Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.展开更多
Social distancing and self-isolation management are crucial preventive measures that can save millions of lives during challenging pandemics of diseases such as the Spanish u,swine u,and coronavirus disease 2019(COVID...Social distancing and self-isolation management are crucial preventive measures that can save millions of lives during challenging pandemics of diseases such as the Spanish u,swine u,and coronavirus disease 2019(COVID-19).This study describes the comprehensive and effective implementation of the Industrial Internet of Things and machine-to-machine technologies for social distancing and smart self-isolation management.These technologies can help prevent outbreaks of any disease that can disperse widely and develop into a pandemic.Initially,a smart wristband is proposed that incorporates Bluetooth beacon technology to facilitate the tracing and tracking of Bluetooth Low Energy beacon packets for smart contact tracing.Second,the connectivity of the device with Android or iOS applications using long-term evolution technology is realized to achieve mobility.Finally,mathematical formulations are proposed to measure the distance between coordinates in order to detect geo-fencing violations.These formulations are specically designed for the virtual circular and polygonal boundaries used to restrict suspected or infected persons from trespassing in predetermined areas,e.g.,at home,in a hospital,or in an isolation ward.The proposed framework outperforms existing solutions,since it is implemented on a wider scale,provides a range of functionalities,and is cost-effective.展开更多
Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchro...Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things.展开更多
In this paper, we propose a novel multiple access rateless network coding scheme for machine-to-machine (M 2M) communications. The presented scheme is capable of increasing transmission efficiency by reducing occupi...In this paper, we propose a novel multiple access rateless network coding scheme for machine-to-machine (M 2M) communications. The presented scheme is capable of increasing transmission efficiency by reducing occupied time slots yet with high decoding suc-cess rates. Unlike existing state-of-the-art distributed rateless coding schemes, the proposed rateless network coding can dynami-cally recode by using simple yet effective XOR operations, which is suitable for M2M erasure networks. Simulation results and analysis demonstrate that the proposed scheme outperforms the existing distributed rateless network coding schemes in the scenar-io of M2M multicast network with heterogeneous erasure features.展开更多
In the near future, there are expected to have at least billions of devices interconnected with each other. How to connect so many devices becomes a big issue. Machine-to-Machine (M2M) communications serve as the fund...In the near future, there are expected to have at least billions of devices interconnected with each other. How to connect so many devices becomes a big issue. Machine-to-Machine (M2M) communications serve as the fundamental underlying technologies to support such Internet of Things (IoT) applications. The characteristics and services requirements of machine type communication devices (MTCDs) are totally different from the existing ones. Existing network technologies, ranging from personal area networks to wide area networks, are not well suited for M2M communications. Therefore, we first investigate the characteristics and service requirements for MTCDs. Recent advances in both cellular and capillary M2M communications are also discussed. Finally, we list some open issues and future research directions. 展开更多
In the near future,there will be many more embedded devices than there are mobile phones.When these devices are connected to the Internet,many novel kinds of ubiquitous service will be enabled.
In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we pro...In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we propose a novel random access(RA) and resource allocation scheme for the coexistence of NOMA-based and OMAbased machine-to-machine(M2M) communications,which aims at improving the number of successful data packet transmissions and guaranteeing the quality of service(Qo S) (e.g.,the minimum data rate requirement) for M2 M communications.The algorithm of joint user equipment(UE) paring and power allocation is proposed for the coexisting RA(i.e.,the coexistence of NOMA-based RA and OMA-based RA) .The resource allocation for the coexisting RA is investigated,thus improving the number of successful data packet transmissions by more efficiently using the radio resources.Simulation results demonstrate that the proposed RA and resource allocation scheme outperforms the conventional RA in terms of the number of successful data packet transmissions,thus is a promising technology in future M2 M communications.展开更多
In this study, an improved random access(RA) scheme for Machine-to-Machine(M2M) communications is proposed. The improved RA scheme is realized by two steps. First, the improved RA scheme achieves a reasonable resource...In this study, an improved random access(RA) scheme for Machine-to-Machine(M2M) communications is proposed. The improved RA scheme is realized by two steps. First, the improved RA scheme achieves a reasonable resource tradeoff between physical random access channel(PRACH) and physical uplink shared channel(PUSCH). To realize a low-complexity resource allocation between PRACH and PUSCH, a boundary of traffic load is derived to divide the number of active M2 M users(UEs) into multiple intervals. The corresponding resource allocation for these intervals is determined by e NB. Then the resource allocation for other number of UEs can be obtained from the allocation of these intervals with less computation. Second, the access barring on arrival rate of new UEs is introduced in the improved RA scheme to reduce the expected delay. Numerical results show that the proposed improved RA scheme can realize a low-complexity resource allocation between PRACH and PUSCH. Meanwhile, the expected delay can be effectively reduced by access barring on arriving rate of new M2 M UEs.展开更多
