Unsourced Multiple Access with Common Alarm Messages: Network Slicing for Massive and Critical IoT

Khac Hoang Ngo*, Giuseppe Durisi, Alexandre Graell I Amat, Petar Popovski, Anders E. Kalor, Beatriz Soret

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

Abstract

We investigate the coexistence of massive and critical Internet of Things (IoT) services in the context of the unsourced multiple access (UMA) framework introduced by Polyanskiy (2017), where all users employ a common codebook and the receiver returns an unordered list of decoded codewords. This setup is suitably modified to introduce heterogeneous traffic. Specifically, to model the massive IoT service, we assume that a standard message originates independently from each IoT device as in the standard UMA setup. To model the critical IoT service, we assume the generation of alarm messages that are common for all devices. This setup requires a significant redefinition of the error events, i.e., misdetections and false positives. We further assume that the number of active users in each transmission attempt is random and unknown. We derive a random-coding achievability bound on the misdetection and false positive probabilities of both standard and alarm messages on the Gaussian multiple access channel. Using our bound, we demonstrate that orthogonal network slicing enables massive and critical IoT to coexist under the requirement of high energy efficiency. On the contrary, we show that nonorthogonal network slicing is energy inefficient due to the residual interference from the alarm signal when decoding the standard messages.

Original languageEnglish
JournalIEEE Transactions on Communications
Volume72
Issue number2
Pages (from-to)907-923
Number of pages17
ISSN0090-6778
DOIs
Publication statusPublished - 1 Feb 2024

Bibliographical note

Publisher Copyright:
© 1972-2012 IEEE.

Keywords

  • false positive
  • Internet of Things
  • misdetection
  • network slicing
  • random-coding bound
  • unsourced multiple access

Fingerprint

Dive into the research topics of 'Unsourced Multiple Access with Common Alarm Messages: Network Slicing for Massive and Critical IoT'. Together they form a unique fingerprint.

Cite this