Journal ArticleDOI
Architecture for IoT Domain With CoAP Observe Feature
TLDR
The constrained application protocol (CoAP) observe feature has the potential to achieve fast communication and low energy consumption, and the evaluation of Max-Age parameter at the proxy is implemented to maintain the freshness of cached records under random data arrivals.Abstract:
The constrained application protocol (CoAP) observe feature has the potential to achieve fast communication and low energy consumption. We have analyzed a CoAP proxy which stores observed data from multiple Internet of Things (IoT) nodes that belong to single IoT domain. To maintain the freshness of cached records under random data arrivals, we have implemented the evaluation of Max-Age parameter at the proxy. We have also implemented congestion control at both IoT nodes and proxy, and show that it interacts with data freshness estimation at the proxy. Our results demonstrate the capacity limits of a single IoT domain against cluster size, interobservation time, proxy re-registration rate, ratio of confirmable/nonconfirmable observations, and presence of congestion control.read more
Citations
More filters
Journal ArticleDOI
IoT Technology, Applications and Challenges: A Contemporary Survey
TL;DR: An extensive overview of the IoT technology and its varied applications in life saving, smart cities, agricultural, industrial etc. by reviewing the recent research works and its related technologies is proposed.
Proceedings ArticleDOI
An Overview of Security in CoAP: Attack and Analysis
S Arvind,V. Anantha Narayanan +1 more
TL;DR: A client-server architecture is setup, whose end devices communicate using CoAP and a proxy system was installed across the client side to launch an active interception between the client and the server to mitigate Man-In-The-Middle attack.
Journal ArticleDOI
Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things
Isha Batra,Sahil Verma,Arun Malik,Kavita,Uttam Ghosh,Joel J. P. C. Rodrigues,Gia Nhu Nguyen,A. S. M. Sanwar Hosen,Vinayagam Mariappan +8 more
TL;DR: This work proposes the hybrid logical security framework (HLSF), which offers authentication and data confidentiality in IoT and shows that HLSF outperforms CoAP and OSCAR in terms of throughput with low computational, storage and energy overhead, even in the presence of attackers.
Journal ArticleDOI
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions
TL;DR: In this article , the authors survey traditional and recent advances in IoT application layer protocols, as well as relevant real-time applications and their adapted application-layer protocols for improving performance.
Journal ArticleDOI
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions
Praveen Kumar Donta,Praveen Kumar Donta,Satish Narayana Srirama,Satish Narayana Srirama,Tarachand Amgoth,Chandra Sekhara Rao Annavarapu +5 more
TL;DR: In this article, the authors survey traditional and recent advances in IoT application layer protocols, as well as relevant real-time applications and their adapted application-layer protocols for improving performance.
References
More filters
ReportDOI
The Constrained Application Protocol (CoAP)
TL;DR: The Constrained Application Protocol is a specialized web transfer protocol for use with constrained nodes and constrained networks, designed for machine- to-machine (M2M) applications such as smart energy and building automation.
Book
Computer Networking: A Top-Down Approach Featuring the Internet
James F. Kurose,Keith W. Ross +1 more
TL;DR: The most up-to-date introduction to the field of computer networking, this book's top-down approach starts at the application layer and works down the protocol stack, it also uses the Internet as the main example of networks as discussed by the authors.
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals
TL;DR: The assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks form an initial set only.
Computing TCP's Retransmission Timer
Vern Paxson,Mark Allman +1 more
TL;DR: This document defines the standard algorithm that Transmission Control Protocol senders are required to use to compute and manage their retransmission timer and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST.