Probabilistic Rateless Multiple Access for Machine-to-Machine Communication

被引:42
作者
Shirvanimoghaddam, Mahyar [1 ]
Li, Yonghui [1 ]
Dohler, Mischa [2 ]
Vucetic, Branka [1 ]
Feng, Shulan [3 ]
机构
[1] Univ Sydney, Sch Elect & Informat Engn, Ctr Excellence Telecommun, Sydney, NSW 2006, Australia
[2] Kings Coll London, Wireless Commun, London WC2R 2LS, England
[3] Huawei Technol Co Ltd, Shenzhen 518129, Peoples R China
关键词
Analog fountain codes; belief propagation; machine-to-machine communication; massive multiple access; MULTIUSER DETECTION; M2M; LTE; ALLOCATION; NETWORKS; CHANNEL; CODES;
D O I
10.1109/TWC.2015.2460254
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Future machine-to-machine (M2M) communications need to support a massive number of devices communicating with each other with little or no human intervention. Random access techniques were originally proposed to enable M2M multiple access, but suffer from severe congestion and access delay in an M2M system with a large number of devices. In this paper, we propose a novel multiple access scheme for M2M communications based on the capacity-approaching analog fountain code to efficiently minimize the access delay and satisfy the delay requirement for each device. This is achieved by allowing M2M devices to transmit at the same time on the same channel in an optimal probabilistic manner based on their individual delay requirements. Simulation results show that the proposed scheme achieves a near optimal rate performance and at the same time guarantees the delay requirements of the devices. We further propose a simple random access strategy and characterize the required overhead. Simulation results show that the proposed approach significantly outperforms the existing random access schemes currently used in long term evolution advanced (LTE-A) standard in terms of the access delay.
引用
收藏
页码:6815 / 6826
页数:12
相关论文
共 50 条
[31]   Context-aware multi-agent system in machine-to-machine communication [J].
Maracic, Hrvoje ;
Miskovic, Tihana ;
Kusek, Mario ;
Lovrek, Ignac .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 18TH ANNUAL CONFERENCE, KES-2014, 2014, 35 :241-250
[32]   Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges [J].
Ullah, Shafi ;
Bazai, Sibghat Ullah ;
Imran, Mohammad ;
Ilyas, Qazi Mudassar ;
Mehmood, Abid ;
Saleem, Muhammad Asim ;
Rafique, Muhmmad Aasim ;
Haider, Arsalan ;
Khan, Ilyas ;
Iqbal, Sajid ;
Gulzar, Yonis ;
Hameed, Kauser .
CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01) :93-115
[33]   A Mechanism for Uplink Packet Scheduler in LTE Network in the Context of Machine-to-Machine Communication [J].
Maia, Adyson M. ;
Vieira, Dario ;
de Castro, Miguel F. ;
Ghamri-Doudane, Yacine .
2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, :2776-2782
[34]   A random access channel resources allocation approach to control machine-to-machine communication congestion over LTE-advanced networks [J].
Aragao, David ;
Rodrigues, Christiano ;
Vieira, Dario ;
de Castro, Miguel Franklin .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (10)
[35]   A proactive Medium Access Control (MAC) for finite-sized machine-to-machine (M2M) communication networks [J].
Fazil, Adnan ;
Hasan, Aamir ;
Alyaei, Bahman R. ;
Khan, Khurram ;
Zakwan, Muhammad .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
[36]   Hybrid Random Access and Data Transmission Protocol for Machine-to-Machine Communications in Cellular Networks [J].
Wiriaatmadja, Dimas Tribudi ;
Choi, Kae Won .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (01) :33-46
[37]   Massive Random Access of Machine-to-Machine Communications in LTE Networks: Modeling and Throughput Optimization [J].
Zhan, Wen ;
Dai, Lin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (04) :2771-2785
[38]   A Novel Blind Detection Algorithm Based on Spectrum Sharing and Coexistence for Machine-to-Machine Communication [J].
Zhang Yun ;
Zhou, Jing ;
Liu, Rong ;
Yu Shujuan ;
Li Binrui .
CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (05) :1036-1049
[39]   A blockchain-based authentication scheme for the machine-to-machine communication of a cyber physical system [J].
Xie, Yi ;
Wang, Yulin ;
Ma, Maode .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 41 (03) :4425-4430
[40]   Machine-to-machine communication with long-term evolution with reduced device energy consumption [J].
Tirronen, Tuomas ;
Larmo, Anna ;
Sachs, Joachim ;
Lindoff, Bengt ;
Wiberg, Niclas .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2013, 24 (04) :413-426