Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Projects/Programs

Displaying 1 - 11 of 11

Advanced DDoS Mitigation Techniques

Ongoing
Background In recent years the threat of DDoS) attacks on the Internet seems to be significantly increasing. The rapidly growing threat can be characterized by the orders of magnitude increases in the bandwidth of such attacks (from 100s of millions bits per second, to 100s of billions bits per

5G/6G Core Networks and Services

Ongoing
The main tasks of this program are: Task 1: 6G Core Network Architecture: I nvestigating AI-native architectures that not just execute AI/ML-based network functions but also support the creation, management, cooperation, measurement, and evolution of these functions. Task 2: Key Technologies Task 2

Cyber Physical Systems and Internet of Things Program

Ongoing
Objective - Enable scalable, dependable design methods and reproducible performance measurement for effective and trustworthy (reliable, safe, secure, resilient and privacy-enhancing) cyber-physical systems and IoT, by means of new measurement science, advanced testing and assurance capabilities and

Cyber-Physical Systems/Internet of Things Testbed

Ongoing
Objective - To develop general design principles useful to all cyber-physical systems testbed developers and the co-simulation community; to develop specific design concepts to guide the development, operation, and evolution of NIST’s IoT/CPS testbed; and to establish a cross-sector IoT/CPS testbed

Future Wireless Communications Systems and Protocols

Ongoing
​ Millimeter wave Communication Systems and Protocols 5G and beyond wireless communication systems make use of the Millimeter-Wave (mmWave) band. While this band offers unprecedented throughput thanks to the large bandwidth available, it also suffers from larger propagation loss compared to the sub

High Assurance Domains

Ongoing
The objectives of NIST’s High Assurance Domains (HAD) project are to design, standardize and foster wide scale adoption of technologies to improve the security, robustness and privacy of the Internet’s Domain Name System. A second dimension of the NIST’s effort is to explore ways to leverage a

Internet Infrastructure Protection

Ongoing
In the FY 2016 ITL staff made significant contributions in the design, standardization, test and measurement of technologies to improve the security and robustness of the Internet’s global routing protocol BGP. NIST staff are key contributors to Internet Engineering Task Force (IETF) standards to

Measurement Science for Complex Information Systems

Ongoing
What are complex systems? Large collections of interconnected components whose interactions lead to macroscopic behaviors in: Biological systems (e.g., slime molds, ant colonies, embryos) Physical systems (e.g., earthquakes, avalanches, forest fires) Social systems (e.g., transportation networks

Network Modeling for Public Safety Communications

Ongoing
Advances in broadband wireless technologies developed by standard developing organizations (SDOs) such as 3GPP and IEEE 802 offer unprecedented capabilities that have the potential to improve the effectiveness of first responders. Our efforts are aimed at evaluating how well emerging solutions meet

Robust Inter-Domain Routing

Ongoing
Today’s global Internet is comprised of roughly 800,000 distinct destinations interconnected by 60,000 enterprise and Internet Service Provider (ISP) networks. The Border Gateway Protocol (BGP) is the “glue” that enables the modern Internet, by exchanging reachability information about each

Trustworthy Networks Program

Ongoing
The need for Trustworthy Networking Internet Society Report on the Future of the Internet “Perhaps the most pressing danger to the future of the Internet is the rising scope and breadth of Cyber Threats.” “Addressing cyber threats should be the priority” “The scale of cyberattacks is steadily