Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Article Metrics in Dimensions
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-11-25
Vol. 19, No. 11 has been published online!
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
Home
>
Published Issues
>
2020
>
Volume 15, No. 1, January 2020
>
Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey
Fahd A. Alhaidari
1
and Ebtesam J. Alqahtani
2
1. Department of Computer Information System, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia
2. Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia
Abstract
—Nowadays, cloud computing and IoT devices are widely used and involved in our life. However, the current cloud computing paradigm still have some limitation mainly related to the latency, location, and mobility. Thus, to overcome such limitations, Fog Computing was introduced as an intermediate layer between the IoT devices and cloud computing to providing multiple benefits such as low latency and mobility. However, the security of Fog Computing protocols is still a concern especially those related CoAP protocol. CoAP protocol is still does not have the reliable standards for securing its architecture and there is a huge lack of the main researches on how security can be managed or provided to CoAP. Hence, this paper surveys the CoAP protocol, its architecture, security and different proposed techniques to secure CoAP protocol. The paper provides a solid reference for the Fog Computing and CoAP protocol security as well as it proposed a taxonomy for the literature review to ease understanding all available techniques to secure CoAP.
Index Terms
—Fog computing, IoT, CoAP, security, DTLS, wireless sensor networks
Cite: Fahd A. Alhaidari and Ebtesam J. Alqahtani, “Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey,”Journal of Communications vol. 15, no. 1, pp. 14-30, January 2020. Doi: 10.12720/jcm.15.1.14-30
Copyright © 2020 by the authors. This is an open access article distributed under the Creative Commons Attribution License (
CC BY-NC-ND 4.0
), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.
2-JCM170365
PREVIOUS PAPER
Performance Evaluation of eICIC Scheme for Small Cell Data Offloading in Heterogeneous Cellular Network
NEXT PAPER
Analysis and Comparison of VLC based Pulse Modulation in LiFi Enterprise Standard Environment