The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March-April (2012 vol.16)
pp: 62-67
Angelo P. Castellani , University of Padova
Carsten Bormann , Universität Bremen
ABSTRACT
<p>The Constrained Application Protocol (CoAP) is a transfer protocol for constrained nodes and networks, such as those that will form the Internet of Things. Much like its older and heavier cousin HTTP, CoAP uses the REST architectural style. Based on UDP and unencumbered by historical baggage, however, CoAP aims to achieve its modest goals with considerably less complexity.</p>
INDEX TERMS
Internet of Things, Web of things, CoAP, constrained nodes and networks, embedded Internet, REST, Constrained RESTful Environments (CoRE), smart objects, machine-to-machine (M2M) communication, 6LoWPAN, wireless sensor networks
CITATION
Angelo P. Castellani, Carsten Bormann, "CoAP: An Application Protocol for Billions of Tiny Internet Nodes", IEEE Internet Computing, vol.16, no. 2, pp. 62-67, March-April 2012, doi:10.1109/MIC.2012.29
REFERENCES
1. Z. Shelby and C. Bormann, 6LoWPAN: The Wireless Embedded Internet, Wiley, 2009.
2. Z. Shelby et al., "Constrained Application Protocol (CoAP)," IETF Internet draft, work in progress, Oct. 2011.
3. R.T. Fielding, Architectural Styles and the Design of Network-Based Software Architectures, PhD thesis, Univ. of California, Irvine, 2000.
4. C. Jennings, Z. Shelby, and J. Arkko, "Media Types for Sensor Markup Language (SENML)," IETF Internet draft, work in progress, Oct. 2011.
5. C. Bormann and Z. Shelby, "Blockwise Transfers in CoAP," IETF Internet draft, work in progress, July 2011.
6. K. Hartke and Z. Shelby, "Observing Resources in CoAP," IETF Internet draft, work in progress, Oct. 2011.
7. E. Gamma et al., Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley, 1994.
8. Z. Shelby, "CoRE Link Format," IETF Internet draft, work in progress, Nov. 2011.
9. N. Leavitt, "Internet Security Under Attack: The Undermining of Digital Certificates," Computer, Dec. 2011, pp. 17–20.
10. E. Rescorla and N. Modadugu, "Datagram Transport Layer Security version 1.2," IETF Internet draft, work in progress, July 2011.
11. P. Wouters et al., "TLS Out-of-Band Public Key Validation," IETF Internet draft, work in progress, Nov. 2011.
26 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool