Practical Exploitation of CoAP Protocol Vulnerabilities

Practical Exploitation of CoAP Protocol Vulnerabilities

This article is an excellent piece from the Kanxue Forum. Kanxue Forum Author ID: Feng Yi Ying Han It seems that there is very little content related to the CoAP protocol on domestic security forums like Kanxue, and the CVEs mainly involve vulnerabilities in the CoAP protocol library. Therefore, I will organize and record my … Read more

Common IoT Protocols List (Collector’s Edition)

Common IoT Protocols List (Collector's Edition)

IoT protocols refer to the protocols used for communication and data transmission between devices in an IoT environment. Depending on their functions, IoT protocols can be divided into two main categories: transport protocols and communication protocols. Transport Protocols: Mainly responsible for networking and communication between devices within a subnet, such as Wi-Fi, Ethernet, RFID, NFC … Read more

Understanding Various Protocols in IoT

Understanding Various Protocols in IoT

IoT protocols refer to the protocols used for communication and data transmission between devices in an IoT environment. Based on their functions, IoT protocols can be categorized into Transport Protocols, Communication Protocols, and Industry Protocols. Transport Protocols: Generally responsible for networking and communication between devices within a subnet. Examples include Wi-Fi, Ethernet, NFC, Zigbee, Bluetooth, … Read more

Understanding NB-IoT: Features and Applications

Understanding NB-IoT: Features and Applications

Yesterday, a news article from Shanghai was praised by the People’s Daily, which also suggested nationwide promotion. Colleagues are celebrating the application of NB-IoT. What is NB-IoT? What are the advantages of NB-IoT? What can NB-IoT do? What is its relationship with the Internet of Things? 1. What is NB-IoT 2. Four Major Features of … Read more

Understanding the Internet of Things: Key Insights and Trends

Understanding the Internet of Things: Key Insights and Trends

The Anti-Pyramid Scheme Network released on July 6:This article introduces the fundamental knowledge of the Internet of Things, what it is, and common IoT protocols.Why have participants in IoT investment projects been severely deceived in recent years? Where have the core members of those promotional IoT project investment platforms gone? Not going to discuss that … Read more

Overview of Embedded IoT Protocols

Overview of Embedded IoT Protocols

For software companies, the IoT model brings decisive changes to their hardware design and the services they provide. One of the most impactful aspects is the communication protocols. 1 Communication Protocols Communication protocols can be thought of as a language, allowing two or more devices to communicate with each other. Just as there are rules … Read more

Toolkits Designed for IoT Developers: Manage MQTT, CoAP, and NB Devices

Toolkits Designed for IoT Developers: Manage MQTT, CoAP, and NB Devices

As an IoT developer and learner, testing and debugging IoT device protocols is a crucial part of the job! The Toolkit integrates MQTT, CoAP, and NB-IoT protocols into one, with a memory footprint of only 15M, making it a command-line tool designed for IoT developers and engineers! var __INLINE_SCRIPT__ = (function () { 'use strict'; … Read more

Creating CoAP Products on Huawei OC Platform

Creating CoAP Products on Huawei OC Platform

1. Cloud Preparation – Register and Log in to OC Platform Register and log in to the Huawei OceanConnect platform using a Huawei Cloud account. The interface after entering is as follows: 2. Cloud Operations – Create Cloud Device 2.1. Create Project Click to create a project: Fill in the information and submit: After creation, … Read more

Detailed Explanation of CoAP Protocol + Server Setup Testing + Data Capture Analysis

Detailed Explanation of CoAP Protocol + Server Setup Testing + Data Capture Analysis

Click the blue text above to follow us Every day there are fun things waiting for you In the IoT project architecture, besides the TCP-based MQTT protocol, the most commonly used is the UDP-based CoAP protocol. Both can be said to hold equal advantages. The CoAP protocol runs on top of UDP, and the message … Read more

A Brief Discussion on NB-IoT Module Debugging

A Brief Discussion on NB-IoT Module Debugging

Source: LPWAN Technology IoT Think Tank Organized and Published Please indicate the source when reprinting —— [Introduction] —— The author’s remarks: The following narrative is solely personal opinion, devoid of any emotional color. Background The core development technologies of NB-IoT are held by a few major companies, such as Huawei HiSilicon, Qualcomm, and Intel. Of … Read more