Academic literature on the topic 'Constrained application protocol (CoAP)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Constrained application protocol (CoAP).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Constrained application protocol (CoAP)"
Levä, Tapio, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar, and Oleksiy Mazhelis. "Adoption of Constrained Application Protocol." International Journal of Innovation in the Digital Economy 7, no. 1 (January 2016): 38–53. http://dx.doi.org/10.4018/ijide.2016010104.
Full textTariq, Muhammad Ashar, Murad Khan, Muhammad Toaha Raza Khan, and Dongkyun Kim. "Enhancements and Challenges in CoAP—A Survey." Sensors 20, no. 21 (November 9, 2020): 6391. http://dx.doi.org/10.3390/s20216391.
Full textIslam, Hasan, Dmitrij Lagutin, Antti Ylä-Jääski, Nikos Fotiou, and Andrei Gurtov. "Transparent CoAP Services to IoT Endpoints through ICN Operator Networks." Sensors 19, no. 6 (March 17, 2019): 1339. http://dx.doi.org/10.3390/s19061339.
Full textUkil, Arijit, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal, and Tulika Bose. "Lightweight security scheme for IoT applications using CoAP." International Journal of Pervasive Computing and Communications 10, no. 4 (October 28, 2014): 372–92. http://dx.doi.org/10.1108/ijpcc-01-2014-0002.
Full textJin, Wenquan, and DoHyeun Kim. "A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things." JOIV : International Journal on Informatics Visualization 1, no. 4 (November 4, 2017): 110. http://dx.doi.org/10.30630/joiv.1.4.37.
Full textKwon, Jung-Hyok, Sol-Bee Lee, Jaehoon Park, Kyu-Sung Hwang, Yongseok Lim, and Eui-Jik Kim. "Adaptive Resource Observation for Congestion Alleviation using Constrained Application Protocol." International Journal of Engineering & Technology 7, no. 4.38 (December 3, 2018): 885. http://dx.doi.org/10.14419/ijet.v7i4.38.27601.
Full textViel, Felipe, Luis Augusto Silva, Valderi Reis Quietinho Leithardt, Juan Francisco De Paz Santana, Raimundo Celeste Ghizoni Teive, and Cesar Albenes Zeferino. "An Efficient Interface for the Integration of IoT Devices with Smart Grids." Sensors 20, no. 10 (May 17, 2020): 2849. http://dx.doi.org/10.3390/s20102849.
Full textJung, Joong-Hwa, Moneeb Gohar, and Seok-Joo Koh. "CoAP-Based Streaming Control for IoT Applications." Electronics 9, no. 8 (August 16, 2020): 1320. http://dx.doi.org/10.3390/electronics9081320.
Full textSudaryanto, Eko, Asep Suryanto, and Susatyo Adhi Pramono. "PENERAPAN SISTEM PEMANTAUAN KELEMBAPAN DAN SUHU LABORATORIUM DENGAN METODE CONSTRAINED APPLICATION PROTOCOL (CoAP)." Teodolita: Media Komunkasi Ilmiah di Bidang Teknik 23, no. 1 (June 26, 2022): 56–61. http://dx.doi.org/10.53810/jt.v23i1.439.
Full textYun Kang, Jeong, Nathali Silva, and Kijun Han. "CoAP Monitoring System Using Logical Grouping Technique." International Journal of Engineering & Technology 7, no. 4.4 (September 15, 2018): 46. http://dx.doi.org/10.14419/ijet.v7i4.4.19901.
Full textDissertations / Theses on the topic "Constrained application protocol (CoAP)"
Oudishu, Ramcin, and Pethrus Gärdborn. "A CoAP Publish-Subscribe Broker for More Resource-Efficient Wireless Sensor Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232076.
Full textDen hastiga utvecklingen av Sakernas Internet över hela världen har medfört ett ökat användande av trådlösa sensornätverk vars datainsamling kan bidra till en mer hållbar utveckling. För närvarande använder sig GreenIoT-projektet i Uppsala av trådlösa sensornätverk för att övervaka halterna av luftföroreningar. Resursbegränsningarna för dylika nätverk medför att särskild hänsyn måste tas vid design av såväl kommunikationsmodeller som kommunikationsprotokoll. Modellen Publicera-Prenumerera (pub/pre) passar ypperligt för trådlösa sensornätverk då en mellanhand placeras mellan klient och server en s.k. broker vilket får den positiva effekten att att sensornoderna avlastas. För närvarande är IETF (Internet Engineering Task Force) i färd med att standardisera en pub/pre-utvidgning av det redan standardiserade CoAP (Constrained Application Protocol). Eftersom att utvidgningen är så pass ny finns ytterst få implementationer av den och man vet därmed väldigt lite om hur den faktiskt fungerar i praktiken. GreenIoT-projektet överväger att ersätta sin nuvarande pub/pre-broker med en CoAP pub/pre-broker eftersom att energianvändningen kan antas bli lägre samt att standardiseringsorganisationen bakom CoAP är det välrenommerade IETF. Sett ur ett större perspektiv erbjuder denna rapport en undersökning av de problem och utmaningar man ställs inför vid implementation av CoAP pub/pre-utvidgningen med avseende på designval, implementationsval, och protokolltvetydigheter. Mer konkret implementeras en CoAP pub/pre-broker åt GreenIoT-projektet. Genom att först noggrant analysera CoAP-protokollet, CoAP pub/pre-utkastet, liksom andra nödvändiga protokoll, för att därefter bestämma vilket programmeringsspråk och vilket existerande CoAP-bibliotek som skulle användas, implementerades en broker server som testades iterativt under processens gång. Ett flertal frågor som uppstod rörande pub/pre-utkastet presenteras och diskuteras i rapporten.
Amaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things." Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.
Full textIn Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
Kallsäby, Mattias. "Modular MiniTest Tester." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-65101.
Full textHuang, Lum-Pin, and 黃倫斌. "IOT Communication and CoAP (Constrained Application Protocol) Research in Teaching and Implementation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/50926914231944227468.
Full text健行科技大學
資訊工程所
101
The development and applications of smart home networks has been promoted by Internet of Things. The Constrained Application Protocol (CoAP) is regarded as the key protocol for machine-to-machine communication. It provides constrained environments with very low overhead and low power consumption web service and integrate smart objects with the web. It describes CoAP and the differences with HTTP in performance. At last, it reports the results of the experiment showing the benefits of CoAP in teaching and transmission efficiency compared to HTTP in constrained environments.
Pancev, I. Gede Darko, and 易英戈. "Design and Implementation of a Lightweight Wireless Embedded Internet Platform With the Constrained Application Protocol." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/44919609580770400143.
Full text國立臺灣科技大學
自動化及控制研究所
104
The Internet has been a great success over the past 20 years, growing from small academic networks into global networks used regularly by over 1.4 billion people. Another Internet revolution, known as Internet of Things (IoT), has been going on with the maturing of the net communication in routers, servers and personal computers. The vision behind the IoT is that embedded devices are universally becoming IP (Internet Protocol) enabled and an integral part of Internet. The scale of the IoT has already been estimated to be immense, with the potential of trillion of devices becoming IP-enabled. The impact of IoT will be significant with the promise of better environment monitoring, energy saving, smart grids, more efficient factories, better logistic, better healthcare systems, and smart homes. However, one of the greatest potential growth of IoT comes from low power embedded devices that until now have not been IP-enabled. A new paradigm, known as Wireless Embedded Internet, is needed to enable low-power wireless devices with limited processing capabilities to participate in the IoT. Until now only powerful embedded devices and networks are able to natively participate in the Internet. Direct communication with traditional IP networks requires many Internet protocols, and an operating system to deal with complexity and maintainability. These requirements have in practice limited the IoT linking to devices with a powerful processor, an operating system with a full TCP/IP stack, and an IP-capable communication link. The main contribution of this study is to investigate a reliable way of future IoT networking by designing and implementing a lightweight wireless embedded platform, which equips with the characteristics of low power consumption, memory-constrained, small size, low cost IP-enabled wireless embedded device and the constrained application protocol. As a result, the embedded device with Low Power Wireless Connectivity, called “Lowvy,” was born, and a newest version of IP standard called IPv6 was successfully enabled on Lowvy wireless embedded devices with low-power consumption, thus enabling end-to-end IP networking, and wide range of wireless embedded IoT applications. Internet integration of Lowvy wireless embedded platform has been tested by creating an online environment-monitoring system which periodically published the measurement results of environment-monitoring applications (e.g., temperature, humidity, air quality, and ambient light) to Ubidots Cloud service. Therefore, by the designed system, we are able to access the applications from anywhere in the world through Internet connectivity.
Book chapters on the topic "Constrained application protocol (CoAP)"
Dong, Yuji, Kaiyu Wan, Yong Yue, and Xin Huang. "Support Context-Adaptation in the Constrained Application Protocol (CoAP)." In Lecture Notes in Computer Science, 294–305. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17642-6_25.
Full textUmamaheswari, S., and K. Vanitha. "Interaction Model of Service Discovery Using Visa Processing Algorithm and Constrained Application Protocol (CoAP)." In Digital Connectivity – Social Impact, 99–106. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-3274-5_8.
Full textYachou, Mohammed, Taoufiq El Harrouti, Salma Ait Oussous, Siham Beloualid, Sanaa El Aidi, Abdelhadi El Allali, Abderrahim Bajit, and Ahmed Tamtaoui. "Applying Advanced IoT Network Topologies to Enhance Intelligent City Transportation Cost Based on a Constrained and Secured Applicative IoT CoAP Protocol." In Advances in Information, Communication and Cybersecurity, 195–205. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91738-8_19.
Full textBhattacharjya, Aniruddha, Xiaofeng Zhong, Jing Wang, and Xing Li. "CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP." In Internet of Things, 151–75. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18732-3_9.
Full textChen, Nanxing, and César Viho. "Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol." In Testing Software and Systems, 87–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34691-0_8.
Full textMali, Amit, and Anant Nimkar. "Security Schemes for Constrained Application Protocol in IoT: A Precise Survey." In Communications in Computer and Information Science, 134–45. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6898-0_11.
Full textLoseto, Giuseppe, Saverio Ieva, Filippo Gramegna, Michele Ruta, Floriano Scioscia, and Eugenio Di Sciascio. "Linked Data (in Low-Resource) Platforms: A Mapping for Constrained Application Protocol." In Lecture Notes in Computer Science, 131–39. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46547-0_14.
Full textAit Oussous, Salma, Mohammed Yachou, Sanaa El Aidi, Siham Beloualid, Taoufiq El Harrouti, Abdelhadi El Allali, Abderrahim Bajit, and Ahmed Tamtoui. "Applying a Lightweight ECC Encryption in Multi-topology Sensor Networks to Enhance Intelligent IoT Low-Cost Transportation Platforms Security Based on CoAP Constrained Protocol." In Advances on Intelligent Informatics and Computing, 359–70. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98741-1_30.
Full textHamza, Fatima Zahra, Sanaa El Aidi, Abdelhadi El Allali, Siham Beloualid, Abderrahim Bajit, and Ahmed Tamtaoui. "Applying Lightweight Elliptic Curve Cryptography ECC and Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platforms Based on Constrained Application Protocol." In Advances on Intelligent Informatics and Computing, 512–23. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98741-1_42.
Full textLevä, Tapio, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar, and Oleksiy Mazhelis. "A Techno-Economic Perspective of Constrained Application Protocol." In Driving Innovation and Business Success in the Digital Economy, 251–67. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1779-5.ch016.
Full textConference papers on the topic "Constrained application protocol (CoAP)"
Da Porciúncula, Cleber B., Sílvio Beskow, Daniel Stefani Marcon, and Jéferson Campos Nobre. "Constrained Application Protocol (CoAP) no Arduino UNO R3: Uma Análise Prática." In V Workshop Pré-IETF. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/wpietf.2018.3212.
Full textPradilla, J., R. Gonzalez, M. Esteve, and C. Palau. "Sensor Observation Service (SOS)/Constrained Application Protocol (CoAP) proxy design." In 2016 18th Mediterranean Electrotechnical Conference (MELECON). IEEE, 2016. http://dx.doi.org/10.1109/melcon.2016.7495411.
