Mobile and Transportable Energy Storage Systems: Business Case and Benchmark Analysis
An innovative approach to conventional portable and emergency gensets involves the use of mobile energy storage systems (MESS) and transportable energy storage systems (TESS), offering clean and noise-free alternative solutions. While enhancing grid reliability and resilience remains a critical objective in MESS/TESS deployment, it is equally important to assess the…
Hardware Security Attack Landscape and Countermeasures
An overview is given of attacks on hardware security by introducing the four attack classes: logical attacks, physical observative attacks, physical fault injection attacks, and physical manipulative attacks. Descriptions and examples are given for each class of attack. Additionally, typical countermeasures for products to prevent successful attacks are listed and…
Corporate Digital Responsibility (CDR) Securing Our Digital Futures
In recognition of the complexities facing organizational leaders in navigating responsibility across the social, economic, and environmental (physical and digital) domains, corporate digital responsibility (CDR) is a method to assist evidence-based decision-making processes. Furthermore, few organizations possess the skills, knowledge, or resources to implement a coherent process or policy to…
The Development of The Trusted Digital Identity Industry In Future Networks
The historical development of information and communication network identity, as well as insights into network identity technologies, applications, and industry trends are reviewed in this report. Current approaches to implementing digital identity in future networks are outlined, and definitions and key metrics for trustworthy digital identities in future networks are…
XR Ethics in War, Conflict, and Defense
The scope of this report is the exploration of ethics-related issues to support the development, design, and deployment of XR applications in the war, conflict, and defense domain and the aim is to initiate expert-driven, multidiscipline analysis of the evolving XR Ethics requirements, with a vision to propose solutions, technologies,…
Low-Latency Communication White Paper
This white paper is to inform users and IEEE 802 working groups on the applications and requirements for low latency communications. Low latency is challenging to implement in wired or wireless networks. Some wireless applications are located in physical environments over which the operator/owner can exert control in unlicensed and…
A Framework for Human Decision-Making through the Lifecycle of Autonomous and Intelligent Systems in Defense Applications
The framework set out in this document is intended to help inform a range of stakeholders involved in various types of decision-making related to autonomous and intelligent systems (AIS), especially in the military context. The framework provides a granular means for identifying the technical considerations that are necessary to meet…
Simulation, Testing, Verification, and Validation (STV2) of Autonomous Driving
STV2 is a set of processes that support the development, validation, and operation of autonomous driving systems from the perspectives of safety and cost. The scope, architecture, and critical components of STV2, as well as how the full lifecycle of autonomous driving systems is covered, is presented in this white…
Stabilizing Qubits with Dynamic Frequencies, the Implications on Post-Quantum Encryption Protocols, and A Hybrid Quantum Internet
The paper discusses how stabilized qubits can impact encryption methods, such as quantum key distribution (QKD) and Quantum Elliptical Curve Cryptography (QECC), by enhancing computational integrity and error rates. However, the ability to stabilize qubits also introduces potential risks, as it may lead to vulnerabilities in quantum cryptographic systems if…