745,554 research outputs found
Random Access for Machine-Type Communication based on Bloom Filtering
We present a random access method inspired on Bloom filters that is suited
for Machine-Type Communications (MTC). Each accessing device sends a
\emph{signature} during the contention process. A signature is constructed
using the Bloom filtering method and contains information on the device
identity and the connection establishment cause. We instantiate the proposed
method over the current LTE-A access protocol. However, the method is
applicable to a more general class of random access protocols that use
preambles or other reservation sequences, as expected to be the case in 5G
systems. We show that our method utilizes the system resources more efficiently
and achieves significantly lower connection establishment latency in case of
synchronous arrivals, compared to the variant of the LTE-A access protocol that
is optimized for MTC traffic. A dividend of the proposed method is that it
allows the base station (BS) to acquire the device identity and the connection
establishment cause already in the initial phase of the connection
establishment, thereby enabling their differentiated treatment by the BS.Comment: Accepted for presentation on IEEE Globecom 201
Providing Physical Layer Security for Mission Critical Machine Type Communication
The design of wireless systems for Mission Critical Machine Type
Communication (MC-MTC) is currently a hot research topic. Wireless systems are
considered to provide numerous advantages over wired systems in industrial
applications for example. However, due to the broadcast nature of the wireless
channel, such systems are prone to a wide range of cyber attacks. These range
from passive eavesdropping attacks to active attacks like data manipulation or
masquerade attacks. Therefore it is necessary to provide reliable and efficient
security mechanisms. One of the most important security issue in such a system
is to ensure integrity as well as authenticity of exchanged messages over the
air between communicating devices in order to prohibit active attacks. In the
present work, an approach on how to achieve this goal in MC-MTC systems based
on Physical Layer Security (PHYSEC), especially a new method based on keeping
track of channel variations, will be presented and a proof-of-concept
evaluation is given
5G wireless systems: principles, IoT connectivity, and slicing of radio resources
In the conference, the landscape of future wireless connectivity is first described. Later, a glimpse into the new radio and standardization is given. New modes in 5G are treated in deep, emphasizing those related to Ultra-Reliable Low Latency Communication and massive Machine Type Communication (mMTC). Finally, an overview is given on slicing and modeling of 5G systems.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech
- …