Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

cross-protocol attacks

biblio

Visible to the public An Overview of Security in CoAP: Attack and Analysis

Submitted by grigby1 on Fri, 09/11/2020 - 11:58am
  • network servers
  • Constrained Application Protocol (CoAP)
  • Copper
  • cross-protocol attacks
  • datagram transport layer security
  • Datagram Transport Layer Security (DTLS)
  • denial of service
  • Denial of Service (DoS) attacks
  • DoS
  • DTLS
  • man-in-the-middle attack
  • CoAP security attack
  • peak security issues
  • proxy
  • Relay Attacks
  • replay attacks
  • request for comments 7252
  • RFC 7252
  • smart ecosystems
  • UDP
  • User Datagram Protocol (UDP)
  • Web transfer protocols
  • secure protocol
  • Internet of Things
  • security
  • Servers
  • pubcrawl
  • Human behavior
  • Metrics
  • resilience
  • IoT devices
  • telecommunication security
  • Protocols
  • computer architecture
  • composability
  • Browsers
  • Compositionality
  • Browser Security
  • authentication mechanism
  • Constrained Application Protocol
  • Internet of Things (IoT)
  • application layer protocol
  • channel security
  • client-server architecture

Terms of Use  |  ©2023. CPS-VO