Abstract

The protocols related to the Internet of Things (IoT) have proven to undergo changes in the Wireless Sensor Network (WSN), to increase the compatibility of WSN with the industrial and automation applications. In this paper, the programming model, the framework and the security aspects for the Constrained Application Protocol (CoAP) are analyzed with respect to the WSN. CoAP chooses the two-layered approach, to deal with interchanging of messages. The IOT involves implementing the programming in the Representational State Transfer (REST) model paradigm, which is predominantly inherited by the CoAP protocol. The CoAP proxy adapts a backend framework in a modular form. Also, the Datagram Transport Layer Security (DTLS) overcomes unreliable nature in the CoAP due to the User Datagram Protocol (UDP). The CoAP protocol is studied from different angle with respect to the prominent aspects for implementation of IOT in a real world.

Highlights

  • The tiny embedded devices are linked to the Internet over IP to realize the connection of trillions of smart objects, collectively called as Internet of Things (IoT) or Web of Things

  • Comparing the Transfer Control Protocol (TCP)[11] over the User Datagram Protocol (UDP), the HTTP is provided with security using the transfer layer security and the COAP is secured using the Datagram Transport Layer Security (DTLS)

  • The overall analysis of web protocol, the Constrained Application Protocol (CoAP) is realized with respect to the IOT

Read more

Summary

Introduction

The tiny embedded devices are linked to the Internet over IP to realize the connection of trillions of smart objects, collectively called as Internet of Things (IoT) or Web of Things. The flow control mechanism of the Transfer Control Protocol (TCP) is not suitable for power constrained networks It leads to the high overhead for short-lived nodes. The Constrained RESTful Environments (CORE) work aims the REST architecture for 8-bit microcontrollers with limited RAM and ROM Constrained networks such as 6LOWPAN, support fragmentation and segmentation of IPV6 packets[5] into small link-layer frames. The main characteristics for COAP are it ensures the need for the M2M, reduces the complexity in parsing and message overhead, supports the URI and resources, includes caching and proxy capabilities and features the message exchange asynchronously. COAP is a two-layered approach, possessing the features of messaging and request-response models.

Messaging Model
Request-Response Model
Programming for IOT
Frameworks for COAP
Securing COAP with DTLS
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call