analyzing random access collisions in massive iot networks

17
1 Analyzing Random Access Collisions in Massive IoT Networks Nan Jiang, Student Member, IEEE, Yansha Deng, Member, IEEE, Arumugam Nallanathan, Fellow, IEEE, Xin Kang, Member, IEEE, and Tony Q. S. Quek, Fellow, IEEE Abstract—The cellular-based infrastructure is regarded as one of potential solutions for massive Internet of Things (mIoT), where the Random Access (RA) procedure is used for requesting channel resources in the uplink data transmission. Due to the nature of mIoT network with the sporadic uplink transmissions of a large amount of IoT devices, massive concurrent channel resource requests lead to a high probability of RA failure. To relieve the congestion during the RA in mIoT networks, we model RA procedure, and analyze as well as evaluate the per- formance improvement due to different RA schemes, including power ramping (PR), back-off (BO), access class barring (ACB), hybrid ACB and back-off schemes (ACB&BO), and hybrid power ramping and back-off (PR&BO). To do so, we develop a traffic-aware spatio-temporal model for the contention-based RA analysis in the mIoT network, where the signal-to-noise- plus-interference ratio (SINR) outage and collision events jointly determine the traffic evolution and the RA success probability. Compared with existing literature only modelled collision from single cell perspective, we model both SINR outage and the collision from the network perspective. Based on this analytical model, we derive the analytical expression for the RA success probabilities to show the effectiveness of different RA schemes. We also derive the average queue lengths and the average waiting delays of each RA scheme to evaluate the packets accumulation status and packets serving efficiency. Our results show that our proposed PR&BO scheme outperforms other schemes in heavy traffic scenario in terms of the RA success probability, the average queue length, and the average waiting delay. Index Terms—Massive IoT, Cellular Network, Random Access, Collision, Power Ramping, Stochastic Geometry. I. INTRODUCTION With the rapid proliferation of innovative applications in the paradigm of massive Internet of Things (mIoT), such as smart city, smart home, smart industrial, and vehicular com- munication, the demand of data traffic for wireless networks Manuscript received Augest 2, 2017; revised October 26, 2017; revised March 5, 2018; revised Augest 6, 2018; accepted Augest 6, 2018. This work was supported in part by the U.K. Engineering and Physical Sciences Research Council (EPSRC) under Grant EP/M016145/2, in part by the MOE ARF Tier 2 under Grant MOE2015-T2-2-104, and in part by the SUTD-ZJU Research Collaboration under Grant SUTD-ZJU/RES/01/2016. This paper was presented in part at the IEEE International Conference on Communications, Kansas City, MO, USA, May 2018 [1]. The associate editor coordinating the review of this paper and approving it for publication was Brady Ruffing. (Corresponding author: Yansha Deng.) N. Jiang, and A. Nallanathan are with School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, UK (e-mail: {nan.jiang, a.nallanathan}@qmul.ac.uk). Y. Deng is with Department of Informatics, King’s College London, London WC2R 2LS, UK (e-mail:[email protected]). X. Kang is with Center for Intelligent Networking and Communications (CINC), National Key Laboratory of Science and Technology on Communi- cations, University of Electronic Science and Technology of China (UESTC), Chengdu 610054, China. T. Q. S. Quek is with the Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore 487372 (e-mail: [email protected]). is explosively grown [2,3]. In view of this, providing reliable wireless access for the mIoT network becomes challenging due to its nature of massive IoT devices and diversification of data traffic [2, 3]. Cellular-based network is deemed as a potential solution to provide last mile connectivity for massive number of IoT devices, due to its advantages in high scalability, diversity, and security, as well as low cost of additional infrastructure deployments [4,5]. However, to provide reliable and efficient access mechanisms for a huge number of IoT devices is still a key challenge [5–7]. IoT devices perform Random Access (RA) procedure to re- quest channel resources for uplink transmission in the cellular- based mIoT network, where the massive mIoT traffic impose enormous load at the Radio Access Network (RAN) level. To improve the quality of service and reduce power consumption of IoT devices, efficient RA procedure is required to enhance the sucess RA performance. An IoT device can either perform contention-free RA when a dedicated scheduling request re- source is assigned by the base station (BS) (e.g., handover), or perform contention-based RA without a dedicated scheduling request resource (e.g., uplink data or control information transmission). Due to the delay-tolerant and uplink preferable characteristics of the mIoT traffic, the contention-based RA is considered as the main access technology to request channel resources in the uplink transmission [6, 8]. The contention-based RA is based on ALOHA-type access (i.e., request access in the first available opportunity), where an IoT device randomly selects a non-dedicated preamble (i.e., orthogonal pseudo code, such as Zadoff-Chu sequence) transmitting to its associated BS via Physical Random Access CHannel (PRACH) in the 1st step of RA [9]. As single preamble provides single RA opportunity, preambles con- tention among IoT devices represents their competition of up- link channel resources. When competing simultaneously, IoT devices choosing the same preamble bring mutual interference and collision risks in preamble detection, resulting in perfor- mance degradation in terms of high RA failure probability [4, 6, 8]. A collision occurs at the step 1 of RA when a BS suc- cessfully decodes two or more same preambles from different IoT devices simultaneously, such that the BS cannot serve any colliding IoT devices, and these IoT devices need to restart the RA procedure in the next available RA time slot. The RA opportunities are represented by the repeated PRACHs, which are reserved in the uplink channel and defined by the PRACH configuration index, which is selected in the BS. A great number of possible PRACH configuration indexes are defined in LTE [9], and the PRACH configuration index 6 is suggested to conduct the study in the mIoT network by the

