An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Radio frequency identification (RFID) is a form of automatic identification and data capture technology that uses electric or magnetic fields at radio frequencies to transmit information. An RFID system can be used to identify many types of objects, such
Richard Ayers, Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistant (PDA) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Message
Sheila E. Frankel, Bernard Eydt, L Owens, Karen Kent Scarfone
This report provides readers with a detailed explanation of next generation 802.11 wireless security. It describes the inherently flawed Wired Equivalent Privacy (WEP) and explains 802.11i's two-step approach (interim and long-term)to providing effective
A measurement method and associated uncertainty analysis have been developed for the measurement of propagation or group delay in electrical transmission lines and optical fibers. The measurement method and uncertainty analysis were applied to measurements
Michael McKinley, Kate Remley, M. Myslinski, J. S. Kenney
We present a method to minimize spectral leakage in measurements of periodic signals made with the vector signal analyzer (VSA) by taking into account the periodic nature of the Fast Fourier Transform (FFT). This method negates the need for filtering the
Cooperative transmission, in which a source and relay cooperate to send a message to a destination, can provide spatial diversity against fading in wireless networks. We derive analytical expressions for the error probability of amplify-and-forward (AF)
Michael R. Souryal, Luke Klein-Berndt, Leonard E. Miller, Nader Moayeri
This paper presents the empirical results and analysis of a link variability study for an indoor, stationary 802.11 network subject to external interference. The objective is to characterize the relationships between the packet loss rate on a link and the
M. Myslinski, Kate Remley, Michael McKinley, Dominique Schreurs, Bart Nauwelaers
This work presents a procedure to design a multisine with probability density function (PDF) similar to that of a measured realistic digitally modulated signal. We discuss important practical issues crucial to the successful multisine construction and
Channel-adaptive relaying has recently been proposed as a means to exploit spatial and temporal diversity in multihop ad hoc networks with fading. In conjunction with appropriate routing protocols, adaptive relaying enables each forwarding node in a
This paper describes an approach for relaying in multihop networks that adapts to the time-varying channel and exploits spatial diversity to mitigate multipath fading. Ignored in some simulation-based performance analyses, fading arises from multipath
B M. Peric, Michael R. Souryal, E G. Larsson, B R. Vojcic
This paper addresses turbo-coded non-coherent FH M-FSK ad hoc networks with a Poisson distribution of interferers where multiple access interference can be modeled as symmetric a-stable (SaS) noise and a is inversely proportional to the path loss exponent
Michael R. Souryal, E G. Larsson, B M. Peric, B R. Vojcic
This paper derives new soft decision metrics for coded orthogonal signaling in symmetric a-stable noise, which has been used to model impulsive noise. In addition to the optimum metrics for Gaussian (a = 2) noise and Cauchy (a = 1) noise, a class of
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Voice over Internet Protocol (VOIP) refers to the transmission of speech across data-style networks. This form of transmission is conceptually superior to conventional circuit switched communication in many ways. However, a plethora of security issues are
Forensic specialists periodically encounter unusual devices and new technologies normally not envisaged as having immediate relevance from a digital forensics perspective. The objective of the guide is twofold: to help organizations evolve appropriate
Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibility are
Donald R. Larson, Nicholas Paulter, David I. Bergman
The pulse parameters of amplitudes and transition duration (10% to 90%) are examined as a function of the epoch and position of the transition edge in the epoch. The primary explanations for the observed variations are the pulse aberrations and the finite
The IEEE 1451 family of standards makes it easy to create solutions using existing networking technologies, standardized connections to smart devices, and a common software architecture. The standards allow the choice of application software, field network
This ITL Bulletin summarizes NIST Special Publication (SP) 800-48, Wireless Network Security, 802.11, Bluetooth, and Handheld Devices. Written by Tom Karygiannis and Les Owens. NIST SP 800-48 provides recommendations to improve the security of wireless
This paper describes air interface standards for wireless local area network (LAN), wireless metropolitan area network (MAN), and wireless personal area network (PAN) technology being developed within the IEEE 802 LAN MAN Standards Committee of the
This bulletin summarizes NIST SP 800-46, Security for Telecommuting and Broadband Communications, published September 2002. The report discusses both technical and policy issues, and provides guidance on using personal firewalls, strengthening the security