Efficient C-RAN Random Access for IoT Devices: Learning Links via Recommendation Systems

نویسندگان

  • Ozgun Y. Bursalioglu
  • Zheda Li
  • Chenwei Wang
  • Haralabos C. Papadopoulos
چکیده

We focus on C-RAN random access protocols for IoT devices that yield low-latency high-rate active-device detection in dense networks of large-array remote radio heads. In this context, we study the problem of learning the strengths of links between detected devices and network sites. In particular, we develop recommendation-system inspired algorithms, which exploit random-access observations collected across the network to classify links between active devices and network sites across the network. Our simulations and analysis reveal the potential merit of data-driven schemes for such on-the-fly link classification and subsequent resource allocation across a wide-area network.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

The Optimal MMSE Transceiver Design for IoT-oriented Cognitive Radio Systems

This paper studies interference alignment scheme and minimum mean square error (MMSE) improvement in Internet of Things (IoT)-oriented cognitive systems, where IoT devices share the licensed spectrum by cognitive radio in spectrum underlay. Target to manage the inter-tier interference caused by cognitive spectrum sharing as well as ensure an MMSE at receivers, the interference alignment algorit...

متن کامل

The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...

متن کامل

Energy Efficient Barring Factor Enabled Extended Access Barring for IoT Devices in LTE-Advanced

Synchronized Random Access Channel (RACH) attempts by Internet of Things (IoT) devices could result in Radio Access Network (RAN) overload in LTE-A. 3GPP adopted Barring Bitmap Enabled-Extended Access Barring (EAB-BB) mechanism that announces the EAB information (i.e., a list of barred Access Classes) through a barring bitmap as the baseline solution to mitigate the RAN overload. EAB-BB was ana...

متن کامل

IoT Security Techniques Based on Machine Learning

Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques includi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1801.04001  شماره 

صفحات  -

تاریخ انتشار 2018