Industry Adoption of the Internet of Things: A Constrained Application Protocol Survey

被引:0
|
作者
Lerche, Christian [1 ]
Hartke, Klaus [2 ]
Kovatsch, Matthias [3 ]
机构
[1] Univ Rostock, D-18055 Rostock, Germany
[2] Univ Bremen, D-28359 Bremen, Germany
[3] ETH, Inst Pervas Comp, Zurich, Switzerland
来源
2012 IEEE 17TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA) | 2012年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Constrained Application Protocol (CoAP) has been designed for RESTful machine-to-machine communication, thereby enabling an Internet of Things. CoAP is based on the principles of the Web, but takes the limited resources of tiny embedded devices such as wireless sensor nodes into account. Despite being relatively new and only about to become an IETF Internet Standard, several implementations of the protocol already exist-each with its own background and supported set of features. In this paper, we give an overview of current CoAP implementations and discuss the results of the first formal interoperability meeting, organized by the European Telecommunications Standards Institute (ETSI) in March 2012. We note that, despite the young age of the protocol, interoperability between the participating implementations is very high, although the no-nessential parts of the protocol currently receive significantly less coverage and exhibit slightly more interoperability problems.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Security Analysis of the Constrained Application Protocol in the Internet of Things
    Alghamdi, Thamer A.
    Lasebae, Aboubaker
    Aiash, Mahdi
    2013 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT 2013), 2013, : 163 - 168
  • [2] A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things
    Qasem, Mamoun
    Al-Dubai, Ahmed
    Imed, Romdhani
    Yassien, Muneer Bani
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1119 - 1123
  • [3] A Constrained Monitoring Protocol for the Internet of Things
    Yago Fontoura do Rosário
    Xenofon Fafoutis
    Journal of Signal Processing Systems, 2022, 94 : 45 - 64
  • [4] A Constrained Monitoring Protocol for the Internet of Things
    do Rosario, Yago Fontoura
    Fafoutis, Xenofon
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2022, 94 (01): : 45 - 64
  • [5] Enhancing constrained application protocol using message options for internet of things
    Sharu Bansal
    Dilip Kumar
    Cluster Computing, 2023, 26 : 1917 - 1934
  • [6] Quality Adaptation of Constrained Application Protocol Multimedia Streaming in Internet of Things
    Kwon, Jung-Hyok
    Youm, Sungkwan
    Jung, Jai-Jin
    Kim, Eui-Jik
    SENSORS AND MATERIALS, 2018, 30 (03) : 423 - 430
  • [7] An Energy-efficient Technique for Constrained Application Protocol of Internet of Things
    Yasin, Muneer Bani
    Abuein, Qusai
    Amer, Ahmad Bani
    Qasem, Mamoun
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
  • [8] Enhancing constrained application protocol using message options for internet of things
    Bansal, Sharu
    Kumar, Dilip
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (03): : 1917 - 1934
  • [9] A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
    Hasan, Mohammad Kamrul
    Zhou, Weichen
    Safie, Nurhizam
    Ahmed, Fatima Rayan Awad
    Ghazal, Taher M.
    IEEE ACCESS, 2024, 12 : 61642 - 61666
  • [10] A personal connected health system for the Internet of Things based on the Constrained Application Protocol
    Santos, Danilo F. S.
    Almeida, Hyggo O.
    Perkusich, Angelo
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 : 122 - 136