1248 (2016) microcoap. https://github.com/1248/microcoap. Accessed 24 Sep 2016
AlShahwan F, Faisal M, Ansa G (2016) Security framework for RESTful mobile cloud computing Web services. J Ambient Intell Humaniz Comput 7(5):649–659. https://doi.org/10.1007/s12652-015-0308-5
Article
Google Scholar
AMQP (2014) AMQP. https://www.amqp.org/. Accessed 17 Jan 2018
ARM (2016) mbed TLS. https://tls.mbed.org/. Accessed 17 Jan 2018
Azimi I, Rahmani AM, Liljeberg P, Tenhunen H (2017) Internet of things for remote elderly monitoring: a study from user-centered perspective. J Ambient Intell Humaniz Comput 8(2):273–289. https://doi.org/10.1007/s12652-016-0387-y
Article
Google Scholar
Banks A, Gupta R (2014) MQTT Version 3.1.1. OASIS standard
Bergmann O (2016) libcoap: C-Implementation of CoAP. https://libcoap.net/. Accessed 24 Sep 2016
Bormann C (2016) CoAP Implementations. http://coap.technology/impls.html. Accessed 17 Jan 2018
Bormann C, Shelby Z (2016). Block-wise transfers in the Constrained Application Protocol (CoAP). https://tools.ietf.org/html/rfc7959. Accessed 17 Jan 2018
Bormann C, Betzler A, Gomez C, Demirkol I (2015) CoAP simple congestion control/advanced. https://tools.ietf.org/html/draft-ietf-core-cocoa-01. Accessed 17 Jan 2018
Castro M, Jara AJ, Skarmeta AFG (2013) Smart lighting solutions for smart cities. In: Proceedings—27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, art. no. 6550587, pp. 1374–1379. https://doi.org/10.1109/WAINA.2013.254
Chase J (2013) The Evolution of the Internet of Things. Texas Instruments
Chen Y, Kunz T (2016) Performance evaluation of IoT protocols under a constrained wireless access network. In: 2016 International Conference on Selected Topics in Mobile and Wireless Networking, MoWNeT 2016, art. no. 7496622. https://doi.org/10.1109/MoWNet.2016.7496622
CoAPy (2010) CoAPy. http://coapy.sourceforge.net/. Accessed 24 Sep 2016
Colitti W, Steenhaut K, De Caro N, Buta B, Dobrota V (2011) Evaluation of constrained application protocol for wireless sensor networks. In: IEEE Workshop on Local and Metropolitan Area Networks, art. no. 6076934. https://doi.org/10.1109/LANMAN.2011.6076934
Collina M (2016) node-coap. https://github.com/mcollina/node-coap. Accessed 24 Sep 2016
Cullen K (2016) FreeCoAP. https://github.com/keith-cullen/FreeCoAP. Accessed 24 Sep 2016
Cyber Defense Laboratory (2011) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. http://discovery.csc.ncsu.edu/software/TinyECC/. Accessed 17 Jan 2018
De Caro N, Colitti W, Steenhaut K, Mangino G, Reali G (2013) Comparison of two lightweight protocols for smartphone-based sensing. In: IEEE SCVT 2013—proceedings of 20th IEEE Symposium on Communications and Vehicular Technology in the BeNeLux, art. no. 6735994. https://doi.org/10.1109/SCVT.2013.6735994
Dierks T, Rescorla E (2008) The transport layer security (TLS) protocol version 1.2. https://tools.ietf.org/html/rfc5246. Accessed 17 Jan 2018
Elmangoush A, Steinke R, Magedanz T, Corici AA, Bourreau A, Al-Hezmi A (2015) Application-derived communication protocol selection in M2M platforms for smart cities. In: 2015 18th International Conference on Intelligence in Next Generation Networks, ICIN 2015, art. no. 7073810, pp 76–82. https://doi.org/10.1109/ICIN.2015.7073810
ETH Zurich (2014) Erbium. http://people.inf.ethz.ch/mkovatsc/erbium.php. Accessed 17 Jan 2018
ETSI (2012) IoT CoAP Plugtests. http://www.etsi.org/plugtests/coap/coap.htm. Accessed 17 Jan 2018
