machine type communication
Recently Published Documents


TOTAL DOCUMENTS

225
(FIVE YEARS 102)

H-INDEX

14
(FIVE YEARS 6)

2022 ◽  
Vol 54 (9) ◽  
pp. 1-37
Author(s):  
Pasika Ranaweera ◽  
Anca Jurcut ◽  
Madhusanka Liyanage

The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 472
Author(s):  
Abdullah Waqas ◽  
Nasir Saeed ◽  
Hasan Mahmood ◽  
Muhannad Almutiry

Fifth-generation and beyond networks target multiple distributed network application such as Internet of Things (IoT), connected robotics, and massive Machine Type Communication (mMTC). In the absence of a central management unit, the device need to search and establish a route towards the destination before initializing data transmission. In this paper, we proposes a destination search and routing method for distributed 5G and beyond networks. In the proposed method, the source node makes multiple attempts to search for a route towards the destination by expanding disk-like patterns originating from the source node. The source node increases the search area in each attempt, accommodating more nodes in the search process. As a result, the probability of finding the destination increases, which reduces energy consumption and time delay of routing. We propose three variants of routing for high, medium, and low-density network scenarios and analyze their performance for various network configurations. The results demonstrate that the performance of the proposed solution is better than previously proposed techniques in terms of time latency and reduced energy consumption, making it applicable for 5G and beyond networks.


2021 ◽  
Author(s):  
Jie Ding ◽  
Jinho Choi

<div>In this paper, a successive interference cancellation (SIC) aided K-repetition scheme is proposed to support contention-based mission-critical machine-type communication (MTC) in cell-free (CF) massive multiple-input and multipleoutput (MIMO) systems. With the assistance of a tailored deep neural network (DNN) based preamble multiplicity estimator, the proposed SIC in K-repetition is capable of fully cancelling the interference signals, which leads to the reliability improvement in CF massive MIMO. Simulation results show the accuracy of preamble multiplicity estimation by the proposed DNN, and</div><div>demonstrate that, compared to the existing schemes, the proposed SIC scheme can achieve an improvement of two orders of magnitude in terms of block error rate (BLER) under a given latency constraint. Moreover, when the number of access points (APs) is sufficiently large, employing the proposed SIC scheme provides a great potential to meet ultra-reliable and low-latency requirements, e.g., 10<sup>-5 </sup>BLER and 1 ms access latency, for crowd mission-critical applications, which is far beyond the capabilities of the existing schemes.</div>


2021 ◽  
Author(s):  
Shah Mahdi Hasan ◽  
Kaushik Mahata ◽  
Md Mashud Hyder

Grant-Free Non Orthogonal Multiple Access (NOMA) offers promising solutions to realize uplink (UL) massive Machine Type Communication (mMTC) using limited spectrum resources, while reducing signalling overhead. Because of the sparse, sporadic activities exhibited by the user equipments (UE), the active user detection (AUD) problem is often formulated as a compressive sensing problem. In line of that, greedy sparse recovery algorithms are spearheading the development of compressed sensing based multi-user detectors (CS-MUD). However, for a given number of resources, the performance of CS-MUD algorithms are fundamentally limited at higher overloading of NOMA. To circumvent this issue, in this work, we propose a two-stage hierarchical multi-user detection framework, where the UEs are randomly assigned to some pre-defined clusters. The active UEs split their data transmission frame into two phases. In the first phase an UE uses the sinusoidal spreading sequence (SS) of its cluster. In the second phase the UE uses its own unique random SS. At phase 1 of detection, the active clusters are detected, and a reduced sensing matrix is constructed. This matrix is used in Phase 2 to recover the active UE indices using some sparse recovery algorithm. Numerical investigations validate the efficacy of the proposed algorithm in highly overloaded scenarios.


2021 ◽  
Author(s):  
Shah Mahdi Hasan ◽  
Kaushik Mahata ◽  
Md Mashud Hyder

Grant-Free Non Orthogonal Multiple Access (NOMA) offers promising solutions to realize uplink (UL) massive Machine Type Communication (mMTC) using limited spectrum resources, while reducing signalling overhead. Because of the sparse, sporadic activities exhibited by the user equipments (UE), the active user detection (AUD) problem is often formulated as a compressive sensing problem. In line of that, greedy sparse recovery algorithms are spearheading the development of compressed sensing based multi-user detectors (CS-MUD). However, for a given number of resources, the performance of CS-MUD algorithms are fundamentally limited at higher overloading of NOMA. To circumvent this issue, in this work, we propose a two-stage hierarchical multi-user detection framework, where the UEs are randomly assigned to some pre-defined clusters. The active UEs split their data transmission frame into two phases. In the first phase an UE uses the sinusoidal spreading sequence (SS) of its cluster. In the second phase the UE uses its own unique random SS. At phase 1 of detection, the active clusters are detected, and a reduced sensing matrix is constructed. This matrix is used in Phase 2 to recover the active UE indices using some sparse recovery algorithm. Numerical investigations validate the efficacy of the proposed algorithm in highly overloaded scenarios.


