Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 151 - 175 of 833

Energy Harvesting from the Human Leg Motion

July 23, 2014
Author(s)
Kamran Sayrafian, Antonio M. Possolo, Nathalie Yarkony
Kinetic energy harvested from the human body motion seems to be one of the most attractive and convenient solution for wearable wireless sensors in healthcare applications. Due to their small size, such sensors typically have a very limited battery-powered

1588 Power Profile Test Plan

July 7, 2014
Author(s)
Carol Perkins, Jeff Laird, Ryan McEachern, Bob Noseworthy, Julien M. Amelot, Ya-Shian Li-Baboud, Kevin G. Brady
The National Institute of Standards and Technology (NIST) is an agency of the U.S. Department of Commerce, facilitating the industry adoption of IEEE Standard C37.238 for the use of IEEE 1588 in Power Systems Applications in support of the Smart Grid. The

Polar codes in a QKD Environment

May 22, 2014
Author(s)
Anastase Nakassis, Alan Mink
Polar coding is the most recent encoding scheme in the quest for error correction codes that approaches the Shannon limit, has a simple structure, and admits fast decoders. As such, it is an interesting candidate for the quantum key distribution (QKD)

LTE Physical Layer Performance Analysis

May 15, 2014
Author(s)
Wen-Bin Yang, Michael R. Souryal
In this report, we present results of a physical layer performance study for all MCSs (from MCS0 to MCS28) in terms of block error rate (BLER) and spectral efficiency. The results are obtained by using the Steepest Ascent LTE toolbox for MATLAB which

An Integrated Detection System Against False Data Injection Attacks in the Smart Grid

March 4, 2014
Author(s)
Wei Yu, David W. Griffith, Linqiang Ge, Sulabh Bhattarai, Nada T. Golmie
The smart grid is a new type of power grid that will use the advanced communication network technologies to support more efficient energy transmission and distribution. The grid infrastructure was designed for reliability; but security, especially against

Trust Issues with Opportunistic Encryption

February 28, 2014
Author(s)
Scott W. Rose
Recent revelations have shed light on the scale of eavesdropping on Internet traffic; violating the privacy of almost every Internet user. In response, protocol designers, engineers and service operators have begun deploying encryption (often opportunistic

Dynamic Spectrum Access: Current State of the Art and Future Challenges

February 2, 2014
Author(s)
Anirudha Sahoo, Michael R. Souryal
Dynamic Spectrum Access (DSA) is emerging as a promising technology to mitigate the spectrum scarcity caused by static frequency allocations. Despite the clear need for more efficient allocation, however, DSA faces a number of challenges, chief among them

Greedy Backpressure Routing for Smart Grid Sensor Networks

January 13, 2014
Author(s)
Hamid Gharavi
In this paper, a greedy backpressure routing protocol is proposed for multigate mesh networks. This protocol evaluates the greedy backpressure metric (GBM) value of mesh points and routes packets in the direction of the steepest gradient. The GBM value is

A New Standard for Securing Media-Independent Handover: IEEE 802.21a

December 31, 2013
Author(s)
Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE 802

A Simulation Platform to Study Inter-BAN Interference

December 2, 2013
Author(s)
Kamran Sayrafian, John G. Hagedorn, Martina Barbi, Judith E. Terrill, Mehdi Alasti
A Body Area Network (BAN) is a radio standard for wireless connectivity of wearable and implantable sensor nodes that are located inside or in proximity to the human body. Many applications of BANs (e.g. physiological monitoring) require reliable

Combining Genetic Algorithms & Simulation to Search for Failure Scenarios in System Models

October 28, 2013
Author(s)
Kevin L. Mills, Christopher E. Dabrowski, James J. Filliben, Sanford P. Ressler
Large infrastructures, such as clouds, can exhibit substantial outages, sometimes due to failure scenarios that were not considered during system design. We define a method that uses a genetic algorithm (GA) to search system simulations for parameter

Investigating the Application of Moving Target Defenses to Network Security

August 15, 2013
Author(s)
Rui Zhuang, Su Zhang, Alex Bardas, Scott DeLoach, Xinming Ou, Anoop Singhal
This paper presents a preliminary design for a moving-target defense (MTD) for computer networks to combat an attacker's asymmetric advantage. The MTD system reasons over a set of abstract models that capture the network's configuration and its operational

Where in the Internet is Congestion?

July 26, 2013
Author(s)
Daniel I. Genin
Understanding distribution of congestion in the Internet is a long-standing problem. Using data from the SamKnows US broadband access network measurement study, commissioned by the FCC, we explore patterns of congestion distribution in DSL and cable

Quantifying Network Topology Robustness Under Budget Constraints

June 24, 2013
Author(s)
Assane Gueye, Aron Lazska
To design robust network topologies that resist strategic attacks, one must first be able to quantify robustness. In a recent line of research, the theory of network blocking games has been used to derive robustness metrics for topologies. A network

Modeling a Nationwide Public Safety Broadband Network

June 1, 2013
Author(s)
Richard A. Rouil, Antonio Izquierdo Manzanares, Michael R. Souryal, Camillo Gentile, David W. Griffith, Nada T. Golmie
As governments plan nationwide, interoperable broadband networks for their public safety services, the challenge arises of determining how and where to invest limited resources to meet demanding requirements. The United States is at the early stages of
Was this page helpful?