Machine-to-Machine Communication: An Overview of Opportunities

Machine-to-Machine Communication: An Overview of Opportunities

Accepted Manuscript Machine-to-Machine Communication: An Overview of Opportunities Oluwatosin Ahmed Amodu, Mohamed Othman PII: DOI: Reference: S1389...

3MB Sizes 1 Downloads 69 Views

Accepted Manuscript

Machine-to-Machine Communication: An Overview of Opportunities Oluwatosin Ahmed Amodu, Mohamed Othman PII: DOI: Reference:

S1389-1286(18)30851-X https://doi.org/10.1016/j.comnet.2018.09.001 COMPNW 6583

To appear in:

Computer Networks

Received date: Revised date: Accepted date:

21 February 2018 6 August 2018 2 September 2018

Please cite this article as: Oluwatosin Ahmed Amodu, Mohamed Othman, Machine-toMachine Communication: An Overview of Opportunities, Computer Networks (2018), doi: https://doi.org/10.1016/j.comnet.2018.09.001

This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

ACCEPTED MANUSCRIPT

Machine-to-Machine Communication: An Overview of Opportunities

CR IP T

Oluwatosin Ahmed Amodu∗, Mohamed Othman

Department of Communication Technology and Network, Universiti Putra Malaysia, 43400 UPM, Serdang, Selangor Darul Ehsan, Malaysia.

AN US

Abstract

M

The envisioned capability of machine devices to autonomously communicate in the future Internet of Things (IoT) has brought considerable attention to machine-to-machine (M2M) communication in recent years. This paradigm has applications in homes, safety, transport, health, and industry. As an active focus of research, there are interesting open questions on several of its aspects, which we aim to capture in this paper. Accompanied by an attempted classification of existing surveys on M2M, we propose a followable exposition on the challenges and open research opportunities that embrace the diverse facets of M2M.

ED

Keywords: access problems, applications, challenges, home, mobile, open issues, standards, survey, taxonomy, technologies, M2M, MAC.

PT

1. Introduction

AC

CE

Machine-to-Machine (M2M) communication is the autonomous interaction of a large number of machine devices to perform sensing, processing, and actuation activities without human intervention. These devices include meters in a smart grid, electronics and servers, and navigation sensors used for relaying information through a network. The main feature that sets M2M apart from other communication paradigms is the absence of human supervision [1, 2, 3, 4, 5]. The primary objective of M2M communication is to ∗

Corresponding author Email addresses: [email protected] (Oluwatosin Ahmed Amodu), [email protected]; [email protected] (Mohamed Othman)

Preprint submitted to Computer Networks

September 3, 2018

ACCEPTED MANUSCRIPT

• The emergent automation of machine devices

CR IP T

enable communication among smart devices [6]. This fast-growing paradigm with billions of inter-connected machines used for various applications is imminent [7]. M2M has been a focus of extensive research in recent years because of several reasons. Some of the reasons and enablers of M2M include [5, 7, 8, 9, 10, 11]:

• The pervasiveness of high-speed internet access

• The declining cost of sensing and actuating devices

AN US

• The cheap, ubiquitous connectivity of electronic gadgets • The utility and variety of M2M applications

• The projected impact of M2M communication on cellular network connections and the growth rate • The use of machine devices in locations unfrequented by humans

M

• The potential of M2M communication in generating revenue for cellular operators

AC

CE

PT

ED

M2M applications span across various fields such as health, monitoring, security, home, and city automation. To facilitate such autonomous communication, several challenges must be addressed in different areas. Among other reasons, these challenges emerge from the unique characteristics of M2M communication in different architectural domains and its diverse applications. In this paper, we present the challenges and opportunities associated with various aspects of M2M communication shown in Figure 1, which is based on the emphasis placed on such aspects in the existing literature (see Figure 2). We provide a high-level summary of relevant literature in each aspect, indicating some other related articles, to familiarise readers with other recent research. The organisation of the main sections of this paper (Sections 2 to 7) is shown in Figure 3. A more general approach to classifying M2M communication is to categorise it into cellular and capillary M2M communication as presented in [12]. However, our discussion in this paper emphasises the aspects of the research in the literature from different perspectives such as application use cases. 2

PT

ED

M

AN US

CR IP T

ACCEPTED MANUSCRIPT

Figure 1: Classification of themes for M2M communication

AC

CE

It is worth noting that the classified aspects in this paper are not fully orthogonal because the objective is to emphasise the opportunities that are available based on a careful study of existing surveys in this field. For instance, Long-Term Evolution (LTE)/Long-Term Evolution-Advanced (LTEA) can be classified as a standard but we have included LTE/LTE-A as a separate section for emphasis. Furthermore, [7, 12, 13] could have assumed a more general classification but a key aspect in each survey was considered. Our findings demonstrate that as the number of existing surveys increase, it is essential to capture some of the key efforts that have been presented in such surveys. Therefore, we present Figures 4, 5 and 6. 3

ACCEPTED MANUSCRIPT

AN US

CR IP T

Figures 4 and 5 classify summary tables presented in these references, guiding the interested reader to associated references for subjects of interest. For example, a reader can find an ‘overview of contention-based channel access mechanisms in various communication technologies for IoT’ under medium access in Figure 5 in reference [14]. Similarly, Figure 6 guides readers to cardinal illustrations (such as architectures) in the literature. The remainder of this paper is organised as follows: Section 2 examines issues related to medium access of the M2M wireless channel. Section 3 discusses M2M architecture and technologies associated with home applications. Section 4 provides insights into M2M for mobile deployments, which includes the challenges, vehicular M2M architecture and related issues. Section 5 explores several standardisation efforts in M2M/IoT. Section 6 examines cellular LTE/LTE-A networks and ultra-dense networks (UDNs). Section 7 analyses issues concerning energy efficiency, reliability, and security in M2M with potential solutions. Section 8 concludes this paper. Common notations used in this paper are provided in Table 1 within the appendix.

M

2. Medium Access

CE

PT

ED

As M2M is envisioned to involve millions of machine devices, it presents several challenges in research. One of the fundamental issues of critical concern is the inability of access management mechanisms in traditional wireless networks to accommodate the unprecedented number of projected devices while satisfying the necessary quality of service (QoS) requirements. In this section, we will discuss the fundamental issues pertaining to medium access protocols in traditional and cellular networks, including their pros and cons. Considerations for choosing or designing protocols and open issues will be discussed.

AC

2.1. MAC protocols for M2M Medium access control (MAC) schemes define the rules which allow devices to communicate with each other in an orderly and efficient manner [35]. The development of MAC protocols plays a vital role in the pursuit of autonomous machine communication. Generally, traditional MAC protocols can be broadly categorised into three classes, namely contentionbased, contention-free, and hybrid schemes. These three schemes differ in the approach by which transmission time slots are acquired and managed. In contention-based schemes, nodes contend for access to the shared medium. 4

ED

M

AN US

CR IP T

ACCEPTED MANUSCRIPT

Figure 2: Taxonomy of survey papers for M2M communication

AC

CE

PT

Whenever any node acquires the channel, it transmits at a specific time slot. The node defers transmission if the channel is busy. If the state of the channel is empty, the node transmits or backs-off for a random time before it transmits [16]. Contention-free schemes, on the other hand, have pre-allocated time slots for each node to transmit. Hybrid schemes combine both contention-based and contention-free schemes. Contention-based schemes do not scale at high loads i.e. their performance degrades with an increase in the number of nodes. Contention-based schemes are also not energy-efficient as the retransmission of packets leads to energy loss. Another issue is that in contention-based schemes where nodes back-off because of contention, the back-off parameters are selected based on the traffic load. Clearly, this may not be efficient in applications where 5

ACCEPTED MANUSCRIPT

Introduction

CR IP T

A primer to introduce each aspect

Discussion on key aspects

Main Section

Subsections

Future considerations

AN US

Relevant Literature

Main references and other associated references

M

Figure 3: Organisation of main sections in this paper

AC

CE

PT

ED

delay-critical information must be shared for safety as in the case of sharing information between pedestrians, vehicles, and road infrastructure [14]. On the contrary, contention-free schemes are more energy efficient and possess better scalability. However, they cannot adapt to dynamic network conditions because node transmission occurs at scheduled time slots. Delay is also incurred since devices would have to wait for their assigned time slots. The use of hybrid schemes, which combine the advantages of the above approaches and offset the demerits, have also been considered in the wireless networks (adhoc and sensor network) literature [36] and recently for M2M [37, 38, 39]. In terms of the fraction of channel capacity deployed for data transmission i.e. throughput, hybrid schemes generally perform better than contention-based schemes (especially at high loads). However, hybrid schemes still incur longer delays as compared with contention-free schemes e.g. Time Division Multiple Access (TDMA) for lesser number of devices in [37, 38]. Tree-based schemes such as the distributed queuing (DQ) algorithm [41] where a group of contending devices are iteratively split to smaller subgroups 6

ACCEPTED MANUSCRIPT

AN US

CR IP T

to reduce collisions, have been studied and found suitable for M2M networks [40]. Specifically, the DQ algorithm achieves fairness and scalability for an unlimited number of devices [14, 15]. Recently, a hybrid collision avoidance tree-resolution mechanism was proposed in [42]. The scheme demonstrates better performance compared with collision avoidance mechanisms without the tree-based access. [43] proposed a hybrid of adaptive slotted-ALOHA and TDMA to achieve resource utilisation in LTE/LTE-A under strict fairness constraints. The authors [44] proposed a hybrid of slotted-CSMA and TDMA for massive IoT devices. The algorithm caters to an efficient registration of up to eight thousand devices when these devices attempt to register at one centralized access point. [45] combines contention and contention-free mechanisms to address preamble collision in LTE because of periodic machine access. A number of further directions associated with the MAC layer includes [8, 16]: • Handling scalability for massive machine device connections; • Designing MAC layer schedulers for M2M applications;

M

• Incorporating low power communication into scalable MAC protocol design;

ED

• Supporting priority access for applications such as alarming applications by supporting differentiated bandwidth requests, resource reservation, admission control, and priority-based service pre-emption;

PT

• Devising support for diverse QoS requirements; • Deploying heterogeneous transceivers;

CE

• Designing MAC protocols that support multi-hop architectures; • Developing energy-harvesting aware MAC protocols;

AC

• Devising support for clustering at the MAC layer; • Supporting new technologies like wake-up radio; • Designing mobility-aware MAC protocols; • Devising support for intra-M2M connectivity at the MAC layer. 7

ACCEPTED MANUSCRIPT

Apart from the above issues related to the MAC layer, cross-layer optimisation should be intuitively enhanced in a manner that is independent of the production of new commercial hardware [7].

AC

CE

PT

ED

M

AN US

CR IP T

Relevant Literature In the survey entitled ‘A Survey of MAC layer Issues and Protocols for Machine-to-Machine Communications’ [8], the authors highlighted the key characteristics of MAC protocols for M2M communication with a focus on ensuring scalable, efficient, and fair channel access for machine devices. They discussed MAC protocols specifically proposed for M2M communication. Limitations for [46, 47, 48] were highlighted; however, no critique was presented for [49, 50, 51]. Future work is required to extend the proposed taxonomy for medium access proposals with the inclusion of tree-based contention resolution, energy-harvesting protocols, and other recent proposals. Among others, this work has been referenced in [52, 53, 54, 55]. Authors in [52] presented a comprehensive survey of fog and cloud Radio Access Network (RAN) for 5th Generation wireless system (5G) networks; investigating a synergy of these two architectures for the diverse needs of 5G mobile networks. [53] designed a random access scheme for M2M data transmission in applications with delay constraints. The protocol inherits the benefits of DQ’s collision resolution as well as the efficiency of the data transmission in Multiple-input and Multiple-output (MIMO). Recently, [54] proposed an intelligent CSMA-based collision avoidance mechanism suitable for capillary M2M communication characterised by low power and short-range transmissions. [55] studied a multi-channel CSMA for M2M communication. They show that the traffic load defines the gains in energy efficiency and delay achieved when the frequency band is divided into sub-bands Laya et al. considered the MAC solutions for IoT in the article ‘Goodbye Aloha!’ [14]. They presented the DQ protocol, demonstrating that it works for an infinite number of machine devices regardless of the network load and traffic pattern. A major contribution is its invitation of the research community to consider an alternative to the current ALOHA-based protocols for deployment in IoT. This paper has been referred to in [56, 57, 58]. Reference [56] surveyed low power wide area (LPWA) networks and [57] reviewed LTE random access channel (RACH) for IoT, evaluating the performance of 3rd Generation Partnership Project (3GPP) schemes for overload control. Similarly, [58] addressed preamble collision for massive smart devices using the preamble grouping method. 8

ACCEPTED MANUSCRIPT

CR IP T

Recently, [16] presented ‘A survey of hybrid MAC protocols for machineto-machine communications’. The paper focused on peculiar areas pertaining to a recent trend in MAC protocol design for M2M by providing insights into the objectives and problems solved in different protocols while revealing enhancement opportunities and potential future directions. Some of the future directions identified include the use of directional antennas, wake-up radios, energy-harvesting and multi-hop MAC protocols.

ED

M

AN US

2.2. Access Management for Cellular M2M In cellular networks, devices also contend for access to the wireless channel. Because M2M networks consist of a massive number of devices, this necessitates the consideration of a highly effective contention resolution procedure i.e. an approach by which transmission collision can be resolved to ensure the effective utilisation of wireless radio resources. For example, there is a standard random access (RA) procedure that defines how devices attempt to access the channel and mechanisms for handling collisions in LTE. This procedure is necessary because devices contend while requesting for transmission or during reconnection after a failure. Measures that can be used for evaluation and performance comparisons of access management techniques for M2M in cellular networks include access delay, transmission success rate, energy efficiency and QoS guarantee of machine devices. These metrics can be defined as follows [5]:

PT

• Access delay refers to the length of time between the initiation and completion of random access procedure. • Success rate refers to the rate by which random access attempts are successful considering the maximum number retransmissions allowable.

CE

• Energy Efficiency refers to the total amount of energy which is spent during the access management process.

AC

• QoS guarantee refers to the ability of machine devices to meet peculiar service requirements such as delay.

With regards to the above mentioned measures, it is highly desired that devices are not delayed access beyond the application QoS constraint. The rate of transmission success should also be high. Another important factor to be considered is device mobility. For example, in applications such as 9

AC

CE

PT

ED

M

AN US

CR IP T

ACCEPTED MANUSCRIPT

Figure 4: Summary tables in literature and their references

10

AC

CE

PT

ED

M

AN US

CR IP T

ACCEPTED MANUSCRIPT

Figure 5: Summary tables in literature and their references

11

ACCEPTED MANUSCRIPT

AN US

CR IP T

vehicular M2M, the mobility of devices should be accommodated effectively without negatively impacting the overall QoS of the network. Solutions for medium access management were proposed by 3GPP for M2M communication in a cellular architecture. Solutions include access barring schemes, separation of RACH resources, dynamic allocation of RACH resources, back-off schemes, slotted access schemes, and pull-based schemes (where machine type communication devices (MTCDs) transmit data to eNB only when they are paged [59]) [5]. Suggesting that RACH contention is caused by high preamble transmission rate, [60] proposed a two-stage scheme based on controlling preamble transmission rates. The first stage is an auction approach for balancing and allocating traffic among periods, while the second stage is an RACH attempt estimation approach for controlling the preamble transmission rate decided by the first stage. For a variety of M2M applications, the proposed scheme is capable of handling access requests effectively. Some research directions are to [5, 61]:

M

• investigate if a trade-off exists (and to what extent) between computation and communication costs for maintaining a clustered M2M network;

ED

• design energy-efficient access management protocols for event-driven applications;

PT

• ensure the availability of adequate control channel resources for massive M2M in cellular networks;

CE

• research the desired cluster size for massive hierarchical M2M in different settings; • address core network (CN) scaling or signalling because of congestion caused by concurrent signalling messages of machine devices;

AC

• develop hybrid pricing schemes to cater to the simultaneous access of machine and human traffic; • design LTE schedulers that can accommodate timing constraints and specific QoS requirements (latency, jitter, and guaranteed bit rate) for M2M communication within the Transmission Time Interval (TTI) of LTE; 12

ACCEPTED MANUSCRIPT

• design low-complexity schedulers for M2M in LTE/LTE-A;

CR IP T

• design schedulers capable of catering to real and non-real time applications.

