Logo
International Journal of
Academic Research and Development

Search

ARCHIVES
2025 ISSUES
VOL. 3, ISSUE 3 (2018)
Network security using constrained application protocol (CoAP)
Authors
Amol Kadam, Srija Srivastava, Vijay Suryawanshi, Nikhil Thorat, Abhinav Parashar
Abstract
The Internet of Things (IoT) has emerged as the key networking paradigm for supporting the connectivity of massively distributed objects and numerous simultaneous applications. The Constrained Application Protocol (CoAP) is designed to meet the requirements for IoT data transmission among constrained nodes. The lean design of CoAP enables it to additionally meet the needs of the data transmission in dynamic network environments. In this paper, we conduct an emulation-based quantitative performance assessment of CoAP in comparison with HTTP, assessing data transmission based on key characteristics of dynamic network environments and the designed scenarios. We also designed scenarios and evaluate the performance of investigated protocols using real-world IoT datasets. Our experimental results demonstrate that CoAP performs better than HTTP for data transmission in the dynamic network environments with respect to delivery rate, delay, and overhead. In addition, we analyze the impact of features in dynamic network environments on the performance of data transmission protocols with respect to success rate, delay and overhead, as well as discuss some further extensions for future research.
Download
Pages:249-253
How to cite this article:
Amol Kadam, Srija Srivastava, Vijay Suryawanshi, Nikhil Thorat, Abhinav Parashar "Network security using constrained application protocol (CoAP)". International Journal of Academic Research and Development, Vol 3, Issue 3, 2018, Pages 249-253
Download Author Certificate

Please enter the email address corresponding to this article submission to download your certificate.