2021 ◽  
Author(s):  
Jie Ding ◽  
Jinho Choi

<div>In this paper, a successive interference cancellation (SIC) aided K-repetition scheme is proposed to support contention-based mission-critical machine-type communication (MTC) in cell-free (CF) massive multiple-input and multipleoutput (MIMO) systems. With the assistance of a tailored deep neural network (DNN) based preamble multiplicity estimator, the proposed SIC in K-repetition is capable of fully cancelling the interference signals, which leads to the reliability improvement in CF massive MIMO. Simulation results show the accuracy of preamble multiplicity estimation by the proposed DNN, and</div><div>demonstrate that, compared to the existing schemes, the proposed SIC scheme can achieve an improvement of two orders of magnitude in terms of block error rate (BLER) under a given latency constraint. Moreover, when the number of access points (APs) is sufficiently large, employing the proposed SIC scheme provides a great potential to meet ultra-reliable and low-latency requirements, e.g., 10<sup>-5 </sup>BLER and 1 ms access latency, for crowd mission-critical applications, which is far beyond the capabilities of the existing schemes.</div>


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 8064
Author(s):  
Binod Kharel ◽  
Onel Luis Alcaraz López ◽  
Hirley Alves ◽  
Matti Latva-aho

This paper focuses on edge-enabled cloud radio access network architecture to achieve ultra-reliable communication, a crucial enabler for supporting mission-critical machine-type communication networks. We propose coordinated multi-point transmission schemes taking advantage of diversity mechanisms in interference-limited downlink cellular networks. The network scenario comprises spatially distributed multiple remote radio heads (RRHs) that may cooperate through silencing, or by using more elaborated diversity strategies such as maximum ratio transmission or transmit antenna selection to serve user equipment in the ultra-reliable operation regime. We derive an exact closed-form expression for the outage probabilities and expected values of signal-to-interference ratio for silencing, transmit antenna selection and maximum ratio transmission schemes. We formulate rate control and energy efficiency under reliability constraints to test the performance and resource usage of the proposed schemes. Furthermore, we study the impact on average system sum throughput with throughput-reliability trade-off under cooperative communication. Extensive numerical analysis shows the feasibility of ultra-reliable communication by implementing diversity schemes with RRHs cooperation.


Author(s):  
Artem Burkov

Introduction: Currently, the issues of Internet of Things technology are being actively studied. The operation of a large number of various self-powered sensors is within the framework of a massive machine-type communication scenario, using random access methods. Topical issues in this type of communication are how to reduce the transmission signal power and to increase the device lifetime by reducing the consumed energy per bit. Purpose: Formulation and analysis of the problems of minimizing the transmission power and consumed energy per bit in systems with or without retransmissions in order to obtain the achievability bounds. Results: A model of the system is described, within which four problems are formulated and described, concerning the signal power minimization and energy consumption for given parameters (the number of information bits, the spectral efficiency of the system, and the Packet Delivery Ratio). The numerical results of solving these optimization problems are presented. They make it possible to obtain the achievability bounds for the considered characteristics in systems with or without losses. The lower bounds obtained by the Shannon formula are also presented, assuming that the message length is not limited. The obtained results showed that solving the minimization problem with respect to one of the parameters (signal power or consumed energy per bit) does not minimize the second parameter. This difference is most significant for information messages of a small length, which is common in IoT scenarios. Practical relevance: The results obtained allow you to assess the potential for minimizing the transmission signal power and consumed energy per bit in random multiple access systems with massive machine-type communication scenarios. Discussion: The presented problems were solved without taking into account the average delay of message transmission; the introduction of such a limitation should increase the transmitted signal power and consumed energy per bit.


Author(s):  
Christian Arendt ◽  
Manuel Patchou ◽  
Stefan Bocker ◽  
Janis Tiemann ◽  
Christian Wietfeld

Sign in / Sign up

Export Citation Format

Share Document