Open Access Open Access  Restricted Access Subscription Access

Domination of Constrained Application Protocol: A Requirement Approach for Optimization of Internet of Things in Wireless Sensor Networks


Affiliations
1 School of Computing, Embedded System, SASTRA University, Tirumalaisamudram,Thanjavur-613401, India
2 School of Computing, SASTRA University, Tirumalaisamudram,Thanjavur-613401, India
 

The protocols related to the Internet of Things (IoT) have proven to undergo changes in the Wireless Sensor Network (WSN), to increase the compatibility of WSN with the industrial and automation applications. In this paper, the programming model, the framework and the security aspects for the Constrained Application Protocol (CoAP) are analyzed with respect to the WSN. CoAP chooses the two-layered approach, to deal with interchanging of messages. The IOT involves implementing the programming in the Representational State Transfer (REST) model paradigm, which is predominantly inherited by the CoAP protocol. The CoAP proxy adapts a backend framework in a modular form. Also, the Datagram Transport Layer Security (DTLS) overcomes unreliable nature in the CoAP due to the User Datagram Protocol (UDP). The CoAP protocol is studied from different angle with respect to the prominent aspects for implementation of IOT in a real world.

Keywords

CoAP, IOT, REST, WSN
User

Abstract Views: 215

PDF Views: 0




  • Domination of Constrained Application Protocol: A Requirement Approach for Optimization of Internet of Things in Wireless Sensor Networks

Abstract Views: 215  |  PDF Views: 0

Authors

P. Madhumitha
School of Computing, Embedded System, SASTRA University, Tirumalaisamudram,Thanjavur-613401, India
B. Johnsema
School of Computing, Embedded System, SASTRA University, Tirumalaisamudram,Thanjavur-613401, India
D. Manivannan
School of Computing, SASTRA University, Tirumalaisamudram,Thanjavur-613401, India

Abstract


The protocols related to the Internet of Things (IoT) have proven to undergo changes in the Wireless Sensor Network (WSN), to increase the compatibility of WSN with the industrial and automation applications. In this paper, the programming model, the framework and the security aspects for the Constrained Application Protocol (CoAP) are analyzed with respect to the WSN. CoAP chooses the two-layered approach, to deal with interchanging of messages. The IOT involves implementing the programming in the Representational State Transfer (REST) model paradigm, which is predominantly inherited by the CoAP protocol. The CoAP proxy adapts a backend framework in a modular form. Also, the Datagram Transport Layer Security (DTLS) overcomes unreliable nature in the CoAP due to the User Datagram Protocol (UDP). The CoAP protocol is studied from different angle with respect to the prominent aspects for implementation of IOT in a real world.

Keywords


CoAP, IOT, REST, WSN



DOI: https://doi.org/10.17485/ijst%2F2014%2Fv7i3%2F50263