An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Catherine A. Remley, Dylan F. Williams, Paul D. Hale, Chih-Ming Wang, Jeffrey A. Jargon, Youngcheol Park
We provide techniques to generate and characterize precision wideband millimeter-wave modulated signals. We use predistortion to obtain a significant improvement in signal quality and an associated reduction in the error vector magnitude (EVM) of the
Paul D. Hale, Kate Remley, Dylan Williams, Jeffrey Jargon, Chih-Ming Wang
We propose a compact and low cost waveform source that can be used to calibrate the magnitude and phase response of vector receivers over a bandwidth as large as a few gigahertz. The generator consists of a broadband comb generator followed by a filter and
Peter B. Papazian, Jae-Kark Choi, Jelena Senic, Peter J. Jeavons, Camillo Gentile, Nada T. Golmie, Roy Sun, David R. Novotny, Kate Remley
Millimeter-wave communication systems will rely on highly directional antennas to compensate for the greater pathloss expected in their frequency bands of operation. Electronic beamforming, hence, will form a cornerstone for the technology. For the
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use. These considerations are scoped into the context of their
Athanasios T. Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implementation
William F. Young, Jason B. Coder, Luis A. Gonzalez
This paper discusses several wireless coexistence test methods in-practice and proposed for industry standards such as ANSI C63.27 The test methods include conducted and radiated setups, and utilize a range of technologies at various levels of
Previous testing has shown that measuring a devices susceptibility to a radiated, broadband signal can present a different set of challenges than those faced when testing with a narrow-band signal. Decisions ranging from choosing a measurement facility to
Richard A. Rouil, Antonio Izquierdo Manzanares, Camillo A. Gentile, David W. Griffith, Nada T. Golmie
The legislation included in the middle class tax relief and job creation act of 2012 established the First Responder Network Authority (FirstNet) for the purpose of deploying and running a nationwide Long Term Evolution (LTE) network for Public Safety
Michael Cotton, Michael R. Souryal, Mudumbai Ranganathan, Jeff Wepman, Julie Kub, Steve Engelking, Yeh Lo, Heather Ottke, Raian Kaiser, Douglas Anderson
This paper provides an overview of a Spectrum Monitoring Pilot Program within the U.S. Department of Commerce. It provides background, motivation, goals, accomplishments, and plans for future work. We describe the development of a federated Measured
Wen-Bin Yang, Michael R. Souryal, David W. Griffith
Direct device-to-device (D2D) communications between mobile terminals in cellular networks allows operators to offload proximity traffic from the Radio Access Network (RAN) and permits out-of-coverage terminals to maintain peer-to-peer communications. In
Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, David W. Griffith, Nada T. Golmie
There has been growing interest over the past few years in the US and around the world to build reliable, robust, and interoperable public safety broadband networks for emergency and disaster response. In this paper, we propose a low-cost, dynamic
Stephen Quirolgico, Jeffrey M. Voas, Tom T. Karygiannis, Christoph Michael, Karen Scarfone
The purpose of this document is to help organizations (1) understand the process for vetting the security of mobile applications, (2) plan for the implementation of an app vetting process, (3) develop app security requirements, (4) understand the types of
This document captures the input received from the half-day workshop titled "Public Safety Mobile Application Security Requirements" organized by the Association of Public-Safety Communications Officials (APCO) International, in cooperation with FirstNet
Catherine A. Remley, Joop Aan Den Toorn, Christopher L. Holloway, John M. Ladbury, Chih-Ming Wang
We present a test method for quantifying and reducing systematic errors arising from antenna proximity to lossy objects in over-the-air performance testing of lossy large-form-factor wireless devices. The method determines the extent to which antenna
John G. Hagedorn, Kamran Sayrafian, Judith E. Terrill, Kamya Yekeh Yazdandoost
Recent advances in micro-electronics technology to build small radio-enabled implantable and wearable medical sensors have sparked considerable interest in body area networks. Understanding the characteristics of radio frequency propagation inside and
Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
NIST has recently released Special Publication (SP) 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials. Itto provide the technical details for a system by which mobile devices such as smart phones and tables are provisioned
Hildegard Ferraiolo, David A. Cooper, Salvatore Francomacaro, Andrew R. Regenscheid, Jason Mohler, Sarbari Gupta, William E. Burr
This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable, interoperable PKI-based identity credentials that are issued by Federal departments and agencies to individuals who possess and prove control
Francisco E. Becerra Chavez, Jingyun Fan, Alan L. Migdall
Quantum-enhanced measurements can provide information about the properties of a physical system with sensitivities beyond what is fundamentally possible with conventional technologies. However, this advantage can be achieved only if quantum measurement
Sungseob Lee, SuKyoung Lee, Kim KyungSoo, David W. Griffith, Nada T. Golmie
As data traffic demand in cellular networks grows exponentially, operators need to add new cell sites to keep up; unfortunately, it is costly to build and operate macrocells. Moreover, it may not be possible to obtain the needed approvals for additional
Devices in mobile tactical edge networks are often resource constrained due to their lightweight and mobile nature, and often have limited access to bandwidth. In order to maintain situational awareness in the cyber domain, security logs from these devices
It is common for electronic devices to be tested for their susceptibility to radiated signals they may be exposed to during their normal operation. A reverberation chamber is well suited to perform this type of testing because it can expose the device
William F. Young, Catherine A. Remley, Christopher L. Holloway, Galen H. Koepke, Dennis G. Camell, John M. Ladbury, Colton R. Dunlap
We characterize key elements that pose challenges to public-safety radio communications into and out of large buildings, including the strong attenuation of radio signals caused by losses and scattering in the building materials and structure, and the
Vladimir Marbukh, Kamran Sayrafian, Martina Barbi, Mehdi Alasti
A Body Area Network (BAN) is a wireless network of wearable or implantable computing devices. A BAN typically consists of several miniaturized radio-enabled body sensor/actuator that communicate with a single coordinator. Medical applications usually
Opportunistic Spectrum Access (OSA) is one of the models proposed for Dynamic Spectrum Access (DSA). In OSA systems, it is important to restrict the interference of Secondary Users (SUs) to the Primary Users (PUs), so that the performance degradation of PU
Juan C. Collado Gomez, Eduard Rocas, James C. Booth, Jordi Mateu, J. M. O'Callaghan, J. Verdu, A. Hueltes
This paper describes a novel absorptive limiter for frequency selective circuits. The proposed circuit allows the design of absorptive limiters based on a bi-state phase shifter, which is appropriate for integration into channelizing devices, such as