NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Keith A. Stouffer, Timothy A. Zimmerman, CheeYee Tang, Joshua Lubell, Jeffrey A. Cichonski, John McCarthy
This document provides the Cybersecurity Framework (CSF) implementation details developed for the manufacturing environment. The "Manufacturing Profile" of the Cybersecurity Framework can be used as a roadmap for reducing cybersecurity risk for
Sokwoo Rhee, Cuong T. Nguyen, Alexander Nelson, Greg Toth, Dennis Linders
Recent efforts to integrate Internet of Things into Smart City constructs have proven successful through proof of concept deployments in multiple cities. To facilitate additional deployments, standardization and dissemination of best practices for these
This paper presents the design and implementation of a process for an exploratory study that identifies a set of principles for designed-in security and privacy for smart city projects from among Global City Teams Challenge (GCTC) - Smart and Secure Cities
Mudumbai Ranganathan, Douglas Montgomery, Omar Ilias El Mimouni
Manufacturer Usage Descriptions are generalized network Access Control Lists (ACL) that allow manufacturers to declare intended communication patterns for devices (Things). MUD-enabled Things are restricted to only communicate in the manner intended by the
Christopher Greer, Martin J. Burns, David Wollman, Edward Griffor
This NIST Special Publication describes the relationship between the phrases "cyber-physical systems" and "Internet of Things." CPS and IoT both refer to trends in integrating digital capabilities, including network connectivity, with physical devices and
Kamran Sayrafian, Katjana Krhac, Mehdi Alasti, Kamya Yazdandoost, Dina Simunic
Comprehensive study of wireless communication for ingestible electronics is a very challenging task. To initiate the study on wireless capsule endoscopy, an innovative immersive platform containing an enhanced 3D human body model has been developed. This
Kamran Sayrafian, Sofia Perez-Simbor, Katjana Krhac, Concepcion GarciaPardo, Dina Simunic, Narcis Cardona
Sophisticated medical implants that allow vital information delivery to/from the human body are opening the door to novel approaches in diagnosis and/or therapy of various health related issues. Ultra-Wide Band (UWB) technology is gaining the attention of
Hansong Xu, Wei Yu, David W. Griffith, Nada T. Golmie
The vision of Industry 4.0, otherwise known as the fourth industrial revolution, is the integration of massively deployed smart computing and network technologies in industrial production and manufacturing settings for the express purposes of automation
Cities and communities around the world are increasingly deploying advanced technologies such as Internet of Things and Cyber-Physical Systems for improved efficiency, convenience, safety, and better quality of life. The Global City Teams Challenge (GCTC)
Increased availability of low-cost water level sensors communicating through the Internet of Things (IoT) has expanded the horizons of publicly-ingestible data streams available to modern smart cities. StormSense is an IoT-enabled inundation forecasting
NIST and DHS S&T co-host the GCTC Smart and Secure Cities and Communities Challenge (SC3) program. The objective is to encourage participating teams to include cybersecurity and privacy as integral project elements in addition to existing GCTC goals such
Marc A. Weiss, Ya-Shian Li-Baboud, Dhananjay Anand, Paul A. Boynton, Kevin Gerard Brady, Martin Burns
We report results from a project to calibrate timing in the NIST CPS and Smart Grid Testbeds. We measured clock synchronization accuracy and stability as well as latencies for potential experiments in the testbeds. We determined calibrations of GPS
This feature topic aims at providing timely and comprehensive overviews of the current state-of-the art in terms of fundamental theoretical innovations and technological advances and towards exploiting smart caching, communications, computing and
Gavin W. O'Brien, Nate V. Lesser, Brett Pleasant, Sue Wang, Kangmin Zheng, Colin Bowers, Kyle Kamke
Health care providers increasingly use mobile devices to receive, store, process, and transmit patient clinical information. According to our own risk analysis, discussed here, and in the experience of many health care providers, mobile devices can present
Yalong Wu, Wei Yu, Jin Zhang, David W. Griffith, Nada T. Golmie
Without efficient topology management, M2M communications will likely asymmetrically congest gateways and eNodeBs in 3rd Generation Partnership Project (3GPP) Long-Term Evolution (LTE) and Long-Term Evolution Advanced (LTE-A) networks, especially when M2M
Yalong Wu, Wei Yu, David W. Griffith, Nada T. Golmie
The number of Machine-to-Machine (M2M) devices has continued to grow at an accelerated rate. Without thoughtful and efficient resource management, M2M communications will be asymmetrically handicapped by service rate scarcity as more devices are
Propagation of cost-effective water level sensors powered through the Internet of Things (IoT) has expanded the available offerings of ingestible data streams at the disposal of modern smart cities. StormSense is an IoT-enabled inundation forecasting
With the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local governments, the military, businesses, and the critical infrastructure, the need for trustworthy
Michaela Iorga, Larry Feldman, Robert Barton, Michael J. Martin, Nedim S. Goren, Charif Mahmoudi
Managing the data generated by Internet of Things (IoT) sensors and actuators is one of the biggest challenges faced when deploying an IoT system. Traditional cloud-based IoT systems are challenged by the large scale, heterogeneity, and high latency
A Body Area Network (BAN) is a wireless protocol for connectivity of wearable and implantable sensors located inside, on the surface or near the human body. Medical applications requirements impose stringent constraints on the reliability, and quality of
In this paper, we present an analytical approach to evaluate the performance of dual-hop, two-way, and asymmetric D2D communications with and without network coding. In our approach, we first establish a relationship between link outage probability (LOP)
With the continuing frequency, intensity, and adverse consequences of cyber-attacks, disruptions, hazards, and other threats to federal, state, and local governments, the military, businesses, and the critical infrastructure, the need for trustworthy
Benjamin M. Piccarreta, Katerina N. Megas, Danna G. O'Rourke
This report provides an overview of the topics discussed at the Internet of Things (IoT) Cybersecurity Colloquium hosted on NISTs campus in Gaithersburg, Maryland on October 19, 2017. It summarizes key takeaways from the presentations and discussions
Paul A. Grassi, James L. Fenton, Michael E. Garcia
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and