Professional Documents
Culture Documents
Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc
a r t i c l e
i n f o
Article history:
Received 14 March 2013
Accepted 16 March 2013
Available online xxxx
Keywords:
Machine-to-machine communications
Internet of Things
Cyberphysical systems
Multi-hop networks
Cognitive radio
Spectrum sharing
Swarm communications
a b s t r a c t
Machine-to-machine (M2M) communications emerge to autonomously operate to link
interactions between Internet cyber world and physical systems. We present the technological scenario of M2M communications consisting of wireless infrastructure to cloud,
and machine swarm of tremendous devices. Related technologies toward practical realization are explored to complete fundamental understanding and engineering knowledge of
this new communication and networking technology front.
2013 Elsevier B.V. All rights reserved.
1. Introduction
Following tremendous deployment of Internet and
mobile communications, Internet of Things (IoTs) and
cyberphysical systems (CPS) emerge as technologies to
combine information communication technology (ICT)
with our daily life [13]. By deploying great amount of
machines that are typically wireless devices, such as
sensors, we expect to advance human beings life in a signicant way. In particular, autonomous communications
among machines of wireless communication capability
creates a new frontier of wireless communications and
networks [4,5]. In this paper, we will survey some technological milestones and research opportunities toward
1570-8705/$ - see front matter 2013 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.adhoc.2013.03.007
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
2. Wireless infrastructure
To practice M2M communications, few realizations of
M2M communications have been proposed, such as leveraging Bluetooth (IEEE 802.15.1), Zigbee (IEEE 802.15.4), or
WiFi (IEEE 802.11b) technologies. However, there is still no
consensus on the network architecture for M2M communications over these wireless technologies. Considering that
the ultimate goal of M2M communications is to construct
comprehensive connections among all machines distributed over an extensive coverage area, the network architecture of M2M communications leveraging these
wireless technologies can generally be considered as the
heterogeneous mobile ad hoc network (HetMANET), and
faces similar challenges that can be encountered in the
HetMANET. Although a considerable amount of research
has provided solutions for the HetMANET (connections,
routing, congestion control, energy-efcient transmission,
etc.), it is still not clear whether these sophisticated solutions can be applied to M2M communications due to constraints on the hardware complexity of a MTC device.
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
di s
i
X
c
k1
ci
s; for i 2; . . . ; M
For (ii) to physically group MTC devices, a new communications paradigm is essential: a direct communication
between a group header and an MTC devices. To enable
such a direction communications among MTC devices, we
shall note a communications paradigm that will be dened
in 3GPP Rel. 12 referred to device-to-device (D2D) communications [2830]. To signicantly reduce the transmission
energy at the UE side, always transmitting packets to EUTRA then E-UTRA relaying these packets to the destination UE may not be an optimum scheme, especially when
the source UE is located nearby the destination UE. To orientate this situation, 3GPP plans to provide the interface
and protocols for direct packets exchanges among UEs as
D2D communications. By facilitations of the interface and
protocols of D2D communications, MTC devices in a group
can communicate with the group header without the intermediate of 3GPP E-UTRA to enable the group-based operation of MTC devices. Precise system design and
performance evaluations are still subject to further study.
2.3. Cognitive operations of MTC devices
Even though the group based operation of MTC devices
can potentially alleviate signaling congestion and management burden in M2M communications, these issues may
not be resolved when the number of MTC devices grows
enormously in the future. Under this circumstance, the
operator may need to deploy more stations of E-UTRA
and separate trafc as well as the management of UEs
and MTC devices. That is, there can be E-UTRA stations
for UEs and E-UTRA stations for MTC devices coexisting
with each other, as shown in Fig. 2, to relax signaling congestion and management burden. However, under such a
coexisting deployment, interference between conventional
human-to-human (H2H) communications (that is, conventional links between UEs and E-UTRA) and M2M communications turns to be a challenging issue. Although interface
of E-UTRA (i.e., X2 interface) can leverage a centralized
coordination for interference mitigations, this scheme is
not suggested, due to a centralized coordination creating
signicant management burden. An appropriate solution
for interference mitigation between H2H and M2M communications lies in a distributive resource management,
and a powerful technology known as cognitive radio (CR)
is particularly noted.
