Skip to main content
  • Print publication year: 2017
  • Online publication date: April 2017

17 - Cellular 5G Access for Massive Internet of Things

from Part III - Network Protocols, Algorithms, and Design

Introduction to the Internet of Things (IoT)

The IoT refers to the paradigm of physical and virtual “things” that communicate and collaborate over the Internet, with or without human intervention. The spectra of things that may be connected within the IoT ranges from complex machines, such as aircraft and cars, to everyday appliances, such as consumer refrigerators, and very simple devices such as humidity sensors. The emphasis of the IoT is on services, which represent the primary driver for interconnecting things. Examples of IoT services include micro-climate monitoring of homes, asset tracking during transportation, and, on a larger scale, controlling the power consumption of all the refrigerators in a country depending on the load. Current and forecast market evaluations (such as Cisco's forecast of a $14.4 trillion global IoT market by 2022 [1]) show that the IoT has a huge revenue potential, to be shared between operators, service providers, hardware vendors, and testing-solutions vendors. Thus, it is not surprising that the IoT is currently one of the hottest topics in the telecommunications world, endorsed by both industry and academia.

A term closely related, but not identical to IoT is machine-to-machine (M2M) communications, or, in the Third Generation Partnership Project (3GPP) terminology, machine-type-communications (MTC). M2M communications refer to the concept in which machines (i.e., standalone devices) communicate with a remote server without human intervention. “M2M can be considered as the plumbing of IoT” [2] or, more formally stated, M2M communications are the key enabler of IoT services. A natural question that arises is how well the existing networking solutions and technologies can serve as the basis for M2M communications and, more broadly, IoT services and, when they cannot support them, how to design other, suitable connectivity solutions. These questions have in recent years instigated a significant body of research and development by industry, standardization bodies, and academia. The general conclusion is that the existing technologies, in their present form, cannot efficiently support M2M communications. The reason is that existing communication systems, particularly in the wireless domain, are designed to efficiently support human-type communications (HTC), such as web browsing, voice calls, and video streaming, where high data rates are essential but the volume of users that simultaneously require service is far beyond the expected number of interconnected devices.

Recommend this book

Email your librarian or administrator to recommend adding this book to your organisation's collection.

