2000 character limit reached
Discovery and capabilities of guard proxies for CoRE networks (2205.14433v1)
Published 28 May 2022 in cs.NI
Abstract: Constrained RESTful Environments tolerate and even benefit from proxy services. We explore the concept of proxies installed at entry points to constrained networks without any unified management. We sketch proxies of different levels of intrusiveness into applications, their announcement and discovery, and compare their theoretical capabilities in mitigating the effects of undesired traffic that can otherwise exhaust the environment's constrained resources.
Sponsor
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.