Please use this identifier to cite or link to this item:
|Title:||CoAP Code Status/THE CONSTRAINED APPLICATION PROTOCOL/CoAP vs HTTP/CoAP vs Mqtt|
|Abstract:||IoT a newly emerging term meant the new generation of Internet (network) that allows the understanding of interconnected devices over the Internet Protocol. These devices include sensors, sensors, sensors and various artificial intelligence tools and others. This definition goes beyond the traditional concept of connecting people with computers and smartphones over a network One global and through traditional known IP. What distinguishes Internet things is that it allows the person to be free from the place, that is, the person can control the tools without having to be in a specific place to deal with a particular device. However, despite the advantages provided by the Internet, there is a problem that remains difficult to protect the information transmitted through the Internet Protocol and this is due to the large number of connected devices in the network, which reached in 2020 more than 20 million and this made hackers Internet make it a treasure for them In this study, we chose to study the actions and methods used to reduce the risks faced by the Restricted Application Protocol (COAP). This protocol, which relies only on the transition protocol, Serve ((UDP, because Internet things in terms of transmission of information based on the user data protocol because it is the best in terms of speed compared to the Transmission Control Protocol (TCP). There have been numerous studies and researches on the field of protection in relation to the restricted application protocol. Among these studies is the study of the Indian researcher Raza, who relied on the technology of transport layer in the data schema (DTLS), which relies mainly on the technology of encryption between the information transmitted and this leads to the nature of confidentiality The network hackers will have great difficulty getting it This Project aims at clarifying the restricted application protocol, clarifying some of the attacks that may be exposed, and the studies that have been carried out in this field, as well as simulating a DOS attack on a network using the Cooja program. Key words: IOT, IDS, Security, Cooja.|
|Appears in Collections:||Faculté des Sciences Exactes et des Sciences de la Nature et de la Vie (FSESNV)|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.