NIST logo

Tech Beat - June 21, 2011

Tech Beat Archives

Submit an email address to receive news from NIST:

Editor: Michael Baum
Date created: June 21, 2011
Date Modified: June 21, 2011 
Contact: inquiries@nist.gov

Nanowire-based Sensors Offer Improved Detection of Volatile Organic Compounds

A team of researchers from the National Institute of Standards and Technology (NIST), George Mason University and the University of Maryland has made nano-sized sensors that detect volatile organic compounds—harmful pollutants released from paints, cleaners, pesticides and other products—that offer several advantages over today's commercial gas sensors, including low-power room-temperature operation and the ability to detect one or several compounds over a wide range of concentrations.

nanowire
Scanning electron microscope image of a gas sensor segment fabricated of a semiconducting nanowire of gallium nitride. The nanowire of less than 500 nanometers across is coated with nanoclusters of titanium dioxide, which alters the current in the nanowire in the presence of a volatile organic compound and ultraviolet light.
Credit: NIST
View hi-resolution image

The recently published work* is proof of concept for a gas sensor made of a single nanowire and metal oxide nanoclusters chosen to react to a specific organic compound. This work is the most recent of several efforts at NIST that take advantage of the unique properties of nanowires and metal oxide elements for sensing dangerous substances.

Modern commercial gas sensors are made of thin, conductive films of metal oxides. When a volatile organic compound like benzene interacts with titanium dioxide, for example, a reaction alters the current running through the film, triggering an alarm. While thin-film sensors are effective, many must operate at temperatures of 200° C (392° F) or higher. Frequent heating can degrade the materials that make up the films and contacts, causing reliability problems. In addition, most thin-film sensors work within a narrow range: one might catch a small amount of toluene in the air, but fail to sniff out a massive release of the gas. The range of the new nanowire sensors runs from just 50 parts per billion up to 1 part per 100, or 1 percent of the air in a room.

These new sensors, built using the same fabrication processes that are commonly used for silicon computer chips, operate using the same basic principle, but on a much smaller scale: the gallium nitride wires are less than 500 nanometers across and less than 10 micrometers in length. Despite their microscopic size, the nanowires and titanium dioxide nanoclusters they're coated with have a high surface-to-volume ratio that makes them exquisitely sensitive.

"The electrical current flowing through our nanosensors is in the microamps range, while traditional sensors require milliamps," explains NIST's Abhishek Motayed. "So we're sensing with a lot less power and energy. The nanosensors also offer greater reliability and smaller size. They're so small that you can put them anywhere." Ultraviolet light, rather than heat, promotes the titanium dioxide to react in the presence of a volatile organic compound.

Further, each nanowire is a defect-free single crystal, rather than the conglomeration of crystal grains in thin-film sensors, so they're less prone to degradation. In reliability tests over the last year, the nano-sized sensors have not experienced failures. While the team's current experimental sensors are tuned to detect benzene as well as the similar volatile organic compounds toluene, ethylbenzene and xylene, their goal is to build a device that includes an array of nanowires and various metal oxide nanoclusters for analyzing mixtures of compounds. They plan to collaborate with other NIST teams to combine their ultraviolet light approach with heat-induced nanowire sensing technologies.

The portion of this work conducted at George Mason University was funded by the National Science Foundation.

* G.S. Aluri, A. Motayed, A.V. Davydov, V.P. Oleshko, K.A. Bertness, N.A. Sanford and M.V. Rao. Highly selective GaN-nanowire/TiO2-nanocluster hybrid sensors for detection of benzene and related environment pollutants. Nanotechnology. 22 295503 doi: 10.1088/0957-4484/22/29/295503

Media Contact: Michael Baum, baum@nist.gov, 301-975-2763

Comment  Comment on this article.back to top

Branch Offices: New Family of Gold-Based Nanoparticles Could Serve as Biomedical 'Testbed'

Gold nanoparticles are becoming the … well … gold standard for medical-use nanoparticles. A new paper* by researchers from the National Institute of Standards and Technology (NIST) and the National Cancer Institute's Nanotechnology Characterization Laboratory (NCL) proposes not only a sort of gold nanoparticle "testbed" to explore how the tiny particles behave in biological systems, but also a paradigm for how to characterize nanoparticle formulations to determine just what you're working with.

nanoparticle
Sketch of a typical gold nanoparticle encased in dendrons. A single sulfur atom at the 'root' of each multiply branched dendron anchors it to the gold nanoparticle at the center. NIST and NCI/NCL researchers are studying the tiny constructs as a test bed and basic vehicle for many possible biomedical applications.
Credit: Cho/NIST
View hi-resolution image

Prospective uses of gold nanoparticles, says NIST chemist Vince Hackley, include high-precision drug-delivery systems and diagnostic image enhancers. Gold is nontoxic and can be fashioned into particles in a range of sizes and shapes. By itself, gold doesn't do much biologically, but it can be "functionalized" by attaching, for instance, protein-based drugs along with targeting molecules that cluster preferentially around cancer cells. The nanoparticles are generally coated as well, to prevent them from clumping together and to avoid rapid clearance by the body's immune system.

NCL's Anil Patri notes that the coating composition, density and stability have a profound impact on the nanomaterial safety, biocompatibility (how well the nanoparticles distribute in the body), and efficacy of the delivery system. "Understanding these parameters through thorough characterization would enable the research community to design and develop better nanomaterials," he says.

To facilitate such studies, the NIST/NCL team set out to create a nanoparticle testbed—a uniform, controllable core-shell nanoparticle that could be made-to-order with precise shape and size, and to which could be attached nearly any potentially useful functionality. Researchers then could study how controlled variations fared in a biological system.

Their trial system is based on regularly shaped branching molecules called dendrons, a term derived from the Greek word for "tree." Dendron chemistry is fairly new, dating from the 1980s. They're excellent for this use, says NIST researcher Tae Joon Cho, because the individual dendrons are always the same size, unlike polymers, and can readily be modified to carry "payload" molecules. At the same time, the tip of the structure—the "tree's" trunk—is designed to bond easily to the surface of a gold nanoparticle.

The team made an exhaustive set of measurements so they could thoroughly describe their custom-made dendron-coated nanoparticles. "There aren't a lot of protocols around for characterizing these materials—their physical and chemical properties, stability, et cetera," Hackley says, "so, one of the things that came out of the project is a basic series of measurement protocols that we can apply to any kind of gold-based nanoparticle."

Any single measurement technique, he says, is probably inadequate to describe a batch of nanoparticles, because it likely will be insensitive to some size ranges or confused by other factors—particularly if the particles are in a biological fluid.

The new NIST/NCL paper provides the beginnings of a catalog of analysis techniques for getting a detailed lowdown on nanoparticles. These techniques include nuclear magnetic resonance spectroscopy, matrix-assisted laser desorption/ionization mass spectrometry, dynamic light scattering, ultra-violet/visible spectroscopy and X-ray photoelectron spectroscopy. The dendron-coated nanoparticles also were tested for stability under "biologically relevant" conditions of temperature, acidity and some recognized forms of chemical attack that would take place in the bloodstream. In vitro biological tests are pending.

The work was funded in part by the National Cancer Institute, National Institutes of Health.

* T.J. Cho, R.A. Zangmeister, R.I. MacCuspie, A.K. Patri and V.A. Hackley. Newkome-type dendron-stabilized gold nanoparticles: synthesis, reactivity, and stability. Chem. Mater. 2011,23,2665-2676. dx.doi.org/10.1021/cm200591h.