Since E-UTRA stations for UEs and E-UTRA stations for
MTC devices belong to identical technology, there is no priority among these stations. This operation is exactly a particular mode of the CR operation referred as the
interweave coexistence [31]. The operation of the interweave coexistence between H2H and M2M communications can be outlined in Fig. 3 [32].
MTC devices only utilize unoccupied radio resources
from that of H2H communications. For this purpose,
MTC devices perform interference measurement and
report measurement result (indicating occupied
resources by H2H communications) to the group header
by D2D communications technology. As a result, the
group header shall acquire interference situations of
all MTC devices in the group. However, if all MTC
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
Fig. 2. Connection scenario of 3GPP MTC devices (a similar illustration is shown in [11]).
and reporting result is Vq 6 V. For this purpose, the coverage of a group is divided into N isotropic grids. Denote
the true interference from H2H communications as
W = [u1,u2, . . . , uN]T, the compressed sensing is
obtained by multiplying a sample matrix on W as
y UW e
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
Network
Cloud
MTC device
Link intra the group (D2D)
Link inter groups
Fig. 3. Coexistence of E-UTRA for M2M communications and H2H communications (a similar illustration is shown in [32]).
jjWjjp
N
X
jun jp
!1=p
Once a radio resource is occupied by M2M communications, this radio resource is regarded as suffering server
interference and will not be utilized by H2H communications, as UEs perform channel estimation before
transmissions.
n1
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
to/from H2H communications, E-UTRA stations shall allocate radio resources for MTC devices to perform interference measurement (although the number of MTC devices
involved in interference measurement can be signicantly
reduced by the compressed sensing technology mentioned
above). These radio resources for interference measurement are overheads, as all MTC devices cannot perform
data transmissions nor receptions by these radio resources
for interference measurement. If radio resources for interference are allocated very frequently, although time-varying interference from H2H communications can be
accurately estimated, there is a severe resources waste.
On the other hand, if radio resources for interference are
allocated very frequently rarely, although overhead is reduced, interference from H2H communications may not
be alleviated. As a result, the measurement period can be
an very critical factor impacting the performance of MTC
devices, especially the most critical QoS guarantees.
To solve this challenge, we particular note an equilibrium of statistical delay guarantees that
d EB h EC h
ddmax
16s6S
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
lowing. We therefore suggest a revolution paradigm to statistically network the machines in the swarm, to avoid the
difculty of tremendous control overhead in end-to-end ad
hoc networking.
yn
wn n 1; . . . ; N
hsn wn
H0
H1
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
PfnjRg
kAR n kAR
e
;
n!
nP0
10
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
P Tx
PRx
k
r 2d
Zk
11
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
10
= 1 , r = 0.1
20
15
15
10
10
10
15
20
= 1 , r = 0.5
20
= 1 , r = 0.3
20
15
10
10
10
15
20
10
15
20
15
20
= 1 , r = 0.7
20
15
10
Fig. 4. When k denotes node density and r denotes transmission range, percolation (from rather isolated connections to pretty full connections) happens
(taken from [90]).
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
11
max
N
X
n1
U n r n
N
X
C n qn
12
n1
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
12
in interference-limited underlay CRN [111]. It is also possible for heterogeneous services in CRN [112]. We may imagine an end-to-end session on top of these multi-paths.
This achievement is particularly useful to applications like
video surveillance and wireless robotics.
Although end-to-end feedback sounds impossible in
machine swarm of cognitive radio capability, the end-toend error control is still desirable. Again leveraging multi-path forwarding, we may implement hybrid ARQ
(HARQ) into packets to different paths. Although there
might not be able to successfully receive desirable packets
from all paths, this is exactly as the operation of HARQ and
thus achieves end-to-end error control in CRN [113]. Similarly, we may apply error control for local communication
in heterogeneous ad hoc networks, to improve the connectivity and thus networking performance in the ad hoc network [114].
