scispace - formally typeset
Journal ArticleDOI

Architecture for IoT Domain With CoAP Observe Feature

TLDR
The constrained application protocol (CoAP) observe feature has the potential to achieve fast communication and low energy consumption, and the evaluation of Max-Age parameter at the proxy is implemented to maintain the freshness of cached records under random data arrivals.
Abstract
The constrained application protocol (CoAP) observe feature has the potential to achieve fast communication and low energy consumption. We have analyzed a CoAP proxy which stores observed data from multiple Internet of Things (IoT) nodes that belong to single IoT domain. To maintain the freshness of cached records under random data arrivals, we have implemented the evaluation of Max-Age parameter at the proxy. We have also implemented congestion control at both IoT nodes and proxy, and show that it interacts with data freshness estimation at the proxy. Our results demonstrate the capacity limits of a single IoT domain against cluster size, interobservation time, proxy re-registration rate, ratio of confirmable/nonconfirmable observations, and presence of congestion control.

read more

Citations
More filters
Journal ArticleDOI

IoT Technology, Applications and Challenges: A Contemporary Survey

TL;DR: An extensive overview of the IoT technology and its varied applications in life saving, smart cities, agricultural, industrial etc. by reviewing the recent research works and its related technologies is proposed.
Proceedings ArticleDOI

An Overview of Security in CoAP: Attack and Analysis

TL;DR: A client-server architecture is setup, whose end devices communicate using CoAP and a proxy system was installed across the client side to launch an active interception between the client and the server to mitigate Man-In-The-Middle attack.
Journal ArticleDOI

Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things

TL;DR: This work proposes the hybrid logical security framework (HLSF), which offers authentication and data confidentiality in IoT and shows that HLSF outperforms CoAP and OSCAR in terms of throughput with low computational, storage and energy overhead, even in the presence of attackers.
Journal ArticleDOI

Survey on recent advances in IoT application layer protocols and machine learning scope for research directions

TL;DR: In this article , the authors survey traditional and recent advances in IoT application layer protocols, as well as relevant real-time applications and their adapted application-layer protocols for improving performance.
Journal ArticleDOI

Survey on recent advances in IoT application layer protocols and machine learning scope for research directions

TL;DR: In this article, the authors survey traditional and recent advances in IoT application layer protocols, as well as relevant real-time applications and their adapted application-layer protocols for improving performance.
References
More filters
ReportDOI

The Constrained Application Protocol (CoAP)

TL;DR: The Constrained Application Protocol is a specialized web transfer protocol for use with constrained nodes and constrained networks, designed for machine- to-machine (M2M) applications such as smart energy and building automation.
Book

Computer Networking: A Top-Down Approach Featuring the Internet

TL;DR: The most up-to-date introduction to the field of computer networking, this book's top-down approach starts at the application layer and works down the protocol stack, it also uses the Internet as the main example of networks as discussed by the authors.

IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals

TL;DR: The assumptions, problem statement, and goals for transmitting IP over IEEE 802.15.4 networks form an initial set only.

Computing TCP's Retransmission Timer

Vern Paxson, +1 more
TL;DR: This document defines the standard algorithm that Transmission Control Protocol senders are required to use to compute and manage their retransmission timer and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST.
Related Papers (5)