Cognitive radio(CR) is regarded as a promising technology for providing a high spectral efficiency to mobile users by using heterogeneous wireless network architectures and dynamic spectrum access techniques.However,c...Cognitive radio(CR) is regarded as a promising technology for providing a high spectral efficiency to mobile users by using heterogeneous wireless network architectures and dynamic spectrum access techniques.However,cognitive radio networks(CRNs)may also impose some challenges due to the ever increasing complexity of network architecture,the increasing complexity with configuration and management of large-scale networks,fluctuating nature of the available spectrum,diverse Quality-of-Service(QoS)requirements of various applications,and the intensifying difficulties of centralized control,etc.Spectrum management functions with self-organization features can be used to address these challenges and realize this new network paradigm.In this paper,fundamentals of CR,including spectrum sensing,spectrum management,spectrum mobility and spectrum sharing,have been surveyed,with their paradigms of self-organization being emphasized.Variant aspects of selforganization paradigms in CRNs,including critical functionalities of Media Access Control(MAC)- and network-layer operations,are surveyed and compared.Furthermore,new directions and open problems in CRNs are also identified in this survey.展开更多
Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new m...Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.展开更多
Remote sensing data acquisition is one of the most essential processes in the field of Earth observation.However,traditional methods to acquire data do not satisfy the requirements of current applications because larg...Remote sensing data acquisition is one of the most essential processes in the field of Earth observation.However,traditional methods to acquire data do not satisfy the requirements of current applications because large-scale data processing is required.To address this issue,this paper proposes a data acquisition framework that carries out remote sensing metadata planning and then realizes the online acquisition of large amounts of data.Firstly,this paper establishes a unified metadata cataloging model and realizes the catalog of metadata in a local database.Secondly,a coverage calculation model is presented,which can show users the data coverage information in a selected geographical region under the data requirements of a specific application.Finally,according to the data retrieval results and the coverage calcula-tion,a machine-to-machine interface is provided to acquire target remote sensing data.Experiments were conducted to verify the availability and practicality of the proposed frame-work,and the results show the strengths and powerful capabilities of our framework by overcoming deficiencies in traditional methods.It also achieved the online automatic acquisi-tion of large-scale heterogeneous remote sensing data,which can provide guidance for remote sensing data acquisition strategies.展开更多
基金the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.GRANT5,208).
文摘Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
基金supported by Data and Articial Intelligence Scientic Chair at Umm Al-Qura University,Makkah City,Saudi Arabia。
文摘Social distancing and self-isolation management are crucial preventive measures that can save millions of lives during challenging pandemics of diseases such as the Spanish u,swine u,and coronavirus disease 2019(COVID-19).This study describes the comprehensive and effective implementation of the Industrial Internet of Things and machine-to-machine technologies for social distancing and smart self-isolation management.These technologies can help prevent outbreaks of any disease that can disperse widely and develop into a pandemic.Initially,a smart wristband is proposed that incorporates Bluetooth beacon technology to facilitate the tracing and tracking of Bluetooth Low Energy beacon packets for smart contact tracing.Second,the connectivity of the device with Android or iOS applications using long-term evolution technology is realized to achieve mobility.Finally,mathematical formulations are proposed to measure the distance between coordinates in order to detect geo-fencing violations.These formulations are specically designed for the virtual circular and polygonal boundaries used to restrict suspected or infected persons from trespassing in predetermined areas,e.g.,at home,in a hospital,or in an isolation ward.The proposed framework outperforms existing solutions,since it is implemented on a wider scale,provides a range of functionalities,and is cost-effective.
基金supported by the Major Research plan of the National Natural Science Foundation of China 9118008National Key Technology R&D Program of the Ministry of Science and Technology 2014BAC16B01
文摘Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things.
基金supported in part by Natural Scientific Research Innovation Foundation in Harbin Institute of Technology under Grant No.HIT.NSRIF 2017051Shenzhen Basic Research Program under Grant Nos.JCYJ20150930150304185 and JCYJ2016 0328163327348National High Technology Research & Development Program of China under Grant No.2014AA01A704
文摘In this paper, we propose a novel multiple access rateless network coding scheme for machine-to-machine (M 2M) communications. The presented scheme is capable of increasing transmission efficiency by reducing occupied time slots yet with high decoding suc-cess rates. Unlike existing state-of-the-art distributed rateless coding schemes, the proposed rateless network coding can dynami-cally recode by using simple yet effective XOR operations, which is suitable for M2M erasure networks. Simulation results and analysis demonstrate that the proposed scheme outperforms the existing distributed rateless network coding schemes in the scenar-io of M2M multicast network with heterogeneous erasure features.
文摘In the near future, there are expected to have at least billions of devices interconnected with each other. How to connect so many devices becomes a big issue. Machine-to-Machine (M2M) communications serve as the fundamental underlying technologies to support such Internet of Things (IoT) applications. The characteristics and services requirements of machine type communication devices (MTCDs) are totally different from the existing ones. Existing network technologies, ranging from personal area networks to wide area networks, are not well suited for M2M communications. Therefore, we first investigate the characteristics and service requirements for MTCDs. Recent advances in both cellular and capillary M2M communications are also discussed. Finally, we list some open issues and future research directions.