Media Contact: Michael Baum, baum@nist.gov, 301-975-2763

Comment  Comment on this article.back to top

Final Version of Industrial Control Systems Security Guide Published

The National Institute of Standards and Technology (NIST) has issued the final version of its Guide to Industrial Control Systems (ICS) Security (SP 800-82),* intended to help pipeline operators, power producers, manufacturers, air traffic control centers and other managers of critical infrastructures to secure their systems while addressing their unique performance, reliability, and safety requirements.

pipeline
Pipelines and power transmission systems are key components of the nation’s vast critical infrastructure. NIST’s new Guide to Industrial Control Systems Security provides specific guidance on how to reduce the vulnerability of this infrastructure to malicious attacks, equipment failures, and other threats to the operation and reliable performance of underpinning control systems.
Copyright: Shutterstock/LiteChoices

Finalized after three rounds of public review and comment, the guide is directed specifically to federally owned or operated industrial control systems (ICS), including those run by private contractors on behalf of the federal government. Examples include the mail handling operations, air traffic control towers, and some electricity generation and transmission facilities and weather observation systems. However, the guide's potential audience is far larger and more diverse than the federal government, since about 90 percent of the nation's critical infrastructure is privately owned.

The guide responds to responsibilities assigned to NIST under the Federal Information Security Management Act (FISMA). The law directs NIST to develop information security standards and guidelines for non-national security federal information systems. While these FISMA-related specifications are not mandatory for the private sector or state and local governments, many businesses and other organizations have adopted the NIST-developed standards and guidelines. Drafts of the new document have been downloaded more than 1,000,000 times, and the guide already is referenced in industry-specific security publications.

Industrial control systems include supervisory control and data acquisition (SCADA) systems, distributed control systems and programmable logic controllers. The scope of facilities and equipment encompassed by these technologies range from broadly dispersed operations, such as natural gas pipelines and water distribution systems, down to individual machines and processes.

Most industrial control systems began as proprietary, stand-alone systems that were separated from the rest of the world and isolated from most external threats. Today, widely available software applications, Internet-enabled devices and other nonproprietary IT offerings have been integrated into most such systems. This connectivity has delivered many benefits, but it also has increased the vulnerability of these systems to malicious attacks, equipment failures and other threats.

As a rule, these systems must operate continuously and reliably, often around the clock. Unlike information technology (IT) systems, which process, store, and transmit digital data, industrial control systems typically monitor the system environment and control physical objects and devices, such as pipeline valves. Disruptions or failures can result in death or injury, property damage, and loss of critical services.

Due to these unique performance, reliability and safety requirements, securing industrial control systems often requires adaptations and extensions to the NIST-developed security standards and guidelines for IT systems only. The new guide describes these adaptations and extensions, provides an overview of various systems and their organizational layouts, describes typical threats and vulnerabilities, and recommends appropriate countermeasures.

"Securing an industrial control system requires a proactive, collaborative effort that engages cyber security experts, control engineers and operators and other experts and experienced workers," says NIST mechanical engineer and lead author Keith Stouffer. "It also requires factoring in—and addressing—new risks introduced by the evolving 'smart' electric power grid."

Stouffer recommends using the new guide along with Guidelines for Smart Grid Cyber Security (NISTIR 7628), which NIST issued last September, to tackle security issues arising from the convergence of the electric power Smart Grid and ICS.

The free 155-page guide can be downloaded from the NIST Computer Security Resource Center at: http://csrc.nist.gov/index.html.

*K. Stouffer, J. Falco and K. Scarfone, Guide to Industrial Control Systems (ICS) Security (SP 800-82). June 2011.

Media Contact: Mark Bello, mark.bello@nist.gov, 301-975-3776

Comment  Comment on this article.back to top

Baldrige Program Takes Performance Excellence on the Road

Interested in improving your organization's excellence? Then sign up for one of the two 2011 Baldrige Regional Conferences. This year, they're being held in Missouri and Alabama.

