18 research outputs found
Sub 1GHz M2M communications standardization: The advancement in white space utilization for enhancing the energy efficiency
Energy efficiency of machine to machine (M2M) communications terminals is one of the major design goals of M2M networks, resulting from anticipated over 50 billion M2M communications devices to be deployed into the networks by 2020 [1]. The stakeholders in the M2M communications have observed that it will be environmental and economic catastrophic to deploy M2M communications devices without solving the energy inefficiencies associated with wireless devices that are expected to be used for M2M communications. In view of the aforementioned energy challenge, sub 1GHz spectra have provided enormous opportunities that can be energy efficient, cost effective and coverage efficiency which can be utilized for M2M communications. This work will evaluate the energy efficiency benefits of optimized Sub 1GHz spectra for M2M communications
Probabilistic Rateless Multiple Access for Machine-to-Machine Communication
Future machine to machine (M2M) communications need to support a massive
number of devices communicating with each other with little or no human
intervention. Random access techniques were originally proposed to enable M2M
multiple access, but suffer from severe congestion and access delay in an M2M
system with a large number of devices. In this paper, we propose a novel
multiple access scheme for M2M communications based on the capacity-approaching
analog fountain code to efficiently minimize the access delay and satisfy the
delay requirement for each device. This is achieved by allowing M2M devices to
transmit at the same time on the same channel in an optimal probabilistic
manner based on their individual delay requirements. Simulation results show
that the proposed scheme achieves a near optimal rate performance and at the
same time guarantees the delay requirements of the devices. We further propose
a simple random access strategy and characterized the required overhead.
Simulation results show the proposed approach significantly outperforms the
existing random access schemes currently used in long term evolution advanced
(LTE-A) standard in terms of the access delay.Comment: Accepted to Publish in IEEE Transactions on Wireless Communication
On the Fundamental Limits of Random Non-orthogonal Multiple Access in Cellular Massive IoT
Machine-to-machine (M2M) constitutes the communication paradigm at the basis
of Internet of Things (IoT) vision. M2M solutions allow billions of multi-role
devices to communicate with each other or with the underlying data transport
infrastructure without, or with minimal, human intervention. Current solutions
for wireless transmissions originally designed for human-based applications
thus require a substantial shift to cope with the capacity issues in managing a
huge amount of M2M devices. In this paper, we consider the multiple access
techniques as promising solutions to support a large number of devices in
cellular systems with limited radio resources. We focus on non-orthogonal
multiple access (NOMA) where, with the aim to increase the channel efficiency,
the devices share the same radio resources for their data transmission. This
has been shown to provide optimal throughput from an information theoretic
point of view.We consider a realistic system model and characterise the system
performance in terms of throughput and energy efficiency in a NOMA scenario
with a random packet arrival model, where we also derive the stability
condition for the system to guarantee the performance.Comment: To appear in IEEE JSAC Special Issue on Non-Orthogonal Multiple
Access for 5G System
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
This paper studies the secrecy performance of a wireless network (primary
network) overlaid with an ambient RF energy harvesting IoT network (secondary
network). The nodes in the secondary network are assumed to be solely powered
by ambient RF energy harvested from the transmissions of the primary network.
We assume that the secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones. The primary
transmitter goes silent if any secondary receiver is detected within its guard
zone. Using tools from stochastic geometry, we derive the probability of
successful connection of the primary network as well as the probability of
secure communication. Two conditions must be jointly satisfied in order to
ensure successful connection: (i) the SINR at the primary receiver is above a
predefined threshold, and (ii) the primary transmitter is not silent. In order
to ensure secure communication, the SINR value at each of the secondary nodes
should be less than a predefined threshold. Clearly, when more secondary nodes
are deployed, more primary transmitters will remain silent for a given guard
zone radius, thus impacting the amount of energy harvested by the secondary
network. Our results concretely show the existence of an optimal deployment
density for the secondary network that maximizes the density of nodes that are
able to harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard zone radius of the
primary network. In addition, we show that the optimal guard zone radius
selected by the primary network is a function of the deployment density of the
secondary network. This interesting coupling between the two networks is
studied using tools from game theory. Overall, this work is one of the few
concrete works that symbiotically merge tools from stochastic geometry and game
theory