Filtering methods for efficient dynamic access control in 5G massive machine-type communication scenarios

Israel Leyva-Mayorga*, Miguel A. Rodriguez-Hernandez, Vicent Pla, Jorge Martinez-Bauset

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

2 Citations (Scopus)
10 Downloads (Pure)

Abstract

One of the three main use cases of the fifth generation of mobile networks (5G) is massive machine-type communications (mMTC). The latter refers to the highly synchronized accesses to the cellular base stations from a great number of wireless devices, as a product of the automated exchange of small amounts of data. Clearly, an efficient mMTC is required to support the Internet-of-Things (IoT). Nevertheless, the method to change from idle to connected mode, known as the random access procedure (RAP), of 4G has been directly inherited by 5G, at least, until the first phase of standardization. Research has demonstrated the RAP is inefficient to support mMTC, hence, access control schemes are needed to obtain an adequate performance. In this paper, we compare the benefits of using different filtering methods to configure an access control scheme included in the 5G standards: the access class barring (ACB), according to the intensity of access requests. These filtering methods are a key component of our proposed ACB configuration scheme, which can lead to more than a three-fold increase in the probability of successfully completing the random access procedure under the most typical network configuration and mMTC scenario.

Original languageEnglish
Article number27
JournalElectronics (Switzerland)
Volume8
Issue number1
ISSN2079-9292
DOIs
Publication statusPublished - Jan 2019
Externally publishedYes

Keywords

  • Access class barring (ACB)
  • Adaptive algorithms
  • Internet-of-things (IoT)
  • Massive machine-type communication (mMTC)
  • Recursive-least squares (RLS) algorithm

Fingerprint

Dive into the research topics of 'Filtering methods for efficient dynamic access control in 5G massive machine-type communication scenarios'. Together they form a unique fingerprint.

Cite this