Evans D (2011) The Internet of things. How the next evolution of the internet is changing everything. Cisco
Fieldings R, Gettys J, Mogul J, Frystyk H, Masinter L, Leach P, Berners-Lee T (1999) HTTP. https://www.ietf.org/rfc/rfc2616.txt. Accessed 17 Jan 2018
Github (2016) PUT response with payload. https://github.com/Tanganelli/CoAPthon/issues/45. Accessed 17 Jan 2018
Github (2017) Server auto-token generation breaks RFC 7252. https://github.com/Tanganelli/CoAPthon/issues/48. Accessed 17 Jan 2018
GnuTLS (2017) The GnuTLS transport layer security library. https://www.gnutls.org/. Accessed 17 Jan 2018
Hartke K (2015) Observing resources in the constrained application protocol (CoAP). https://tools.ietf.org/html/rfc7641. Accessed 17 Jan 2018
Hilton S (2016) Dyn analysis summary of Friday October 21 attack. https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/. Accessed 17 Jan 2018
IETF (2017) IETF CoRE Working Group. https://datatracker.ietf.org/wg/core/charter/. Accessed 17 Jan 2018
Jeon J (2011) Web Browser as Universal client for IoT. https://es.slideshare.net/hollobit/web-browser-as-universal-client-for-iot. Accessed 17 Jan 2018
Kajimoto K, Matthias K, Duvuluru U (2017) Web of Things (WoT) Architecture. https://www.w3.org/TR/wot-architecture/. Accessed 17 Jan 2018
Khattak HA, Ruta M, Eugenio E, Sciascio D (2014) CoAP-based healthcare sensor networks: a survey. In: Proceedings of 2014 11th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2014, art. no. 06778196, pp 499–503. https://doi.org/10.1109/IBCAST.2014.6778196
Kothmayr T, Schmitt C, Hu W, Brunig M, Carle G (2012) A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: Proceedings—Conference on Local Computer Networks, LCN, art. no. 6424088, pp 956–963. https://doi.org/10.1109/LCNW.2012.6424088
Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw 11(8):2710–2723. https://doi.org/10.1016/j.adhoc.2013.05.003
Article
Google Scholar
Kovatsch M (2014) Copper (Cu) CoAP user-agent for Firefox. http://people.inf.ethz.ch/mkovatsc/copper.php. Accessed 17 Jan 2018
Kruger CP, Hancke GP (2014) Benchmarking Internet of things devices. In: Proceedings—2014 12th IEEE International Conference on Industrial Informatics, INDIN 2014, art. no. 6945583, pp 611–616. https://doi.org/10.1109/INDIN.2014.6945583
Kuladinithi K, Bergmann O, Pötsch T, Becker M, Görg C (2011) Implementation of CoAP and its application in transport logistics. Proc. IP + SN, Chicago, IL
Google Scholar
Kwon H, Park J, Kang N (2016) Challenges in deploying CoAP over DTLS in resource constrained environments. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9503, pp 269–280. https://doi.org/10.1007/978-3-319-31875-2_22
Lerche C, Hartke K, Kovatsch M (2012) Industry adoption of the Internet of Things: a constrained application protocol survey. IEEE International Conference on Emerging Technologies and Factory Automation, ETFA, art. no. 6489787. https://doi.org/10.1109/ETFA.2012.6489787
Ludovici A (2013) TinyCoAP. https://github.com/AleLudovici/TinyCoAP. Accessed 17 Jan 2018
Ludovici A, Moreno P, Calveras A (2013) TinyCoAP: a novel constrained application protocol (CoAP) implementation for embedding RESTful web services in wireless sensor networks based on TinyOS. J Sensor Actuator Netw 2(2):288–315. https://doi.org/10.3390/jsan2020288
Article
Google Scholar
Mun DH, Le Dinh M, Kwon YW (2016) An assessment of Internet of Things protocols for resource-constrained applications. Proc Int Comput Softw Appl Conf 1:555–560. https://doi.org/10.1109/COMPSAC.2016.51
