Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247229
M. Abedi, N. Mokari, H. Saeedi, H. Yanikomeroglu
This paper studies a robust resource allocation framework to enhance physical layer security where it is assumed that the system is equipped with a full-duplex (FD) receiver in contrast to conventional frameworks where a half-duplex (HD) receiver is at hand. Conventionally, relays are used as jammer to reduce the signal quality received by the eavesdroppers so as to increase the secrecy transmission rate between the legitimate transmitter and receiver. This is referred to as cooperative jamming (CJ). In a system equipped with a FD receiver, we propose to use the FD receiver as the jammer, i.e., the FD receiver simultaneously transmits jamming signals toward the eavesdropper while receiving data from the transmitter. The proposed scheme eliminates the need for external helpers, i.e., jamming relays which is welcome from practical point of view. We consider different scenarios to compare the proposed scheme against the CJ scheme in which, under a legitimate transmitter power constraint, optimal power allocation is obtained for each scenario to maximize the secrecy rate. To take into account the impact of imperfect state information of the channels between the eavesdropper and other nodes on the network, worst-case optimization approaches are considered. Simulation results demonstrate that for certain positions of the jamming relay and eavesdropper, the proposed system can outperform the conventional CJ schemes.
{"title":"Secure robust resource allocation using full-duplex receivers","authors":"M. Abedi, N. Mokari, H. Saeedi, H. Yanikomeroglu","doi":"10.1109/ICCW.2015.7247229","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247229","url":null,"abstract":"This paper studies a robust resource allocation framework to enhance physical layer security where it is assumed that the system is equipped with a full-duplex (FD) receiver in contrast to conventional frameworks where a half-duplex (HD) receiver is at hand. Conventionally, relays are used as jammer to reduce the signal quality received by the eavesdroppers so as to increase the secrecy transmission rate between the legitimate transmitter and receiver. This is referred to as cooperative jamming (CJ). In a system equipped with a FD receiver, we propose to use the FD receiver as the jammer, i.e., the FD receiver simultaneously transmits jamming signals toward the eavesdropper while receiving data from the transmitter. The proposed scheme eliminates the need for external helpers, i.e., jamming relays which is welcome from practical point of view. We consider different scenarios to compare the proposed scheme against the CJ scheme in which, under a legitimate transmitter power constraint, optimal power allocation is obtained for each scenario to maximize the secrecy rate. To take into account the impact of imperfect state information of the channels between the eavesdropper and other nodes on the network, worst-case optimization approaches are considered. Simulation results demonstrate that for certain positions of the jamming relay and eavesdropper, the proposed system can outperform the conventional CJ schemes.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"25 1","pages":"497-502"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86091494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247194
Giorgio Quer, M. Danieletto
Ambient assisted living is a key enabler to increase the quality of life, and its importance is going to increase in the next decade due to a significant increment in the number and in the percentage of the elderly population. Many solutions have been proposed to compensate the age related physical limitations and to guarantee autonomy and safety to the elderly people, allowing them to continue their life in their own environment. There are several open issues to solve in order to enable the practical implementation of these solutions. One of them regards the intrinsic difficulties to create a network between a personal smartphone and the correct physiological sensors, in the presence of multiple sensor devices, where the automatic choice of the correct sensor is not obvious. In this paper we propose a solution to this problem, based on an automatic pairing that relies on the instantaneous variability of the heart rate of each subject. We evaluate the technique by collecting real data and showing some promising performance accuracy results, opening new research opportunities in this area.
{"title":"Matching between physiological sensor and smartphone based on RR intervals time series","authors":"Giorgio Quer, M. Danieletto","doi":"10.1109/ICCW.2015.7247194","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247194","url":null,"abstract":"Ambient assisted living is a key enabler to increase the quality of life, and its importance is going to increase in the next decade due to a significant increment in the number and in the percentage of the elderly population. Many solutions have been proposed to compensate the age related physical limitations and to guarantee autonomy and safety to the elderly people, allowing them to continue their life in their own environment. There are several open issues to solve in order to enable the practical implementation of these solutions. One of them regards the intrinsic difficulties to create a network between a personal smartphone and the correct physiological sensors, in the presence of multiple sensor devices, where the automatic choice of the correct sensor is not obvious. In this paper we propose a solution to this problem, based on an automatic pairing that relies on the instantaneous variability of the heart rate of each subject. We evaluate the technique by collecting real data and showing some promising performance accuracy results, opening new research opportunities in this area.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"3 1","pages":"294-299"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82631522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247500
David Steer
Traditional mobile radio communications system designs are largely based on the principles of engineering an independent radio link for each user. Recent developments with small cells and multiple antennas have further improved the capacity of the radio channel through high density frequency reuse. Such techniques achieve an increase in capacity (i.e. number of users and their traffic) that is linearly proportional to the number of additional antennas and the associated cells or cell sectors. However, as the volume of users and their traffic increases there is a need for a massive increase in system capacity. Examples of such massive traffic loads include stadiums and similar events attended by large crowds of connected users. In this paper we outline concepts of radio aperture synthesis and illustrate their application to a high density communications scenario. The aperture synthesis approach augments the engineering of multiple individual radio links with an arrangement of massively parallel cells (MPC). The advantage of the aperture synthesis technique for communications systems is that very high frequency reuse can be achieved and the system capacity increases approximately as the square of the number of antennas in the synthesis array.
{"title":"High density cellular communication using radio aperture synthesis","authors":"David Steer","doi":"10.1109/ICCW.2015.7247500","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247500","url":null,"abstract":"Traditional mobile radio communications system designs are largely based on the principles of engineering an independent radio link for each user. Recent developments with small cells and multiple antennas have further improved the capacity of the radio channel through high density frequency reuse. Such techniques achieve an increase in capacity (i.e. number of users and their traffic) that is linearly proportional to the number of additional antennas and the associated cells or cell sectors. However, as the volume of users and their traffic increases there is a need for a massive increase in system capacity. Examples of such massive traffic loads include stadiums and similar events attended by large crowds of connected users. In this paper we outline concepts of radio aperture synthesis and illustrate their application to a high density communications scenario. The aperture synthesis approach augments the engineering of multiple individual radio links with an arrangement of massively parallel cells (MPC). The advantage of the aperture synthesis technique for communications systems is that very high frequency reuse can be achieved and the system capacity increases approximately as the square of the number of antennas in the synthesis array.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"1 1","pages":"2151-2156"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82920906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247505
S. Moballegh, B. Sirkeci
In this paper, we study cooperative broadcast using multiple levels of relays for high-density 1-D networks and compare its behavior with noncooperative multihop broadcast. The advantage of cooperative broadcast over multihop transmission has been well studied for both high-density and extended 2-D networks. We analyze high-density 1-D networks, and approximate them as a continuum of nodes. Our analysis shows that the broadcast behavior depends on three different regimes of the pathloss exponent and the type of transmission (being bidirectional or unidirectional). We present analytical expressions for successful broadcasting as a function of source and relay powers, decoding threshold and the noise power. We also compare cooperative and noncooperative broadcast in terms of power efficiency and show that cooperative broadcast is substantially more efficient under bidirectional transmission; however it is power inefficient if the transmission is unidirectional.
{"title":"Analysis of cooperative communication in one-dimensional dense ad-hoc networks","authors":"S. Moballegh, B. Sirkeci","doi":"10.1109/ICCW.2015.7247505","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247505","url":null,"abstract":"In this paper, we study cooperative broadcast using multiple levels of relays for high-density 1-D networks and compare its behavior with noncooperative multihop broadcast. The advantage of cooperative broadcast over multihop transmission has been well studied for both high-density and extended 2-D networks. We analyze high-density 1-D networks, and approximate them as a continuum of nodes. Our analysis shows that the broadcast behavior depends on three different regimes of the pathloss exponent and the type of transmission (being bidirectional or unidirectional). We present analytical expressions for successful broadcasting as a function of source and relay powers, decoding threshold and the noise power. We also compare cooperative and noncooperative broadcast in terms of power efficiency and show that cooperative broadcast is substantially more efficient under bidirectional transmission; however it is power inefficient if the transmission is unidirectional.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"124 1","pages":"2181-2186"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86575925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247180
Radwa A. Sultan, Lingyang Song, Karim G. Seddik, Yonghui Li, Zhu Han
Full duplex heterogeneous networks are considered as a mean of boosting the performance of future wireless communication networks. In this paper, we study full duplex orthogonal division multiple access (OFDMA) heterogeneous network. In our model, each node will operate either in full duplex or half duplex multiuser MIMO. In addition, each user will attempt to connect to the macro base station or one of the available small cell access points. Moreover, it is assumed that there exist strict transmission power constraints on each transmitting node and each user. Accordingly, a joint resource allocation problem which maximizes the aggregate network's throughput by considering mode selection, user pairing, subcarrier allocation and power control is proposed. Additionally, the performance of our proposed scheme is evaluated indicating the effects of different system parameters on the system performance. Finally, our proposed scheme's performance is compared with that of a network which operates in full-duplex only or half-duplex only.