A more exciting scenario can be viewed by just looking
at nS and nD, while the multi-path multi-hop networking is
treated as an aggregated multi-inputmulti-output channel 3 3 (in Fig. 5). nS and nD equivalently have multiple
antenna to/from this aggregated channel, to form a virtual MIMO on top of this imaginary session, different
from traditional denition of virtual MIMO controlled by
network. Via such abstract mapping, we can modify the
well-known spacetime codes into path-time codes (PTC)
[115]. By creating appropriate encoding matrix (permutation coding matrix or maximum-distance coding matrix),
we modify sphere decoding to achieve signicant error
correcting gain. PTC can be generally applied to CRN or
any ad hoc networks, which shall enable a new design paradigm in ad hoc networks, reliable end-to-end performance without control overhead and feedback in each
link, a signicant advantage for spectrum and energy
efciency.
More control issues in CRN can be found in literature
such as queue control for service interruption [116],
topology control [117], congestion control [118], and call
admission control [119]. To practically implement spectrum-sharing communication in machine swarm, tremendous technical opportunities are required for various
control mechanisms.
3.5. Heterogeneous network architecture
Although we demonstrate the feasibility of spectrum
sharing multi-hop networking in Section 3.2, we still have
to make sure whether such an approach is effective, particularly a packet of reasonable delay from source to destination. In large networks, this is not easy as we can abstractly
consider from the social network analysis or random graph
analysis. The network diameter is a good indicator of the required number of hops between two nodes in a network
[SN]. Although network diameter has been widely studied
[76], PPP network arrangement of high interests in wireless networks was not known. Unfortunately, in machine
swarm, network diameter analytically derived from PPP
network topology suggests intolerable number of hops
for communications in machine swarm [120].
To resolve this challenge of autonomous M2M communications, we may ironically recall a result from social net-
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
ability distributions that means each node knowing the entire network information. Universal source coding [132]
serves the purpose without the need of priori statistics.
Focusing on data gathering in wireless sensor networks,
joint opportunistic source coding and opportunistic routing has been remarkably developed [133]. Pointed in Sections 3.3 and 3.4, network coding enhances performance
by mixing information contents prior to forwarding packets. This research further explores joint source coding
and (opportunistic) routing in a successful way via leveraging correlation of data in data gathering. Intuitively, the
performance gain comes from (i) multiple independent
receiving equivalent to diversity gain (ii) compression by
LempelZiv universal source coding when two correlated
packets are received by one node. Unfortunately, this
scheme assumes a node knowing the average number of
hops for all forwarding candidates. In a large ad hoc network, efforts are still required for practical applications.
Another experimental study is reported by considering nite alphabets for the data to be collected and transmitted
in multi-hop networking [134]. By leveraging the broadcasting nature and information fusion like compression,
it is shown that certain portion of relays are not needed
anymore to signicantly reduce the trafc in a network
to equivalently increase the effective spectral efciency
(i.e. allowing more packets to transmit for other purposes).
For large machine swarm, this provides an alternative to
signicantly enhance spectral efciency (i.e. network
throughput per bandwidth), though control information
is still required.
The control information in a large network can consume
tremendous bandwidth and opposite to spectral efciency.
Fig. 6 depicts the possibility of trafc reduction in information collection multi-hop sensor networks. Before machine
Rm to transmit, it receives messages from two other ma-
13
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
14
Fig. 7. Phase diagram for time dynamics of CRs sharing spectrum [138].
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
Surveillance.
Energy-efcient control such as smart grid.
Healthcare.
Factory automation.
Intelligent vehicles.
Wireless robotics.
15
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
16
Fig. 9. Stochastic model for an energy-harvesting communication system (a) communication system (b) energy harvesting vs. fading.
Another sort of attacks is the distributed denial-of-service (DDoS) attack, which has been rst introduced to cellular communications in [154] and can be harmful by easy
jamming autonomous M2M communications to disable
the operation of physical systems. Such security treat can
be magnied by more factors when spectrum sharing
M2M communications are conducted, primarily: (i) the
existence of phase transition in heterogeneous CRN suggests sensible operating point change in network operation
[90] (ii) a spectrum sharing network can be viewed as an
eco-system and each node/machine tends to be selsh to
evolve its own operating strategy [155]. Therefore, in addition to known attacks, more powerful and hard-to-detect
DDoS attacks can be implemented [156]. The defense strategy can leverage information fusion in the network and
form a game to retain network resilience [156,157].