Senior leaders from the seven organizations selected for the 2010 Malcolm Baldrige National Quality Award, as well as representatives from previous award recipients, will share their best practices and results during the events on Sept. 13, 2011, at the Westin Crown Center, Kansas City, Mo., and on Sept. 27, 2011, at the Renaissance Birmingham Ross Bridge Golf Resort & Spa, Birmingham, Ala.

Participants can network with the recipients and gather valuable tips on organizational improvement, innovation and performance management, as well as advice on how to successfully apply the Baldrige Criteria for Performance Excellence. 

The 2010 Baldrige Award recipients—listed with their category—are: 

  • MEDRAD, Warrendale, Pa. (manufacturing)
  • Nestlé Purina PetCare Co., St. Louis, Mo. (manufacturing)
  • Freese and Nichols Inc., Fort Worth, Texas (small business)
  • K&N Management, Austin, Texas (small business)
  • Studer Group, Gulf Breeze, Fla. (small business)
  • Montgomery County Public Schools, Rockville, Md. (education)
  • Advocate Good Samaritan Hospital, Downers Grove, Ill. (health care)


Each of the regional conferences will feature an in-depth plenary session with the senior leaders from four of the 2010 Award recipients, along with 18 interactive breakout sessions with leaders from current and former recipients.

A pre-conference workshop is being offered on the day before both conferences to familiarize those new to the Baldrige process with the basics of the Baldrige Criteria, the benefits of self-assessment and the resources available to help organizations begin an organizational excellence program. The workshop is not a prerequisite for attending the conference. 

For more information about, or to register online for, the conferences, go to http://www.nist.gov/baldrige/regionals/index.cfm. You also may contact the Baldrige Performance Excellence Program for details at (301) 975-2036 or baldrige@nist.gov.

An early registration discount is available for the Missouri conference until Aug. 23, 2011, and for the Alabama conference until Sept. 6, 2011. 

The 2011 Regional Conferences are co-sponsored by the Excellence in Missouri Foundation, the Alabama Productivity Center and the Alliance for Performance Excellence.

Media Contact: Michael E. Newman, michael.newman@nist.gov, 301-975-3025

Comment  Comment on this article.back to top

Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies

Most industry executives, military planners, research managers or venture capitalists charged with assessing the potential of an R&D project probably are familiar with the wry twist on Arthur C. Clarke's third law*: "Any sufficiently advanced technology is indistinguishable from a rigged demo."

a U.S. Marine and a native Pashto speaker

A NIST-designed framework for evaluating emerging technologies helped to focus and further efforts to develop two-way speech-translation systems to aid U.S. soldiers and Marines serving in Iraq and Afghanistan. In this trial, a Marine and a speaker of Pashto, a native Afghani tongue, conversed using a translation system based on smart phone technology.  The technology-development effort was sponsored by the Defense Advanced Research Projects Agency.

View hi-resolution image
Credit: NIST

After serving for five years as independent evaluators of emerging military technologies nurtured by the Defense Advanced Research Projects Agency (DARPA), a team from the National Institute of Standards and Technology (NIST) shares critical "lessons learned" that can help businesses and others negotiate the promises and pitfalls encountered when pushing the technology envelope to enable new capabilities.

Writing in the International Journal of Intelligent Control and Systems,** the NIST researchers also describe the evaluative framework they devised for judging the performance of a system and its components as well as the utility of the technology for the intended user. Called SCORE (System, Component, and Operationally Relevant Evaluations), the framework is a unified set of criteria and software tools for evaluating emerging technologies from different perspectives and levels of detail and at various stages of development.

SCORE was developed for evaluating so-called intelligent systems—a fast growing category of technologies ranging from robots and unmanned vehicles to sensor networks, natural language processing devices and "smart" appliances. By definition, explains Craig Schlenoff, acting head of NIST's Systems Integration Group, "Intelligent systems can respond to conditions in an uncertain environment—be it a battlefield, a factory floor, or an urban highway system—in ways that help the technology accomplish its intended purpose."

