2019
DOI: 10.1109/jiot.2019.2912424
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Binary Countdown for Massive IoT Random Access in Dense 5G Networks

Abstract: Massive connectivity for Internet of Things applications is expected to challenge the way access reservation protocols are designed in 5G networks. Since the number of devices and their density are envisioned to be orders of magnitude larger, state-of-the-art access reservation, Random Access (RA) procedure, might be a bottleneck for end-to-end delay. This would be especially challenging for burst arrival scenarios: Semisynchronous triggering of a large number of devices due to a common event (blackout, emerge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(6 citation statements)
references
References 42 publications
0
6
0
Order By: Relevance
“…Use cases have different attributes, such as ultra-high bandwidth use cases, very low-latency use cases, ultra-reliable low-latency use cases, high-bandwidth use cases and massive IoT use cases. Massive IoT [25] is one of the most anticipated use cases of the 5G network and will require the sliced form of the 5G network. It uses the sliced 5G network to seamlessly connect different embedded sensors all over the world.…”
Section: Use Casesmentioning
confidence: 99%
“…Use cases have different attributes, such as ultra-high bandwidth use cases, very low-latency use cases, ultra-reliable low-latency use cases, high-bandwidth use cases and massive IoT use cases. Massive IoT [25] is one of the most anticipated use cases of the 5G network and will require the sliced form of the 5G network. It uses the sliced 5G network to seamlessly connect different embedded sensors all over the world.…”
Section: Use Casesmentioning
confidence: 99%
“…If the generated number is equal or smaller than the access probability sent by the gNB, the devices can access the network. Once the devices are allowed to access the network, they select one of the preambles sent by the gNB in the PRACH configuration message [ 20 ]. The devices transmit the selected preamble to the gNB in a message called MSG1 .…”
Section: Nr Random-access Proceduresmentioning
confidence: 99%
“…The simulation results show that this scheme is efficient in reducing the collision rate and the access delay for M2M systems. Furthermore, a binary countdown scheme has been proposed to resolve the RACH collisions in 5G networks [23]. In this scheme, additional resources are allocated for the collided devices prior to the third step of the random access procedure.…”
Section: Related Workmentioning
confidence: 99%
“…. (23) Note that the value of p in ACB scheme is a random number between 0 and 1. However, according to Duan et al [4], the optimal value of p for DAB scheme is:…”
mentioning
confidence: 99%