact, 99–106. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-3274-5_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Yachou, Mohammed, Taoufiq El Harrouti, Salma Ait Oussous, Siham Beloualid, Sanaa El Aidi, Abdelhadi El Allali, Abderrahim Bajit, and Ahmed Tamtaoui. "Applying Advanced IoT Network Topologies to Enhance Intelligent City Transportation Cost Based on a Constrained and Secured Applicative IoT CoAP Protocol." In Advances in Information, Communication and Cybersecurity, 195–205. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91738-8_19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Bhattacharjya, Aniruddha, Xiaofeng Zhong, Jing Wang, and Xing Li. "CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP." In Internet of Things, 151–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18732-3_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Chen, Nanxing, and César Viho. "Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol." In Testing Software and Systems, 87–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34691-0_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mali, Amit, and Anant Nimkar. "Security Schemes for Constrained Application Protocol in IoT: A Precise Survey." In Communications in Computer and Information Science, 134–45. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6898-0_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Loseto, Giuseppe, Saverio Ieva, Filippo Gramegna, Michele Ruta, Floriano Scioscia, and Eugenio Di Sciascio. "Linked Data (in Low-Resource) Platforms: A Mapping for Constrained Application Protocol." In Lecture Notes in Computer Science, 131–39. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46547-0_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ait Oussous, Salma, Mohammed Yachou, Sanaa El Aidi, Siham Beloualid, Taoufiq El Harrouti, Abdelhadi El Allali, Abderrahim Bajit, and Ahmed Tamtoui. "Applying a Lightweight ECC Encryption in Multi-topology Sensor Networks to Enhance Intelligent IoT Low-Cost Transportation Platforms Security Based on CoAP Constrained Protocol." In Advances on Intelligent Informatics and Computing, 359–70. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98741-1_30.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hamza, Fatima Zahra, Sanaa El Aidi, Abdelhadi El Allali, Siham Beloualid, Abderrahim Bajit, and Ahmed Tamtaoui. "Applying Lightweight Elliptic Curve Cryptography ECC and Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platforms Based on Constrained Application Protocol." In Advances on Intelligent Informatics and Computing, 512–23. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98741-1_42.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Levä, Tapio, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar, and Oleksiy Mazhelis. "A Techno-Economic Perspective of Constrained Application Protocol." In Driving Innovation and Business Success in the Digital Economy, 251–67. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1779-5.ch016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodological framework. Based on eleven expert interviews complemented with a literature survey, the paper identifies potential deployment challenges for CoAP, both technical and business-related, and suggests approaches to overcome them. The findings should facilitate the uptake of CoAP by supporting the potential adopters of the protocol in their decision-making.

Тези доповідей конференцій з теми "Constrained application protocol (CoAP)":

1

Da Porciúncula, Cleber B., Sílvio Beskow, Daniel Stefani Marcon, and Jéferson Campos Nobre. "Constrained Application Protocol (CoAP) no Arduino UNO R3: Uma Análise Prática." In V Workshop Pré-IETF. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/wpietf.2018.3212.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
O protocolo CoAP (Constrained Application Protocol) é uma iniciativa de padronização para troca de informações em dispositivos restritos, sendo o seu uso apropriado para o ambiente de Internet das Coisas (IoT). Atualmente, um conjunto de iniciativas está em desenvolvimento para a criação de uma biblioteca, utilizando várias linguagens (incluindo C, C++, Python e Java) com o objetivo de avaliar as características e problemas do protocolo em ambientes reais. Estas bibliotecas estão sendo testadas em sistemas operacionais Linux ou em sistemas embarcados específicos, que possuem recursos computacionais mais robustos que dispositivos restritos. Este trabalho implementa uma biblioteca CoAP escrita na linguagem C e sua instalação em um Arduino UNO R3, que possui as características de um dispostivo restrito.
2

Pradilla, J., R. Gonzalez, M. Esteve, and C. Palau. "Sensor Observation Service (SOS)/Constrained Application Protocol (CoAP) proxy design." In 2016 18th Mediterranean Electrotechnical Conference (MELECON). IEEE, 2016. http://dx.doi.org/10.1109/melcon.2016.7495411.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gao, Weichao, James Nguyen, Wei Yu, Chao Lu, and Daniel Ku. "Assessing Performance of Constrained Application Protocol (CoAP) in MANET Using Emulation." In RACS '16: International Conference on Research in Adaptive and Convergent Systems. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2987386.2987400.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Yassein, Muneer Bani, Ismail Hmeidi, Omar Meqdadi, Fatimah Alghazo, Bayan Odat, Omar AlZoubi, and Ayat Smairat. "Challenges and Techniques of Constrained Application Protocol (CoAP) for Efficient Energy Consumption." In 2020 11th International Conference on Information and Communication Systems (ICICS). IEEE, 2020. http://dx.doi.org/10.1109/icics49469.2020.239564.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Jarvinen, Ilpo, Laila Daniel, and Markku Kojo. "Experimental evaluation of alternative congestion control algorithms for Constrained Application Protocol (CoAP)." In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389097.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

R. Utech, Guilherme, and Rafael R. Obelheiro. "Investigando o Uso de CoAP em ataques DRDoS." In XVIII Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/errc.2020.15197.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Ataques distribuídos de negação de serviço por reflexão (Distributed Reflection Denial of Service, DRDoS) são ataques realizados pela Internet que visam saturar vítimas com tráfego de rede, causando assim a indisponibilidade de serviços e/ou da própria rede. Um dos protocolos mais recentes no cenários de DRDoS é o CoAP (Constrained Application Protocol), voltado a dispositivos IoT. Este trabalho descreve um honeypot desenvolvido para observar ataques DRDoS usando o CoAP, e apresenta uma análise preliminar de dados coletados pelo honeypot durante um período de cinco meses.
7

