Online citations, reference lists, and bibliographies.
← Back to Search

The Constrained Application Protocol (CoAP)

Z. Shelby, K. Hartke, C. Bormann
Published 2014 · Computer Science

Save to my Library
Download PDF
Analyze on Scholarcy Visualize in Litmaps
Reduce the time it takes to create your bibliography by a factor of 10 by using the world’s favourite reference manager
Time to take this seriously.
Get Citationsy
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation. CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.

This paper is referenced by
Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies
Othmane Friha (2021)
A survey on IoT application layer protocols
Harth G. Hamid (2021)
System Implementation and Evaluation
S. Pal (2021)
The FORA Fog Computing Platform for Industrial IoT
P. Pop (2021)
The Cost of OSCORE and EDHOC for Constrained Devices
S. Hristozov (2021)
Development of a web application for industrial IoT machine monitoring and data visualization
P. Torino (2021)
A Performance Analysis of the Security Communication in CoAP and MQTT
Zakaria Laaroussi (2021)
Machine Learning in Geoscience Applications of Deep Neural Networks in 4D Seismic Data Analysis
Dramsch (2021)
Thorough Performance Evaluation & Analysis of the 6TiSCH Minimal Scheduling Function (MSF)
David Hauweele (2021)
Raisonnement embarqué et distribué pour le Web des Objets : un état de l'art
Alexandre Bento (2021)
ASSURE: A Hardware-Based Security Protocol for Internet of Things Devices
Yildiran Yilmaz (2021)
Ahmad H. Sawalmeh (2021)
Application Domains, Evaluation Data Sets, and Research Challenges of IoT: A Systematic Review
Ritika Lohiya (2021)
Implementation and evaluation of the information flow control for the Internet of Things
Shigenari Nakamura (2021)
P-HIP: A Lightweight and Privacy-Aware Host Identity Protocol for Internet of Things
M. Hossain (2021)
The Security of MQTT Against the Applications Protocols for IoT
Imane Sahmi (2021)
Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices
K. Norrman (2021)
The Impact of Networking Protocols on Massive M2M Communication in the Industrial IoT
Cenk Gundogan (2021)
Captivates: A Smart Eyeglass Platform for Across-Context Physiological Measurement
Networking Group Content: RESTful Multiparty Access to a Data-centric Web of Things
Cenk Gündogan (2021)
WLDT: A general purpose library to build IoT digital twins
Marco Picone (2021)
Virtual IP-based Secure Gatekeeper System for Internet of Things
Younchan Jung (2021)
A Review of Risks and Threats on IoT Layers
Subir Panja (2021)
Hivemind: social control-and-use of IoT towards democratization of public spaces
Wonjung Kim (2021)
A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions
May S. Altulyan (2021)
An IoT Transport Architecture for Passenger Counting: A Real Implementation
Janine Kniess (2021)
IoT Traffic Offloading with MultiPath TCP
Celso F. Silva (2021)
Application of edge computing and cloud service data system for doctors' psychological reconstruction after the epidemic
Xiujun Zhai (2021)
Ensuring Secure Communication from an IoT Edge Device to a Server Through IoT Communication Protocols
Roshni Vidya S. Boolakee (2021)
Implementation of a Device Adopting the OI (Operation Interruption) Protocol to Prevent Illegal Information Flow in the IoT
Shigenari Nakamura (2021)
Modeling and improving named data networking over IEEE 802.15.4
Amar Abane (2021)
Reliable firmware updates for the information-centric internet of things
Cenk Gündogan (2021)
See more
Semantic Scholar Logo Some data provided by SemanticScholar