AC

CE

PT

ED

M

AN US

Relevant Literature In ‘A survey of access management techniques in machine type communications’, [5] compared and classified several access management proposals for M2M communication based on metrics such as success rate, access delay, energy-efficiency, and QoS guarantees. This article has influenced other works including [43, 62, 63, 64, 65]. Reference [43] proposed a hybrid of adaptive slotted-ALOHA and TDMA to achieve resource utilisation in LTE/LTE-A under strict fairness constraints. Reference [62] presents an RA procedure for achieving resource efficiency and increased number of successful accesses. In [63], issues and proposed solutions for RAN and CN overload because of massive machine access are surveyed. Authors in [64] proposed a dynamic scheduler for LTE uplink that adjusts to network contention levels using traffic information. The scheduler supports M2M traffic and controls the impact of the Human-to-Human (H2H) traffic performance. Reference [65] presented a framework for analysing one-stage massive access. Using two approaches, the authors modelled and evaluated the channel occupancy rate and success probability. In the first approach, transmission from the devices arrive at the evolved Node B (eNB) with the same average received power. The second approach is Signal-to-interference-plus-noise (SINR)-based; where it was assumed that devices transmit with a constant power i.e. using channel inversion power control. The authors used analytical and Monte-Carlo simulation approaches to verify the results. The article ‘Is the random access channel of LTE and LTE-A suitable for M2M communications? A survey of alternatives’ [15], summarised the pros, cons, and future trends associated with alternative schemes proposed for improving LTE/LTE-A RACH operations. The authors expounded on the performance of the RACH in terms of energy efficiency to serve as a benchmark for future energy-efficient protocol designs. This article has also been referred to in [66, 67, 68, 69, 70, 71, 72, 73]. Authors in [66] studied the limit of M2M and H2H coexistence in LTE networks using thorough system level simulations. [69] focused on the physical layer (PHY) and MAC transmission technologies for IoT by comparing their performances. 13

ACCEPTED MANUSCRIPT

AC

CE

PT

ED

M

AN US

CR IP T

Recently, [70] considered RA in M2M communication with QoS, whereas [71] discussed machine type communication (MTC) with respect to its associated requirements, challenges, and solutions. [72] proposed an analytical framework for optimizing the random access performance of M2M communication. [73] presented a random access protocol based on DQ, with an estimation mechanism which can cater to over ten thousand simultaneous arrivals of traffic. In the article entitled ‘A survey of Traffic Issues in Machine-to-Machine communications over LTE’, [17] reviewed and classified proposed mechanisms for solving access traffic issues and traffic simulation models in the literature. Amongst others, [42, 74, 75, 76] have referred to this work. Reference [74] proposed a system for home automation suitable for large transducer deployment. The proposed system quickly recognises and configures transducers, thereby saving setup time and resources. For massive machine type devices (MTDs), [75] studied the design of uplink transmission for very short delay and high reliability requirements in tactile internet. Likewise, reference [42] considers a hybrid of collision avoidance and tree collision resolution in LTE for synchronised traffic in aircraft applications. Recently, [76] discussed issues relating to signalling and resource scheduling in LTE-based M2M/IoT networks characterised by small data transmissions. In this respect they reviewed literature on resource allocation in these networks. They further modelled the optimal behaviour of their previously proposed algorithm in [118]. According to the authors, a possible extension of this work is an evaluation of the energy-saved by the algorithm for M2M devices with small data transmissions. In ‘Classification of LTE Uplink Scheduling Techniques: An M2M Perspective’ [61], the authors surveyed uplink scheduling techniques for M2M over LTE/LTE-A and presented a classification of LTE scheduling techniques based on multi-hop and scalability, QoS parameters, and power savings. A main contribution is its exposition of different schedulers for LTE-A and the complexity of various scheduling algorithms. Amongst others, [61] has been referred to in [78, 79]. Reference [78] introduced a scheduling metric called ‘Statistical Priority’, which demonstrates the peculiarity of some packets sent by MTCDs. Data with non-redundant information is scheduled with a higher priority to properly manage radio resources. This approach results in a lower number of deadline misses for critical data. The authors in [79] modelled the energy consumed, and investigated the impact of scheduling and power control on the battery lifetime of machine devices in cellular-based 14

ACCEPTED MANUSCRIPT

M2M networks.

AC

CE

PT

ED

M

AN US

CR IP T

2.3. Access Management for Capillary M2M A capillary network is a local network which deploys short-range radioaccess technologies to provide connectivity to groups of devices [80]. Capillary M2M network consists of machine devices supporting technologies such as Zigbee, Bluetooth, WiFi, ultra-wide band (UWB) and Smart Utility Networks (SUNs). The network uses Industrial Scientific Medical (ISM) band which eradicates the problem of interference with cellular users. Capillary M2M can also ‘aggregate and shape’ M2M traffic transported to a wired, wireless or cellular network such as WiMAX and LTE [81]. Capillary M2M networks have advantages over cellular M2M networks, considering peculiar perspectives. For instance, devices can connect to free unlicensed band radio access technology (RAT) in capillary networks. Although, cellular M2M networks enjoy highly reliable communication and wider coverage, capillary M2M can be effectively deployed in areas with poor cellular coverage such as basements and indoor environments. ZigBee can be effectively deployed in smart homes as it can cater to low power and low-rate applications, whereas Bluetooth Low Energy (BLE) can be effectively used in home automation because of its ultra-low power consumption [18]. Capillary M2M networks are also cost-effective for handling a large number of M2M devices as compared to cellular M2M [82]. Generally, the unique characteristics and general requirements of M2M must be considered when choosing the appropriate technology for access management and during protocol design. Wireless Fidelity (Wi-Fi) for instance has a current service range of 100 m in Wireless Local Area Networks (WLANs), which is quite short to cater to densely deployed MTCDs in large outdoor environments. Therefore, IEEE 802.11ah (Wi-Fi HaLoW) catering to diverse QoS requirements can be integrated into Wi-Fi products, since it can be flexibly configured for different applications [18]. Currently, IEEE 802.11 is one of the wireless technologies being modified for use in IoT because of its wide-range deployment and support for IP connectivity. Therefore, it is promising for energy-efficient and low-cost wide-scale M2M deployment as affirmed in [83]. Some of the issues associated with specific access management in capillary M2M technologies are as follows [18, 81]: • Wi-Fi: Wi-Fi may not fully satisfy the diverse QoS requirements for MTC, it may have to be modified to suit different use-cases. 15

ACCEPTED MANUSCRIPT

• IEEE 802.11 standard: Customised solutions for IEEE 802.11 may have to be devised to cater to diverse MTCD applications.

CR IP T

• ZigBee: Mesh ZigBee networks are characterised by low utilisation as they have no beacons. Tree-based topologies also have limitations which manifest in a lower transmission efficiency and tight synchronisation. Asides the aforementioned, future extensions to these networks should also consider effects of interference, fading and channel quality.

AN US

• Bluetooth: This has energy management issues as well as terminal grouping and data aggregation when M2M terminals are to connect in a piconet (network devices connecting via Bluetooth) [81] as investigated in [84, 85].

M

• Coexisting RATs: For the coexistence of technologies such as ZigBee, SUNs, and Wi-Fi, sharing the unlicensed band radio resources is critical and requires proper management. RATs must coexist in a manner that ensures minimum interference [18]. In addressing interference which could occur due to the coexistence of IEEE 802.15.4 and WiFi, inactive periods in the WiFi channels could be exploited [81].

CE

PT

ED

In addition to the above mentioned issues, it is important to reiterate that these capillary technologies should be able to support heavy M2M traffic in areas such as residential and business areas. Also, MAC protocols which can function with terminals with multiple radio interfaces (such as IEEE 802.11 and IEEE 802.15.4) should also be developed, so that devices can then use whichever technology provides the best connectivity. TV white space could also be deployed to extend the transmission range, especially in less populated areas. Finally, data aggregation should also be supported in gateways for capillary network [81].

AC

Relevant Literature In the article ‘Radio Resource Management in Machine-to-Machine Communications - A Survey’ by Xia et al.[18], the authors presented a comprehensive survey of research activities related to access control, power management, and radio resource allocation for M2M communication. A detailed discussion on unlicensed band RATs for capillary M2M communication was provided. A unique contribution of this paper is its categorisation of themes for radio resource management in LTE/LTE-A. The authors also identified 16

ACCEPTED MANUSCRIPT

CE

PT

ED

M

AN US

CR IP T

open directions with respect to NB-IoT, Sparse Code Multiple Access 1 and software defined network (SDN)-based M2M, amongst others. In the paper entitled ‘Physical layer architectures for machine type communication networks - a survey’ [82] discussed the PHY features of capillary technologies such as Wi-Fi, Bluetooth, ZigBee, and SUN. They proposed an air-link design based on complementary-coded code division multiple access (CC-CDMA). This is suitable for the gateway to small-cell access point interfaces and serves as a ‘complement’ to current standards and technologies. With respect to this, the authors also reviewed CC-CDMA and M2M challenges for future wireless communication. Wang et al.[88] surveyed LPWA, IEEE 802.11ah, and cellular network infrastructure solutions for M2M in the paper entitled ‘A survey of enabling technologies of low power and long-range machine-to-machine communications’. Research gaps and future directions were identified to improve the performance of these low power and long-range technologies. Further related works to [88] include [81, 82, 89, 90]. The authors in [81] discussed the current challenges of capillary M2M communication technologies such as the development of charging policies for service providers and addressing security issues. [89] surveyed technical aspects and use-cases of future IoT-based healthcare applications. In light of this, the authors examined current and emerging technologies, standards, and requirements for such applications with special attention on short and long-range communications. They concluded that an amalgam of existing technologies would be required to cater for future healthcare application. The authors in [90] performed an experimental study to analyse the signalling overhead for M2M services suitable for smart metering and vehicular applications. They proposed techniques for signal reduction by considering signal aggregation to tackle issues associated with a surge in signal overloads.

AC

3. Home M2M M2M communication has a variety of applications in homes. Examples include surveillance, multimedia streaming and sharing, and energy management systems for smart grid and healthcare. When considering radio service 1 Sparse Code Multiple Access [86] can be regarded as a code division multiple access scheme characterized by sparse codebooks [87]

17

M

AN US

CR IP T

ACCEPTED MANUSCRIPT

ED

Figure 6: Key illustrations in the literature and their references

range and applications, home networks involve body, personal, and local sub-area networks [21].

AC

CE

PT

3.1. Architecture According to 3GPP, network terminals interconnect in two ways, either cellular or capillary M2M communication. In the first case, M2M terminals directly connect to the cellular (3G or 4G) network. In capillary networks, devices connect using wireless links and data is relayed to the cellular network using a gateway [21, 91]. As shown in Fig.7, the cellular M2M architecture is basically composed of three major components such as machine devices, gateway, and eNodeB. The interaction of these components within the network results in four different forms of communication: devices can communicate mutually, they can connect to the gateway or the eNodeB, and the gateway can also communicate with the eNodeB. In this regard, a proper architectural design is required to guarantee the necessary QoS requirements.

18

ACCEPTED MANUSCRIPT

AN US

CR IP T

Some trade-offs must be considered in the design of any network architecture. For instance, in a capillary home M2M network, the coverage per device may be very low when compared with cellular M2M. Other issues associated with home M2M network design include radio interference in home areas, unreliable wireless channels because of fluctuation and noise, nature of devices (e.g. heterogeneity and resource constraints), and self-organisation and QoS support [21]. In addition, an architecture with gateways requiring data aggregation should ensure a proper selection of the relay node. In architectures with cognitive gateways, the gateway should be capable of autonomously interacting with the surrounding environment and adaptively changing the transmitter settings when required.

CE

PT

ED

M

Relevant Literature Zhang et al. [21] presented a survey entitled ‘Home M2M Networks: Architectures, standards and QoS improvement’ identifying challenges associated with M2M networks. A QoS and resilience -aware cross-layer joint admission and rate control for multimedia sharing was further proposed. An investigation into this approach with a joint design demonstrated that in resource constrained home M2M networks, the proposed method can allocate radio bandwidth intelligently based on the QoS. In addition, the QoS rate control, a unique feature of [21], is its M2M architecture that supports several technologies. This work has been referred to in [92, 93, 94, 95, 96]. Reference [92] classified M2M in terms of context, task, and objective with a review of recent issues and solutions. [93] addressed radio resource allocation for energy-efficiency in cellular M2M. [94] discussed M2M security challenges in 3GPP and potential solutions. [95] focused on latency, energy savings, and reliability for uplink and downlink M2M with performance analysis. Authors in [96] considered reducing uplink requests for M2M using the grouping and compression approach in the gateways.

AC

3.2. Technologies Home M2M involves the co-existence of several technologies. The technologies can include Bluetooth Low Energy, short-range radio technologies such as ZigBee, and broadband such as UWB. These technologies come with their merits and demerits. For instance, Bluetooth performs well in terms of energy but has latency issues in large deployments. On the contrary, ZigBee can guarantee low power consumption and longer lifetime, thus, it is used in capillary M2M networks. Similarly, broadband technologies such as 19

ACCEPTED MANUSCRIPT

CR IP T

UWB and HomeRF provide high throughput at the price of increased energy consumption [22]. Emerging radio technologies applicable in home networks include IEEE 802.15.6, which is used in medical applications for helping the disabled, 60GHz transmission, and visible light communications [22].

CE

PT

ED

M

AN US

Relevant Literature The article ‘A survey of recent developments in home M2M networks’ [22] discussed M2M technologies and applications such as entertainment and health and energy management. An examination of home M2M network architectures, performance trade-offs associated with designs, and QoS provisioning methodologies were also conducted. This work has been referred to in [97, 98, 99]. [97] surveyed device-to-device communication (D2D) in cellular networks, [98] reviewed networks for home automation, and [99] considered challenges associated with cognitive radio for future mobile networks. Chen and Lien [4] summarised the technologies for achieving highly efficient machine swarm communication in the paper entitled ‘Machine-tomachine communications: Technologies and challenges’. This aims to facilitate a realisation of wireless M2M infrastructure on the cloud with a massive number of machine devices. [4] also highlighted related enabling technologies for wireless M2M communication. This work has been referred to in [100], which studied the interaction between fog computing and D2D communication for low-latency M2M communication to be configured on an LTE-A platform. Reference [101] studied the definition and classification of white spaces for cognitive radio. [102] considered the interference challenge associated with licensed-assisted access in cellular networks. Authors in [103] investigated statistical networking to attain reliability and QoS guarantees. Reference [104] surveyed cognitive technologies and models for improving the efficiency of M2M communication. 4. Mobile M2M

AC

Mobile smartphones in cellular networks, vehicle-to-vehicle applications [5], and logistics and e-health [23] constitute interesting applications enabled by M2M communication. For instance, smartphones can play a major role by serving as mobile gateways for energy constrained machine devices in applications such as heart monitoring systems, where the smartphones can be used to receive data [11]. As there has been considerable research on

20

ACCEPTED MANUSCRIPT

wireless body area networks, more studies on the use of smartphones in health applications for M2M are required.

M

AN US

CR IP T

4.1. Mobile M2M in cellular infrastructure Optimising current cellular network solutions for mobile M2M is a matter of necessity [9]. Mobile M2M applications in the context of cellular networks such as LTE and LTE-A can benefit immensely from the cellular architecture in terms of extensive coverage, high reliability, and reduced cost. However, performance degradation should be avoided by ensuring proper spectrum allocation and utilisation. In a bid to achieve spectral efficiency in the network, issues concerning interference must be properly addressed. In addition, scheduling schemes proposed to achieve proper channel utilisation should duly consider traffic differentiation. Using the resource partitioning approach, RA overload2 control should be made to work in tandem with proper back-off procedures and eNodeB selection. Development of energy efficient transmission schemes using smartphones to function as mobile gateways can be achieved through methods such as transmission scheduling, header compression, and data aggregation [11]. However, future research can leverage heterogeneous networks to address this issue. Other relevant issues include [11, 24]:

ED

• Investigation of how M2M gateways can be used to reduce bandwidth consumption for prompt data collection and aggregation;

PT

• Maximisation of radio resources by aggregating multiple device traffic using relay nodes;

CE

• Power consumption optimisation for M2M in cellular networks and optimising trade-offs associated with reachability;

AC

• Evaluation of resource usage efficiency in mobile M2M communication. For instance, how do diverse traffic patterns from machine devices affect mobile M2M communication?