Full textGao, Weichao, James Nguyen, Wei Yu, Chao Lu, and Daniel Ku. "Assessing Performance of Constrained Application Protocol (CoAP) in MANET Using Emulation." In RACS '16: International Conference on Research in Adaptive and Convergent Systems. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2987386.2987400.
Full textYassein, Muneer Bani, Ismail Hmeidi, Omar Meqdadi, Fatimah Alghazo, Bayan Odat, Omar AlZoubi, and Ayat Smairat. "Challenges and Techniques of Constrained Application Protocol (CoAP) for Efficient Energy Consumption." In 2020 11th International Conference on Information and Communication Systems (ICICS). IEEE, 2020. http://dx.doi.org/10.1109/icics49469.2020.239564.
Full textJarvinen, Ilpo, Laila Daniel, and Markku Kojo. "Experimental evaluation of alternative congestion control algorithms for Constrained Application Protocol (CoAP)." In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389097.
Full textR. Utech, Guilherme, and Rafael R. Obelheiro. "Investigando o Uso de CoAP em ataques DRDoS." In XVIII Escola Regional de Redes de Computadores. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/errc.2020.15197.
Full textSeidel, Felix, Konrad-Felix Krentz, and Christoph Meinel. "Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers." In 2019 IEEE 5th World Forum on Internet of Things (WF-IoT'19). IEEE, 2019. http://dx.doi.org/10.1109/wf-iot.2019.8767262.
Full textBaykara, Cem Ata, Ilgın Şafak, and Kübra Kalkan. "SHAPEIoT: Secure Handshake Protocol for Autonomous IoT Device Discovery and Blacklisting using Physical Unclonable Functions and Machine Learning." In 3rd International Conference on Machine Learning & Applications (CMLA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111511.
Full textBahia, Jasiel G., and Miguel Elias M. Campista. "Um Mecanismo de Comutação de Servidores CoAP para Aumento de Disponibilidade dos Serviços de IoT." In XVII Workshop em Desempenho de Sistemas Computacionais e de Comunicação. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/wperformance.2018.3328.
Full textNguyen, James, Wei Yu, and Daniel Ku. "Reliable Transport for Mobile Ad Hoc Networks with Constrained Application Protocol (CoAP) over Negative-Acknowledgment Oriented Reliable Multicast (NORM)." In 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2018. http://dx.doi.org/10.1109/iccnc.2018.8390374.
Full textReports on the topic "Constrained application protocol (CoAP)"
Shelby, Z., K. Hartke, and C. Bormann. The Constrained Application Protocol (CoAP). RFC Editor, June 2014. http://dx.doi.org/10.17487/rfc7252.
Full textBoucadair, M., T. Reddy.K, and J. Shallow. Constrained Application Protocol (CoAP) Hop-Limit Option. RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8768.
Full textRahman, A., and E. Dijk, eds. Group Communication for the Constrained Application Protocol (CoAP). RFC Editor, October 2014. http://dx.doi.org/10.17487/rfc7390.
Full textHartke, K. Observing Resources in the Constrained Application Protocol (CoAP). RFC Editor, September 2015. http://dx.doi.org/10.17487/rfc7641.
Full textBormann, C., S. Lemay, H. Tschofenig, K. Hartke, and B. Silverajan. CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets. Edited by B. Raymor. RFC Editor, February 2018. http://dx.doi.org/10.17487/rfc8323.
Full textFossati, T., K. Hartke, and C. Bormann. Multipart Content-Format for the Constrained Application Protocol (CoAP). RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8710.
Full textBormann, C. Block-Wise Transfers in the Constrained Application Protocol (CoAP). Edited by Z. Shelby. RFC Editor, August 2016. http://dx.doi.org/10.17487/rfc7959.
Full textBhattacharyya, A., S. Bandyopadhyay, A. Pal, and T. Bose. Constrained Application Protocol (CoAP) Option for No Server Response. RFC Editor, August 2016. http://dx.doi.org/10.17487/rfc7967.
Full textvan der Stok, P., C. Bormann, and A. Sehgal. PATCH and FETCH Methods for the Constrained Application Protocol (CoAP). RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8132.
Full textAmsüss, C., J. Preuß Mattsson, and G. Selander. Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing. RFC Editor, February 2022. http://dx.doi.org/10.17487/rfc9175.
Full text