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
isfy four parties: primary system users, secondary cognitive radio users, operator of the primary system and secondary system, and regulator who cares overall spectrum
utilization and users QoS. An auction mechanism is established to ensure such satisfaction of network economy
[161]. Such research can be extended to heterogeneous
spectrum sharing wireless networks [162] and even cellular systems [163], which suggests economic feasibility of
multiple M2M communication operators sharing certain
spectrum.
4.5. Implementation, deployment, and sustainable operation
In spite of a lot of explorations on realization of efcient
M2M communications, particular challenges in machine
swarm. However, we have to look at some practical issues
to install, to deploy, and to operate in a sustainable way.
For wireless infrastructure, it is an extension of existing
well operating cellular-type systems, and there shall not
be any major fundamental technological obstacle in spite
of tremendous technical efforts in need. Backward compatibility and scalability for potential expansion to accommodate DAs to support large number of machines might be
something easy to overlook. Using smart coding, such an
access mechanism to DA can be retained as [164].
There are further implementation concerns regarding
spectrum sharing cooperative multi-hip networking in machine swarm:
Time synchronization: It is too spectrum-costly to
maintain a control channel in machine swarm communication. Typical thinking is to assume time synchronization in CRN to avoid performance loss. Ways to
establish network synchronization can adopt algorithms from consensus and cooperation [165] like gossip
algorithm,
etc.
In
large
network,
the
synchronization overhead can be signicant and further
stabilization is not fully understood. However, a different thinking to dynamic access the radio resource in
asynchronous way is suggested [166]. Based on game
theoretical formulation for each machine, even better
performance than synchronous access can be surprisingly achieved. Asynchronous spectrum access can open
a brand new door for advances in spectrum sharing network technology.
Complexity to implement cognitive radio and spectrum
sharing networks: The complexity of CR implementation is widely considered high. However, a good example is the adaptive frequency hopping (AFH) [167] in
IEEE 802.15.2 and Bluetooth 2.0 and later versions.
AFH requires to sense the spectrum and then to decide
the change of hopping sequence to avoid collisions,
such that synchronous (SCO) stream-trafc link can be
well maintained among different networks to share
the same spectrum. This is pretty much aligned with
the principle of cognitive radio or spectrum sharing scenario in machine swarm. However, as long as we can
select parameters in an appropriate manner and design
accordingly, the incremental complexity in implementation is actually very minimal that can be ignored.
With this energy-efcient technology has been widely
17
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
18
[16] Y.-S. Liang, W.-H. Chung, G.-K. Ni, I.-Y. Chen, H. Zhang, S.-Y. Kuo,
Resource allocation with interference avoidance in OFDMA
femtocell networks, IEEE Transaction on Vehicular Technology 61
(5) (2012) 22432255.
[17] Y. Sun, R.P. Jover, X. Wang, Uplink interference mitigation for
OFDMA femtocell networks, IEEE Transaction on Wireless
Communication 11 (2) (2012) 614625.
[18] . Bulakci, S. Redana, B. Raaf, J. Hmlinen, Impact of power
control optimization on the system performance of relay based
LTE-advanced heterogeneous networks, Journal of Communication
& Networking 13 (4) (2012) 345359.
[19] R. Combes, Z. Altman, E. Altman, Self-organizing relays:
dimensioning, self-optimization, and learning, IEEE Transaction
on Network and Service Management, in press.
[20] Z.M. Fadlullah, M.M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, Y.
Nozaki, Toward intelligent machine-to-machine communications
in smart grid, IEEE Communications Magazine 49 (4) (2011) 60
65.
[21] S.-Y. Lien, T.-H. Liao, C.-Y. Kao, K.-C. Chen, Cooperative access class
barring for machine-to-machine communication, IEEE Transaction
on Wireless Communication 11 (1) (2012) 2732.