2 RA overload occurs as a result of massive random access in dense LTE-A networks [66, 19]

21

ACCEPTED MANUSCRIPT

PT

ED

M

AN US

CR IP T

Relevant Literature The paper entitled ‘Towards efficient mobile M2M communications: Survey and open challenges’ [11] provided insights into reference architectures for M2M with a focus on European Telecommunications Standards Institute (ETSI) network architecture. A major contribution of this work is its exploration of the use of smartphones as gateways for M2M communication. Related research includes [20, 105, 106, 107]. [20] surveyed technologies and networking techniques for M2M communication with their associated limitations. Similarly, they discussed short-range capillary networks and application development protocols. [105] evaluated latency performance in IoT using mobile gateways. [106] studied a ‘D2D-based IoT data collection’ scheme. In this approach, an IoT device aggregates data collected from smart objects (using D2D links) towards the eNodeB by using a Modulation and Coding Scheme (MCS). Motivated by the use of satellites to cater to a fraction of the M2M/IoT data, [107] proposed a congestion control mechanism in the random-access satellite channel which can be configured at the application layer. In the review paper entitled ‘Mobile M2M communication architectures, upcoming challenges, applications, and future directions’ [24], the authors discussed reference models, architectures, service requirements, standardisation efforts, applications, challenges and future directions related to mobile M2M. Some of the notable papers that have referred to this work include [108], which surveyed radio resource management for energy-efficiency in cellular networks, and [109], which presented a survey on networks and technologies for smart cities. Recently, [110] discussed current advances, architectures, and research challenges associated with M2M technologies.

AC

CE

4.2. Vehicular M2M Autonomous vehicular communication is one of the key applications of M2M communication. Its applications are extensive and its implications are beyond current expectancies. Particularly, this technology can reduce transportation costs. For instance, driverless cabs are expected to make transportation more accessible to low-income households [111] who may not afford to own cars. Other applications include safety and collision avoidance, management of traffic and infrastructure, vehicle telematics, and in-car entertainment and internet services. Owing to the unique mobility patterns associated with vehicles as compared to cellular devices, vehicular networks are characterised by an architecture consisting of five major parts that include intra-car 22

ACCEPTED MANUSCRIPT

AN US

CR IP T

networks, vehicle-to-vehicle (V2V) networks, vehicle-to-infrastructure (V2I) networks, backhaul, and servers [23]. Sensors and car-instruments (e.g. airbag system) can collect data while Media Oriented Systems Transport (MOST) ring facilitates intra-car communication. An On-Board Unit (OBU) and the bus master on the MOST ring can aggregate data. Similarly, Wireless Access to Vehicular Environment (WAVE) can be deployed for intra-vehicle and extra-vehicle communication. Through the MOST ring, media can connect to infrastructures through wireless technologies with high bandwidth such as Wi-Fi, Worldwide Interoperability for Microwave Access (WiMAX), and cellular networks for video, audio, or internet services. Road side units and access points for high-bandwidth technologies can function as gateways to Intelligent Transport System (ITS) and internet as backhaul services. Using the internet and ITS, vehicles can communicate with back-end servers [23]. In the pursuit of effective autonomous vehicular communication, it is important to ensure that involved entities in communication can be visualized. Devices should also be easy to control and the process of sending reports should be automated. A few other necessities include [23, 111]:

M

• vehicular network autonomy that would help to achieve security, centralized management systems, and dynamic connectivity;

ED

• mechanisms that would address the challenges of V2V and V2I connectivity;

PT

• cross-platform networking for inter-vehicle and intra-vehicle communication;

CE

• adapting to the dynamic evolution and diversity of consumer electronic devices;

AC

• mechanisms that would discreetly accommodate the unpredictable movement of nodes that could hinder proper inter-vehicle communication; • preserving privacy of vehicular users such as traffic reporting; • mechanisms for efficient vehicle routing so that autonomous vehicles could easily determine appropriate routes in road networks; • addressing operational setbacks associated with the functionality of electric vehicles such as battery durability, size and lifetime. 23

ACCEPTED MANUSCRIPT

AC

CE

PT

ED

M

AN US

CR IP T

Relevant Literature In the article entitled ‘Machine-to-Machine Communication in Vehicular networks’, Booysen et al.[23] described the generic M2M architecture and the communication standards associated with vehicular networks such as Controller Area Network (CAN), MOST, WAVE, Wi-Fi, WiMAX, and cellular standards. This work has been referred to in [112, 113, 114, 115]. Reference [112] gave insights into vehicle electrification and intelligent transport systems for future smart grid networks considering the entities and components involved. They discussed electrified transportation with respect to societal adaptation and communication perspectives. [113] presented a survey on cooperative platoon-based driving with physical dynamics in Vehicular adhoc Networks (VANETs). [114] surveyed current approaches targeted at the deployment of smartphones to enhance ITS including the opportunities and challenges associated with smartphone-assisted driving. Reference [115] considered Internet of Vehicles (IoV) and proposed a framework for layered architecture to address relevant problems. In the article entitled ‘Autonomous vehicles: challenges, opportunities, and future implications for transportation policies’ [111], the authors discussed an array of issues including ethical challenges and opportunities associated with autonomous vehicles with respect to transport policies. They presented a navigation model for effective ‘traffic circulations’ in autonomous vehicular communication. The relationship and differences between machine-to-machine communication, wireless sensor networks, cyber physical systems, and Internet of things were considered in ‘Machine-to-Machine Communications: Architectures, Standards and Applications’ [13]. The potential of a cyber-transport system to enhance road safety was shown in the form of a novel system that brings together the concept of an unmanned vehicle using sensor navigation and an intelligent road to avoid intersection collision. Further research challenges were also identified. Works that have referred to this article include [116, 117, 118, 119, 120]. Reference [116] proposed an autonomous, secure, and economic M2M system for e-health. The proposed system also accommodates dynamic allocation of medical doctors. Reference [117] presented a 4-layered IoT architecture with an intelligent system based on Radio Frequency Identification (RFID) for M2M communication. Authors in reference [118] considered the priority scheduling approach deployable in applications requiring instantaneous

24

ACCEPTED MANUSCRIPT

5. Standards and Service Platforms

CR IP T

response such as healthcare. Reference [119] presented event-driven architectures for M2M communication. [120] considered a framework for smart home applications, incorporating several previously proposed frameworks and architectures.

AC

CE

PT

ED

M

AN US

One of the key constituents for the rapid development of M2M markets is standardisation activities [7]. This is quite challenging because of the wide range of M2M applications. Consequently, the scope of standardisation efforts becomes wider than other traditional networks [24]. Consequently, several standards development organisations are making efforts to facilitate M2M communication. Among these are 3GPP [121], ETSI [122], Internet Engineering Task Force (IETF) [123], oneM2M [124] and NB-IOT [125]. 3GPP provides a stable environment for members to produce reports and specifications that are used to define its technologies. Amongst others, the 3GPP technologies include radio access, core transport network, and service capabilities. 3GPP consists of seven member telecommunication standards development organisations [121]. ETSI is concerned with developing standards that are globally applicable for information communication technologies. These include fixed, mobile, broadcast, and radio and Internet technologies. It is a large body consisting of eight hundred member organisations from sixty-six countries and five continents [122]. The IETF is an international community involving several stakeholders such as network designers, vendors, operators, and researchers working towards the smooth operation of the Internet and the evolution of its architecture [123]. oneM2M is a global standard initiative targeted at M2M and IoT. To address the need for a uniform service layer that can be embedded in various hardware and software, oneM2M develops the required technical specifications. Furthermore, oneM2M is also concerned with the reliable connectivity of several devices with M2M servers all over the world [124]. NB-IoT is a new narrowband radio technology standardised by 3GPP and completed in 2016. It is aimed at addressing the requirements of IoT such as coverage, support for massive devices, low power consumption, low cost, and optimised network architecture [125].

25

ACCEPTED MANUSCRIPT

AN US

CR IP T

5.1. Standards’ Requirements Because multiple stakeholders are involved in M2M, it is essential that M2M systems should be based on open standards as their lifetime would be extended for over many years. In addition, standards must be rapidly developed for interoperability and global market and economies of scale support as needed by the industry. Standards should also support multiple classes of delay using an enforcement delay mechanism for the development of M2M/IoT applications. This can be done by leveraging the pros of standards such as Differentiated Services (DiffServ) and Integrated services (IntServ) for QoS requirements. For applications such as smart home, semantics and relevant data are required in the abstraction of such M2M use-cases. The use of information semantics would also cater to the need of providing common enablers to M2M applications for discovery, interpretation, and utilisation of data from different sources [25]. Several open issues associated with standards include [25] and [6, 10, 27, 32]: • the need for working on adequate device management (on a large scale) and remote software management;

ED

M

• the need for handling the complexity associated with device identification of technological specifications. This would help to improve the market potential of M2M; • the need for bringing computing facilities closer to data to address the concern of transferring data to computing facilities;

CE

PT

• the need for organisations to convert large amounts of incoming data to a standard format in current M2M deployments to facilitate proper data analysis;

AC

• the need for a definition of guidelines to provide a strong foundation for multiple stakeholder systems.

Relevant Literature In the paper entitled ‘M2M Communications for E-Health and Smart Grid: An Industry and Standard Perspective’, Fan et al.[10] discussed M2M standardisation activities analysing their enabling technologies and industrial applications. Smart grid and e-health were discussed as typical examples of

26

ACCEPTED MANUSCRIPT

AC

CE

PT

ED

M

AN US

CR IP T

M2M applications with a summary of ongoing industrial and standardisation efforts. The discussion entailed academic perspectives published in the literature and how they are augmented. Reference [10] has been referred to in [126, 127, 128]. [126] discussed meta-architectures for harmonising standardisation technologies, including architecture and protocol interoperation for smart grids. [127] surveyed 5G mobile networks while [128] surveyed challenges for M2M in smart grids. In ‘A survey of standards for Machine-to-Machine and Internet of Things’, Gazis [25] reviewed major challenges of future standardisation in IoT. The features of several standards and architectures were summarised and classified under different headings such as progress/release state, internet protocol stack layer, and deployment perspective/coordination model. Classification was based on supported domains, architectural styles, and contributed definitive elements. Amongst others, this work has been referred to in [129, 130, 131]. [129] surveyed real-time analytics and other proposed network methodologies for IoT. Reference [130] estimated the quality of transmission and spatial frequency reuse and optimised massive IoT systems. [131] considered security standardisation for IoT. The article ‘Machine-to-Machine (M2M) communications: A survey’ [7] presented a generic system model for the device, network, and application domains of M2M. Several system models and architectures proposed by different standards developing organisations such as 3GPP, ETSI, and oneM2M were also discussed. A characterisation of M2M data traffic was performed by various standardisation bodies and their specific tasks. This work has been referred to in papers such as [132, 133, 134, 135]. Reference [132] studied the clustering algorithm for MTC over LTE for data processing by considering mobility. Authors in [133] studied localisation problems among ‘blind’ machine devices in ‘noisy’ environments. [134] considered the deployment of M2M communication to enhance fault-detection accuracy in industrial applications. Reference [135] considered an analytical approach for medium access control to investigate the performance of M2M and D2D communication with unlicensed resources. 5.2. Service Platforms To ensure interoperability, ease of discovery, and proper management, M2M systems should be managed with an appropriate level of abstraction. In this manner, devices can be organised to collaborate and share complex 27

ACCEPTED MANUSCRIPT

M

AN US

CR IP T

information. The platforms on which the devices are managed can be referred to as M2M service platforms [136]. As discussed by Kim et al. [26], M2M platform models can be classified based on commercialisation and research. The first class of M2M platform models include a customer-to-customer and business-to-customer model that would be beneficial to individual users with a limited number of different devices. Devices can periodically send data to subscribers based on events. Objects can also be collected from sensors, which can be retrieved from the access gateway. The second class of M2M platform models are research-based, which accommodates both authorised personal user devices and public devices. Smart object resources are shared through virtualisation and can be searched and discovered. These platforms are not devoid of requirements vital for successful application. In the industrial domain, major players associated with service platforms have to establish an ‘ecosystem’ that would reduce the cost of development and the time to market M2M devices. The service platforms must also be supported by enabling technologies and standardisations. This would help bring down development cost, reduce the time to market M2M services, and achieve service-convergence among industries through data sharing. Other requirements are given below [26]:

ED

• Internet-connected objects must be registered to platforms where they can be authenticated, searched, and modified; • Platforms should have the ability to autonomously control and instruct devices and actuators in reaction to collected data;

PT

• Apart from managing individual devices, functionality should also be supported by the platform;

CE

• Smart devices should be capable of accessing services using an application or the web. The app store can be managed by the platforms;

AC

• Platforms offering cloud services should be able to store data from sensors and objects; • Interoperation and mutual connection of M2M devices should also be supported; • Platforms should have the capability of being accessed via the internet at any time and from any location; 28

ACCEPTED MANUSCRIPT

• Platforms should have the ability to provide peer-to-peer (P2P) communication support;

CR IP T

• It is also necessary to develop an M2M platform to realise the future conception of M2M services.

M

AN US

A typical service platform architecture such as M2M Service Platform (M2SP) [26] can include an M2M area network, access network, and a CN. The M2M area network consists of heterogeneous networks with a sink that connects the network through access networks. The CN accommodates various traffic types from several objects and provides reliability and QoS guarantees for such traffic. Users and objects connected to the CN are managed and M2SP provides services. A typical scenario that illustrates the manner in which different components and stakeholders interact is a vending machine. In this case, a user can find the location of a vending machine with a specific product. The service provider manages the stock of vending machines and provides product details and advertisements. Some issues and future considerations for service platforms are given below [26, 27]: • Processing management information in bulk can reduce network performance degradation because of dead nodes.

ED

• Enabling virtualisation of M2M communication. • Developing solutions to realise autonomic service networks.

CE

PT

• Considering P2P communication to reduce delay and efficiently handle unnecessary traffic. However, for massive M2M, a signalling process for authorization between devices and resource allocation is required.

AC

Relevant Literature In the article [26] entitled ‘M2M Service platforms; survey, issues, enabling technologies’, a service platform architecture with a sample service scenario was proposed. Several application use-cases were provided to demonstrate the way components of this platform interacted. The authors further discussed standardisation activities in international standards organisations (ISO) and provided future research directions. Some works that have referred to this paper include [137, 138, 139, 140]. [137] thoroughly studied 5G wireless evolution, [138] considered pricing models in 29

ACCEPTED MANUSCRIPT

M

6. LTE/LTE-A

AN US

CR IP T

Wireless Sensor Networks (WSN), M2M and IoT while [139] reviewed RA procedures and probable solutions for satellite networks. [140] deployed use cases consisting of several platforms to evaluate inter-networking interfaces using oneM2M. The authors of ‘Machine-type communications: Current status and future perspectives of 5G systems’ [28] ‘mapped’ MTC requirements and their likely solutions. They provided a picture of current cellular technologies progressing towards MTC in 5G mobile systems. Similarly, the service functions, requirements, applications, and corresponding issues were discussed. This paper has been referred to in [141, 142, 143, 144]. Authors in [141] surveyed security threats and solutions in MTC and further presented an authentication scheme for scalable LTE heterogeneous networks. [142] presented a dynamic resource allocation mechanism using learning automaton (LA) to assign resources to devices based on their priorities. [143] surveyed notable advancements in technology for 5G wireless communication including issues and possible solutions. Authors in [144] surveyed unmanned aerial vehicles (UAVs) using MTC for IoT.

PT

ED

The LTE technology is growing rapidly [145] and is being enhanced to support new applications and technologies in recent years. LTE-A is an enhanced version of the LTE cellular network [146]. The LTE/LTE-A network is of particular interest as it can cope with the increased usage of mobile data and multimedia applications [147]. Next, we briefly introduce the LTEA architecture which supports M2M communication and highlight some of its challenges.

