Discovery and capabilities of guard proxies for CoRE networks

05/28/2022
by   Christian Amsüss, et al.
0

Constrained RESTful Environments tolerate and even benefit from proxy services. We explore the concept of proxies installed at entry points to constrained networks without any unified management. We sketch proxies of different levels of intrusiveness into applications, their announcement and discovery, and compare their theoretical capabilities in mitigating the effects of undesired traffic that can otherwise exhaust the environment's constrained resources.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset