IJWMT Vol. 5, No. 6, 8 Nov. 2015
Cover page and Table of Contents: PDF (size: 317KB)
CoAP, TCP, HTTP, UDP
This paper discusses the Constrained Application Protocol (CoAP), an application layer protocol introduced by Internet Engineering Task Force (IETF) Constrained RESTful environment (CoRE) Working Group for use with low power and resource constrained nodes in the internet of things. The paper discusses the CoAP architecture supported with suitable examples. CoAP protocol message format, types, methods and security feature is also discussed. In this paper, we present a CoAP based car parking system implemented using Contiki, an open source operating system for resource constrained device. The Cooper (Cu) CoAP user agent for Firefox browser is used for handling CoAP URI scheme.
Manveer Joshi, Bikram Pal Kaur,"CoAP Protocol for Constrained Networks", IJWMT, vol.5, no.6, pp.1-10, 2015. DOI: 10.5815/ijwmt.2015.06.01
[1]Atzori L, Iera A, Morabito G. The Internet of Things: A Survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 2010 Oct; 54(15): 2787–2805.
[2]Constrained RESTful Environments(CoRE)Working Group. Available at: https://datatracker.ietf.org/wg/ core/charter/.
[3]Shelby Z, Hartke K. Constrained Application Protocol (CoAP). Draft-ietf-core-coap-18. [2013-06--28] http://tools.ietf.org/html/draft-ietf-core-coap-18.
[4]Shelby Z, Hartke K, Bormann C. The Constrained Application Protocol (CoAP). draft-ietf-core-coap 2014 June.
[5]Colitti W, Steenhaut K, De Caro N, Buta B, Dobrota V. Evaluation of Constrained Application Protocol for Wireless Sensor Network. Proceedings of 18th IEEE International Workshop of Local and Metropolitan Area Networks (LanMan), Chapel Hill, NC, USA, 2011 Oct; 1 - 6.
[6]Lerche C, Hartke K, Kovatsch M. Industry Adoption of the Internet of Things: A Constrained Application Protocol Survey. Proceedings of the 7th International Workshop on Service Oriented Architectures in Converging Networked Environments (SOCNE 2012). Krakow, Poland, 2012 Sept.
[7]Shelby Z. Embedded web services. IEEE Wirel. Commun. 2010; 17: 52–57.
[8]Sharma V. Understanding Constrained Application Protocol. EXILANT Technologies Private Limited.
[9]Alghamdi T A, Lasebae A, Aiash M. Security analysis of the constrained application protocol in the Internet of Things. 2nd Int.Conference on Future Generation Communication Technology (FGCT). 2013.
[10]Brachmann M, Garcia-Morchon O, Kirsche M. Security for Practical CoAP Applications: Issues and Solution Approaches. GI/ITG KuVS Fachgesprch Sensornetze (FGSN), 2011.
[11]Bergmann O, Hillmann K T, Gerdes, S. A CoAP-gateway for smart homes. International Conference on Computing, Networking and Communications (ICNC); 2012: 446 – 450.
[12]Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M. Internet of Things for Smart Cities. IEEE Internet of Things Journal 2014 Feb; 1(1): 22-32.
[13]Bergmann O, Hillmann K.T.,Gerdes, S.. A CoAP-gateway for smart homes. International Conference on Computing, Networking and Communications (ICNC) 2012; 446 – 450.
[14]Krimmling J, Peter S. Integration and evaluation of intrusion detection for CoAP in smart city applications. IEEE Conference on Communications and Network Security (CNS), 2014 Oct; 73-78.
[15]Rajesh K R, Bindyashree CA. Multiple Appliances Controlling and Monitoring System based on wireless Embedded Home Gateway. Int. Journal of Innovative Research in Computer and Comm. Engg. 2015 April; 3(4): 2872-2877.