{"title":"Mode selection, user pairing, subcarrier allocation and power control in full-duplex OFDMA HetNets","authors":"Radwa A. Sultan, Lingyang Song, Karim G. Seddik, Yonghui Li, Zhu Han","doi":"10.1109/ICCW.2015.7247180","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247180","url":null,"abstract":"Full duplex heterogeneous networks are considered as a mean of boosting the performance of future wireless communication networks. In this paper, we study full duplex orthogonal division multiple access (OFDMA) heterogeneous network. In our model, each node will operate either in full duplex or half duplex multiuser MIMO. In addition, each user will attempt to connect to the macro base station or one of the available small cell access points. Moreover, it is assumed that there exist strict transmission power constraints on each transmitting node and each user. Accordingly, a joint resource allocation problem which maximizes the aggregate network's throughput by considering mode selection, user pairing, subcarrier allocation and power control is proposed. Additionally, the performance of our proposed scheme is evaluated indicating the effects of different system parameters on the system performance. Finally, our proposed scheme's performance is compared with that of a network which operates in full-duplex only or half-duplex only.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"113 1","pages":"210-215"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89044657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247285
J. Schloemann, Harpreet S. Dhillon, R. Buehrer
When the Global Positioning System is unavailable, cellular networks become the dominant vehicle for positioning. However, no tractable approach exists for gaining general insights into localization performance in such networks. Instead, analysis is often done using deterministic network models or with complex system-level simulations, resulting in highly context-specific insights, which do not translate well to random network topologies. In this paper, we motivate and introduce a new approach for analyzing localization performance in cellular networks using tools from point process theory and stochastic geometry. After presenting the model, easy-to-use expressions are derived for the distributions of base station hearability, a metric which is closely-related to localization performance, with and without base station coordination.
{"title":"Localization performance in cellular networks","authors":"J. Schloemann, Harpreet S. Dhillon, R. Buehrer","doi":"10.1109/ICCW.2015.7247285","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247285","url":null,"abstract":"When the Global Positioning System is unavailable, cellular networks become the dominant vehicle for positioning. However, no tractable approach exists for gaining general insights into localization performance in such networks. Instead, analysis is often done using deterministic network models or with complex system-level simulations, resulting in highly context-specific insights, which do not translate well to random network topologies. In this paper, we motivate and introduce a new approach for analyzing localization performance in cellular networks using tools from point process theory and stochastic geometry. After presenting the model, easy-to-use expressions are derived for the distributions of base station hearability, a metric which is closely-related to localization performance, with and without base station coordination.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"3 1","pages":"871-876"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83113458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247217
Wenwen Tu, L. Lai
This paper considers the problem of key generation with a helper, which might be subjected to Byzantine attacks. If the helper is not under attack, it will follow the key generation protocol. However, if the helper is under attack, it will modify the messages to mislead the key generation parties. We propose a scheme that can benefit from the helper, if the helper is not under attack, and can detect the presence of the attack, if the helper is under Byzantine attacks. We show that our key generation scheme can achieve the secret key capacity when the helper is not under attack. At the same time, if the helper is under Byzantine attacks, our scheme can achieve the key rate as if the attacker is a passive eavesdropper.
{"title":"Key generation with a Byzantine helper","authors":"Wenwen Tu, L. Lai","doi":"10.1109/ICCW.2015.7247217","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247217","url":null,"abstract":"This paper considers the problem of key generation with a helper, which might be subjected to Byzantine attacks. If the helper is not under attack, it will follow the key generation protocol. However, if the helper is under attack, it will modify the messages to mislead the key generation parties. We propose a scheme that can benefit from the helper, if the helper is not under attack, and can detect the presence of the attack, if the helper is under Byzantine attacks. We show that our key generation scheme can achieve the secret key capacity when the helper is not under attack. At the same time, if the helper is under Byzantine attacks, our scheme can achieve the key rate as if the attacker is a passive eavesdropper.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"42 1","pages":"429-434"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79108449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247241
A. S. Cacciapuoti, M. Caleffi, Francesco Marino, L. Paura
The attractive characteristics of the TV White Space makes it the ideal candidate for enabling multiple and independently-operated secondary networks via Cognitive Radio paradigm. However, so far, there are no regulatory requirements for the coexistence among heterogenous secondary networks over TVWS. Hence, their mutual interference can be very severe. This issue is even more crucial in urban Smart Grid scenarios, where the latency and energy requirements are very tight and multiple Neighborhood Area Networks (NANs) are likely to be located within the same geographical area. Hence, in this paper, the problem of the interference among multiple NANs is addressed with the objective to maximize the achievable data rate. To this aim, the Gateway senses the TVWS channel declared available from incumbents by the WSDB to discover the presence of an interfering NAN. If the sensing declares the TVWS channel as idle, the Gateway can transmit over such a channel. Otherwise, the Gateway uses the ISM channel. Within the paper, the choice of the sensing duration maximizing the achievable data rate at the Gateway, by explicitly accounting for the accuracy/overhead trade-off and the co-located NANs traffic patterns, is addressed. Numerical results validate the theoretical analysis.