AC

CE

6.1. Network Architecture As shown in Fig. 7, an LTE network consists of the Evolved Packet Core (EPC) and the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). The E-UTRAN comprises of eNBs that are connected to each other by the X2 interface. The S1 interface connects each eNB to the EPC. The serving gateway (S-GW) is terminated by the S1 interface on the user plane, while on the signalling plane, the S1 interface terminates the Mobility Management Entity (MME). To enable M2M communication, machine devices can connect to the eNB directly or through a gateway. Services are

30

M

AN US

CR IP T

ACCEPTED MANUSCRIPT

Figure 7: A basic LTE/LTE-A architecture with M2M communication

AC

CE

PT

ED

provided by MTC servers that can be accessed by the users in the application domain [92]. Machine devices can also connect to each other in a P2P fashion. Cellular M2M networks play a key role in wireless infrastructure. A flexible network architecture is required, keeping in view the present and future technologies. Because it is necessary to centrally locate data obtained from M2M devices, a cloud-based solution will be highly propitious and would help achieve cost efficiency, scalability, continuous availability, and accessibility [4, 7]. 3GPP has made provisions to accommodate MTC at the physical layer of the LTE architecture [148]. 3GPP LTE and LTE-A have several advantages over other access technologies because they have a flexible radio resource management scheme. However, they were not envisioned for applications characterised by small amounts of data like M2M applications. They are used for wideband applications. The consequence of this is an inefficient utilisation of technology [29]. As such, there is a need for a standard end-to-end architecture to integrate 31

ACCEPTED MANUSCRIPT

CE

PT

ED

M

AN US

CR IP T

network solutions from different MTC stakeholders. This would help to give reliable interconnectivity between devices all over the globe. Constructing and managing connections among several MTC devices distributed over a vast area has several challenges. For instance, in the case of an air interface (i.e. the radio-frequency-based connection/communication medium between the mobile base station and user equipment [149, 150]), there are challenges associated with the use of current H2H mechanisms for M2M communication. The challenges include PHY transmission issues, RA procedure issues, energy and complexity challenges, and radio resource allocation for critical QoS provision [6]. Another major problem in MTC cellular networks is congestion due to simultaneous signalling messages from machine devices, possibly resulting in peak load situations [151]. This negatively affects mobile network operation and performance of critical nodes with limited resources. To address this problem, a bulk signalling handling approach can be used [9]. Using this scheme, similar signalling messages from MTC are handled in bulk. This approach can be used as a complementary or alternative method of controlling network congestion and overload in M2M. Extending network coding and random data combination is required for reliability and error control in heterogeneous M2M communication in 3GPP LTE/LTE-A. The network coding provides an effective means to achieve efficient and reliable transfer of data. It also requires very little coordination among nodes. Distributed processing paradigms can also be considered for decoding in dense M2M networks. In addition, ensuring efficient and timely analysis of data gathered by M2M devices can be achieved using various machine learning techniques. However, it should be noted that this requirement depends on the application. Other challenges associated with M2M network architecture include [6, 9, 29]: • ensuring connectivity, compatibility, and interoperability within M2M communication network;

AC

• developing practical scheduling schemes that will support massive M2M devices (with small data payloads) to satisfy jitter requirements; • placing suitable relay nodes for delivering data to improve the overall network performance in heterogeneous M2M; • managing signalling congestion of the traffic of user equipment (UEs) 32

ACCEPTED MANUSCRIPT

and M2M devices through more Evolved Universal Terrestrial Radio Access (E-UTRA); • characterising M2M traffic to handle several QoS requirements;

CR IP T

• developing more reliable transmission mechanisms;

• considering unsophisticated, fixed, and conservative techniques for the design of link adaptation;

AN US

• determining whether additional resources shall be allocated for the Physical Downlink Control Channel (PDCCH) and whether the PDCCH shall be separated for MTC devices and UEs.

AC

CE

PT

ED

M

Relevant Literature The article entitled ‘Machine Type Communications in 3GPP Networks: Potential, Challenges, and Solutions’ [9] focused on 3GPP Release 10. The authors proposed a bulk signalling handling approach for congestion control and network overload avoidance. [9] has been referenced in [152, 153, 154, 155].Reference [152] examined mobile telecommunication trends, issues, and the possibility of bringing the cloud service to mobile users. [153] presented enhancements for M2M and IoT in 3GPP concerning architecture, management, monitoring, power, and latency. [154] studied the significance of multihop-based D2D communication in extending M2M network coverage and range. Authors in [155] focused on physical control channel issues for LTE-based M2M communication with a proposed solution for handling physical limitations associated with M2M devices. In the survey entitled ‘M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, service requirements, challenges and applications’,[29] presented enhancements concerning LTE/LTE-A architecture in M2M networks and examined challenges of M2M over 3GPP, LTE/LTE-A. This work has been referenced in a number of research papers including [156, 157, 158]. The authors in [156] focused on using a dynamic grouping approach controlled by the gateway to reduce signalling overhead in MTC over LTE. Authors in [157] proposed an approach to determine the required number of preambles to achieve maximum throughput for an unknown number of devices and access probability. Recently, [158] presented a detailed survey on cognitive radio for machine-to-machine communications. In this respect the

33

ACCEPTED MANUSCRIPT

ED

M

AN US

CR IP T

authors discussed challenges and benefits associated with the amalgamation of these technologies. Lien et. al [6] presented an overview of M2M features and network architectures in 3GPP and LTE-A in the survey entitled ‘Towards Ubiquitous Massive Accesses in 3GPP Machine-to-Machine Communications’. The challenges related to an air interface of LTE-A were examined. An effective grouping-based radio resource management was proposed to facilitate M2M applications with strict timing constraints for QoS guarantees. This survey has been referenced in articles such as [159, 151, 160, 161, 162, 163, 164, 165]. [159] studied RACH overload and key challenges in LTE-A. [151] addressed the congestion issue in MTC using congestion-aware admission control. [162] proposed a dynamic overload control algorithm to resolve congestion at the RAN because of massive M2M device requests. Reference [163] put forward a group model based on MTD traffic to achieve efficient resource management for MTC. [164] proposed an RACH for 5G MTDs that transmit small packets within the RA burst. This allows machine device detection, decoding, channel estimation, and security authentication. Recently, [165] analysed a new Millimeter wave-non-orthogonal multiple access transmission mechanism for achieving QoS guarantees in cellular M2M. The authors also proposed an BSto-MTD distance-based device pairing schemes to cut overhead and latency in cellular M2M networks.

AC

CE

PT

6.2. Ultra-dense Networks One of the main technologies that would enable future wireless communication is Ultra-Dense Networks (UDNs) [30]. UDNs have several unique features that set them apart from traditional cellular networks. First, the number of communication links and (or) access nodes are densified for each unit of area. In other words, there are many small cells in the vicinity of each user. This would mean that several of these small cells would also be inactive. From the above description, an increase in the density of small cells would mean a high level of interference. In addition, very innovative approaches for handling frequency reuse would be required. Another feature of UDNs is that line-of-sight (LOS) communication would be higher. However, achieving low-delay and high-speed backhaul would pose challenges to network designers [166]. Because M2M communication will become a vital component of future 5G wireless networks consisting of UDNs, there is a need for comprehensive studies on M2M in UDNs. Application scenarios of M2M in UDNs include 34

ACCEPTED MANUSCRIPT

AN US

CR IP T

apartments, industries, enterprises, and hotspots. Although, cellular networks inherently include UDNs, implementing M2M communication poses peculiar challenges at different layers of the protocol stack [30]. In relation to the PHY layer, supporting multiple non-cellular technologies is a challenge especially in Small cell Base Station (SBS)-based or distributed antenna system (DAS)-based UDNs. In other words, cellular and non-cellular interfaces should be accommodated by either machine-type gateways or Small cell Base Station/Radio Remote Head (SBS/RRU). However, a different design of SBS/RRU is required for other configurations. An advantage of this approach is that the expense of deploying machine-type gateways will not be an issue of concern [30]. In relation to the MAC layer, four major challenges must be considered for implementing M2M communication in UDNs: • Concurrent access of machine devices;

• Resource allocation efficiency because H2H and M2M would co-exist within the network.

M

• Interference mitigation schemes for machine devices working in the same band;

ED

• Appropriate selection of RATs for machine devices.

AC

CE

PT

In the network layer, finding an appropriate routing mechanism is the most paramount concern. This can be achieved in several ways using machine-type gateways or UEs as relay nodes between machine devices and the CN. Similarly, the BS could also be used for data relay. The application layer requires improvements to ensure that resources are not wasted because of M2M communication. In this regard, the waiting time of machine-type devices can be made dependent on latency requirements. It is necessary to design protocols that efficiently accommodate the unique characteristics of M2M traffic [30]. In the physical and medium access layers, some modifications or enhancements might be necessary. The main research questions related to the implementation of M2M communication in UDNs are as follows [30]: • Supporting non-cellular M2M networks in UDNs; • Improving transmission efficiency for M2M in UDNs; • Minimising the number of required active gateways for M2M in UDNs; 35

ACCEPTED MANUSCRIPT

• Designing priority-based resource allocation mechanisms for machinetype and H2H communication; • Efficient separation of M2M and H2H traffic at base stations;

CR IP T

• Efficient coordination among BS by grouping or clustering the BSs; • Defining new service categories for several M2M applications.

AN US

Another promising direction in UDNs is highly efficient device positioning for location-aware applications. Specifically, robots, drones, and vehicles can be accurately tracked for use in factories, intelligent transport systems, and autonomous cars [167]. This is propitious for several M2M applications.

ED

M

Relevant Literature In the article entitled ‘Machine-to-Machine Communication in UltraDense Networks: A Survey’ Chen et al., [30] married M2M and UDNs that have usually been separately considered in the literature. To support M2M in UDNs, they explored several service categories for small data transmission. Some papers that have referred to this work include [168], which achieved optimal throughput and scalability in ultra-dense multi-cell RA scenarios using a decentralised approach to transmission suited for machine communications. [169] proposed a security-aware mobile relay selection algorithm for M2M devices using multiple UEs. The relay perform aggregates and transmits data to the BS.

PT

7. Energy Efficiency, Reliability and Security

AC

CE

The growth of M2M communication rests on understanding and managing the challenges of M2M. Among these challenges are energy-efficiency, reliability, and security (GRS) [2]. This section discusses issues related to energy-efficiency and reliable and secure M2M communication. Specifically, subsection 7.1 and 7.2 highlight issues related to energy-efficiency and reliability, respectively. In subsection 7.3, we present an overview of security issues with respect to M2M communication. We excluded technical details because of space considerations.

36

ACCEPTED MANUSCRIPT

M

AN US

CR IP T

7.1. Energy Efficiency In the context of wireless networks and mobile devices, one of the objectives of achieving energy-efficiency is to increase the battery life of devices. Specifically, energy-efficient communication is motivated by reducing the impact of C02 emission and to counter-balance the increasing cost of energy sustained by network operators [170]. Energy efficiency is crucial to the success of M2M communication. Many of the M2M applications require devices to operate for a long period of time with constraints in terms of computation power and battery life. Whenever M2M performs monitoring functions, data redundancy and energy loss can occur, which negatively affect the network lifetime. Therefore, for M2M networks to perform effectively, energyefficiency must be the focus of consideration. This is also important for environmental protection [31]. Energy efficiency can be realised in several domains using radio optimisation, data reduction, sleep/wakeup schemes, battery repletion, and architectural and proprietary energy saving methods. The reduction of energy loss can be achieved through several approaches. For instance, energy efficiency of monitoring devices can be improved by regulating their active modes [31]. Other insights into energy-efficiency actualisation and power optimisation include [7, 31, 171]:

ED

• Proposing self-adaptive and energy-efficient routing protocols for M2M; • Including precise location information in protocols because of their effect on planarisation techniques;

PT

• Investigating the required number of hops for efficient communication with the cellular backbone;

CE

• Harvesting energy from natural sources (such as temperature, light, and mechanical sources);

AC

• Ensuring cross layer interoperability. This is because of the present challenges related to combining energy saving techniques associated with ISO models as a single operational solution; • Minimising device interactivity for reduced power consumption; • Controlling congestion; • Using service differentiation techniques and interference management. 37

ACCEPTED MANUSCRIPT

PT

ED

M

AN US

CR IP T

Relevant Literature In the article entitled ‘Energy efficient techniques for M2M communication: A survey’ [31], the authors classified energy-efficient techniques with respect to the optimisation of radio, reduction of data, sleep/wakeup schemes, battery repletion, architectural and proprietary techniques for energy saving in M2M. They compared and analysed energy efficient algorithms. A key feature of this paper is the classification of energy-efficient techniques based on the OSI model using equations and algorithms. Although, several papers were properly grouped into sections, they were not criticised. Apart from several papers, this study has been referred to in [172] and [173]. Reference [172] surveyed current research issues in M2M, specifically in smart grid scenarios. The authors also presented M2M standards advancements and the potential of cognitive radio for big data communication. [173] investigated clustering approaches for enhancing the lifetime and connectivity of M2M networks with sink mobility (for load balancing). Energy-efficient shortest-path routing (SPR) based networking mechanisms were comprehensively reviewed in the paper entitled ‘Energy efficient wireless unicast routing alternatives for machine-to-machine networks’ [32]. Energy-efficient unicast routing alternatives for sensor and adhoc networks were classified with a focus on additive link cost-based alternatives. However, the survey did not consider information collection-based (sensing) type of energy consumption [32]. Similarly, many of the routing techniques surveyed were designed for stationary nodes. Further survey can focus on scalability [32], protocol designs for mobile nodes, and topology dynamics. This work has been referenced in [31], which we reviewed in this paper, and [174] presented power efficient schemes for mobile adhoc network (MANET).

AC

CE

7.2. Reliability Reliability refers to the timely and effective transport of the required data for its target applications. In other words, it defines the quantity of sent packets that ought to reach its destination within the required delay bound [175]. It is essential to mention that, the amount of data required to ensure reliability is application dependent. In traditional sensor networks, this could be achieved either by packet re-transmissions or recovering lost bits within a packet using coding schemes. Retransmissions result in additional overhead due to transmissions. This could cause network congestion and waste energy of sensors with constrained energy resources. The second approach achieves

38

ACCEPTED MANUSCRIPT

ED

M

AN US

CR IP T

reliability and reduces transmission overhead since lost or corrupted bits within a packet are corrected [176]. Without assurances of reliability, concerned entities may be disinterested in the potential of M2M communication. Reliability is pivotal to achieving green M2M because misleading reports, prolonged delays, and data loss can occur because of inaccurate sensing, processing, and transmission [2]. For example, in applications very sensitive to latency such as alarms for intruder detection, if the alarm response is not timely, the intruder might leave the vicinity of the event unnoticed. Structural health monitoring requires long-term functional networks. In such applications, energy-aware routing algorithms, which consider residual energy levels for maximising network lifetime, are necessary [32]. For some critical monitoring applications, packet retransmissions may severely decrease network lifetime, and therefore, retransmission-aware energyefficient routing algorithms can be advantageous [32]. Reliability can be improved by exploiting redundant technologies such as information and spatial and temporal redundancy. Although, redundancy is an effective solution, it comes with additional cost [2]. In industrial automation systems where a hybrid of wired and wireless architecture may be required, achieving the target reliability may pose challenges. This can be approached using QoS aware schedulers. For instance, the solution proposed in [175] can be adapted to suit M2M applications with diverse delay bounds in these environments. Balancing energy-efficiency and reliability remains an open issue in M2M communication.

AC

CE

PT

Relevant Literature Lu et al. [2] presented major technical requirements for emerging M2M communication in the article entitled ‘GRS: The Green, Reliability, and Security of Emerging Machine-to-Machine Communications’. A scheme for energy efficiency in M2M communication was provided with a discussion on several alternatives for ensuring high-level reliability and security. However, GRS issues were only discussed in a general context. According to the authors, it is necessary to identify and address GRS issues for several existing and upcoming M2M applications. A few notable papers that have referred to this work include [7, 11, 22], which we have considered in this survey and [177, 178, 23, 179, 181]. Reference [177] proposed an aggregation scheme for preserving privacy in smart grids while [178] addressed security concerns for 5G using a lightweight 39

ACCEPTED MANUSCRIPT

CR IP T

message authentication scheme. [23] concentrated on M2M communication in vehicular networks, [179] extended Fog computing3 for distributed decentralised smart building management, identifying issues yet to be studied. [181] presented technologies, challenges, and foresights concerning energyefficient IoT.

AC

CE

PT

ED

M

AN US

7.3. Security Network security refers to the mechanisms put in place to ensure confidential, undefiled and trustworthy transfer of information. As such, there should be an assurance of confidentiality, integrity and non-repudiation of data transfer within the network [182]. Security issues can hinder the growth of M2M and some of its applications as considerable personal data can be ‘stolen’ from M2M devices when compared to personal communication devices. M2M is also characterised by existing threats in data communication. These threats can be classified as physical, logical, and data attacks. Physical attacks include theft, modification of software, and side-channel attacks. Logical attacks include impersonation, denial of service [183], and relay attacks [27]. Data attacks include privacy, data alteration, and selecting forwarding attacks. M2M security concerns also include trust creation, advanced credential management for mobile communication, and horizontal end-to-end security solutions [27]. In cellular networks, M2M deployed in UDNs poses security concerns such as privacy issues. Such issues are attributable to the heterogeneous network structure and the ‘frequent’ handovers that exist in such networks. Security should be considered from the outset of M2M application development in a holistic manner as general requirements may differ from application-specific requirements. An example is the difference between telemetry-based e-Health body area networks and home area networks in terms of battery life and the number of devices [10]. Another important consideration is interoperability because the network generally consists of several protocols and heterogeneous capacity. Schemes using dynamic configuration and adaptive protocols for end-to-end security can be deployed to address this issue. M2M data must be secured from source to destination using hop by hop or end-to-end security [27]. Other considerations include [33]: 3

The Fog extends the Cloud by bringing it closer to the devices which produces data. This minimizes latency and retains sensitive data within the network [180].