Seidel, Felix, Konrad-Felix Krentz, and Christoph Meinel. "Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers." In 2019 IEEE 5th World Forum on Internet of Things (WF-IoT'19). IEEE, 2019. http://dx.doi.org/10.1109/wf-iot.2019.8767262.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Baykara, Cem Ata, Ilgın Şafak, and Kübra Kalkan. "SHAPEIoT: Secure Handshake Protocol for Autonomous IoT Device Discovery and Blacklisting using Physical Unclonable Functions and Machine Learning." In 3rd International Conference on Machine Learning & Applications (CMLA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111511.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper proposes a new lightweight handshake protocol implemented on top of the Constrained Application Protocol (CoAP) that can be used in device discovery and ensuring the IoT network security by autonomously managing devices of any computational complexity using whitelisting and blacklisting. A Physical Unclonable Function (PUF) is utilized for the session key generation in the proposed handshake protocol. The CoAP server performs real-time device discovery using the proposed handshake protocol, and anomaly detection using machinelearning algorithms to ensure the security of the IoT network. To the best of our knowledge, the presented PUF-based handshake protocol is the first to performs blacklisting and whitelisting. Whitelisted IoT devices not displaying anomalous behavior can join and remain in the IoT network. IoT devices that display anomalous behavior are autonomously blacklisted by the CoAP server and are either disallowed from joining the IoT network or are removed from the IoT network. Simulation results show that amongst the five machine learning algorithms studied, the stacking classifier displays the highest overall anomaly detection accuracy of 99.98%. Based on the results of the network simulation performed, the CoAP server is capable of blacklisting malicious IoT devices within the network with perfect accuracy.
9

Bahia, Jasiel G., and Miguel Elias M. Campista. "Um Mecanismo de Comutação de Servidores CoAP para Aumento de Disponibilidade dos Serviços de IoT." In XVII Workshop em Desempenho de Sistemas Computacionais e de Comunicação. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/wperformance.2018.3328.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A Internet das Coisas (Internet of Things - IoT) desafia a escalabilidade em rede, dado o enorme número de dispositivos interconectados, e cria um cenário fértil para exploração de recursos redundantes para aumentar a robustez dos serviços. Consequentemente, novos protocolos vêm sendo propostos, sendo o CoAP (Constrained Application Protocol) um dos principais de IoT para a camada de aplicação. Este trabalho apresenta um mecanismo de seleção e comutação de servidores CoAP que visa aumentar a disponibilidade dos serviços necessários a uma aplicação. As funções do próprio CoAP são usadas para realizar a comutação dos servidores, seguindo uma lista ordenada de endereços IP obtida a partir de uma infraestrutura central. Essa lista é construída com base nos requisitos da aplicação e fica armazenada no cliente. O mecanismo é avaliado em um simulador específico de IoT (Cooja) e os resultados mostram que o mecanismo aumenta a confiabilidade e a robustez na obtenção de serviços de IoT, além de permitir o balanceamento do consumo de energia entre os servidores.
10

Nguyen, James, Wei Yu, and Daniel Ku. "Reliable Transport for Mobile Ad Hoc Networks with Constrained Application Protocol (CoAP) over Negative-Acknowledgment Oriented Reliable Multicast (NORM)." In 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018. http://dx.doi.org/10.1109/iccnc.2018.8390374.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Constrained application protocol (CoAP)":

1

Shelby, Z., K. Hartke, and C. Bormann. The Constrained Application Protocol (CoAP). RFC Editor, June 2014. http://dx.doi.org/10.17487/rfc7252.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Boucadair, M., T. Reddy.K, and J. Shallow. Constrained Application Protocol (CoAP) Hop-Limit Option. RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8768.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Rahman, A., and E. Dijk, eds. Group Communication for the Constrained Application Protocol (CoAP). RFC Editor, October 2014. http://dx.doi.org/10.17487/rfc7390.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hartke, K. Observing Resources in the Constrained Application Protocol (CoAP). RFC Editor, September 2015. http://dx.doi.org/10.17487/rfc7641.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Bormann, C., S. Lemay, H. Tschofenig, K. Hartke, and B. Silverajan. CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets. Edited by B. Raymor. RFC Editor, February 2018. http://dx.doi.org/10.17487/rfc8323.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Fossati, T., K. Hartke, and C. Bormann. Multipart Content-Format for the Constrained Application Protocol (CoAP). RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8710.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bormann, C. Block-Wise Transfers in the Constrained Application Protocol (CoAP). Edited by Z. Shelby. RFC Editor, August 2016. http://dx.doi.org/10.17487/rfc7959.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bhattacharyya, A., S. Bandyopadhyay, A. Pal, and T. Bose. Constrained Application Protocol (CoAP) Option for No Server Response. RFC Editor, August 2016. http://dx.doi.org/10.17487/rfc7967.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

van der Stok, P., C. Bormann, and A. Sehgal. PATCH and FETCH Methods for the Constrained Application Protocol (CoAP). RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8132.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Amsüss, C., J. Preuß Mattsson, and G. Selander. Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing. RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9175.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії