NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Energy harvesting (EH) is the process of capturing and storing energy from external sources or the ambient environment. The EH devices have found various emerging applications, particularly, in healthcare sector. Kinetic-based micro energy-harvesting is a
Brian Woo-Shem, Kaleb Pattawi, Hannah Covington, Patrick McCurdy, Chenli Wang, Thomas Roth, Cuong Nguyen, Yuhong Liu, Hohyun Lee
Energy consumption in buildings continues to rise with increased deployment of energy-consuming equipment such as Heating, Ventilation, and Air Conditioning (HVAC) amid a growing world economy. Renewable energy is projected to comprise a majority of the
Rick Candell, Karl Montgomery, Mohamed Hany, Susruth Sudhakaran, Dave Cavalcanti
Time-sensitive networking (TSN) is emerging as a viable means to achieving deterministic quality of service (QoS) communications within mission critical industrial applications such as feedback control systems, robotics, and precision sensing and actuation
Miniaturized wearable or implantable medical sensors (or actuators) are often used in the Internet of Things (IoT) technologies in healthcare applications. However, their limited source of power is becoming a bottleneck for the pervasive use of these
In recent work, we proposed sweeping the antennas of phased arrays and beamforming in postprocessing – what we coined switched beamforming – instead of sweeping beams through analog beamforming – what the arrays are designed for. Not only is it orders of
Edward Griffor, Khalid Halba, ahmed lbath, Anton Dahbura
Internet of Things (IoT) capabilities are features or services produced by IoT devices. IoT capabilities composition brings existing capabilities together to create a novel service with added value. IoT Capabilities decomposition works the other way around
The digital forensics community has generated training and reference data over the course of decades. However, significant challenges persist today in the usage pipeline for that data, from research problem formulation, through discovery of applicable
Hamed Ahmadi, Avishek Nag, Zaheer Khan, Kamran Sayrafian, Susanto Rahadrja
Digital twin (DT) is a promising technology for the new immersive digital life with a variety of applications in areas such as Industry 4.0, aviation, and healthcare. Proliferation of this technology requires higher data rates, reliability, resilience, and
Human blockage at millimeter-wave frequencies is most commonly modeled through Knife-Edge Diffraction (KED) from the edges of a vertical strip. Although extensively validated through controlled laboratory experiments, the method does not scale to realistic
Kamran Sayrafian, Brian D. Cloteaux, Vladimir Marbukh
Current automatic exposure notification apps primarily operate based on hard distance/time threshold guidelines (e.g., 2 m/15 min in the United States) to determine exposures due to close contacts. However, the possibility of virus transmission through
A Coulomb force parametric generator (CFPG) can be used to harvest energy from the natural human body motion. This micro-harvester is the architecture of choice for integration with small wearable (or implantable) sensors. In this paper, an asymmetric
The COrona VIrus Disease – 2019 (COVID-19) pandemic has had a profound effect on the entire world. With the onset of the pandemic in 2020, also started various efforts around the world to automate the contact tracing process to increase its efficacy. Most
Khalid Halba, Asmaa Hailane, ahmed lbath, Edward Griffor, Anton Dahbura
Smart building value-added capabilities are gaining significant attention from various stakeholders, including the general public, researchers, and industry. One such capability is well-being, a composition of multiple atomic capabilities that characterize
Cheng Qian, Wei Yu, Chao Lu, David W. Griffith, Nada T. Golmie
Machine learning, as a viable way of conducting data analytics, has been successfully applied to a number of areas. Nonetheless, the lack of sufficient data is one critical issue for applying machine learning in Industrial Internet of Things (IIoT) systems
Johannes Schulz, William Z. Bernstein, Rafael Radkowski
As industrial internet of things (IoT) concepts and technologies continue to be retro-fitted onto existing manufacturing infrastructure, geospatial considerations, such as asset localization, registration, and tracking, become more critical to ensure
Katerina N. Megas, Michael Fagan, Jeffrey Marron, Paul Watrobski, Barbara Bell Cuthill
This publication documents the consumer profile of NIST's Internet of Things (IoT) core baseline and identifies cybersecurity capabilities commonly needed for the consumer IoT sector (i.e., IoT products for home or personal use). It can also be a starting
Katerina N. Megas, Michael Fagan, Barbara Bell Cuthill, Brad Hoehn, David Lemire, Rebecca Herold
This report summarizes the feedback received on the work of the NIST Cybersecurity for the Internet of Things (IoT) program on IoT product cybersecurity criteria at a virtual workshop in June 2022. The purpose of this workshop was to obtain feedback on
Miniaturized wearable or implantable medical sensors are becoming an important application area for kinetic-based micro energy-harvesters. These harvesters can generate power through the natural human body motion. The architecture based on the Coulomb
Kamran Sayrafian, Brian D. Cloteaux, Vladimir Marbukh
The proximity detection mechanism in current automatic exposure notification systems is typically based on the Bluetooth signal strength from the individual's mobile phone. However, there is an underlying error in this proximity detection methodology that
While the IoT market continues to grow, securing IoT systems remains a challenge as successful cyberattacks keep escalating. Named Data Networking (NDN) offers a number of advantages over traditional IP-based communications and is considered a promising
Xing Liu, Wei Yu, Cheng Qian, David W. Griffith, Nada T. Golmie
The interconnection and digitization of the physical world has increased dramatically with the widespread deployment of network communication and the rapid development of the Internet of Things (IoT). Application scenarios and requirements in IoT are more
Gema Howell, Kevin Gerard Brady, Don Harriss, Scott Ledgerwood
Public safety officials utilizing the forthcoming public safety broadband networks will have access to devices, such as mobile devices, tablets and wearables. These devices offer new ways for first responders to complete their missions but may also
Internet-of-Things (IoT)-based streaming applications are all around us. Currently, we are transitioning from IoT processing being performed on the cloud to the edge. While moving to the edge provides significant networking efficiency benefits, IoT edge
The digital forensics community has generated training and reference data over the course of decades. However, significant challenges persist today in the usage pipeline for that data, from research problem formulation, through discovery of applicable
Thomas Roth, Wenqi Guo, Chenli Wang, Himanshu Neema, Anirban Bhattacharjee
Cyber-Physical Systems (CPS) are complex systems of computational, physical, and human components integrated to achieve some function over one or more networks. The use of distributed simulation, or co-simulation, is one method often used to analyze the