40

ACCEPTED MANUSCRIPT

• Addressing issues related to mobility and delay-sensitivity. Proposed schemes should be robust to ensure that M2M communication is resilient against attacks;

CR IP T

• Designing secure and scalable key management schemes;

• Ensuring mobility in security schemes for data origin authentication;

• Proposing robust lightweight and highly efficient cryptographic mechanisms;

AN US

• Addressing entity authentication with minimal computation for devices having limited resources;

• Ensuring that privacy-preserving schemes consider the trade-off between delay, robustness, and resource constraints; • Addressing security issues associated with availability and group key management for multicast communication.

M

Generally, M2M security schemes should effectively support authentication, proper identification of entities, confidentiality, data integrity, access control, and non-repudiation [34].

AC

CE

PT

ED

Relevant Literature Latvakoski et al. [27] presented a review of M2M information and services in the paper ‘A Survey on M2M Service Networks’. The focus of this paper is on communication, security, and service technologies for M2M. The authors evaluated the effectiveness of technologies for addressing M2M service network issues. Reference [27] reviewed several security technologies related to Local Area Network (LAN) device domain. This article is referenced in [184], which surveyed the pros and cons of wireless technologies in home networks. The survey on M2M security entitled ‘M2M Security: Challenges and Solutions’ focused on critical issues for achieving secured M2M communication and preventing relevant attacks. The outstanding feature of this paper is that general M2M challenges such as scalability, heterogeneity, and resource constraints were discussed in the context of lapses in security. Future works should consider the issue of physical attacks as this paper mainly focused on logical and data attacks. Articles that have referred to this work include [185, 186, 187]. 41

ACCEPTED MANUSCRIPT

8. Conclusion

ED

M

AN US

CR IP T

Authors in [185] proposed a novel key management security protocol. This is was done to achieve maximal airtime savings in modern devices by using implicit certificates and Deffie-Hellman exchange. Reference [186] studied the effectiveness of current protocols and network stacks for IoT security. [187] proposed a scheme that recommends services for users of connected objects. Tuna et al. [34] surveyed security threats and potential solutions to minimise the impact of such threats or to mitigate the threats in M2M networks. This was presented in ‘A survey on information security threats and solutions for machine to machine (M2M) communications’. Consequently, the authors identified further research opportunities and challenges. There have been several recent references to Tuna et.al, including [188, 189]. Authors in [188] used the principles of blockchain technology to design a sophisticated blockchain structure for M2M communication based on a case study involving cotton spinning production for demonstration and validation. [189] proposed an authentication scheme suitable for multi-domain M2M scenarios. In addition to its authentication property, the scheme achieves anonymity by using a hybrid of certificateless cryptography and advanced encryption standards. It was shown to be effective against several security attacks such as Denial of service, impersonation, and replay and man-in-themiddle attacks.

AC

CE

PT

M2M communication has become a promising communication paradigm that would impact human lives in the years to come. This is because machine devices would communicate autonomously, thereby rendering interesting services to humans. Efforts are being made in academia and industry to ensure that the large number of machines involved in autonomous communication are well supported from several domains and there have been numerous articles on this matter. In this survey, we approached open questions in a particular way by classifying prime references in this area into themes and then discussing their fundamental concepts. Then potential areas for future work (some of which are summarized in Figure 8) were highlighted based on each theme. This is intended to present an overview of research opportunities available in these aspects. Relevant references for understanding such issues in greater depth were also reviewed with insights into their significant contributions and (or) limitations. More research and surveys that have spurred from these refer42

AC

CE

PT

ED

M

AN US

CR IP T

ACCEPTED MANUSCRIPT

Figure 8: Summary of some issues highlighted

43

ACCEPTED MANUSCRIPT

AC

CE

PT

ED

M

AN US

CR IP T

ences are highlighted with the aim of familiarising readers with some of the recent developments. Specifically, in this paper, we learn that one of the most crucial aspects of M2M communication is supporting the large number of machine devices with their diverse QoS requirements at the MAC layer. Other aspects include the proper choice of technology to support these devices and ensuring interoperability in terms of standards, service platforms, and architecture. It is important to cite that proper support for mobility, network densification, and gateways with cognitive capabilities is desirable. Reliable and secure solutions should be incorporated into the architecture of M2M while also considering energy efficiency. Looking into recent trends in wireless communication literature [137, 190, 191, 192, 193, 194, 195, 196, 197], it can be observed that advances in transportation, health, agriculture, manufacturing, and industry will present new challenges and further research opportunities for M2M communication. The ubiquitous use of autonomous vehicular communication is set to revolutionise the current transportation systems. Manufacturing will require more automated interactions of machines with the physical environment i.e cyberphysical systems. Critical health applications would require ultra-low latency M2M communication with ultra-reliable device connections. Smart drones and autonomous farm machines will also be able to work on large plots of land thereby reducing human effort. To realise these level of reliability and automation, several new technologies are expected to permeate the development of M2M communication. These include: edge computing, fog computing, and network slicing. Through edge computing, computational devices are brought closer to machine devices which would help mitigate traffic congestion, reduce latency in data exchange, improve the response time in real-time applications and improve the battery life of energy-constrained machine devices. Fog computing would enable machine devices to connect to fog clusters thereby facilitating proximity based M2M applications. Network slicing allows a physical infrastructure to accommodate several network instances in form of a virtual network architecture which is highly propitious for ultra-reliable and low-latency M2M communication. In the lower layer, network-coded multiple access (NCMA)4 and universal 4

a non-orthogonal multiple access scheme which uses non-orthogonal codewords for

44

ACCEPTED MANUSCRIPT

AN US

CR IP T

filtered multi-carrier (UFMC)5 are suitable for future advancement in M2M communication. NCMA is suitable for massive number of machines having small packets of data to transmit. This has the potential of improving the throughput, connectivity and, performance of M2M networks. Furthermore, it can reduce collision probability in contention based multiple access. UFMC is suitable for applications with short-bursts of traffic. Autonomous relay-assisted UAV communication, where UAVs can connect to terrestrial networks through relays, are also expected to find promising applications in the future. Asides the aforementioned, it is reasonable to expect that advances in M2M communication will also be driven by 6G expectations [199]. This would require advancements in technologies such as wireless charging and energy-harvesting. Current research [200, 201, 202, 203, 204, 205, 206, 207, 208] also shows that NB-IoT would highly impact M2M research in years to come thereby providing further opportunities. Acknowledgements

ED

M

The authors would like to appreciate everyone who gave comments and provided support to improve the content, quality and presentation of this paper. This work has been supported by the Malaysian Ministry of Higher Education under the Malaysian International Scholarship scheme. This publication is also supported by the Malaysian Ministry of Education under Research Management Center, Universiti Putra Malaysia, PUTRA Grant with High Impact UPM/700-2/1/GPB/2017/9557900.

PT

Table 1: Some key abbreviations used in this paper

Abbreviation

AC

CE

3GPP 5G ACB BS CAN CN

Meaning 3rd Generation Partnership Project 5th Generation wireless systems Access Class Barring Base Station Controller Area Network Core Network

resource spreading [195, 198] 5 an alternative to orthogonal frequency division multiplexing [196]

45

ACCEPTED MANUSCRIPT

Table 1: Key Abbreviations (continued)

ED

M

AN US

CR IP T

Cyber Physical Systems Cognitive Radio Networks Device-to-Device Distributed Antenna System Distributed Queuing Evolved Node B Evolved Packet Core Evolved Universal Terrestrial Radio Access European Telecommunications Standards Institute General Packet Radio Service Global System for Mobile Communications Human-to-Human Internet of Things Internet of Vehicles Intelligent Transport System Local Area Network Low Power Wide Area Long-Term Evolution Long-Term Evolution Advanced LTE in unlicensed spectrum Medium Access Control Machine-to-Machine Multiple-input and Multiple-output Message Queueing Telemetry Transport Machine Type Communication Machine Type Devices On Board Unit Open Geospatial Consortium Peer-to-Peer Physical layer Physical Resource Blocks Physical Random Access Channel Quality of Service Random Access

AC

CE

PT

CPS CRNs D2D DAS DQ eNB EPC E-UTRA ETSI GPRS GSM H2H IoT IoV ITS LAN LPWA LTE LTE-A LTE-U MAC M2M MIMO MQTT MTC MTD OBU OGC P2P PHY PRBs PRACH QoS RA

46

ACCEPTED MANUSCRIPT

Table 1: Key Abbreviations (continued)

ED

M

AN US

CR IP T

Random Access Channel Radio Access Network Radio Access Technology Radio Frequency Identification Radio Remote Head Serving Gateway Small cell Base Station Service Capability Layer Standard Development Organisation Smart Utility Networks Sensor Web Enablement Time Division Multiple Access Ultra Dense Networks User Equipment Ultra-Wide Band Vehicular Adhoc Networks Vehicle-to-Vehicle Vehicle-to-Infrastructure Wireless Access to Vehicular Environment Wireless Fidelity Wireless Local Area Networks Wireless Sensor Networks

PT

RACH RAN RAT RFID RRU S-GW SBS SCL SDO SUNs SWE TDMA UDNs UE UWB VANET V2V V2I WAVE Wi-Fi WLAN WSN References

CE

References

AC

[1] M. Dohler, J. Swetina, A. Alexiou, C. Wang, P. Martigne, K. Zheng, Editorial: IEEE Communications Surveys & Tutorials; Machine-toMachine Technologies & Architectures, IEEE Communications Surveys & Tutorials 16 (1) (2014) 1–3. doi:10.1109/SURV.2014.012114.00000. [2] R. Lu, X. Li, X. Liang, X. Shen, X. Lin, GRS: The green, reliability, and security of emerging machine to machine communications, IEEE Communications Magazine 49 (4) (2011) 28–35. doi:10.1109/MCOM.2011.5741143. 47

ACCEPTED MANUSCRIPT

[3] P. Jain, P. Hedman, H. Zisimopoulos, Machine type communications in 3GPP systems, IEEE Communications Magazine 50 (11) (2012) 28–35. doi:10.1109/MCOM.2012.6353679.

CR IP T

[4] K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Networks 18 (2014) 3 – 23. doi:10.1016/j.adhoc.2013.03.007. [5] M. T. Islam, A. e. M. Taha, S. Akl, A survey of access management techniques in machine type communications, IEEE Communications Magazine 52 (4) (2014) 74–81. doi:10.1109/MCOM.2014.6807949.

AN US

[6] S. Y. Lien, K. C. Chen, Y. Lin, Toward ubiquitous massive accesses in 3GPP machine-to-machine communications, IEEE Communications Magazine 49 (4) (2011) 66–74. doi:10.1109/MCOM.2011.5741148.

M

[7] P. K. Verma, R. Verma, A. Prakash, A. Agrawal, K. Naik, R. Tripathi, M. Alsabaan, T. Khalifa, T. Abdelkader, A. Abogharaf, Machine-to-machine (M2M) communications: A survey, Journal of Network and Computer Applications 66 (2016) 83 – 105. doi:10.1016/j.jnca.2016.02.016.

ED

[8] A. Rajandekar, B. Sikdar, A survey of MAC layer issues and protocols for machine-to-machine communications, IEEE Internet of Things Journal 2 (2) (2015) 175–186. doi:10.1109/JIOT.2015.2394438.

PT

[9] T. Taleb, A. Kunz, Machine type communications in 3GPP networks: potential, challenges, and solutions, IEEE Communications Magazine 50 (3) (2012) 178–184. doi:10.1109/MCOM.2012.6163599.

AC

CE

[10] Z. Fan, R. J. Haines, P. Kulkarni, M2M communications for e-health and smart grid: an industry and standard perspective, IEEE Wireless Communications 21 (1) (2014) 62–69. doi:10.1109/MWC.2014.6757898. [11] C. Pereira, A. Aguiar, Towards efficient mobile M2M communications: Survey and open challenges, Sensors 14 (10) (2014) 19582. doi:10.3390/s141019582.

48

ACCEPTED MANUSCRIPT

[12] M. Zhao, A. Kumar, T. Ristaniemi, P. H. J. Chong, Machine-toMachine communication and research challenges: A survey, Wireless Personal Communications 97 (3) (2017) 3569–3585.

CR IP T

[13] F. L. M. Chen, J. Wan, Machine-to-Machine communications: Architectures Standards and Applications, KSII Transactions on Internet and Information Systems 6 (2) (2012) 480–497.

[14] A. Laya, C. Kalalas, F. V´azquez-Gallego, L. Alonso, J. AlonsoZarate, Goodbye, ALOHA!, IEEE Access 4 (2016) 2029–2044. doi:10.1109/ACCESS.2016.2557758.

AN US

[15] A. Laya, L. Alonso, J. Alonso-Zarate, Is the random access channel of LTE and LTE-A suitable for M2M communications? A Survey of Alternatives, IEEE Communications Surveys & Tutorials 16 (1) (2014) 4–16. doi:10.1109/SURV.2013.111313.00244.

M

[16] O. A. Amodu and M. Othman, A survey of hybrid MAC protocols for machine-to-machine communications, Telecommunication Systems 69 (1) (2018) 141–165. https://doi.org/10.1007/s11235-018-0434-4.

ED

[17] E. Soltanmohammadi, K. Ghavami, M. Naraghi-Pour, A Survey of Traffic Issues in Machine-to-Machine Communications Over LTE, IEEE Internet of Things Journal 3 (6) (2016) 865–884. doi:10.1109/JIOT.2016.2533541.

PT

[18] N. Xia, H.-H. Chen, C.-S. Yang, Radio Resource Management in Machine-to-Machine Communications-A Survey, IEEE Communications Surveys & Tutorials 20 (1) (2018) 791–828.

AC

CE

[19] A. H. E. Fawal, A. Mansour, F. L. Roy, D. L. Jeune, and A. Hami, RACH Overload Congestion Mechanism for M2M Communication in LTE-A: Issues and Approaches, in: 2017 International Symposium on Networks, Computers and Communications (ISNCC), (2017) 1–6. doi:10.1109/ISNCC.2017.8071981. [20] A. Ali, G. A. Shah, M. O. Farooq, U. Ghani, Technologies and challenges in developing Machine-to-Machine applications: A survey, Journal of Network and Computer Applications 83 (2017) 124 – 139. doi:10.1016/j.jnca.2017.02.002. 49

ACCEPTED MANUSCRIPT

CR IP T

[21] Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, M. Guizani, Home M2M networks: Architectures, standards, and QoS improvement, IEEE Communications Magazine 49 (4) (2011) 44–52. doi:10.1109/MCOM.2011.5741145. [22] M. Chen, J. Wan, S. Gonzalez, X. Liao, V. C. M. Leung, A Survey of Recent Developments in Home M2M Networks, IEEE Communications Surveys & Tutorials 16 (1) (2014) 98–114. doi:10.1109/SURV.2013.110113.00249.

AN US

[23] M. J. Booysen, J. S. Gilmore, S. Zeadally, G.-J. Van Rooyen, Machineto-Machine (M2M) communications in Vehicular Networks, Korea Society of Internet Information (KSII) 6 (2) (2012) 529–546.

[24] Y. Mehmood, C. G¨org, M. Muehleisen, A. Timm-Giel, Mobile M2M communication architectures, upcoming challenges, applications, and future directions, EURASIP Journal on Wireless Communications and Networking 2015 (1) (2015) 250. doi:10.1186/s13638-015-0479-y.

M

[25] V. Gazis, A Survey of Standards for Machine-to-Machine and the Internet of Things, IEEE Communications Surveys & Tutorials 19 (1) (2017) 482 – 511. doi:10.1109/COMST.2016.2592948.

ED

[26] J. Kim, J. Lee, J. Kim, J. Yun, M2M Service Platforms: Survey, Issues, and Enabling Technologies, IEEE Communications Surveys & Tutorials 16 (1) (2014) 61–76. doi:10.1109/SURV.2013.100713.00203.

CE

PT

[27] J. Latvakoski, A. Iivari, P. Vitic, B. Jubeh, M. B. Alaya, T. Monteil, Y. Lopez, G. Talavera, J. Gonzalez, N. Granqvist, M. Kellil, H. Ganem, T. V¨ais¨anen, A Survey on M2M Service Networks, Computers 3 (4) (2014) 130–173. doi:10.3390/computers3040130.

