NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Douglas C. Montgomery, Mark E. Carson, Timothy Winters, Michayla Newcombe, Timothy Carlin
This profile establishes a basic taxonomy of IPv6 capabilities, defined in terms of IETF specifications, resulting in specific capability labels for common network functions and usage scenarios. The profile maps each such labeled capability to one or more
The NISTv6 Capabilities Table (NCT) provides a concise tabular summary of the technical requirements of the NISTv6 profile. For ease of reference, the NCT is maintained as supplemental information to this profile and provided in a separate document.
The USGv6 Capabilities Table (UCT) provides a concise tabular summary of the technical requirements of the USGv6 profile. For ease of reference, the UCT is maintained as supplemental information to this profile and provided in a separate document.
Douglas C. Montgomery, Mark E. Carson, Timothy Winters, Michayla Newcombe, Timothy Carlin
This profile establishes a basic taxonomy of IPv6 capabilities, defined in terms of IETF specifications, resulting in specific capability labels for common network functions and usage scenarios. The profile maps each such labeled capability to one or more
Douglas C. Montgomery, Erica Johnson, Michayla Newcombe, Timothy Winters
This document defines the scope of accreditation for the USGv6 Test program, including test method validation procedures, laboratory accreditation process and roles of the accreditor.
Douglas C. Montgomery, Erica Johnson, Michayla Newcombe, Timothy Winters
This document outlines the form and function of the USGv6 Test Program. In particular, it defines the components of the test program, their implementation and use. This guide also defines the management process that will govern the future evolution of the
The USGv6 Profile SDoC captures the results of conformance, interoperability and functional tests conducted and provides traceability back to the accredited laboratory and the methods used to test. The SDoC provides the flexibility necessary to deal with
As we power through to the future, in-vehicle communications' reliance on speed is becoming a challenging predicament. This is mainly due to the ever-increasing number of electronic control units (ECUs), which will continue to drain network capacity, hence
A summary and overview of a public workshop on machine learning for optical Communication systems held on August 2nd 2019, by the Communications Technology Laboratory at the National Institute of Standards and Technology in Boulder, CO.
The Smart Grid represents an unprecedented opportunity to move the electric grid into a new era of reliability, availability, and efficiency. It uses two-way communications, digital technologies, advanced sensing and computing infrastructure, and software
Kamran Sayrafian, Katjana Krhac, Gregory Noetscher, Dina Simunic
Human Body Communication (HBC) is an attractive low complexity technology with promising applications in wearable biomedical sensors. In this paper, a simple parametric model based on the finite-element method (FEM) using a full human body model is
Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Diversity as a security mechanism is receiving renewed interest due to its potential for improving the resilience of software and networks against previously unknown attacks. Recent works show diversity can be modeled and quantified as a security metric at
Under the new service paradigm, artificial intelligence (AI) can play a significant role in the new generation of wireless communications systems. This special issue presents a comprehensive overview of research challenges and opportunities regarding
Hany Assasa, Joerg Widmer, Jian Wang, Tanguy Ropitault, Nada T. Golmie
Wireless communications in the millimeter-wave band bring unprecedented capabilities to achieve wireline performance in wireless networks and alleviate the congestion problem of current wireless technologies. However, efficient wireless networking in this
Hany Assasa, Joerg Widmer, Tanguy Ropitault, Anuraag Bodi, Nada T. Golmie
Supporting high data-rates and a large number of connected devices has always been challenging for wireless technologies operating in the microwave band. Wireless communication in the millimeter band is a promising solution to address this challenge and
Hybrid precoding architectures are widely studied for millimeter wave (mmWave) massive MIMO systems. A major challenge in designing hybrid precoders is the practical constraints on the number of RF chains, which can have a direct impact on the spectral and
The rechargeable battery is the conventional power source for mobile devices. Limited battery capacity and frequent recharging require researches to find new ways to deliver power without the hassle of connecting cables. Novel wireless power supply methods
Yongkang Liu, Mohamed T. Hany, Kang B. Lee, Lotfi Benmohamed, Richard Candell
In this paper we propose a framework that allows a designer to assess various physical and cyber factors involved in determining the performance of a wireless use case as well as evaluate their performance impacts in search for a design that leads to an
Shuvo Bardhan, Douglas C. Montgomery, James J. Filliben, Nathanael A. Heckert
Externally-launched computer worms which maliciously propagate within networks are one of the most serious and dangerous security threats facing the commercial, political, military, and research community today. With an eye to the ultimate goal of
The concept of attack surface has seen many applications in various domains, e.g., software security, cloud security, mobile device security, Moving Target Defense (MTD), etc. However, in contrast to the original attack surface metric, which is formally
In this paper, we propose an analytical framework to derive all positive integer moments of MIMO mutual information in high-SNR regime. The approach is based on efficient use of the underlying matrix integrals of the high-SNR mutual information. As an
DNS-based server redirecting has been realized as the most popular way to deploy CDNs. However, with the increasing use of remote DNS, DNS-based CDNs faces a great challenge in performance degradation. To address this challenging issue, encouraging
This paper describes the structure of the PerfLoc Prize Competition organized by the US National Institute of Standards and Technology (NIST). The Competition consisted of collecting an extensive repository of smartphone data, releasing the data to
This feature topic aims at providing timely and comprehensive overviews of the current state-of-the art in terms of fundamental theoretical innovations and technological advances and towards exploiting smart caching, communications, computing and