Multi-User Shared Access for Internet of Things

被引:199
|
作者
Yuan, Zhifeng [1 ]
Yu, Guanghui [1 ]
Li, Weimin [1 ]
Yuan, Yifei [1 ]
Wang, Xinhui [1 ]
Xu, Jun [1 ]
机构
[1] ZTE Corp, Shenzhen, Peoples R China
关键词
Internet of Things (IoT); multi-user shared access (MUSA); non-orthogonal complex spreading; grant-free access; user overloading;
D O I
10.1109/VTCSpring.2016.7504361
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of things (IoT) is widely expected to be an important scenario in the fifth generation (5G) wireless network. Major challenges of IoT include the low cost of devices, low energy consumption, low latency and the ability to support a large number of simultaneous connections. In this article, a new type of non-orthogonal multiple access scheme called multi-user shared access (MUSA) is proposed to support IoT. MUSA adopts a grant-free access strategy to simplify the access procedure significantly and utilizes advanced code domain non-orthogonal complex spreading to accommodate massive number of users in the same radio resources. A family of complex sequences with short length is chosen as spreading sequence for its ability to enable simple and robust successive interference cancellation at the base station side and cope with high user load. Simulation results show that MUSA can achieve significant gain in user overloading performance compared to orthogonal systems, while incurring much lower control overhead.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] ADVERSARIAL MULTI-USER BANDITS FOR UNCOORDINATED SPECTRUM ACCESS
    Bande, Meghana
    Veeravalli, Venugopal V.
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 4514 - 4518
  • [32] A certificateless keyword searchable encryption scheme in multi-user setting for fog-enhanced Industrial Internet of Things
    Olakanmi, Oladayo Olufemi
    Odeyemi, Kehinde Oluwasesan
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04):
  • [33] User Interactive Internet of Things Privacy Preserved Access Control
    Huang, Xin
    Fu, Rong
    Chen, Bangdao
    Zhang, Tingting
    Roscoe, A. W.
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 597 - 602
  • [34] Reusing single-user applications to create multi-user Internet applications
    Lukosch, S
    Roth, J
    INNOVATIVE INTERNET COMPUTING SYSTEMS, PROCEEDINGS, 2001, 2060 : 79 - 90
  • [35] Multi-User PIR with Cyclic Wraparound Multi-Access Caches
    Vaidya, Kanishak
    Rajan, Balaji Sundar
    ENTROPY, 2023, 25 (08)
  • [36] Multi-User Multi-Armed Bandits for Uncoordinated Spectrum Access
    Bande, Meghana
    Veeravalli, Venugopal V.
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 653 - 657
  • [37] Multi-user network paves the way towards a quantum internet
    Wogan, Tim
    PHYSICS WORLD, 2020, 33 (10) : 7 - 7
  • [38] SenseWeb: A multi-user environment for browsing images from the Internet
    Lopez-Gulliver, R
    Hagita, N
    Suzuki, M
    Satoh, T
    Tochigi, H
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 763 - 766
  • [39] Search Control in Multi-user Searchable Encryption without Shared keys
    Nair, Manju S.
    Rajasree, M. S.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON DATA SCIENCE & ENGINEERING (ICDSE), 2016, : 197 - 201
  • [40] Mobility-Aware Access Strategy in Multi-User HetNets
    Chen, Changshan
    Zhao, Xinsheng
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (07) : 1004 - 1008