AC

[28] H. Shariatmadari, R. Ratasuk, S. Iraji, A. Laya, T. Taleb, R. J¨antti, A. Ghosh, Machine-type communications: current status and future perspectives toward 5G systems, IEEE Communications Magazine 53 (9) (2015) 10–17. doi:10.1109/MCOM.2015.7263367. [29] F. Ghavimi, H. H. Chen, M2M Communications in 3GPP LTE/LTE-A Networks: Architectures, Service Requirements, Challenges, and Applications, IEEE Communications Surveys & Tutorials 17 (2) (2015) 525–549. doi:10.1109/COMST.2014.2361626. 50

ACCEPTED MANUSCRIPT

CR IP T

[30] S. Chen, R. Ma, H. H. Chen, H. Zhang, W. Meng, J. Liu, Machineto-Machine Communications in Ultra-Dense Networks – A Survey, IEEE Communications Surveys & Tutorials 19 (3) (2017) 1478 – 1503. doi:10.1109/COMST.2017.2678518. [31] A. Ali, G. A. Shah, J. Arshad, Energy efficient techniques for M2M communication: A survey, Journal of Network and Computer Applications 68 (2016) 42 – 55. doi:10.1016/j.jnca.2016.04.002.

AN US

[32] N. Tekbiyik, E. Uysal-Biyikoglu, Energy efficient wireless unicast routing alternatives for machine-to-machine networks, Journal of Network and Computer Applications 34 (5) (2011) 1587 – 1614, Dependable Multimedia Communications: Systems, Services, and Applications. doi:10.1016/j.jnca.2011.02.005. [33] A. Barki, A. Bouabdallah, S. Gharout, J. Traor´e, M2M Security: Challenges and Solutions, IEEE Communications Surveys & Tutorials 18 (2) (2016) 1241–1254. doi:10.1109/COMST.2016.2515516.

ED

M

[34] G. Tuna, D. G. Kogias, V. C. Gungor, C. Gezer, E. Ta¸skın, E. Ayday, A survey on information security threats and solutions for Machine to Machine (M2M) communications, Journal of Parallel and Distributed Computing 109 (2017) 142–154.

PT

[35] A. C. V. Gummalla and J. O. Limb, Wireless medium access control protocols, IEEE Communications Surveys & Tutorials 3 (2) 2–15. doi:0.1109/COMST.2000.5340799.

CE

[36] I. Rhee, A. Warrier, M. Aia, J. Min, M. L. Sichitiu, ZMAC: A Hybrid MAC for Wireless Sensor Networks, IEEE/ACM Transactions on Networking (TON) 16 (3) (2008) 511–524. doi:10.1109/TNET.2007.900704.

AC

[37] Y. Liu, C. Yuen, X. Cao, N. U. Hassan, J. Chen, Design of a Scalable Hybrid MAC Protocol for Heterogeneous M2M Networks, IEEE Internet of Things Journal 1 (1) (2014) 99–111. doi:10.1109/JIOT.2014.2310425. [38] P. K. Verma, R. Verma, A. Prakash, R. Tripathi, K. Naik, A novel hybrid medium access control protocol for inter-M2M communications, 51

ACCEPTED MANUSCRIPT

Journal of Network and Computer Applications 75 (2016) 77 – 88. doi:10.1016/j.jnca.2016.08.011.

CR IP T

[39] E. Hegazy, W. Saad, M. Shokair, An Efficient Proposed MAC Protocol for M2M Networks, Wireless Personal Communications 96 (2) (2017), 2253–2269. doi:10.1007/s11277-017-4296-y. [40] L. A. Francisco V´azquez-Gallego, J. Alonso-Zarate, Energy Analysis of Contention Tree-Based Access Protocols in Dense Machine-to-Machine Area Networks, Journal of Sensors (2015) 12 pages Article ID 685164. doi:10.1155/2015/685164.

AN US

[41] W. Xu, G. Campbell, A near perfect stable random access protocol for a broadcast channel, [Conference Record] SUPERCOMM/ICC ’92 Discovering a New World of Communications, 1992, pp. 370–374 vol.1. doi:10.1109/ICC.1992.268230.

M

[42] H. M. G¨ ursu, M. Vilgelm, W. Kellerer, M. Reisslein, Hybrid Collision Avoidance-Tree Resolution for M2M Random Access, IEEE Transactions on Aerospace and Electronic Systems 53 (4) (2017) 1974 – 1987. doi:10.1109/TAES.2017.2677839.

ED

[43] N. Sui, C. Wang, W. Xie, Y. Xu, Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic, KSII Transactions on Internet & Information Systems 11 (2) (2017).

PT

[44] N. Shahin, R. Ali, and Y.-T. Kim, Hybrid Slotted-CSMA/CA-TDMA for Efficient Massive Registration of IoT Devices, IEEE Access 6 (2018) 18366–18382. doi:10.1109/ACCESS.2018.2815990.

AC

CE

[45] C. Karupongsiri, K. S. Munasinghe, A. Jamalipour, A novel communication mechanism for Smart Meter packet transmission on LTE networks, in: 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2016, pp. 122–127. doi:10.1109/SmartGridComm.2016.7778749. [46] G. Wang, X. Zhong, S. Mei, J. Wang, An adaptive medium access control mechanism for cellular based Machine to Machine (M2M) communication, in: 2010 IEEE International Conference on, Wireless Information Technology and Systems (ICWITS), IEEE, 2010, pp. 1–4. 52

ACCEPTED MANUSCRIPT

CR IP T

[47] C. Y. Hsu, C. H. Yen, C. T. Chou, An adaptive multichannel protocol for large-scale machine-to-machine (M2M) networks, in: 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), 2013, pp. 1223–1228. doi:10.1109/IWCMC.2013.6583731.

´ [48] F. V. Azquez-Gallego, J. Alonso-Zarate, I. Balboteo, L. Alonso, DPCFM: A Medium Access Control protocol for dense Machine-to-Machine area networks with dynamic gateways, in: 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2013, pp. 490–494. doi:10.1109/SPAWC.2013.6612098.

AN US

[49] C. W. Park, D. Hwang, T. J. Lee, Enhancement of IEEE 802.11ah MAC for M2M Communications, IEEE Communications Letters 18 (7) (2014) 1151–1154. doi:10.1109/LCOMM.2014.2323311.

M

[50] H. Wu, C. Zhu, R. J. La, X. Liu, Y. Zhang, Fast Adaptive S-ALOHA Scheme for Event-Driven Machine-to-Machine Communications, in: 2012 IEEE Vehicular Technology Conference (VTC Fall), 2012, pp. 1–5. doi:10.1109/VTCFall.2012.6398917.

ED

[51] Y. Chen, W. Wang, Machine-to-Machine Communication in LTE-A, in: 2010 IEEE 72nd Vehicular Technology Conference - Fall, 2010, pp. 1–4. doi:10.1109/VETECF.2010.5594218.

PT

[52] S.-C. Hung, H. Hsu, S.-Y. Lien, K.-C. Chen, Architecture Harmonization Between Cloud Radio Access Networks and Fog Networks, IEEE Access 3 (2015) 3019–3034.

AC

CE

[53] J. Yuan, H. Shan, A. Huang, T. Q. Quek, and Y.-D. Yao, Massive Machine-to-Machine Communications in Cellular Network: Distributed Queueing Random Access Meets MIMO, IEEE Access 5 (2017) 2981–2993. doi:10.1109/ACCESS.2017.2670614.

[54] K. Ashrafuzzaman and A. O. Fapojuwo, Efficient and Agile Carrier Sense Multiple Access in Capillary Machine-to-Machine Communication Networks, IEEE ACCESS 6 (2018) 4916–4932. doi:10.1109/ACCESS.2018.2790842.

53

ACCEPTED MANUSCRIPT

CR IP T

[55] C. Zhang, X. Sun, J. Zhang, H. Zhu, Performance Evaluation of Multi-channel CSMA for Machine-to-Machine Communication, Wireless Internet, WiCON 2017, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Springer, Cham, 230 (2018) 24–33. [56] U. Raza, P. Kulkarni, M. Sooriyabandara, Low Power Wide Area Networks: An Overview, IEEE Communications Surveys & Tutorials 19 (2) (2017) 855 – 873. doi:10.1109/COMST.2017.2652320.

AN US

[57] T. P. C. d. Andrade, C. A. Astudillo, L. R. Sekijima, N. L. S. d. Fonseca, The Random Access Procedure in Long Term Evolution Networks for the Internet of Things, IEEE Communications Magazine 55 (3) (2017) 124–131. doi:10.1109/MCOM.2017.1600555CM.

[58] C. Yoon, Distributed queuing with preamble grouping for massive IoT devices in LTE random access, in: 2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016, pp. 103–105. doi:10.1109/ICTC.2016.7763445.

ED

M

[59] R.-G. Cheng, F. M. Al-Taee, J. Chen, and C.-H. Wei, A Dynamic Resource Allocation Scheme for Group Paging in LTE-Advanced Networks, IEEE Internet of Things Journal, 2 (5) (2015) 427–434. doi:10.1109/JIOT.2015.2435655.

PT

[60] G. Y. Lin, H. Y. Wei, Auction-Based Random Access Load Control for Time-Dependent Machine-to-Machine Communications, IEEE Internet of Things Journal 3 (5) (2016) 658–672. doi:10.1109/JIOT.2015.2480070.

AC

CE

[61] M. A. Mehaseb, Y. Gadallah, A. Elhamy, H. Elhennawy, Classification of LTE Uplink Scheduling Techniques: An M2M Perspective, IEEE Communications Surveys Tutorials 18 (2) (2016) 1310–1335. doi:10.1109/COMST.2015.2504182. [62] N. Zhang, G. Kang, J. Wang, Y. Guo, F. Labeau, Resource Allocation in a New Random Access for M2M Communications, IEEE Communications Letters 19 (5) (2015) 843–846.

54

ACCEPTED MANUSCRIPT

CR IP T

[63] L. Ferdouse, A. Anpalagan, S. Misra, Congestion and overload control techniques in massive M2M systems: a survey, Transactions on Emerging Telecommunications Technologies 28 (2) (2017). doi:10.1002/ett.2936. [64] A. M. Maia, D. Vieira, M. F. de Castro, Y. Ghamri-Doudane, A fair QoS-aware dynamic LTE scheduler for machine-to-machine communication, Computer Communications 89-90 (2016) 75 – 86, Internet of Things: Research challenges and Solutions. doi:10.1016/j.comcom.2016.03.013.

AN US

[65] N. H. Mahmood, N. Pratas, T. Jacobsen, P. Mogensen, On the performance of one stage massive random access protocols in 5G systems, in: 2016 9th International Symposium on Turbo Codes and Iterative Information Processing (ISTC), 2016, pp. 340–344. doi:10.1109/ISTC.2016.7593133.

M

[66] K. Zheng, S. Ou, J. Alonso-Zarate, M. Dohler, F. Liu, H. Zhu, Challenges of massive access in highly dense LTE-advanced networks with machine-to-machine communications, IEEE Wireless Communications 21 (3) (2014) 12–18. doi:10.1109/MWC.2014.6845044.

ED

[67] H. Cui, V. C. M. Leung, S. Li, X. Wang, LTE in the Unlicensed Band: Overview, Challenges, and Opportunities, IEEE Wireless Communications 24 (4) (2017) 99 – 105. doi:10.1109/MWC.2016.1600031WC.

CE

PT

[68] M. Condoluci, M. Dohler, G. Araniti, A. Molinaro, K. Zheng, Toward 5G densenets: architectural advances for effective machine-type communications over femtocells, IEEE Communications Magazine 53 (1) (2015) 134–141. doi:10.1109/MCOM.2015.7010526.

AC

[69] C. Goursaud, J.-M. Gorce, Dedicated networks for IoT : PHY / MAC state of the art and challenges, EAI endorsed transactions on Internet of Things (2015) hal-01231221. doi:10.4108/eai.26-10-2015.150597. [70] R. abbas, M. Shirvanimoghaddam, Y. Li, B. Vucetic, Random Access for M2M Communications With QoS Guarantees, IEEE Transactions on Communications 65 (7) (2017) 2889 – 2903. doi:10.1109/TCOMM.2017.2690900.

55

ACCEPTED MANUSCRIPT

[71] Z. Dawy, W. Saad, A. Ghosh, J. G. Andrews, E. Yaacoub, Toward Massive Machine Type Cellular Communications, IEEE Wireless Communications 24 (1) (2017) 120–128. doi:10.1109/MWC.2016.1500284WC.

CR IP T

[72] W. Zhan and L. Dai, Massive Random Access of Machine-to-Machine Communications in LTE Networks: Modeling and Throughput Optimization, IEEE Transactions on Wireless Communications 17 (4) (2018) 2771–2785. doi:10.1109/TWC.2018.2803083

AN US

[73] A. H. Bui, C. T. Nguyen, T. C. Thang, A. T. Pham, Design and Performance Analysis of a Novel Distributed Queue Access Protocol for Cellular-Based Massive M2M Communications, IEEE Access 6 (2018) 3008–3019. doi:10.1109/ACCESS.2017.2786678

[74] M. Su´arez-Albela, P. Fraga-Lamas, T. M. Fern´andez-Caram´es, A. Dapena, M. Gonz´alez-L´opez, Home Automation System Based on Intelligent Transducer Enablers., Sensors 16 (10) (2016) 1595.

M

[75] C. She, C. Yang, T. Q. Quek, Uplink Transmission Design with Massive Machine Type Devices in Tactile Internet, in: 2016 IEEE Globecom Workshops (GC Wkshps), Washington, DC, 2016, pp. 1-6. doi:10.1109/GLOCOMW.2016.7849072.

PT

ED

[76] M. K. Giluka, T. V. Pasca, N. Rajoria, and B. R. Tamma, On Efficient Scheduling of H2H Traffic and Reducing Signaling Overhead due to Uplink Small Data M2M Traffic in LTE-A Networks, Wireless Personal Communications, (2018) 1–28. doi:10.1007/s11277-018-5881-4.

CE

[77] M. K. Giluka, N. Rajoria, A. C. Kulkarni, V. Sathya, and B. R. Tamma, Class based dynamic priority scheduling for uplink to support M2M communications in LTE, in: 2014 IEEE World Forum on Internet of Things (WF-IoT), IEEE (2014) 313–317. doi:10.1109/WFIoT.2014.6803179.

AC

[78] A. E. Mostafa, Y. Gadallah, A Statistical Priority-Based Scheduling Metric for M2M Communications in LTE Networks, IEEE Access 5 (2017) 8106–8117. doi:10.1109/ACCESS.2017.2700409.

[79] A. Azari, G. Miao, Network Lifetime Maximization for CellularBased M2M Networks, IEEE Access 5 (2017) 18927–18940. doi:10.1109/ACCESS.2017.2753283. 56

ACCEPTED MANUSCRIPT

CR IP T

[80] J. Sachs, N. Beijar, P. Elmdahl, J. Melen, F. Militano, and P. Salmela, Capillary networks – a smart way to get things connected, Ericsson Review (2014) 8. https://www.ericsson.com/assets/local/publications/ericssontechnology-review/docs/2014/er-capillary-networks.pdf.

[81] V. B. Miˇsi´c, J. Miˇsi´c, X. Lin, and D. Nerandzic, Capillary Machine-toMachine Communications: The Road Ahead, International Conference on Ad-hoc, Mobile, and Wireless Networks: ADHOC-NOW 2012, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 7363 413–423.

AN US

[82] Y.-F. Huang and H. H. Chen, Physical layer architectures for machine type communication networks–a survey, Wireless Communications and Mobile Computing, 16 (18) (2016) 3269–3294. doi:10.1002/wcm.2752.

M

[83] O. Raeesi, J. Pirskanen, A. Hazmi, T. Levanen, and M. Valkama, Performance evaluation of IEEE 802.11ah and its restricted access window mechanism, in: 2014 IEEE International Conference on Communications Workshops (ICC), Sydney, NSW, IEEE, 2014, pp. 460–466.

ED

[84] K.-R. Jung, A. Park, and S. Lee, Machine-Type-Communication (MTC) Device Grouping Algorithm for Congestion Avoidance of MTC Oriented LTE Network, Security-enriched urban computing and smart grid, Springer Berlin Heidelberg, (2010) 167–178.

CE

PT

[85] J. J. M. Castillo, The Survival of communications in Ad Hoc and M2M networks: The fundamentals design of architecture and radio technologies used for low-power communication NOMOHI devices, in: 2010 International Symposium on Information Technology, 2 (2010) 666–671. doi:10.1109/ITSIM.2010.5561531.

AC

[86] H. Nikopour and H. Baligh, Sparse code multiple access, in: 2013 IEEE 24th International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (2013) 332–336. doi:10.1109/PIMRC.2013.6666156. [87] Y. Wu, C. Wang, Y. Chen, and A. Bayesteh, Sparse Code Multiple Access for 5G Radio Transmission radio transmission, in: 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), (2017) 1–6. 57

ACCEPTED MANUSCRIPT

CR IP T

[88] H. Wang, A. O. Fapojuwo, A Survey of Enabling Technologies of Low Power and Long Range Machine-to-Machine Communications, IEEE Communications Surveys Tutorials 19 (4) (2017) 2621–2639. doi:10.1109/COMST.2017.2721379. [89] M. M. Alam, H. Malik, M. I. Khan, T. Pardy, A. Kuusik, Y. Le. Moullec, A Survey on the Roles of Communication Technologies in IoT-Based Personalized Healthcare Application, IEEE Access 6 (2018) 36611–36631. doi:10.1109/ACCESS.2018.2853148.

