Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 551 - 575 of 611

Performance Evaluation of a Secure Mac Protocol for Vehicular Networks

November 17, 2008
Author(s)
Yi Qian, Kejie Lu, Nader Moayeri
The main benefit of vehicular communication is seen in active safety systems that increase passenger safety by exchanging warning messages between vehicles. Other applications and private services are also permitted in order to lower the cost and to

Using the EAP Framework for Fast Media Independent Handover Authentication

November 17, 2008
Author(s)
Antonio Izquierdo Manzanares, Nada T. Golmie, Katrin Hoeper, Lidong Chen
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication. We provide a detailed analysis of each mechanism, and

Forensic Filtering of Cell Phone Protocols

August 27, 2008
Author(s)
Aurelien M. Delaitre, Wayne Jansen
Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a phone, using one or more of the communications protocols supported by the phone. Phone managers are sometimes

Wireless Communications in Tunnels for Urban Search and Rescue Robots

August 18, 2008
Author(s)
Catherine A. Remley, George Hough, Galen H. Koepke, Dennis G. Camell, Robert Johnk, Chriss A. Grosvenor
We report on propagation tests carried out in a subterranean tunnel to support improved wireless communications for urban search and rescue robots. We describe single-frequency and ultrawideband channel-characterization tests that we conducted, as well as

Attenuation of Radio Wave Signals Coupled Into Twelve Large Building Structures

August 1, 2008
Author(s)
Christopher L. Holloway, William F. Young, Galen H. Koepke, Catherine A. Remley, Dennis G. Camell, Yann Becquet
In this report, we investigate radio communication problems faced by emergency responders (firefighters, police and emergency medical personnel) in disaster situations. A fundamental challenge to communications into and out of large buildings is the strong

Guide to Securing Legacy IEEE 802.11 Wireless Networks

July 25, 2008
Author(s)
Karen A. Scarfone, Derrick Dicoi, Matt Sexton, Cyrus Tibbs
The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. The document provides an

Electromagnetic Airframe Penetration Measurements of the FAA's 737-200

May 2, 2008
Author(s)
Chriss A. Grosvenor, David R. Novotny, Dennis G. Camell, Galen H. Koepke, Robert Johnk, Seturnino Canales
The National Institute of Standards and Technology has completed shielding effectiveness/penetration studies on three different aircraft types for the Federal Aviation Administration. The studies are used to understand the cavity coupling characteristics

Interference Avoidance in Rapidly Deployed Wireless Ad hoc Incident Area Networks

April 18, 2008
Author(s)
Mohamed T. Refaei, Nader Moayeri, Michael R. Souryal
A common strategy for responding to indoor emergency scenarios is to rapidly deploy a group of first responders inside the incident area and an incident command center outside of the incident area. First responders are equipped with radios that allow them

Quantize-and-Forward Relaying with M-ary Phase Shift Keying

March 31, 2008
Author(s)
Michael R. Souryal, Huiqing You
Using cooperative transmission, two or more single-antenna users can share their antennas to achieve spatial diversity in a slow fading channel. One relaying protocol that achieves diversity, amplify-and-forward (AF), is striking in its simplicity, but

Comb-Generator Characterization

February 1, 2008
Author(s)
Howard C. Reader, Dylan Williams, Paul D. Hale, Tracy S. Clement
We characterize a 50 GHz comb generator measured on a sampling oscilloscope. With careful control of the input power, input harmonics and comb generator temperature, we find the output spectrum to be stable to 0.1 dB and 0.5 degrees. We correct results for

Soft-Decision Metrics for Coded Orthogonal Signaling in Symmetric Alpha-Stable Noise

January 1, 2008
Author(s)
Michael R. Souryal, E G. Larsson, B M. Peric, B R. Vojcic
This paper derives new soft decision metrics for coded orthogonal signaling in impulsive noise, more specifically symmetric alpha-stable noise. For the case of a known channel amplitude and known noise dispersion, exact metrics are derived both for Cauchy

Guide to Storage Encryption Technologies for End User Devices

November 15, 2007
Author(s)
Karen A. Scarfone, Murugiah P. Souppaya, Matt Sexton
Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause information stored on the devices to be accessed by unauthorized parties. To prevent such disclosures

Nanosecond Delay With Subpicosecond Uncertainty

September 1, 2007
Author(s)
Donald R. Larson, Nicholas Paulter
We have combined a commercially available, variable length coaxial delay line (trombone line) with a high resolution linear translation system. The result is better resolution and lower uncertainty in the achievable delays than previously available. The

Real-Time Deployment of Multihop Relays for Range Extension

June 11, 2007
Author(s)
Michael R. Souryal, Johannes Geissbuehler, Leonard E. Miller, Nader Moayeri
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through multihop relaying. This paper targets the need in certain scenarios for rapid

Securing Radio Frequency Identification (RFID) Systems

May 17, 2007
Author(s)
Karen A. Scarfone
Radio frequency identification (RFID) is a form of automatic identification and data capture technology that uses electric or magnetic fields at radio frequencies to transmit information. An RFID system can be used to identify many types of objects, such

Cell Phone Forensic Tools: An Overview and Analysis Update

March 21, 2007
Author(s)
Richard Ayers, Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistant (PDA) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Message

Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i

February 7, 2007
Author(s)
Sheila E. Frankel, Bernard Eydt, L Owens, Karen Kent Scarfone
This report provides readers with a detailed explanation of next generation 802.11 wireless security. It describes the inherently flawed Wired Equivalent Privacy (WEP) and explains 802.11i's two-step approach (interim and long-term)to providing effective

A Measurement of Propagation Delay

January 16, 2007
Author(s)
Donald R. Larson, Nicholas Paulter
A measurement method and associated uncertainty analysis have been developed for the measurement of propagation or group delay in electrical transmission lines and optical fibers. The measurement method and uncertainty analysis were applied to measurements

Eliminating FFT Artifacts in Vector Signal Analyzer Spectra

October 1, 2006
Author(s)
Michael McKinley, Kate Remley, M. Myslinski, J. S. Kenney
We present a method to minimize spectral leakage in measurements of periodic signals made with the vector signal analyzer (VSA) by taking into account the periodic nature of the Fast Fourier Transform (FFT). This method negates the need for filtering the
Displaying 551 - 575 of 611