Abstract

Internet of things is the fast developing network between different day-to-day products or things connected together via Internet. Internet of Things (IoT) has enabled connectivity of millions of devices together and help operate them at ease. The most important factor that needs to be taken into consideration while performing connectivity between devices over IoT is the IPbased communication protocols. Rapid growth in IoT increases security vulnerabilities of the linked objects. Internet Engineering Task Force (IETF) has standardized a communication protocol at application layer, that is developed in consideration with IoT, named Constrained Application Protocol (CoAP). Ensuring security over CoAP is an ongoing challenge and a major research area. CoAP is associated with various security schemes that guarantee secure data transfer and reliability over the network, but each of them still lack in providing full efficiency. This survey aims to analyze different security schemes implied to CoAP inorder to improve its performance and also states issues present in them. We examine different techniques that are aligned with CoAP to ensure fundamental security requirement and protect communication and some research challenges.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.