Upload: others

Post on 28-May-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Analyzing Random Access Collisions in Massive IoT Networks

1

Analyzing Random Access Collisions in MassiveIoT Networks

Nan Jiang, Student Member, IEEE, Yansha Deng, Member, IEEE, Arumugam Nallanathan, Fellow, IEEE,Xin Kang, Member, IEEE, and Tony Q. S. Quek, Fellow, IEEE

Abstract—The cellular-based infrastructure is regarded as oneof potential solutions for massive Internet of Things (mIoT),where the Random Access (RA) procedure is used for requestingchannel resources in the uplink data transmission. Due to thenature of mIoT network with the sporadic uplink transmissionsof a large amount of IoT devices, massive concurrent channelresource requests lead to a high probability of RA failure. Torelieve the congestion during the RA in mIoT networks, wemodel RA procedure, and analyze as well as evaluate the per-formance improvement due to different RA schemes, includingpower ramping (PR), back-off (BO), access class barring (ACB),hybrid ACB and back-off schemes (ACB&BO), and hybridpower ramping and back-off (PR&BO). To do so, we developa traffic-aware spatio-temporal model for the contention-basedRA analysis in the mIoT network, where the signal-to-noise-plus-interference ratio (SINR) outage and collision events jointlydetermine the traffic evolution and the RA success probability.Compared with existing literature only modelled collision fromsingle cell perspective, we model both SINR outage and thecollision from the network perspective. Based on this analyticalmodel, we derive the analytical expression for the RA successprobabilities to show the effectiveness of different RA schemes.We also derive the average queue lengths and the average waitingdelays of each RA scheme to evaluate the packets accumulationstatus and packets serving efficiency. Our results show that ourproposed PR&BO scheme outperforms other schemes in heavytraffic scenario in terms of the RA success probability, the averagequeue length, and the average waiting delay.

Index Terms—Massive IoT, Cellular Network, Random Access,Collision, Power Ramping, Stochastic Geometry.

I. INTRODUCTIONWith the rapid proliferation of innovative applications in

the paradigm of massive Internet of Things (mIoT), such assmart city, smart home, smart industrial, and vehicular com-munication, the demand of data traffic for wireless networks

Manuscript received Augest 2, 2017; revised October 26, 2017; revisedMarch 5, 2018; revised Augest 6, 2018; accepted Augest 6, 2018. Thiswork was supported in part by the U.K. Engineering and Physical SciencesResearch Council (EPSRC) under Grant EP/M016145/2, in part by the MOEARF Tier 2 under Grant MOE2015-T2-2-104, and in part by the SUTD-ZJUResearch Collaboration under Grant SUTD-ZJU/RES/01/2016. This paper waspresented in part at the IEEE International Conference on Communications,Kansas City, MO, USA, May 2018 [1]. The associate editor coordinatingthe review of this paper and approving it for publication was Brady Ruffing.(Corresponding author: Yansha Deng.)

N. Jiang, and A. Nallanathan are with School of Electronic Engineeringand Computer Science, Queen Mary University of London, London E1 4NS,UK (e-mail: nan.jiang, [email protected]).

Y. Deng is with Department of Informatics, King’s College London, LondonWC2R 2LS, UK (e-mail:[email protected]).

X. Kang is with Center for Intelligent Networking and Communications(CINC), National Key Laboratory of Science and Technology on Communi-cations, University of Electronic Science and Technology of China (UESTC),Chengdu 610054, China.

