White Papers

Working groups interested in writing a white paper can find additional information in this White Paper Criteria List (PDF) and should use this downloadable template (DOCX) to draft their paper.

Industry Connections program working groups can develop a white paper using this downloadable template (DOCX).

Those members drafting a white paper for ICAP should use this downloadable template (DOCX).

All groups are encouraged to download and consult the IEEE SA Non-Standard Projects Style Manual (PDF).

Hardware Security Attack Landscape and Countermeasures

An overview is given of attacks on hardware security by introducing the four attack classes: logical attacks, physical observative attacks, physical fault injection attacks, and physical manipulative attacks. Descriptions and examples are given for each class of attack. Additionally, typical countermeasures for products to prevent successful attacks are listed and…

Access Article


Corporate Digital Responsibility (CDR) Securing Our Digital Futures

In recognition of the complexities facing organizational leaders in navigating responsibility across the social, economic, and environmental (physical and digital) domains, corporate digital responsibility (CDR) is a method to assist evidence-based decision-making processes. Furthermore, few organizations possess the skills, knowledge, or resources to implement a coherent process or policy to…

Access Article


Mobile and Transportable Energy Storage Systems: Business Case and Benchmark Analysis

An innovative approach to conventional portable and emergency gensets involves the use of mobile energy storage systems (MESS) and transportable energy storage systems (TESS), offering clean and noise-free alternative solutions. While enhancing grid reliability and resilience remains a critical objective in MESS/TESS deployment, it is equally important to assess the…

Access Article


The Development of The Trusted Digital Identity Industry In Future Networks

The Development of The Trusted Digital Identity Industry In Future Networks

The historical development of information and communication network identity, as well as insights into network identity technologies, applications, and industry trends are reviewed in this report. Current approaches to implementing digital identity in future networks are outlined, and definitions and key metrics for trustworthy digital identities in future networks are…

Access Article


XR Ethics in War, Conflict, and Defense

XR Ethics in War, Conflict, and Defense

The scope of this report is the exploration of ethics-related issues to support the development, design, and deployment of XR applications in the war, conflict, and defense domain and the aim is to initiate expert-driven, multidiscipline analysis of the evolving XR Ethics requirements, with a vision to propose solutions, technologies,…

Access Article


Simulation, Testing, Verification, and Validation (STV2) of Autonomous Driving

STV2 is a set of processes that support the development, validation, and operation of autonomous driving systems from the perspectives of safety and cost. The scope, architecture, and critical components of STV2, as well as how the full lifecycle of autonomous driving systems is covered, is presented in this white…

Access Article


A Framework for Human Decision-Making through the Lifecycle of Autonomous and Intelligent Systems in Defense Applications

The framework set out in this document is intended to help inform a range of stakeholders involved in various types of decision-making related to autonomous and intelligent systems (AIS), especially in the military context. The framework provides a granular means for identifying the technical considerations that are necessary to meet…

Access Article


Low-Latency Communication White Paper

This white paper is to inform users and IEEE 802 working groups on the applications and requirements for low latency communications. Low latency is challenging to implement in wired or wireless networks. Some wireless applications are located in physical environments over which the operator/owner can exert control in unlicensed and…

Access Article


Stabilizing Qubits with Dynamic Frequencies, the Implications on Post-Quantum Encryption Protocols, and A Hybrid Quantum Internet

The paper discusses how stabilized qubits can impact encryption methods, such as quantum key distribution (QKD) and Quantum Elliptical Curve Cryptography (QECC), by enhancing computational integrity and error rates. However, the ability to stabilize qubits also introduces potential risks, as it may lead to vulnerabilities in quantum cryptographic systems if…

Access Article


WEB 3.0: The Evolution of Information-Centric Networks

The aim of Web 3.0 is to revolutionize how users interact with and derive value from information in the digital age. By providing a framework for efficient information organization, value creation, and privacy preservation, solutions to critical challenges facing the current internet ecosystem are offered. The technical architecture, economic model,…

Access Article


Older Whitepapers

Subscribe to our Newsletter

Sign up for our monthly newsletter to learn about new developments, including resources, insights and more.