2016 International Conference on Engineering &Amp; MIS (ICEMIS) 2016
DOI: 10.1109/icemis.2016.7745303
|View full text |Cite
|
Sign up to set email alerts
|

Application layer protocols for the Internet of Things: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
43
0
4

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 107 publications
(47 citation statements)
references
References 10 publications
0
43
0
4
Order By: Relevance
“…The most important features in CoAP are simplicity and reliability, since it supports unicast and multicast request by taking advantage of UDP and provides the ability to asynchronous message exchanges. CoAP is a single protocol with two layers, ie, the first layer is the messaging layer and the second one is the request/response layer; messaging layer aims to achieve reliability based on UDP, while request/response layer aims to act the interactions and communication …”
Section: Internet Of Thingsmentioning
confidence: 99%
“…The most important features in CoAP are simplicity and reliability, since it supports unicast and multicast request by taking advantage of UDP and provides the ability to asynchronous message exchanges. CoAP is a single protocol with two layers, ie, the first layer is the messaging layer and the second one is the request/response layer; messaging layer aims to achieve reliability based on UDP, while request/response layer aims to act the interactions and communication …”
Section: Internet Of Thingsmentioning
confidence: 99%
“…In this protocol, one message is encrypted and is published to several other nodes which are made possible using broadcast encryption method. Another session layer protocol to achieve significant packet overhead and low power consumption is through Constrained Application Protocol (CoAP) discussed by V. Karagiannis [18]. This protocol helps in usage of RESTful (Representation State Transfer) services to meet the power limitations and to interface with standard HTTP protocol.…”
Section: Literature Surveymentioning
confidence: 99%
“…These layers are discussed in detail in various papers by different authors, including the protocols used with respect to each layer and the type of network involved in the communication. Karagiannis [18] and K. Malar [10] discussed on application layer protocols, thrashing out few standard protocols based on reliability, security and energy consumption aspects. A detailed insight of IOT technologies and protocols are proposed by Fuqaha [7] and X. Che [2].…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations