Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 126 - 150 of 195

A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective

December 4, 2018
Author(s)
Hansong Xu, Wei Yu, David W. Griffith, Nada T. Golmie
The vision of Industry 4.0, otherwise known as the fourth industrial revolution, is the integration of massively deployed smart computing and network technologies in industrial production and manufacturing settings for the express purposes of automation

Smart and Secure Cities and Communities

October 15, 2018
Author(s)
Sokwoo Rhee, Scott Tousley
Cities and communities around the world are increasingly deploying advanced technologies such as Internet of Things and Cyber-Physical Systems for improved efficiency, convenience, safety, and better quality of life. The Global City Teams Challenge (GCTC)

A Calibration of Timing Accuracy in NIST Cyber-Physical Systems Testbed

October 3, 2018
Author(s)
Marc A. Weiss, Ya-Shian Li-Baboud, Dhananjay Anand, Paul A. Boynton, Kevin Gerard Brady, Martin Burns
We report results from a project to calibrate timing in the NIST CPS and Smart Grid Testbeds. We measured clock synchronization accuracy and stability as well as latencies for potential experiments in the testbeds. We determined calibrations of GPS

Feature Topic: Enabling Technologies for Smart Internet of Things

September 18, 2018
Author(s)
Hamid Gharavi
This feature topic aims at providing timely and comprehensive overviews of the current state-of-the art in terms of fundamental theoretical innovations and technological advances and towards exploiting smart caching, communications, computing and

Securing Electronic Health Records on Mobile Devices

July 27, 2018
Author(s)
Gavin W. O'Brien, Nate V. Lesser, Brett Pleasant, Sue Wang, Kangmin Zheng, Colin Bowers, Kyle Kamke
Health care providers increasingly use mobile devices to receive, store, process, and transmit patient clinical information. According to our own risk analysis, discussed here, and in the experience of many health care providers, mobile devices can present

A 3D Topology Optimization Scheme for M2M Communications

June 29, 2018
Author(s)
Yalong Wu, Wei Yu, Jin Zhang, David W. Griffith, Nada T. Golmie
Without efficient topology management, M2M communications will likely asymmetrically congest gateways and eNodeBs in 3rd Generation Partnership Project (3GPP) Long-Term Evolution (LTE) and Long-Term Evolution Advanced (LTE-A) networks, especially when M2M

A Dynamic Rate Adaptation Scheme for M2M Communications

May 24, 2018
Author(s)
Yalong Wu, Wei Yu, David W. Griffith, Nada T. Golmie
The number of Machine-to-Machine (M2M) devices has continued to grow at an accelerated rate. Without thoughtful and efficient resource management, M2M communications will be asymmetrically handicapped by service rate scarcity as more devices are

Fog Computing Conceptual Model

March 14, 2018
Author(s)
Michaela Iorga, Larry Feldman, Robert Barton, Michael J. Martin, Nedim S. Goren, Charif Mahmoudi
Managing the data generated by Internet of Things (IoT) sensors and actuators is one of the biggest challenges faced when deploying an IoT system. Traditional cloud-based IoT systems are challenged by the large scale, heterogeneity, and high latency

Application of Link Adaptation in Body Area Networks

February 15, 2018
Author(s)
Kamran Sayrafian, Martina Barbi, Mehdi Alasti
A Body Area Network (BAN) is a wireless protocol for connectivity of wearable and implantable sensors located inside, on the surface or near the human body. Medical applications requirements impose stringent constraints on the reliability, and quality of

Internet of Things (IoT) Cybersecurity Colloquium

December 22, 2017
Author(s)
Benjamin M. Piccarreta, Katerina N. Megas, Danna G. O'Rourke
This report provides an overview of the topics discussed at the “Internet of Things (IoT) Cybersecurity Colloquium” hosted on NIST’s campus in Gaithersburg, Maryland on October 19, 2017. It summarizes key takeaways from the presentations and discussions

Digital Identity Guidelines [including updates as of 12-01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, James L. Fenton, Michael E. Garcia
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. The guidelines cover identity proofing and

Digital Identity Guidelines: Authentication and Lifecycle Management [including updates as of 12- 01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Ray A. Perlner, Elaine M. Newton, Andrew R. Regenscheid, William E. Burr, Justin P. Richer, Naomi B. Lefkovitz, Jamie M. Danker, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. These guidelines focus on the authentication of

Digital Identity Guidelines: Enrollment and Identity Proofing Requirements [including updates as of 12-01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Naomi B. Lefkovitz, James L. Fenton, Jamie M. Danker, Yee-Yin Choong, Kristen Greene, Mary F. Theofanos
These guidelines provide technical requirements for federal agencies implementing digital identity services and are not intended to constrain the development or use of standards outside of this purpose. This guideline focuses on the enrollment and

Digital Identity Guidelines: Federation and Assertions [including updates as of 12-01-2017]

December 1, 2017
Author(s)
Paul A. Grassi, Ellen M. Nadeau, Justin P. Richer, Sarah K. Squire, James L. Fenton, Naomi B. Lefkovitz, Jamie M. Danker
This document and its companion documents, SP 800-63, SP 800-63A, and SP 800-63B, provide technical and procedural guidelines to agencies for the implementation of federated identity systems and for assertions used by federations. This publication

Alexa, Can I Trust You?

September 29, 2017
Author(s)
Judy Chung, Michaela Iorga, Jeff Voas, Sangjin Lee
Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA)-- diagnostics offer the possibility of securer IVA ecosystems. This paper explores security and privacy concerns with these

Autonomous Relocation of Mobile Base Stations in Emergency Scenarios

September 12, 2017
Author(s)
Kamran Sayrafian, Ladan Rabieekenari, John Baras
Limited access to communication services is one of the challenges that emergency personnel and first responders could face during environmental disasters or other emergencies. Networking infrastructure can breakdown during a catastrophe. At the same time
Displaying 126 - 150 of 195