Explore chapters and articles related to this topic
A Review on IoT Architectures, Protocols, Security, and Applications
Published in Anand Sharma, Sunil Kumar Jangir, Manish Kumar, Dilip Kumar Choubey, Tarun Shrivastava, S. Balamurugan, Industrial Internet of Things, 2022
Dilip Kumar Choubey, Vaibhav Shukla, Vaibhav Soni, Jitendra Kumar, Dharmendra Kumar Dheer
The protocols can be described in this framework as:CoAP is a one-to-one protocol used for transferring state information between client and server over UDP. It is designed specifically for constrained resources, sensors, and devices/smart objects connected via lossy networks, which need to operate on low power, especially when there is a high number of sensors and devices within the network.MQTT is a many-to-many protocol for passing a message from multiple clients through a broker and communicating it to the servers (D2S). This protocol has been integrated with the IBM WebSphere application server.RESTful HTTP: Over TCP is particularly suitable for connecting consumer premise devices, given the near-universal availability of HTTP stacks for various platforms.Of course, it's not really that simple to figure out an appropriate protocol. For instance, the “control plane” represents some of the complexity in controlling and monitoring all IoT connections. Many other protocols cooperate in this region.
IPv6 Adaptation in Ultrasonic NFC IoT Communications
Published in Bhawana Rudra, Anshul Verma, Shekhar Verma, Bhanu Shrestha, Futuristic Research Trends and Applications of Internet of Things, 2022
Interaction with IoT devices is done by means of Representational State Transfer (REST) message exchanges. Specifically, REST requests and responses support connectivity between clients and servers. There are many session layer protocols that support REST Application Program Interfaces (APIs) including the well-known HyperText Transfer Protocol (HTTP) and the aforementioned CoAP. From all of them, it is this latter protocol the one that best works with 6LoWPAN. CoAP is an extra lightweight session layer protocol that was designed for the transmission of sensor and actuation traffic over LLNs. CoAP was standardized by the Internet Engineering Task Force (IETF) as RFC 7252 in 2014 [4]. CoAP is expected to become in the coming years the default mechanism for transmission of device data in the context of access IoT network. CoAP applications range from smart grid and building automation to asset tracking and Industry 4.0. CoAP also includes built-in mechanisms for resource discovery and management.
Security Challenges and Mitigation Approaches for Smart Cities
Published in Naveen Chilamkurti, T. Poongodi, Balamurugan Balusamy, Blockchain, Internet of Things, and Artificial Intelligence, 2021
S. Ponmaniraj, Tapas Kumar, V. Gokul Rajan, Sanjay Sharma
A constrained RESTful environment (CoRE) is the network model for smart devices and IoT devices. Each device is activated as a node in the network by constrained application protocol (CoAP) functions. Since CoAP uses low-power consumption and low-memory consumption it is suited for CoRE devices networking models. IPV6 low power personal area networks (6LoPAN) is another constraint in IoT networks that ensemble smart devices such as energy management, fire sensors, home building automation and more. The CoAP protocol model is used in connection with smart devices on the same constrained networks or different constrained networks joined by the internet and it works on traditional IP network models [22]. CoAP and client to authentication protocol (CTAP) works along with domain transport layer security (DTLS) and TLS for providing security functions like authentication and confidentiality for its communications. The CTAP security function captures the constrained object signing and encryption (COSE) and JSON object signing and encryption (JOSE) algorithms for encrypting web files and JSON file information over network transactions. The internet assigned number authority (IANA) takes a part in CTAP to bind them into protective algorithms such as RSA, ECC, or the JSON web key elliptic curve for secured authentication operations.
MQTT Vulnerabilities, Attack Vectors and Solutions in the Internet of Things (IoT)
Published in IETE Journal of Research, 2023
Ahmed J. Hintaw, Selvakumar Manickam, Mohammed Faiz Aboalmaaly, Shankar Karuppayah
CoAP is designed for devices that have limited resource and the design goal was to limit packet fragmentation and minimize the message overhead. CoAP is a synchronous request/response, and is a standard by the IETF [65]. CoAP runs over UDP and offers unicast as well as multicast. CoAP employs UDP and supports unicast and multicast. The commands of HTTP like GET, PUT, POST, and DELETE are used by CoAP to achieve resource-oriented connections in the architecture of client/server. CoAP includes a built-in pub/sub mechanism, a mechanism for discovering and advertising resource descriptions. It contains 4 bytes binary fixed header followed by compact binary options, header length between 10 and 20 bytes. CoAP transactions can be protected only by the use of DTLS because of no built-in security options offered by the protocol. Since CoAP packet structure is diverse, hence, HTTP servers might expose additional confusion when using DTLS. Other protocols for securing CoAP can be found in the literature [66,67].
Application of the Internet of Things in the textile industry
Published in Textile Progress, 2019
Hitesh Manglani, George L. Hodge, William Oxenham
There are seven potential application protocols for the IoT. Since HTTP and HTTP REST are fundamental building blocks of these protocols, derived five protocols are discussed in the Table 2. These are the influential ones, and developing protocols are not limited to these five protocols. Constrained Application Protocol (CoAP) is used for low power, low computation, and communication capability devices, which is usually the case on the shop floor in manufacturing industries. The sensor-embedded SBCs do not have resources to perform a task similar to say a laptop. Thus, to make it ‘smart’ to store, process, and exchange information with the internet, protocols are needed to make up for their low computational powers. CoAP is based on the HTTP REST protocol to transport data with an on-demand user request to access data. CoAP can communicate with several devices simultaneously with reduced overhead.
Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and Challenges
Published in IETE Technical Review, 2018
Bhagya Nathali Silva, Murad Khan, Kijun Han
CoAP is a stateless protocol developed by IETF for IoT applications. CoAP is Representational State Transfer (REST)-based protocol; therefore, CoAP-REST proxy translation can be done directly [20]. It was defined by means of replacing HTTP for lightweight and resource-constrained devices [57]. In order, slight modifications were made in HTTP to enable low power consumption. Since it is bound to UDP, it reduces TCP overhead and reduces bandwidth requirements, thus making it an excellent fit for IoT communication [19].