An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Michael Fagan, Katerina Megas, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Rebecca Herold
Las capacidades de apoyo no técnicas son acciones que realiza un fabricante o una organización de terceros en apoyo de la seguridad cibernética de un dispositivo de Internet de las cosas (IoT, por sus siglas en inglés). Esta publicación define una línea
Katerina Megas, Michael Fagan, Jeffrey Marron, Kevin Brady, Barbara Cuthill, Rebbecca Herold
Recursos de suporte não técnicos são ações que um fabricante ou organização terceirizada executa em apoio à segurança cibernética de um dispositivo IoT. Esta publicação define a base principal de recursos de suporte não técnico dos fabricantes de
Michael Fagan, Katerina Megas, Paul Watrobski, Jeffrey Marron, Barbara Bell Cuthill, David Lemire, Brad Hoehn, Christopher Evans
Ensuring the security of routers is crucial for safeguarding not only individuals' data but also the integrity and availability of entire networks. With the increasing prevalence of smart home IoT devices and remote work setups, the significance of
Edward Griffor, Hadhoum Hajjaj, Thoshitha Gamage, Thomas Roth, Wenqi Guo
This technical report presents a structured methodology for describing and assessing auto-mated vehicle (AV) features, with a focus on ensuring consistent and reproducible testing across various scenarios. The document delineates a systematic approach to
Yan Lu, Zhuo Yang, Shengyen Li, Yaoyao Fiona Zhao, Jiarui Xie, Mutahar Safdar, Hyunwoong Ko
The key differentiation of digital twins from existing models-based engineering approaches lies in the continuous synchronization between physical and virtual twins through data exchange. The success of digital twins, whether operated automatically or with
Anuraag Bodi, Raied Caromi, Jian Wang, Jelena Senic, Camillo Gentile, Hang Mi, Bo Ai, Ruisi He
Millimeter-wave (MmWave) channel characteristics are quite different from sub-6 GHz frequency bands. The major differences include higher path loss and sparser multipath components (MPCs), resulting in more significant time-varying characteristics in
Joshua Kast, Paritosh Manurkar, Sudantha Perera, Mohamed Hany, Rob Horansky, Rick Candell, Kate Remley, Matt Simons
Industrial and consumer wireless devices increasingly make use of millimeter-wave (mmWave) frequencies to meet increasing requirements for bandwidth, device density, and latency. The complex propagation environment and design of phased-array antennas pose
Himanshu Neema, Harmon Nine, Thomas Roth, Wenqi Guo
Automated Vehicles (AVs) aim to transfer driving responsibility from humans to the vehicle itself with the objective of enhancing vehicle safety by increasing awareness and reducing response time. At present, automation in vehicles is limited to advanced
Jihoon Bang, Jack Chuang, Jelena Senic, Samuel Berweger, Steve Blandino, Camillo Gentile
Monitoring vital signs such as breathing or heart rates as well as other physical movements in complex environments is the basis for many emerging applications spanning from healthcare to autonomous vehicles. Designing Radar systems capable of remotely
During Fiscal Year 2023 (FY 2023) – from October 1, 2022, through September 30, 2023 –the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy Program successfully responded to numerous challenges and opportunities in security and privacy
Anuraag Bodi, Samuel Berweger, Raied Caromi, Jihoon Bang, Jelena Senic, Camillo Gentile
We describe how the data acquired from the camera and Lidar systems of our context-aware radio-frequency (RF) channel sounder is used to reconstruct a 3D mesh of the surrounding environment, segmented and classified into discrete objects. First, the images
Camillo Gentile, Jelena Senic, Anuraag Bodi, Samuel Berweger, Raied Caromi, Nada Golmie
We describe a context-aware channel sounder that consists of three separate systems: a radio-frequency system to extract multipaths scattered from the surrounding environment in the 3D geometrical domain, a Lidar system to generate a point cloud of the
Chiehping Lai, Jelena Senic, Camillo Gentile, Nada T. Golmie
Accurate channel propagation modeling of foliage is critical to the design and deployment of wireless networks, given its pervasive nature in rural, suburban, and urban environments. Its blockage effects can be particularly devastating at millimeter-wave
Smart home technology may expose adopters to increased risk to network security, information privacy, and physical safety. However, users of this technology may lack understanding of the privacy and security implications, and manufacturers often fail to
Edward Griffor, Matthew Bundas, Chasity Nadeau, Jeannine Shantz, Thanh Nguyen, Marcello Balduccini, Tran Son
Artificial Intelligence (AI) is often critical to the success of modern business processes. Leveraging it, however, is non-trivial. A major hurdle is communication: discussing system requirements among stakeholders with different backgrounds and goals
Eugene Song, Kang B. Lee, Nishi Hiroaki, Yuki Takayama, Janaka Wijekoon
It is vital to establish a suitable thermal environment for crop cultivation and greenhouse to improve production quality. However, in greenhouse environments, uneven temperature, caused by the influence of outside temperature, leads to unevenness in air
Hannah Covington, Brian Woo-Shem, Chenli Wang, Cuong Nguyen, Thomas Roth, Yuhong Liu, Yi Fang, Hohyun Lee
Modern advancements in energy technology, such as smart meters and renewable power generation, have contributed to the increasing penetration of time-variable electricity pricing plans. Under such plans, consumers experience a higher financial burden for
Energy harvesting (EH) is the process of capturing and storing energy from external sources or the ambient environment. The EH devices have found various emerging applications, particularly, in healthcare sector. Kinetic-based micro energy-harvesting is a
Brian D. Cloteaux, Vladimir Marbukh, Kamran Sayrafian
Automatic exposure notification apps operate based on guidelines that specify distance and time thresholds to measure the occurrence of contacts with infected individuals. In the United States 2 m/15 min thresholds are used to determine exposures due to a
Anmol Bhardwaj, Jack Chuang, Camillo Gentile, Chiehping Lai
A wireless channel is wide-sense stationary (WSS) when the mean and autocorrelation of its small-scale fading are displacement invariant. This occurs when the channel is rich in propagation paths – their complex summation averages out any displacement
Katjana Ladic, Kamran Sayrafian, Dina Simunic, Kamya Yazdandoost
Since its invention in the early 1990s the technology behind capsule endoscopy has been making rapid progress. The emergence of high-resolution miniature video cameras along with other microsensor technology have increased the data rate and power
Unsupported smart home devices can pose serious safety and security issues for consumers. However, unpatched and vulnerable devices may remain connected because consumers may not be alerted that their devices are no longer supported or do not understand
Mariella Sarestoniemi, Kamran Sayrafian, Marko Sonkki, Jari Iinatti
Flexible electronics are envisioned to play a major role in future wearable medical devices. An important component of this technology is flexible antennas. This paper presents a preliminary study of on-body and off-body propagation channels in Body Area
In this paper, we present a ray tracing (RT) assisted multipath cluster association method. This work is based on an indoor channel measurement at 60 GHz, where a light detection and ranging (LiDAR) sensor was co-located with channel sounder and time
Patrick D. O'Reilly, Kristina Rigopoulos, Larry Feldman, Greg Witte
During Fiscal Year 2022 (FY 2022) – from October 1, 2021, through September 30, 2022 –the NIST Information Technology Laboratory (ITL) Cybersecurity and Privacy Program successfully responded to numerous challenges and opportunities in security and privacy