[22] K.S. Ko, M.J. Kim, K.Y. Bae, D.K. Sung, J.H. Kim, J.Y. Ahn, A novel
random
access
for
xed-location
machine-to-machine
communications in OFDMA based systems, IEEE Communications
Letters 16 (9) (2012) 14281430.
[23] ZTE, R2-104662: MTC Simulation Results with Specic Solutions,
3GPP TSG RAN WG2 Meeting 71, August 2010.
[24] CATT, R2-100182: Access Control of MTC Devices, 3GPP TSG RAN
WG2 Meeting 68bis, January 2010.
[25] S.-Y. Lien, K.-C. Chen, Massive access management for QoS
guarantees in 3GPP machine-to-machine communications, IEEE
Communications Letters 15 (3) (2011) 311313.
[26] S.-E. Wei, H.-Y. Hsieh, and H.-J. Su, Enabling dense machine-tomachine
communications
through
interference-controlled
clustering, in: Proc. IEEE IWCMC, 2012.
[27] C.Y. Ho, C.-Y. Huang, Energy-saving massive access control and
resource allocation schemes for M2m communications in OFDMA
cellular networks, IEEE Communications Letters 1 (3) (2012) 209
211.
[28] 3GPP RAN WS, RWS-120003: LTE Release 12 and Beyond, in: 3GPP
RAN WS on Rel-12 and onwards, June 2012.
[29] K. Doppler, M. Rinne, C. Wijting, C.B. Ribeiro, K. Hugl, Device-todevice communication as an underlay to LTE-advanced networks,
IEEE Communications Magazine 47 (12) (2009) 4249.
[30] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls, Z.
Turnyi, Design aspects of network assisted device-to-device
communications, IEEE Communications Magazine 50 (3) (2012)
170177.
[31] A. Goldsmith, S.A. Jafar, I. Maric, S. Srinivasa, Breaking spectrum
gridlock with cognitive radios: an information theoretic
perspective, IEEE Proceedings 97 (5) (2009) 894914.
[32] S.-Y. Lien, S.-M. Cheng, S.-Y. Shih, K.-C. Chen, Radio resource
management for QoS guarantees in cyber-physical systems, IEEE
Transactions on Parallel and Distributed Systems 23 (9) (2012)
17521761.
[33] D. Wu, R. Negi, Effective capacity: a wireless link model for support
of quality of service, IEEE Transaction on Wireless Communication
12 (4) (2003) 630643.
[34] C.-S. Chang, Stability, queue length, and delay of deterministic and
stochastic queuing networks, IEEE Transactions on Automatic
Control 39 (5) (1994) 913931.
[35] C. Courcoubetis, R. Weber, Effective bandwidth for stationary
sources, Probability Engineering Information Sciences 9 (2) (1995)
285294.
[36] Qing Wang, Bongjun Ko, Kwang-Cheng Chen, Junsong Wang, Ting
He, Yonghua Lin, Kang-won Lee, Dynamic spectrum allocation
under cognitive cellular network for M2M applications, IEEE
Asilomar Conference, 2012.
[37] R.J.M. Vullers, R. van Schaihk, H.J. Visser, J. Penders, C. van Hoof,
Energy Harvesting for Autonomous Wireless Sensor Networks, IEEE
Solid State Circuits Magazine 2938, Spring 2010.
[38] K.C. Chen, R. Prasad, Cognitive Radio Networks, Wiley, 2009.
[39] I.F. Akyildiz, W.Y. Lee, K.R. Chowdhury, Crahns: cognitive radio Ad
Hoc networks, Ad Hoc Networks 7 (5) (2009) 810836.
[40] Y.C. Liang, K.C. Chen, J.Y. Li, P. Mahonen, Cognitive radio networking
and communications: an overview, IEEE Transaction on Vehicular
Technology 60 (7) (2011) 33863407.
[41] O. Akan, O. Karli, O. Ergul, Cognitive radio sensor networks, IEEE
Network 23 (4) (2009) 3440.
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
19
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
20
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007
21
Please cite this article in press as: K.-C. Chen, S.-Y. Lien, Machine-to-machine communications: Technologies and challenges, Ad Hoc Netw.
(2013), http://dx.doi.org/10.1016/j.adhoc.2013.03.007