AN US

[90] N. Kouzayha, M. Jaber, Z. Dawy, Measurement-Based Signaling Management Strategies for Cellular IoT, IEEE Internet of Things Journal 4 (5) (2017) 1434–1444. doi:10.1109/JIOT.2017.2736528.

[91] N. Accettura, M. R. Palattella, M. Dohler, L. A. Grieco, G. Boggia, Standardized power-efficient & internet-enabled communication stack for capillary M2M networks, in: 2012 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2012, pp. 226–231.

M

[92] Y. Cao, T. Jiang, Z. Han, A Survey of Emerging M2M Systems: Context, Task, and Objective, IEEE Internet of Things Journal 3 (6) (2016) 1246–1258. doi:10.1109/JIOT.2016.2582540.

PT

ED

[93] G. Zhang, A. Li, K. Yang, L. Zhao, Y. Du, D. Cheng, Energy-Efficient Power and Time-Slot Allocation for Cellular-Enabled Machine Type Communications, IEEE Communications Letters 20 (2) (2016) 368– 371. doi:10.1109/LCOMM.2015.2504980.

CE

[94] C. Lai, R. Lu, D. Zheng, H. Li, X. . Shen, Toward secure large-scale machine-to-machine communications in 3GPP networks: challenges and solutions, IEEE Communications Magazine 53 (12) (2015) 12–19. doi:10.1109/MCOM.2015.7355579.

AC

[95] M. Condoluci, G. Araniti, T. Mahmoodi, M. Dohler, Enabling the IoT Machine Age With 5G: Machine-Type Multicast Services for Innovative Real-Time Applications, IEEE Access 4 (2016) 5555–5569. doi:10.1109/ACCESS.2016.2573678.

[96] B. J. Sahu, N. Saxena, A. Roy, Efficient M2M Gateway Planning for Next-Generation Cellular Networks, IETE Technical Review 50 (2017) 42–54. doi:1080/02564602.2017.1308281. 58

ACCEPTED MANUSCRIPT

[97] A. Asadi, Q. Wang, V. Mancuso, A Survey on Device-to-Device Communication in Cellular Networks, IEEE Communications Surveys & Tutorials 16 (4) (2014) 1801–1819. doi:10.1109/COMST.2014.2319555.

CR IP T

[98] G. M. Toschi, L. B. Campos, C. E. Cugnasca, Home automation networks: A survey, Computer Standards & Interfaces 50 (2017) 42–54.

[99] K. Katzis, H. Ahmadi, Challenges Implementing Internet of Things (IoT) Using Cognitive Radio Capabilities in 5G Mobile Networks, Internet of Things (IoT) in 5G Mobile Technologies, Springer, 2016, pp. 55–76.

AN US

[100] C. Vallati, A. Virdis, E. Mingozzi, G. Stea, Exploiting LTE D2D communications in M2M Fog platforms: Deployment and practical issues, in: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 2015, pp. 585–590. doi:10.1109/WF-IoT.2015.7389119.

M

[101] F. Akhtar, M. H. Rehmani, M. Reisslein, White space: Definitional perspectives and their role in exploiting spectrum opportunities, Telecommunications Policy 40 (4) (2016) 319 – 331. doi:https://doi.org/10.1016/j.telpol.2016.01.003.

PT

ED

[102] S. Y. Lien, S. M. Cheng, K. C. Chen, D. I. Kim, ResourceOptimal Licensed-Assisted Access in Heterogeneous Cloud Radio Access Networks With Heterogeneous Carrier Communications, IEEE Transactions on Vehicular Technology 65 (12) (2016) 9915–9930. doi:10.1109/TVT.2016.2523562.

CE

[103] S. C. Lin, K. C. Chen, Cognitive and Opportunistic Relay for QoS Guarantees in Machine-to-Machine Communications, IEEE Transactions on Mobile Computing 15 (3) (2016) 599–609. doi:10.1109/TMC.2015.2421931.

AC

[104] R. Boisguene, S. H. Chou, C. W. Huang, A survey on cognitive machine-to-machine communications, in: 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), 2014, pp. 739–744. doi:10.1109/IWCMC.2014.6906448.

[105] C. Pereira, A. Pinto, D. Ferreira, A. Aguiar, Experimental Characterization of Mobile IoT Application Latency, IEEE Internet of Things Journal 4 (4) (2017) 1082–1094. doi:10.1109/JIOT.2017.2689682. 59

ACCEPTED MANUSCRIPT

CR IP T

[106] A. Orsino, G. Araniti, L. Militano, J. Alonso-Zarate, A. Molinaro, A. Iera, Energy Efficient IoT Data Collection in Smart Cities Exploiting D2D Communications, Sensors 16 (6) (2016) 836. doi:10.3390/s16060836. [107] M. Bacco, P. Cassar, M. Colucci, and A. Gotta, Modeling Reliable M2M/IoT Traffic Over Random Access Satellite Links in NonSaturated Conditions, IEEE Journal on Selected Areas in Communications 36 (5) (2018) 1042–1051. doi:10.1109/JSAC.2018.2832799.

AN US

[108] Q. Song, L. Nuaymi, X. Lagrange, Survey of radio resource management issues and proposals for energy-efficient cellular networks that will cover billions of machines, EURASIP journal on wireless communications and networking 2016 (1) (2016) 140.

[109] I. Yaqoob, I. A. T. Hashem, Y. Mehmood, A. Gani, S. Mokhtar, S. Guizani, Enabling Communication Technologies for Smart Cities, IEEE Communications Magazine 55 (1) (2017) 112–120. doi:10.1109/MCOM.2017.1600232CM.

ED

M

[110] Y. Mehmood, N. Haider, M. Imran, A. Timm-Giel, and M. Guizani, M2M Communications in 5G: State-of-the-Art Architecture, Recent Advances, and Research Challenges, IEEE Communications Magazine, 55 (9) (2017) 194–201. doi:10.1109/MCOM.2017.1600559.

PT

[111] S. A. Bagloee, M. Tavana, M. Asadi, and T. Oliver, Autonomous vehicles: challenges, opportunities, and future implications for transportation policies, Journal of Modern Transportation, 24 (4) (2016) 284–303. doi:10.1007/s40534-016-0117-3.

AC

CE

[112] X. Cheng, X. Hu, L. Yang, I. Husain, K. Inoue, P. Krein, R. Lefevre, Y. Li, H. Nishi, J. G. Taiber, F. Y. Wang, Y. Zha, W. Gao, Z. Li, Electrified Vehicles and the Smart Grid: The ITS Perspective, IEEE Transactions on Intelligent Transportation Systems 15 (4) (2014) 1388– 1404. doi:10.1109/TITS.2014.2332472.

[113] D. Jia, K. Lu, J. Wang, X. Zhang, X. Shen,A Survey on Platoon-Based Vehicular Cyber-Physical Systems, IEEE Communications Surveys & Tutorials 18 (1) (2016) 263–284. doi:10.1109/COMST.2015.2410831.

60

ACCEPTED MANUSCRIPT

CR IP T

[114] J. Engelbrecht, M. J. Booysen, G.-J. van Rooyen, F. J. Bruwer, Survey of smartphone-based sensing in vehicles for intelligent transportation system applications, IET Intelligent Transport Systems 9 (10) (2015) 924–935. [115] J. Contreras-Castillo, S. Zeadally, J. A. G. Ib´an ˜ez, A sevenlayered model architecture for Internet of Vehicles, Journal of Information and Telecommunication 1 (1) (2017) 4–22. http://www.tandfonline.com/doi/pdf/10.1080/24751839.2017.1295601, doi:10.1080/24751839.2017.1295601.

AN US

[116] K. Saleem, A. Derhab, J. Al-Muhtadi, B. Shahzad, Humanoriented design of secure Machine-to-Machine communication system for e-Healthcare society, Computers in Human Behavior 51, Part B (2015) 977 – 985, computing for Human Learning, Behaviour and Collaboration in the Social and Mobile Networks Era. doi:10.1016/j.chb.2014.10.010.

M

[117] M. Chen, Towards smart city: M2M communications with software agent intelligence, Multimedia Tools and Applications 67 (1) (2013) 167–178.

PT

ED

[118] M. K. Giluka, N. Rajoria, A. C. Kulkarni, V. Sathya, B. R. Tamma, Class based dynamic priority scheduling for uplink to support M2M communications in LTE, in: 2014 IEEE World Forum on Internet of Things (WF-IoT), 2014, pp. 313–317. doi:10.1109/WFIoT.2014.6803179.

CE

[119] R. Bruns, J. Dunkel, H. Masbruch, S. Stipkovic, Intelligent M2M: Complex event processing for machine-to-machine communication, Expert Systems with Applications 42 (3) (2015) 1235–1246.

AC

[120] B. L. R. Stojkoska, K. V. Trivodaliev, A review of Internet of Things for smart home: Challenges and solutions, Journal of Cleaner Production 140, Part 3 (2017) 1454 – 1464. doi:10.1016/j.jclepro.2016.10.006. [121] About 3GPP home. URL http://www.3gpp.org/about-3gpp/about-3gpp [122] About ETSI. URL http://www.etsi.org/about 61

ACCEPTED MANUSCRIPT

[124] IoT standards. URL http://www.onem2m.org/

CR IP T

[123] About IETF. URL https://www.ietf.org/about/

[125] Narrowband IoT. URL http://www.3gpp.org/news-events/3gpp-news/1733-niot

[126] M. Albano, L. L. Ferreira, L. M. Pinho, Convergence of Smart Grid ICT Architectures for the Last Mile, IEEE Transactions on Industrial Informatics 11 (1) (2015) 187–197. doi:10.1109/TII.2014.2379436.

AN US

[127] N. Panwar, S. Sharma, A. K. Singh, A survey on 5G: The next generation of mobile communication, Physical Communication 18 (2016) 64–84. doi:10.1016/j.phycom.2015.10.006.

M

[128] S. Subhani, H. Shi, J. F. G. Cobben, A survey of technical challenges in wireless machine-to-machine communication for smart grids, in: 2015 50th International Universities Power Engineering Conference (UPEC), 2015, pp. 1–6. doi:10.1109/UPEC.2015.7339879.

ED

[129] S. Verma, Y. Kawamoto, Z. Fadlullah, H. Nishiyama, N. Kato, A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues, IEEE Communications Surveys & Tutorials 19 (3) (2017) 1457 – 1477. doi:10.1109/COMST.2017.2694469.

CE

PT

[130] M. J. Farooq, Q. Zhu, Optimizing mission critical data dissemination in massive IoT networks, International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Paris, 2017, pp. 1–6. doi:10.23919/WIOPT.2017.7959930.

AC

[131] I. Hwang, Y. G. Kim, Analysis of Security Standardization for the Internet of Things, in 2017 International Conference on Platform Technology and Service (PlatCon), 2017, pp. 1–6. doi:10.1109/PlatCon.2017.7883687. [132] K. V. Deshpande, A. Rajesh, Investigation on IMCP based clustering in LTE-M communication for smart metering applications, Engineering Science and Technology, an International Journal 20 (3) (2017) 944– 955 doi:10.1016/j.jestch.2017.04.004. 62

ACCEPTED MANUSCRIPT

[133] M. Imtiaz Ul Haq, D. Kim, Greedy Successive Anchorization for Localizing Machine Type Communication Devices, Sensors 16 (12) (2016) 2115. doi:10.3390/s16122115.

CR IP T

[134] R. Vrabic, D. Kozjek, P. Butala, Knowledge elicitation for fault diagnostics in plastic injection moulding: A case for machine-to-machine communication, CIRP Annals-Manufacturing Technology 66 (1) (2017) 433-436. doi:10.1016/j.cirp.2017.04.001.

protocol for rechannel, in 2016 Technology, Com2016, pp. 397–402.

AN US

[135] A. Sofwan, Performance analysis of MAC source sharing D2D and M2M in unlicensed 3rd International Conference on Information puter, and Electrical Engineering (ICITACEE), doi:10.1109/ICITACEE.2016.7892479.

[136] M. Castro, A. J. Jara, A. F. Skarmeta, An Analysis of M2M Platforms: Challenges and Opportunities for the Internet of Things, in 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012, pp. 757–762. doi:10.1109/IMIS.2012.184.

ED

M

[137] M. Agiwal, A. Roy, N. Saxena, Next Generation 5G Wireless Networks: A Comprehensive Survey, IEEE Communications Surveys & Tutorials 18 (3) (2016) 1617–1655. doi:10.1109/COMST.2016.2532458.

PT

[138] N. C. Luong, D. T. Hoang, P. Wang, D. Niyato, D. I. Kim, Z. Han, Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey, IEEE Communications Surveys Tutorials 18 (4) (2016) 2546–2590. doi:10.1109/COMST.2016.2582841.

AC

CE

[139] R. De Gaudenzi, O. Del Rio Herrero, G. Gallinaro, S. Cioni, P.-D. Arapoglou, Random access schemes for satellite networks, from VSAT to M2M: a survey, International Journal of Satellite Communications and Networking 36 (1) (2018) 66–107. [140] J. Kim, J. Yun, S. C. Choi, D. N. Seed, G. Lu, M. Bauer, A. Al-Hezmi, K. Campowsky, J. Song, Standard-based IoT platforms interworking: implementation, experiences, and lessons learned, IEEE Communications Magazine 54 (7) (2016) 48–54. doi:10.1109/MCOM.2016.7514163.

63

ACCEPTED MANUSCRIPT

[141] C. Zhao, L. Huang, Y. Zhao, X. Du, Secure Machine-Type Communications toward LTE Heterogeneous Networks, IEEE Wireless Communications 24 (1) (2017) 82–87. doi:10.1109/MWC.2017.1600141WC.

CR IP T

[142] F. Morvari, A. Ghasemi, Priority-based adaptive access barring for M2M communications in LTE networks using learning automata, International Journal of Communication Systems 30 (16) (2017). doi:10.1002/dac.3325.

AN US

[143] I. F. Akyildiz, S. Nie, S.-C. Lin, M. Chandrasekaran, 5G roadmap: 10 key enabling technologies, Computer Networks 106 (2016) 17 – 48. doi:10.1016/j.comnet.2016.06.010.

[144] N. H. Motlagh, T. Taleb, O. Arouk, Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives, IEEE Internet of Things Journal 3 (6) (2016) 899–922. doi:10.1109/JIOT.2016.2612119.

M

[145] M. Jaber, Z. Dawy, N. Akl, and E. Yaacoub, Tutorial on LTE/LTEA Cellular Network Dimensioning Using Iterative Statistical Analysis, IEEE Communications Surveys & Tutorials, 18 (2) (2016) 1355–1383. doi:10.1109/COMST.2015.2513440

PT

ED

[146] Y. L. Lee, T. C. Chuah, J. Loo, and A. Vinel, Recent Advances in Radio Resource Management for Heterogeneous LTE/LTE-A Networks, IEEE Communications Surveys & Tutorials 16 (4) (2014) 2142–2180. doi:10.1109/COMST.2014.2326303.

CE

[147] J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, A Survey on Security Aspects for LTE and LTE-A Networks, IEEE Communications Surveys Tutorials 16 (1) (2014) 283–302. doi:10.1109/SURV.2013.041513.00174

AC

[148] M. Elsaadany, A. Ali, and W. Hamouda, Cellular LTE-A Technologies for the Future Internet-of-Things: Physical Layer Features and Challenges, IEEE Communications Surveys & Tutorials 19 (4) (2017) 2544–2572. doi:10.1109/COMST.2017.2728013 [149] H. S. Kamath, H. Singh, and A. Khanna, Transmit receive chain in LTE, in: 2016 IEEE 7th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON), (2016) 1–7. doi:10.1109/UEMCON.2016.7777814. 64

ACCEPTED MANUSCRIPT

[150] J. K. Petersen, The Telecommunications Illustrated Dictionary, Second Edition. CRC press, (2002).

CR IP T

[151] A. Ksentini, Y. Hadjadj-Aoul, T. Taleb, Cellular-Based Machine-toMachine: Overload Control, IEEE Network 26 (6) (2012) 54–60. doi:10.1109/MNET.2012.6375894. [152] T. Taleb, Toward carrier cloud: Potential, challenges, and solutions, IEEE Wireless Communications 21 (3) (2014) 80–91. doi:10.1109/MWC.2014.6845052.