Schlenoff and his colleagues used their SCORE approach to evaluate technologies as they progressed under two DARPA programs: ASSIST and TRANSTAC. In ASSIST, DARPA is funding efforts to instrument soldiers with wearable sensors—video cameras, microphones, global positioning devices and more—to continuously record activities while they are on a mission. TRANSTAC is driving the development of two-way speech-translation systems that enable speakers of different languages to communicate with each other in real-world situations, without an interpreter. By providing constructive feedback on system capabilities, the SCORE evaluative framework helps to drive innovation and performance improvements.

Several lessons learned recounted by the NIST team are aimed at maximizing the contributions of test subjects and the developers of technologies without biasing test results. "There is often a balancing act," they write, "between creating the evaluation environment in a way that shows the system in the best possible light vs. having an environment that is as realistic as possible."

They also discuss unavoidable trade-offs due to costs, logistics, or other factors. While evaluators and technology developers should never lose sight of their ultimate objective, the NIST researchers also advise the need for flexibility over time. As more is learned about the system and about user requirements, features may change and project goals may be modified, necessitating adjustments to the evaluation approach.

"The main lesson," Schlenoff explains, "is that the extra effort devoted to evaluation planning can have a huge effect on how successful the evaluation will be. Bad decisions made during the design can be difficult and costly to fix later on."

* "Any sufficiently advanced technology is indistinguishable from magic."
**C. Schlenoff, B. Weiss and M. Steves. A detailed discussion of lessons learned in evaluating emerging and advanced military technologies. International Journal of Intelligent Control and Systems. Forthcoming. To learn more about SCORE, go to: http://www.nist.gov/el/isd/ks/score.cfm.

Media Contact: Mark Bello, mark.bello@nist.gov, 301-975-3776

Comment  Comment on this article.back to top

Calling for Comments on Cybersecurity, Innovations and the Internet Economy

The Department of Commerce's Internet Policy Task Force is requesting comments on a report that proposes voluntary codes of conduct to strengthen the cybersecurity of companies that increasingly rely on the Internet to do business, but are not part of the critical infrastructure sector.

The report, Cybersecurity, Innovations and the Internet Economy, focuses on the "Internet and Information Innovation Sector" (I3S)—businesses that range from small and medium enterprises and bricks-and-mortar firms with online services, to social networking sites and Internet-only business, to cloud computing firms that are increasingly subject to cyber attacks.

"Our economy depends on the ability of companies to provide trusted, secure services online," writes Commerce Secretary Gary Locke in the publication. "As new cybersecurity threats evolve, it's critical that we develop policies that better protect businesses and their customers to ensure the Internet remains an engine for economic growth."

Global online transactions are currently estimated by industry analysts at $10 trillion annually. As Internet business grows, so has the threat of cybersecurity attacks. The number of Internet malware threats was estimated to have doubled between January 2009 and December 2010. In 2010, an estimated 55,000 new viruses, worms, spyware and other threats were bombarding the Internet daily. 

Cybersecurity, Innovation and the Internet Economy, makes a number of specific recommendations for reducing I3S vulnerabilities:

  • Establish nationally recognized but voluntary codes of conduct to minimize cybersecurity vulnerabilities. For example, the report recommends that businesses employ present-day best practices, such as automated security, to combat cybersecurity threats and that they implement the Domain Name System Security (DNSSEC) protocol extensions on the domains that host key web sites.
  • Developing incentives to combat cybersecurity threats. For example, reducing "cyberinsurance" premiums for companies that adopt best practices and openly share details about cyber attacks for the benefit of other businesses.
  • Improve public understanding of cybersecurity vulnerabilities through education and research. Programs like the National Initiative for Cybersecurity Education, which the National Institute of Standards and Technology (NIST) coordinates, should target awareness and training to the I3S and develop methods for cost/benefit analyses for cybersecurity expenditures.
  • Enhance international collaboration on cybersecurity best practices to support expanded global markets for U.S. products. Including enhanced sharing of research and development goals, standards and policies that support innovation and economic growth.