文摘In the near future,there will be many more embedded devices than there are mobile phones.When these devices are connected to the Internet,many novel kinds of ubiquitous service will be enabled.
基金supported by the National Natural Science Foundation of China(61501056)National Science and Technology Major Project of China(No.2016ZX03001012)the Research Fund of ZTE Corporation
文摘In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we propose a novel random access(RA) and resource allocation scheme for the coexistence of NOMA-based and OMAbased machine-to-machine(M2M) communications,which aims at improving the number of successful data packet transmissions and guaranteeing the quality of service(Qo S) (e.g.,the minimum data rate requirement) for M2 M communications.The algorithm of joint user equipment(UE) paring and power allocation is proposed for the coexisting RA(i.e.,the coexistence of NOMA-based RA and OMA-based RA) .The resource allocation for the coexisting RA is investigated,thus improving the number of successful data packet transmissions by more efficiently using the radio resources.Simulation results demonstrate that the proposed RA and resource allocation scheme outperforms the conventional RA in terms of the number of successful data packet transmissions,thus is a promising technology in future M2 M communications.
基金supported by Key Laboratory of Universal Wireless Communications(Beijing University of Posts and Telecommunications),Ministry of Education,P.R.China,KFKT-2014103)National Science and Technology Major Project of China(No.2013ZX03006001)National Natural Science Foundation of China(61501056)
文摘In this study, an improved random access(RA) scheme for Machine-to-Machine(M2M) communications is proposed. The improved RA scheme is realized by two steps. First, the improved RA scheme achieves a reasonable resource tradeoff between physical random access channel(PRACH) and physical uplink shared channel(PUSCH). To realize a low-complexity resource allocation between PRACH and PUSCH, a boundary of traffic load is derived to divide the number of active M2 M users(UEs) into multiple intervals. The corresponding resource allocation for these intervals is determined by e NB. Then the resource allocation for other number of UEs can be obtained from the allocation of these intervals with less computation. Second, the access barring on arrival rate of new UEs is introduced in the improved RA scheme to reduce the expected delay. Numerical results show that the proposed improved RA scheme can realize a low-complexity resource allocation between PRACH and PUSCH. Meanwhile, the expected delay can be effectively reduced by access barring on arriving rate of new M2 M UEs.
基金ACKNOWLEDGEMENT This work was supported by National Natural Science Foundation of China (No. 61172050), Program for New Century Excellent Talents in University (NECT-12-0774), the open research fund of National Mobile Communications Research Laboratory, Southeast University (No.2013D12), the Foundation of Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services. The corresponding author is Dr. Zhongshan Zhang.
文摘Cognitive radio(CR) is regarded as a promising technology for providing a high spectral efficiency to mobile users by using heterogeneous wireless network architectures and dynamic spectrum access techniques.However,cognitive radio networks(CRNs)may also impose some challenges due to the ever increasing complexity of network architecture,the increasing complexity with configuration and management of large-scale networks,fluctuating nature of the available spectrum,diverse Quality-of-Service(QoS)requirements of various applications,and the intensifying difficulties of centralized control,etc.Spectrum management functions with self-organization features can be used to address these challenges and realize this new network paradigm.In this paper,fundamentals of CR,including spectrum sensing,spectrum management,spectrum mobility and spectrum sharing,have been surveyed,with their paradigms of self-organization being emphasized.Variant aspects of selforganization paradigms in CRNs,including critical functionalities of Media Access Control(MAC)- and network-layer operations,are surveyed and compared.Furthermore,new directions and open problems in CRNs are also identified in this survey.
文摘Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.
基金supported by the Strategic Priority Research Program of the Chinese Academy of Sciences[grant number XDA19020201]。
文摘Remote sensing data acquisition is one of the most essential processes in the field of Earth observation.However,traditional methods to acquire data do not satisfy the requirements of current applications because large-scale data processing is required.To address this issue,this paper proposes a data acquisition framework that carries out remote sensing metadata planning and then realizes the online acquisition of large amounts of data.Firstly,this paper establishes a unified metadata cataloging model and realizes the catalog of metadata in a local database.Secondly,a coverage calculation model is presented,which can show users the data coverage information in a selected geographical region under the data requirements of a specific application.Finally,according to the data retrieval results and the coverage calcula-tion,a machine-to-machine interface is provided to acquire target remote sensing data.Experiments were conducted to verify the availability and practicality of the proposed frame-work,and the results show the strengths and powerful capabilities of our framework by overcoming deficiencies in traditional methods.It also achieved the online automatic acquisi-tion of large-scale heterogeneous remote sensing data,which can provide guidance for remote sensing data acquisition strategies.