Abstract
Internet of things is the fast developing network between different day-to-day products or things connected together via Internet. Internet of Things (IoT) has enabled connectivity of millions of devices together and help operate them at ease. The most important factor that needs to be taken into consideration while performing connectivity between devices over IoT is the IPbased communication protocols. Rapid growth in IoT increases security vulnerabilities of the linked objects. Internet Engineering Task Force (IETF) has standardized a communication protocol at application layer, that is developed in consideration with IoT, named Constrained Application Protocol (CoAP). Ensuring security over CoAP is an ongoing challenge and a major research area. CoAP is associated with various security schemes that guarantee secure data transfer and reliability over the network, but each of them still lack in providing full efficiency. This survey aims to analyze different security schemes implied to CoAP inorder to improve its performance and also states issues present in them. We examine different techniques that are aligned with CoAP to ensure fundamental security requirement and protect communication and some research challenges.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.