Filtering methods for efficient dynamic access control in 5G massive machine-type communication scenarios

Israel Leyva-Mayorga*, Miguel A. Rodriguez-Hernandez, Vicent Pla, Jorge Martinez-Bauset

*Corresponding author for this work

    Research output: Contribution to journalJournal articleResearchpeer-review

    2 Citations (Scopus)
    18 Downloads (Pure)

    Abstract

    One of the three main use cases of the fifth generation of mobile networks (5G) is massive machine-type communications (mMTC). The latter refers to the highly synchronized accesses to the cellular base stations from a great number of wireless devices, as a product of the automated exchange of small amounts of data. Clearly, an efficient mMTC is required to support the Internet-of-Things (IoT). Nevertheless, the method to change from idle to connected mode, known as the random access procedure (RAP), of 4G has been directly inherited by 5G, at least, until the first phase of standardization. Research has demonstrated the RAP is inefficient to support mMTC, hence, access control schemes are needed to obtain an adequate performance. In this paper, we compare the benefits of using different filtering methods to configure an access control scheme included in the 5G standards: the access class barring (ACB), according to the intensity of access requests. These filtering methods are a key component of our proposed ACB configuration scheme, which can lead to more than a three-fold increase in the probability of successfully completing the random access procedure under the most typical network configuration and mMTC scenario.

    Original languageEnglish
    Article number27
    JournalElectronics (Switzerland)
    Volume8
    Issue number1
    ISSN2079-9292
    DOIs
    Publication statusPublished - Jan 2019

    Keywords

    • Access class barring (ACB)
    • Adaptive algorithms
    • Internet-of-things (IoT)
    • Massive machine-type communication (mMTC)
    • Recursive-least squares (RLS) algorithm

    Fingerprint

    Dive into the research topics of 'Filtering methods for efficient dynamic access control in 5G massive machine-type communication scenarios'. Together they form a unique fingerprint.

    Cite this