The Internet Policy Task Force was created in April 2010 to identify and address the Internet's most pressing policy issues and to recommend new policies. It includes the Office of the Secretary, NIST, the International Trade Administration and the National Telecommunications and Information Administration. The Task Force was directed to look at establishing practices, norms and ground rules that promote innovative uses of information in four key areas where the Internet must address significant challenges: enhancing Internet privacy, improving cybersecurity, protecting intellectual property and encouraging the global free flow of information.

A June 15, 2011, Federal Register notice requests comments on the task force report by August 1, 2011. Comments should be emailed to SecurityGreenPaper@nist.gov with the subject line ''Comments on Cybersecurity Green Paper.'' The task force will continue to work with others in government to engage the domestic and global privacy community, and will consider publishing a refined set of policy recommendations in the future.

Media Contact: Evelyn Brown, evelyn.brown@nist.gov, 301-975-5661

Comment  Comment on this article.back to top

NIST Contributions to Smart Grid Highlighted in White House Report, Event

A new White House policy document released today* highlights strategic roles that the National Institute of Standards and Technology (NIST) plays in accelerating the modernization of the nation's electric infrastructure, bolstering electric-grid innovation and advancing a clean energy economy, in part by advancing "smart grid" technologies.  The White House unveiled the document today at its "Building the 21st Century Grid" event, which brought together many cabinet departments and agencies working together toward these goals.

powerlines
The first 10 miles of the McNary - John Day Transmission Line, Highway 14, Washington.
Credit: Bonneville Power Administration/DOE
View hi-res image

The document, "A Policy Framework for the 21st Century Grid," was issued by the National Science and Technology Council (NSTC), administered by the White House's Office of Science and Technology Policy. It provides a roadmap for making investments in the nation's electric infrastructure in ways that benefit all Americans. Planned changes to the grid include its evolution into a far more modern system, integrating renewable sources of electricity, accommodating the growing number of electric vehicles, and helping to avoid blackouts and restore power more quickly when outages occur. To make these improvements, the strategy rests on four pillars, including one in which NIST plays a leading role: a focus on standards and interoperability to enable greater innovation in modernizing the grid.

Because updating the grid will require a host of interoperability standards to ensure its millions of devices and systems can operate effectively with one another, NIST has been working to bring various industry groups together to coordinate the development of these standards—an effort the White House highlights in the report.

"This document is the culmination of nine months of work by the NSTC subcommittee on Smart Grid to develop an administration policy framework for modernization," said George Arnold, the National Coordinator for Smart Grid Interoperability at NIST. "It highlights the importance of standards to ensure that innovation can be introduced into the grid without stranding previous investments. NIST has played a major role in the modernization effort along with the Department of Energy."

The event also served to highlight opportunities for innovation in the nation's electric infrastructure and to announce a number of new initiatives for achieving a clean energy economy, including NIST's work with the Asia-Pacific Economic Cooperation (APEC). NIST, together with the U.S. Trade Representative, has launched a collaborative initiative in APEC on Smart Grid interoperability standards, crucial to increasing market opportunities throughout the region, including for American firms.

"APEC's 21 countries are concerned with facilitating economic cooperation in the Asia-Pacific region, and each year they pick a key topic to advance regulatory cooperation to facilitate trade," Arnold said. "This year APEC elected to focus on Smart Grid because all these countries are modernizing their grids. These standards can either be a barrier to trade or facilitate it. If we can achieve a commonality of standards, manufacturers can build equipment and then sell it across the region."

For more information on the Grid Modernization Event and the report, visit the White House's fact sheet at www.whitehouse.gov/administration/eop/ostp/pressroom/06132011.

* Originally released on June 13, 2011.
 

Media Contact: Chad Boutin, boutin@nist.gov, 301-975-4261

Comment  Comment on this article.back to top