AN US

[153] A. Kunz, A. Prasad, K. Samdanis, S. Husain, J. Song, Enhanced 3GPP system for Machine Type Communications and Internet of Things, in: 2015 IEEE Conference on Standards for Communications and Networking (CSCN), 2015, pp. 48–53. doi:10.1109/CSCN.2015.7390419.

M

[154] S. N. Swain, R. Thakur, S. R. M. Chebiyyam, Coverage and Rate Analysis for Facilitating Machine-to-Machine Communication in LTE-A Networks Using Device-to-Device Communication, IEEE Transactions on Mobile Computing 16 (11) (2017) 3014 – 3027. doi:10.1109/TMC.2017.2684162.

ED

[155] M. Wang, W. Yang, J. Zou, B. Ren, M. Hua, J. Zhang, X. You, Cellular machine-type communications: physical challenges and solutions, IEEE Wireless Communications 23 (2) (2016) 126–135. doi:10.1109/MWC.2016.7462494.

CE

PT

[156] M. I. Hossain, A. Laya, F. Militano, S. Iraji, J. Markendahl, Reducing signaling overload: Flexible capillary admission control for dense MTC over LTE networks, in: 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2015, pp. 1305–1310. doi:10.1109/PIMRC.2015.7343500.

AC

[157] J. Choi, On the Adaptive Determination of the Number of Preambles in RACH for MTC, IEEE Communications Letters 20 (7) (2016) 1385– 1388. doi:10.1109/LCOMM.2016.2546238. [158] N. B. Teshale and H. M. Hussien, Review on Cognitive Radio Technology for Machine to Machine Communication, International Conference on Information and Communication Technology for Develoment 65

ACCEPTED MANUSCRIPT

for Africa, ICT4DA 2017, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, Cham 244 (2018) 347–355.

CR IP T

[159] M. Hasan, E. Hossain, D. Niyato, Random access for machineto-machine communication in LTE-advanced networks: issues and approaches, IEEE Communications Magazine 51 (6) (2013) 86–93. doi:10.1109/MCOM.2013.6525600.

AN US

[160] A. Botta, W. de Donato, V. Persico, A. Pescap´e, Integration of Cloud computing and Internet of Things: A survey, Future Generation Computer Systems 56 (2016) 684 – 700. doi:10.1016/j.future.2015.09.021. [161] S. Duan, V. Shah-Mansouri, Z. Wang, V. W. S. Wong, D-ACB: Adaptive Congestion Control Algorithm for Bursty M2M Traffic in LTE Networks, IEEE Transactions on Vehicular Technology 65 (12) (2016) 9847–9861. doi:10.1109/TVT.2016.2527601.

M

[162] Z. Lu, Q. Pan, L. Wang, X. Wen, Overload Control for Signaling Congestion of Machine Type Communications in 3GPP Networks, PloS one 11 (12) (2016) e0167380.

ED

[163] Z. Feng, Z. Feng, W. Li, T. A. Gulliver, An Optimal Service Strategy for Grouped Machine-Type Communications in Cellular Networks, IEEE Communications Letters 21 (1) (2017) 140–143. doi:10.1109/LCOMM.2016.2615299.

CE

PT

[164] Y. D. Beyene, R. J¨antti, K. Ruttik, Random Access Scheme for Sporadic Users in 5G, IEEE Transactions on Wireless Communications 16 (3) (2017) 1823–1833. doi:10.1109/TWC.2017.2655044.

AC

[165] T. Lv, Y. Ma, J. Zeng, and P. T. Mathiopoulos, Millimeter-Wave NOMA Transmission in Cellular M2M Communications for Internet of Things, IEEE Internet of Things Journal 5 (3) (2018) 1989–2000. doi:10.1109/JIOT.2018.2819645.

[166] M. Kamel, W. Hamouda, and A. Youssef, Ultra-Dense Networks: A Survey, IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 2522–2545, Fourthquarter 2016.

66

ACCEPTED MANUSCRIPT

CR IP T

[167] M. Koivisto, A. Hakkarainen, M. Costa, P. Kela, K. Leppanen, and M. Valkama, High-Efficiency Device Positioning and Location-Aware Communications in Dense 5G Networks, IEEE Communications Magazine 55 (8) (2017) 188–195. [168] H. Lin, W.-Y. Shin, Multi-Cell-Aware Opportunistic Random Access for Machine-Type Communications, arXiv preprint arXiv:1708.02861v1. https://arxiv.org/pdf/1708.02861.pdf.

AN US

[169] T. Salam, W. u. Rehman, X. Tao, Y. Chen, P. Zhang, A trust framework based smart aggregation for machine type communication, Science China Information Sciences 60 (10) (2017) 100306. doi:10.1007/s11432-017-9186-6.

[170] R. Bolla, R. Bruschi, F. Davoli, and F. Cucchietti, Energy Efficiency in the Future Internet: A Survey of Existing Approaches and Trends in Energy-Aware Fixed Network Infrastructures, IEEE Communications Surveys & Tutorials 13 (2) (2011) 223–244. doi:0.1109/SURV.2011.071410.00073.

ED

M

[171] N. Zhao, S. Zhang, F. R. Yu, Y. Chen, A. Nallanathan, V. C. M. Leung, Exploiting Interference for Energy Harvesting: A Survey, Research Issues, and Challenges, IEEE Access 5 (2017) 10403–10421. doi:10.1109/ACCESS.2017.2705638.

PT

[172] V. Dehalwar, A. Kalam, M. L. Kolhe, A. Zayegh, Review of Machine to Machine Communication in Smart Grid, in: 2016 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), 2016, pp. 134–139. doi:10.1109/ICSGCE.2016.7876040.

AC

CE

[173] B. R. Al-Kaseem, H. S. Al-Raweshidy, Energy efficient MAC protocol with smart sleep scheduling for cluster-based M2M networks, in: 2016 6th International Conference on Information Communication and Management (ICICM), 2016, pp. 227–232. doi:10.1109/INFOCOMAN.2016.7784248.

[174] W. A. Jabbar, M. Ismail, R. Nordin, S. Arif, Power-efficient routing schemes for MANETs: a survey and open issues, Wireless Networks 23 (6) (2016) 1917–1952. doi:10.1007/s11276-016-1263-6.

67

ACCEPTED MANUSCRIPT

CR IP T

[175] S. Zoppi, A. V. Bemten, H. M. G¨ ursu, M. Vilgelm, J. Guck, and W. Kellerer, Achieving Hybrid Wired/Wireless Industrial Networks With WDetServ: Reliability-Based Scheduling for Delay Guarantees, IEEE Transactions on Industrial Informatics 14 (5) (2018) 2307–2319. [176] M. A. Mahmood, W. K. Seah, and I. Welch, Reliability in wireless sensor networks: A survey and challenges ahead, Computer Networks 79 (2015) 166–187. doi:10.1016/j.comnet.2014.12.016.

AN US

[177] R. Lu, X. Liang, X. Li, X. Lin, X. Shen, EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications, IEEE Transactions on Parallel and Distributed Systems 23 (9) (2012) 1621–1631. doi:10.1109/TPDS.2012.86.

[178] M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, X. S. Shen, A Lightweight Message Authentication Scheme for Smart Grid Communications, IEEE Transactions on Smart Grid 2 (4) (2011) 675–685. doi:10.1109/TSG.2011.2160661.

ED

M

[179] I. Stojmenovic, Fog computing: A cloud to the ground support for smart things and machine-to-machine networks, in: 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC), Southbank, VIC, 2014, pp. 117–122. doi:10.1109/ATNAC.2014.7020884.

CE

PT

[180] Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are, White Paper C11-734435-00, Cisco, San Jose, CA, USA (2015) 1–6. https://www.cisco.com/c/dam/en us/solutions/trends/iot/docs/ computing-overview.pdf (accessed 5 August 2018).

AC

[181] C. Zhu, V. C. M. Leung, L. Shu, E. C. H. Ngai, Green Internet of Things for Smart World, IEEE Access 3 (2015) 2151–2162. doi:10.1109/ACCESS.2015.2497312. [182] J. Granjal, E. Monteiro, and J. S. Silva, Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues, IEEE Communications Surveys & Tutorials 17 (3) 1294–1312. doi:10.1109/COMST.2015.2388550.

68

ACCEPTED MANUSCRIPT

[183] S. Yu, S. Guo, I. Stojmenovic, Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace, IEEE Transactions on Computers 64 (1) (2015) 139–151. doi:10.1109/TC.2013.191.

CR IP T

[184] T. D. Mendes, R. Godina, E. M. Rodrigues, J. C. Matias, J. P. Catal˜ao, Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources, Energies 8 (7) (2015) 7279–7311.

AN US

[185] S. Sciancalepore, G. Piro, G. Boggia, G. Bianchi, Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption, IEEE Embedded Systems Letters 9 (1) (2017) 1–4. doi:10.1109/LES.2016.2630729.

[186] D. Dragomir, L. Gheorghe, S. Costea, A. Radovici, A Survey on Secure Communication Protocols for IoT Systems, in: 2016 International Workshop on Secure Internet of Things (SIoT), 2016, pp. 47–62. doi:10.1109/SIoT.2016.012.

ED

M

[187] L. Noirie, M. L. Pallec, N. Ammar, Towards automated IoT service recommendation, in: 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), 2017, pp. 103–106. doi:10.1109/ICIN.2017.7899397.

PT

[188] S. Yin, J. Bao, Y. Zhang, X. Huang, M2M Security Technology of CPS Based on Blockchains, Symmetry 9 (9) (2017) 193. doi:10.3390/sym9090193.

CE

[189] Y. Qiu, M. Ma, S. Chen, An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems, Computer Networks 129 (2017) 306–318.

AC

[190] P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, and T. Taleb, Survey on Multi-Access Edge Computing for Internet of Things Realization, IEEE Communications Surveys & Tutorials (2018). doi:10.1109/COMST.2018.2849509.

[191] A. Humayed, J. Lin, F. Li, and B. Luo, Cyber-Physical Systems Security–A Survey, IEEE Internet of Things Journal, 4 (6) (2017) 1802–1831. doi:10.1109/JIOT.2017.2703172. 69

ACCEPTED MANUSCRIPT

[192] W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang, A Survey on the Edge Computing for the Internet of Things, IEEE Access, 6 (2018) 6900–6919. doi:10.1109/ACCESS.2017.2778504.

CR IP T

[193] A. Virdis, C. Vallati, G. Nardini, G. Tanganelli, G. Stea, and E. Mingozzi, D2D Communications for Large-Scale Fog Platforms: Enabling Direct M2M Interactions, IEEE Vehicular Technology Magazine 13 (2) (2018) 24–33. doi:10.1109/MVT.2017.2775560.

AN US

[194] T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta, and D. Sabella, On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration, IEEE Communications Surveys Tutorials 19 (3) (2017) 1657–1681. doi:10.1109/COMST.2017.2705720.

[195] L. Dai, B. Wang, Z. Ding, Z. Wang, S. Chen, and L. Hanzo, A Survey of Non-Orthogonal Multiple Access for 5G, IEEE Communications Surveys Tutorials (2018). doi:10.1109/COMST.2018.2835558.

ED

M

[196] X. Wang, L. Kong, F. Kong, F. Qiu, M. Xia, S. Arnon, and G. Chen, Millimeter Wave Communication: A Comprehensive Survey, IEEE Communications Surveys & Tutorials (2018). doi:10.1109/COMST.2018.2844322.

PT

[197] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, Mobile Unmanned Aerial Vehicles (UAVs) for Energy-Efficient Internet of Things Communication, IEEE Transactions on Wireless Communications 16 (11) (2017) 7574–7589. doi:10.1109/TWC.2017.2751045.

CE

[198] LG Electronics, Considerations on DL/UL multiple access for NR, R1162517, 3GPP TSG RAN WG1 #84bis, Busan, Korea, 11th-15th, Apr. 2016

AC

[199] K. David and H. Berndt, 6G Vision and Requirements: Is There Any Need for Beyond 5G?, IEEE Vehicular Technology Magazine (2018) doi:10.1109/MVT.2018.2848498. [200] M. Chen, Y. Miao, Y. Hao, and K. Hwang, Narrow Band Internet of Things, IEEE Access 5 (2017) 20557–20577. doi:10.1109/ACCESS.2017.2751586. 70

ACCEPTED MANUSCRIPT

CR IP T

[201] A. Hoglund, X. Lin, O. Liberg, A. Behravan, E. A. Yavuz, M. V. D. Zee, Y. Sui, T. Tirronen, A. Ratilainen, and D. Eriksson, Overview of 3GPP Release 14 Enhanced NB-IoT, IEEE Network 31 (6) (2017) 16–22. doi:10.1109/MNET.2017.1700082. [202] S. Oh and J. Shin, An Efficient Small Data Transmission Scheme in the 3GPP NB-IoT System, IEEE Communications Letters 21 (3) (2017) 660–663. doi:10.1109/LCOMM.2016.2632128.

AN US

[203] H. Malik, H. Pervaiz, M. M. Alam, Y. L. Moullec, A. Kuusik, and M. A. Imran, Radio Resource Management Scheme in NB-IoT Systems, IEEE Access 6 (2018) 15051–15064. doi:10.1109/ACCESS.2018.2812299.

[204] Y. Li, X. Cheng, Y. Cao, D. Wang, and L. Yang, Smart Choice for the Smart Grid: Narrowband Internet of Things (NBIoT), IEEE Internet of Things Journal 5 (3) (2018) 1505–1515. doi:10.1109/JIOT.2017.2781251.

M

[205] X. Yang, X. Wang, Y. Wu, L. P. Qian, W. Lu, and H. Zhou, Small-Cell Assisted Secure Traffic Offloading for Narrowband Internet of Thing (NB-IoT) Systems, IEEE Internet of Things Journal 5 (3) (2018) 1516– 1526. doi:10.1109/JIOT.2017.2779820.

PT

ED

[206] N. Jiang, Y. Deng, M. Condoluci, W. Guo, A. Nallanathan, and M. Dohler, RACH Preamble Repetition in NB-IoT Network, IEEE Communications Letters 22 (6) (2018) 1244–1247. doi:10.1109/LCOMM.2018.2793274.

CE

[207] H. Zhang, J. Li, B. Wen, Y. Xun, and J. Liu, Connecting Intelligent Things in Smart Hospitals Using NB-IoT, IEEE Internet of Things Journal 5 (3) (2018) 1550–1560. doi:10.1109/JIOT.2018.2792423.

AC

[208] R. Harwahyu, R. Cheng, C. Wei, and R. F. Sari, Optimization of Random Access Channel in NB-IoT, IEEE Internet of Things Journal 5 (1) (2018) 391–402. doi:10.1109/JIOT.2017.2786680.

71

ACCEPTED MANUSCRIPT

CR IP T

Biography

CE

PT

ED

M

AN US

Oluwatosin Ahmed Amodu received his Bachelor of Technology degree in Electrical Electronics Engineering from the Federal University of Technology Akure, Nigeria 2012. He completed his Masters degree in Computer Science with a specialization in distributed computing at Universiti Putra Malaysia 2016. He is currently pursuing a PhD Programme in Wireless Communication and Network Engineering. His research interest lie in sensor networks, machine type communications, device-to-device communication, spectrum sharing networks and stochastic geometry.

AC

Mohamed Othman received the Ph.D. degree (Hons.) from the National University of Malaysia. He is currently a Professor in computer science with the Department of Communication Technology and Network, Universiti Putra Malaysia (UPM). Prior to that he was a Deputy Director of the Information Development and Communication Center, where he was in charge of UMPNet network campus, uSport Wireless Communication Project, and 72

ACCEPTED MANUSCRIPT

AC

CE

PT

ED

M

AN US

CR IP T

the UPM DataCenter. He is also an Associate Researcher and a Coordinator of high speed machine with the Laboratory of Computational Science and Informatics, Institute of Mathematical Science, UPM. In 2017, he received an Honorable Professor from South Kazakhstan Pedagogical University, Shymkent, Kazakhstan, and also was a Visiting Professor with South Kazakhstan State University, Shymkent, and L. N. Gumilyov Eurasian National University, Astana, Kazakhstan. He published more than 300 International journals and 330 proceeding papers. His main research interests are in the fields of computer networks, parallel and distributed computing, highspeed interconnection networks, network design and management (network security, wireless and traffic monitoring), consensus in IoT, and mathematical model in scientific computing. He is a member of the IEEE Computer Society, the IEEE Communication Society, Malaysian National Computer Confederation, and Malaysian Mathematical Society. He was a recipient of the Best Ph.D. Thesis in 2000 by Sime Darby Malaysia and Malaysian Mathematical Science Society. He has also filed six Malaysian, one Japanese, one South Korean, and three U.S. patents.

73