Interaction Model of Service Discovery Using Visa Processing Algorithm and Constrained Application Protocol (CoAP)

Service Discovery is a process of identifying the compatible resources of a transaction to result it in a comfort zone. The environment of Internet of Things would be a mixture of hardware and software independent components. Offering a service in an IoT architecture is challenging problem based on participant registration and logs. A model for Integrating Physical world devices in constrained web environments using Constrained Application Protocol (CoAP) together with an end-to-end IP and RESTful Web Services based architecture is proposed. We suggest a Visa Processing Algorithm for an IoT environment to maintain time constraint participants and for anonymity finding. The proposed model is an integrating Constrained Application Protocol with the algorithm for service discovery issues particularly handling anonymous entity.

[1]  Hamid Aghvami,et al.  Cognitive Machine-to-Machine Communications for Internet-of-Things: A Protocol Stack Perspective , 2015, IEEE Internet of Things Journal.

[2]  K. Vanitha,et al.  Anonymity handling and sensor object modeling for pervasive environments using VISA processing , 2014 .

[3]  Antonio F. Gómez-Skarmeta,et al.  The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities , 2013, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[4]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[5]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[6]  Zach Shelby,et al.  Embedded web services , 2010, IEEE Wireless Communications.

[7]  Miao Wu,et al.  Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[8]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[9]  Costas Lambrinoudakis,et al.  Protecting privacy and anonymity in pervasive computing: trends and perspectives , 2006, Telematics Informatics.

[10]  Song Guo,et al.  The Web of Things: A Survey (Invited Paper) , 2011, J. Commun..