(art. no. 7552070)
Google Scholar
Nottingham M (2010) Web Linking. https://tools.ietf.org/html/rfc5988. Accessed 17 Jan 2018
Object Management Group (2016) DDS. http://portals.omg.org/dds/. Accessed 17 Jan 2018
Open Mobile Alliance (OMA) (2017) Lightweight M2M. http://openmobilealliance.org/iot/lightweight-m2m-lwm2m. Accessed 17 Jan 2018
OpenSSL Software Foundation (2016) OpenSSL cryptography and SSL/TLS toolkit. https://www.openssl.org/. Accessed 17 Jan 2018
Pimoroni (2017) Controlling IKEA Trådfri Lights from your Pi. https://learn.pimoroni.com/tutorial/sandyj/controlling-ikea-tradfri-lights-from-your-pi. Accessed 17 Jan 2018
Quattlebaum R (2016) SMCP—a full-featured embedded CoAP stack. https://github.com/darconeous/smcp. Accessed 24 Sep 2016
Rahman A, Dijk E (2014) Group communication for the constrained application protocol (CoAP). https://tools.ietf.org/html/rfc7390. Accessed 17 Jan 2018
Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: Lightweight secure CoAP for the internet of things. IEEE Sens J 13(10):3711–3720. https://doi.org/10.1109/JSEN.2013.2277656
(art. no. 6576185)
Article
Google Scholar
Rescorla E, Modadugu N (2012) Datagram transport layer security version 1.2. https://tools.ietf.org/html/rfc6347. Accessed 17 Jan 2018
Rouse M (2016) Internet of Things (IoT). http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT. Accessed 17 Jan 2018
Shelby Z (2012) Constrained RESTful environments (CoRE) link format. https://tools.ietf.org/html/rfc6690. Accessed 17 Jan 2018
Shelby Z, Hartke K, Bormann C (2014) The constrained application protocol (CoAP). https://tools.ietf.org/html/rfc7252. Accessed 17 Jan 2018
Shelby Z, Koster M, Bormann C, van der Stok P (2016) CoRE resource directory. https://tools.ietf.org/html/draft-ietf-core-resource-directory-11. Accessed 17 Jan 2018
Talaminos-Barroso A, Estudillo-Valderrama MA, Roa LM, Reina-Tosina J, Ortega-Ruiz F (2016) A machine-to-machine protocol benchmark for eHealth applications—use case: respiratory rehabilitation. Comput Methods Programs Biomed 129:1–11. https://doi.org/10.1016/j.cmpb.2016.03.004
Article
Google Scholar
Tanganelli G (2016) CoAPthon. https://github.com/Tanganelli/CoAPthon. Accessed 24 Sep 2016
Thangavel D, Ma X, Valera A, Tan HX, Tan CKY (2014) Performance evaluation of MQTT and CoAP via a common middleware. In: IEEE ISSNIP 2014–2014 IEEE 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Conference Proceedings, art. no. 6827678. https://doi.org/10.1109/ISSNIP.2014.6827678
The Eclipse Foundation (2014) Californium. https://eclipse.org/californium/. Accessed 24 Sep 2016
The Eclipse Foundation (2017a) Eclipse tinydtls. https://projects.eclipse.org/projects/iot.tinydtls. Accessed 17 Jan 2018
The Eclipse Foundation (2017b) Scandium (Sc)—security for Californium. https://github.com/eclipse/californium/tree/master/scandium-core. Accessed 17 Jan 2018
The New Jersey Cybersecurity and Communications Integration Cell (2016) Mirai Botnet. https://www.cyber.nj.gov/threat-profiles/botnet-variants/mirai-botnet. Accessed 17 Jan 2018
Villaverde BC, Pesch D, De Paz Alberola R, Fedor S, Boubekeur M (2012) Constrained application protocol for low power embedded networks: a survey. In: Proceedings—6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, art. no. 6296940, pp. 702–707. https://doi.org/10.1109/IMIS.2012.93
Walukiewicz Ł (2014) h5.coap. https://github.com/morkai/h5.coap. Accessed 24 Sep 2016
WolfSSL (2017) WolfSSL. https://www.wolfssl.com/. Accessed 17 Jan 2018