NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This report provides general recommendations for collecting, curating, and re-using manufacturing data from both additive and subtractive processes. The intended audience includes researchers, technical-assessment personnel, and end-users who would like to
Continued advancement of sensors has led to an ever-increasing amount of data of various physical nature to be acquired from production lines. As rich information relevant to the machines and processes are embedded within these "big data," how to
Sokwoo Rhee, Dennis Buckmaster, Jean Rice, Josh Seidemann, Mo Shakouri, Robert Tse, Hongwei Zhang
The National Institute of Standards and Technology (NIST) established the Global City Teams Challenge (GCTC) for communities across the world to use as collaboration platform in their pursuit of deploying Internet of Things (IoT) and Cyber-Physical Systems
Michael J. Fagan, Katerina N. Megas, Karen Scarfone, Matthew Smith
Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers-- organizations and individuals--can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving how securable the IoT
Michael J. Fagan, Katerina N. Megas, Karen Scarfone, Matthew Smith
Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device hardware and software). This publication defines an Internet of Things (IoT) device cybersecurity
Vladimir Marbukh, Kamran Sayrafian, Behnam Rouzbehani
A virtualization platform is responsible for allocation and aggregation of radio resources from different access technologies as well as the distribution of the total capacity among Virtual Network Operators (VNOs). The Radio Resource Management (RRM)
Moneer M. Helu, Timothy A. Sprock, Daniel Hartenstine, Rishabh Venketesh, William Sobel
Managing manufacturing data remains challenging despite the growth of the Industrial Internet of Things (IIoT). While various standards and technologies enable greater access to data, scaling data processing and distribution can be difficult given the
Hansong Xu, Xing Liu, Wei Yu, David W. Griffith, Nada T. Golmie
Industrial Internet-of-Things (I-IoT), also known as Industry 4.0, is the integration of Internet of Things (IoT) technology into the industrial manufacturing system so that the connectivity, efficiency, and intelligence of factories and plants can be
Sokwoo Rhee, Brenda Bannan, Samantha Dubrow, Michael Dunaway, Dean Skidmore, Elisa Torres
NIST co-hosted the 2018-2019 GCTC Smart and Secure Cities and Communities Challenge (SC3) program with DHS S&T and NTIA. The objective was to encourage participating teams to include cybersecurity and privacy as integral project elements alongside goals
In the IoT era, botnet threats are rising, which has prompted many studies on botnet detection. This study aims to detect the early signs of botnet attacks such as massive spam emails and Distributed Denial-of-Service attacks. To that end, this study
Cuong Nguyen, Chelo Picardal, Andrew Lee, Brian Pugliese, Raja Kadiyala, Ken Thompson, Sokwoo Rhee
This paper describes efforts by the City of Bellevue, National Institute of Standards and Technology (NIST), CH2M, and Quantela, Inc.—the Bellevue Smart Team (Team)—to develop and pilot test technologies to leverage real-time data to enhance citizen
This report highlights the GCTC/SC3 Expo event held on July 11-12, 2019 to foster discussion of and collaboration to address the cybersecurity and privacy challenges faced by cities as they implement smart technologies. Over 1000 representatives from
Fan Liang, Wei Yu, Xing Lu, David W. Griffith, Nada T. Golmie
As a typical application of the Internet of Things (IoT), the Industrial Internet of Things (I- IoT) connects all the related IoT sensing and actuating devices ubiquitously so that the monitoring and control of numerous industrial systems can be realized
Kamran Sayrafian, Masoud Roudneshin, Amir G. Aghdam
Wearable medical sensors are one of the key components of remote health monitoring systems which allow patients to stay under continuous medical supervision away from the hospital environment. These sensors are typically powered by small batteries which
On September 24, 2019, the National Institute of Standards and Technology (NIST) hosted a one- day workshop entitled "Human Factors in Smart Home Technologies." The workshop addressed human considerations for smart home devices, including usability, user
Robert B. Bohn, Mheni Merzouki, Charif Mahmoudi, Cihan Tunc
Internet of Things (IoT) is reshaping the way Cloud Service Providers (CSP) collect data from sensors. With billions of devices deployed around the world, CSP are providing platforms dedicated to IoT that provides advanced features for those devices. This
Kamran Sayrafian, Katjana Krhac, Gregory Noetscher, Dina Simunic
Human Body Communication (HBC) is an attractive low complexity technology with promising applications in wearable biomedical sensors. In this paper, a simple parametric model based on the finite-element method (FEM) using a full human body model is
Meltem Sonmez Turan, Kerry A. McKay, Cagdas Calik, Dong Hoon Chang, Lawrence E. Bassham
The National Institute of Standards and Technology (NIST) is in the process of selecting one or more authenticated encryption and hashing schemes suitable for constrained environments through a public, competition-like process. In February 2019, 57
Sebastian Barillaro, Dhananjay Anand, Avi Gopstein, Julian Barillaro
Networks of sensors are key components of an Internet of Things. This paper outlines a demonstration of a wireless technology called LoRa/LoRaWAN that may be used to network sensors over a range of several kilometers. LoRa is an example of a Low Power Wide
A workshop on Consensus Safety Measurement Methodologies for Automated Driving System (ADS) - Equipped Vehicles was held at NIST 25-26 June 2019 on the NIST Gaithersburg, Maryland campus, sponsored by NIST and the U.S. Department of Transportation and
Sebastian Barillaro, Sokwoo Rhee, Raghu N. Kacker, Mark L. Badger, David R. Kuhn, Gustavo Escudero
There are multiple options for communication of data to and from mobile sensors. For tracking systems, Global Navigation Satellite System (GNSS) is often used for localization and mobile- phone technologies are used for transmission of data. Low-power wide
Vladimir Marbukh, Kamran Sayrafian, Behnam Rouzbehani, Luis Correia
This paper proposes an approach to cross-layer optimization of virtualized Radio Access Network resources in future mobile communications. Assuming that the Virtual Network Operators (VNOs) guarantee contracted Service Level Agreements (SLAs) with the
Julie Haney, Susanne M. Furman, Mary Theofanos, Yasemin Acar Fahl
Smart home devices are increasingly being used by nontechnical users who have little understanding of the technology, including privacy and security implications. To better understand perceptions of smart home privacy and security, we are conducting an
Under the new service paradigm, artificial intelligence (AI) can play a significant role in the new generation of wireless communications systems. This special issue presents a comprehensive overview of research challenges and opportunities regarding