TY - JOUR
T1 - Enhanced radio access and data transmission procedure s facilitating industry-compliant machine-type communications over LT E-based 5g networks
AU - Condoluci, Massimo
AU - Dohler, Mischa
AU - Araniti, Giuseppe
AU - Molinaro, Antonella
AU - Sachs, Joachim
PY - 2016/2
Y1 - 2016/2
N2 - Priority alarm messages for MTC in industry applications require guaranteed delays of a few dozen milliseconds only, with super-critical applications even calling for below-10-ms access. With the best state-of-the-art cellular systems barely able to meet below-50-ms delays, in this article we propose some important improvements to the 3GPP MTC access procedure allowing a significantly performance boost for alarm messages. Notably, the first method encompasses an SMSlike approach where the alarm is transmitted in a secure and backward-compatible form over the connection-establishing access channel, thus allowing the data transmission to be terminated significantly earlier and to support emerging critical alarm messages. The second method uses a secure and previously agreed sequence of random access codes to convey super-critical alerts within a few milliseconds, and is thus able to support emergency alarm messages. Both methods not only achieve control-compliant access delays but are also highly energy efficient, thus allowing long battery lifetimes and hence quicker uptake by the industry.
AB - Priority alarm messages for MTC in industry applications require guaranteed delays of a few dozen milliseconds only, with super-critical applications even calling for below-10-ms access. With the best state-of-the-art cellular systems barely able to meet below-50-ms delays, in this article we propose some important improvements to the 3GPP MTC access procedure allowing a significantly performance boost for alarm messages. Notably, the first method encompasses an SMSlike approach where the alarm is transmitted in a secure and backward-compatible form over the connection-establishing access channel, thus allowing the data transmission to be terminated significantly earlier and to support emerging critical alarm messages. The second method uses a secure and previously agreed sequence of random access codes to convey super-critical alerts within a few milliseconds, and is thus able to support emergency alarm messages. Both methods not only achieve control-compliant access delays but are also highly energy efficient, thus allowing long battery lifetimes and hence quicker uptake by the industry.
UR - http://www.scopus.com/inward/record.url?scp=84963960478&partnerID=8YFLogxK
U2 - 10.1109/MWC.2016.7422406
DO - 10.1109/MWC.2016.7422406
M3 - Article
AN - SCOPUS:84963960478
SN - 1536-1284
VL - 23
SP - 56
EP - 63
JO - IEEE WIRELESS COMMUNICATIONS
JF - IEEE WIRELESS COMMUNICATIONS
IS - 1
ER -