{"title":"Enabling Smart Grid via TV White Space Cognitive Radio","authors":"A. S. Cacciapuoti, M. Caleffi, Francesco Marino, L. Paura","doi":"10.1109/ICCW.2015.7247241","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247241","url":null,"abstract":"The attractive characteristics of the TV White Space makes it the ideal candidate for enabling multiple and independently-operated secondary networks via Cognitive Radio paradigm. However, so far, there are no regulatory requirements for the coexistence among heterogenous secondary networks over TVWS. Hence, their mutual interference can be very severe. This issue is even more crucial in urban Smart Grid scenarios, where the latency and energy requirements are very tight and multiple Neighborhood Area Networks (NANs) are likely to be located within the same geographical area. Hence, in this paper, the problem of the interference among multiple NANs is addressed with the objective to maximize the achievable data rate. To this aim, the Gateway senses the TVWS channel declared available from incumbents by the WSDB to discover the presence of an interfering NAN. If the sensing declares the TVWS channel as idle, the Gateway can transmit over such a channel. Otherwise, the Gateway uses the ISM channel. Within the paper, the choice of the sensing duration maximizing the achievable data rate at the Gateway, by explicitly accounting for the accuracy/overhead trade-off and the co-located NANs traffic patterns, is addressed. Numerical results validate the theoretical analysis.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"28 1","pages":"568-572"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83439250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247275
Shenghong Li, M. Hedley, I. Collings
Distributed belief propagation is a promising technology for cooperative localization. Difficulties with belief propagation lie in achieving high accuracy without causing high communication overhead and computational complexity. In this paper, we propose an efficient cooperative localization algorithm based on distributed belief propagation and a new empirical indoor ranging error model, which can be applied to indoor localization systems with non-Gaussian ranging error distributions. To reduce the communication overhead and computational complexity, the algorithm passes approximate beliefs represented by Gaussian distributions between neighbours and uses an analytical approximation to compute peer-to-peer messages. The proposed algorithm is validated on an indoor localization system deployed with 28 nodes covering 8000 m2, and is shown to outperform existing algorithms.
{"title":"An empirical ranging error model and efficient cooperative positioning for indoor applications","authors":"Shenghong Li, M. Hedley, I. Collings","doi":"10.1109/ICCW.2015.7247275","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247275","url":null,"abstract":"Distributed belief propagation is a promising technology for cooperative localization. Difficulties with belief propagation lie in achieving high accuracy without causing high communication overhead and computational complexity. In this paper, we propose an efficient cooperative localization algorithm based on distributed belief propagation and a new empirical indoor ranging error model, which can be applied to indoor localization systems with non-Gaussian ranging error distributions. To reduce the communication overhead and computational complexity, the algorithm passes approximate beliefs represented by Gaussian distributions between neighbours and uses an analytical approximation to compute peer-to-peer messages. The proposed algorithm is validated on an indoor localization system deployed with 28 nodes covering 8000 m2, and is shown to outperform existing algorithms.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"13 1","pages":"773-778"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81031432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-08DOI: 10.1109/ICCW.2015.7247383
Andres Laya, L. Alonso, P. Chatzimisios, J. Alonso-Zarate
The capacity limits of the Random Access Channel (RACH) of Long Term Evolution (LTE) for highly dense Machine-to-Machine communications are studied in this paper. We consider the case study when a high number of devices attempt to transmit information to the same base station in a very short period of time. Simulations have been performed considering several parameter configurations related to the random access procedure of LTE. The energy consumption is used as a primordial metric to compare any improvement regarding the random access procedure in future releases, in order to evaluate the impact on the battery lifetime of autonomous devices.
{"title":"Massive access in the Random Access Channel of LTE for M2M communications: An energy perspective","authors":"Andres Laya, L. Alonso, P. Chatzimisios, J. Alonso-Zarate","doi":"10.1109/ICCW.2015.7247383","DOIUrl":"https://doi.org/10.1109/ICCW.2015.7247383","url":null,"abstract":"The capacity limits of the Random Access Channel (RACH) of Long Term Evolution (LTE) for highly dense Machine-to-Machine communications are studied in this paper. We consider the case study when a high number of devices attempt to transmit information to the same base station in a very short period of time. Simulations have been performed considering several parameter configurations related to the random access procedure of LTE. The energy consumption is used as a primordial metric to compare any improvement regarding the random access procedure in future releases, in order to evaluate the impact on the battery lifetime of autonomous devices.","PeriodicalId":6464,"journal":{"name":"2015 IEEE International Conference on Communication Workshop (ICCW)","volume":"13 1","pages":"1452-1457"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84761454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}