Key Technologies for 5G Wireless Systems
  • Online ISBN: 9781316771655
  • Book DOI:
Please enter your name
Please enter a valid email address
Who would you like to send this to *
[1] Cisco, “Embracing the Internet of Everything to capture your share of $14.4 trillion,” 2015 White Paper. Available at Economy.pdf.
[2] “IoT and M2M,” 2015. Available at
[3] SigFox, “Global cellular connectivity for the Internet of Things,” 2015. Available at
[4] LoRa Alliance, “Wide area networks for the Internet of Things,” 2015. Available at
[5] 3GPP, “Overview of 3GPP release 12,” Tech. Rep., 2014.
[6] G. C., Madueño, C., Stefanovic, and P., Popovski, “Reliable and efficient access for alarm-initiated and regular M2M traffic in IEEE 802.11 ah systems,” IEEE Internet Things J., vol. 3, no. 5, pp. 673–682, Oct. 2016.
[7] 3GPP, “Study on machine-type communications (MTC) and other mobile data applications communications enhancements,” TR 22.368, Dec. 2013.
[8] G. C., Madueño, C., Stefanovic, and P., Popovski, “Reengineering GSM/GPRS towards a dedicated network for massive smart metering,” in Proc. of IEEE International Conf. on Smart Grid Communications (SmartGridComm), Nov. 2014.
[9] G. C., Madueño, C., Stefanović, and P., Popovski, “How many smart meters can be deployed in a GSM cell?” in Proc. of IEEE Internatonal Conf. on Communications Workshops (ICC), Jun. 2013.
[10] IEEE, “IEEE 802.16p machine to machine (M2M) evaluation methodology document (EMD),” IEEE 802.16 Broadband Wireless Access Working Group (802.16p), EMD 11/0005, 2011.
[11] FP-7 METIS, “Requirements and general design principles for new air interface,” Deliverable D2.1, 2013.
[12] M., Laner, P., Svoboda, N., Nikaein, and M., Rupp, “Traffic models for machine type communications,” in Proc. of the Tenth International Symposium on Wireless Communication Systems (ISWCS), Aug. 2013.
[13] 3GPP, “Study on RAN improvements for machine-type communications,” TR 37.868 V11.0, Aug. 2010.
[14] G., Andrews, R., Askey, and R., Roy, Special Functions, 1st edn, Cambridge University Press, 2000.
[15] J. P., Cheng, C., Han Lee, and T. M., Lin, “Prioritized random access with dynamic access barring for RAN overload in 3GPP LTE-A networks,” in Proc. of IEEE GLOBECOM Workshops (GC Wkshps), Dec. 2011.
[16] A., Laya, L., Alonso, and J., Alonso-Zarate, “Is the random access channel of LTE and LTE-A suitable for M2M communications? A survey of alternatives,” IEEE Commun. Surv. Tutor., vol. 16, no. 1, pp. 4–16, First Quarter 2014.
[17] 3GPP, “Access barring for delay tolerant access in LTE,” TR R2-113013, May 2011.
[18] 3GPP, “MTC simulation results with specific solutions,” TR R2-104662, Aug. 2010.
[19] 3GPP, “Backoff enhancements for RAN overload control,” TR R2-112863, May 2011.
[20] 3GPP, “RACH congestion evaluation and potential solutions,” TR R2-102824, May 2011.
[21] E., Paolini, C., Stefanovic, G., Liva, and P., Popovski, “Coded random access: Applying codes on graphs to design random access protocols,” IEEE Commun. Mag., vol. 53, no. 6, pp. 144–150, Jun. 2015.
[22] 3GPP, “Medium access control (MAC) protocol specification,” TR 36.321, Tech. Rep., 2014.
[23] N. K., Pratas, C., Stefanovic, G. C., Madueño, and P., Popovski, “Random access for machine-type communication based on bloom filtering.” Available at, Nov. 2015.
[24] H., Thomsen, N., Pratas, C., Stefanovic, and P., Popovski, “Analysis of the LTE access reservation protocol for real-time traffic,” IEEE Commun. Lett., vol. 17, no. 8, pp. 1616–1619, Aug. 2013.
[25] G. C., Madueño, J. J., Nielsen, D. M., Kim, N. K., Pratas, C., Stefanovic, and P., Popovski, “Assessment of LTE wireless access for monitoring of energy distribution in the smart grid,” IEEE J. Sel. Areas Commun., vol. 34, no. 3, pp. 675–688, Mar. 2016.
[26] J. J., Nielsen, G. C., Madueño, N. K., Pratas, R. B., Sørensen, C., Stefanovic, and P., Popovski, “What can wireless cellular technologies do about the upcoming smart metering traffic?” IEEE Commun. Mag., vol. 53, no. 9, pp. 41–47, Sep. 2015.
[27] 3GPP, “Study on RAN improvements for machine-type communications, rel. 11,” TR 37.868, Tech. Rep., Sep. 2011.
[28] 3GPP, “Study on enhancements to machine-type communications (MTC) and other mobile data applications; Radio access network (RAN) aspects, rel. 12,” TR 37.869, Tech. Rep., Sep. 2013.
[29] E., Casini, R. D., Gaudenzi, and O., del Rio Herrero, “Contention resolution diversity slotted ALOHA (CRDSA): An enhanced random access scheme for satellite access packet networks,” IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1408–1419, Apr. 2007.
[30] G., Liva, “Graph-based analysis and optimization of contention resolution diversity slotted ALOHA,” IEEE Trans. Commun., vol. 59, no. 2, pp. 477–487, Feb. 2011.
[31] E., Paolini, C., Stefanovic, G., Liva, and P., Popovski, “Coded random access: How coding theory helps to build random access protocols,” IEEE Commun. Mag., vol. 53, no. 6, pp. 144–150, Jun. 2015.
[32] E., Paolini, G., Liva, and M., Chiani, “Coded slotted ALOHA: A graph-based method for uncoordinated multiple access,” IEEE Trans. Inf. Theory, vol. 61, no. 12, pp. 6815–6832, Dec. 2015.
[33] C., Stefanovic, M., Momoda, and P., Popovski, “Exploiting capture effect in frameless ALOHA for massive wireless random access,” in Proc. of IEEE Wireless Communications and Networking Conf. (WCNC), May 2014.
[34] G. C., Madueño, N. K., Pratas, C., Stefanovic, and P., Popovski, “Massive M2M access with reliability guarantees in LTE systems,” in Proc. of IEEE International Conf. on Communications (ICC), Jun. 2015.
[35] G. C., Madueño, C., Stefanovic, and P., Popovski, “Reliable reporting for massive M2M communications with periodic resource pooling,” IEEE Wireless Commun. Lett., vol. 3, no. 4, pp. 429–432, Aug. 2014.
[36] F., Boccardi, R., Heath, A., Lozano, T., Marzetta, and P., Popovski, “Five disruptive technology directions for 5G,” IEEE Commun. Mag., vol. 52, no. 2, pp. 74–80, Feb. 2014.
[37] 3GPP, “Further LTE physical layer enhancements for MTC,” Tech. Rep. RP-151186, May 2015.
[38] 3GPP, “Narrowband IOT,” Tech. Rep. RP-151621, 2015.
[39] 3GPP, “EC-GSM concept description,” Tech. Rep. GP-150132, 2015.