T. Q. S. Quek is with the Information Systems Technology and DesignPillar, Singapore University of Technology and Design, Singapore 487372(e-mail: [email protected]).

is explosively grown [2, 3]. In view of this, providing reliablewireless access for the mIoT network becomes challenging dueto its nature of massive IoT devices and diversification of datatraffic [2, 3]. Cellular-based network is deemed as a potentialsolution to provide last mile connectivity for massive numberof IoT devices, due to its advantages in high scalability,diversity, and security, as well as low cost of additionalinfrastructure deployments [4, 5]. However, to provide reliableand efficient access mechanisms for a huge number of IoTdevices is still a key challenge [5–7].

IoT devices perform Random Access (RA) procedure to re-quest channel resources for uplink transmission in the cellular-based mIoT network, where the massive mIoT traffic imposeenormous load at the Radio Access Network (RAN) level. Toimprove the quality of service and reduce power consumptionof IoT devices, efficient RA procedure is required to enhancethe sucess RA performance. An IoT device can either performcontention-free RA when a dedicated scheduling request re-source is assigned by the base station (BS) (e.g., handover), orperform contention-based RA without a dedicated schedulingrequest resource (e.g., uplink data or control informationtransmission). Due to the delay-tolerant and uplink preferablecharacteristics of the mIoT traffic, the contention-based RA isconsidered as the main access technology to request channelresources in the uplink transmission [6, 8].

The contention-based RA is based on ALOHA-type access(i.e., request access in the first available opportunity), wherean IoT device randomly selects a non-dedicated preamble(i.e., orthogonal pseudo code, such as Zadoff-Chu sequence)transmitting to its associated BS via Physical Random AccessCHannel (PRACH) in the 1st step of RA [9]. As singlepreamble provides single RA opportunity, preambles con-tention among IoT devices represents their competition of up-link channel resources. When competing simultaneously, IoTdevices choosing the same preamble bring mutual interferenceand collision risks in preamble detection, resulting in perfor-mance degradation in terms of high RA failure probability [4,6, 8].

A collision occurs at the step 1 of RA when a BS suc-cessfully decodes two or more same preambles from differentIoT devices simultaneously, such that the BS cannot serve anycolliding IoT devices, and these IoT devices need to restartthe RA procedure in the next available RA time slot. TheRA opportunities are represented by the repeated PRACHs,which are reserved in the uplink channel and defined by thePRACH configuration index, which is selected in the BS. Agreat number of possible PRACH configuration indexes aredefined in LTE [9], and the PRACH configuration index 6 issuggested to conduct the study in the mIoT network by the

Page 2: Analyzing Random Access Collisions in Massive IoT Networks

2

3GPP [5]. More specifically, the PRACH is repeated every 5ms with 54 available preambles, in other words, this systemoffer a capacity of 10800 contention-based RA oportunitiesper second. However, this performance is still limited on someapplications with serious RA requirements, such as earthquakemonitoring [5], due to the facts that massive IoT devices maycreate bursty traffic, and the practical system performancemight be lower than the upper bound due to the nature ofrandom collision.

To improve the success RA performance under limitedchannel resources, efficient RA schemes need to be proposedand analyzed, which is utilized to alleviate uplink congestionby reducing the high interference and high collision probabilitywhen massive IoT devices contend for the uplink channelresources at the same time [5, 6, 8]. Accordingly, severalsolutions are provided in literature to reduce congestion inthe mIoT network. For instance, Access Class Barring (ACB)scheme had been regarded as an efficient tool to preventcongestion when massive concurrent access occurs [5], whichwas extented studied in [7, 10, 11]. In [12], a delay-estimationbased RA scheme was proposed based on the back-off (BO)scheme, which aims at improving the collision detection andresolution capability. In [13], the authors analyzez the successprobability, throughput, and access delay of preamble trans-mission under three power ramping (PR) schemes with fixed,linear, and geometric step sizes from single cell perspective.In [14], the authors evaluate RA success with and without thePR scheme by considering collision and Physical DownlinkControl Channel (PDCCH) deficiency. In [15], a cooperationincentive scheme was presented which reimburses the extraenergy consumptions for the helper nodes with considerationof signal-to-noise-plus-interference ratio (SINR) constraint andaggregate interference. In [16], the authors suggested a tech-nology called Distributed Queueing RA Protocol, which haspotential for handling an ideally infinite number of devices,attaining near-optimum performance.

To characterize and analyze the performance of contention-based RA in the mIoT network, mathematical models arerequired. Previously, mathematical models mainly focused onthe SINR outage or collision problem [10, 17–20]. However,to the best of our knowledge, most works have focused eitheron studying the SINR outage from the network point of viewwithout considering collision, or studying the collision prob-lem from the single cell point of view considering given fixedvalue of SINR outage. In [10, 17, 18], the authors modelledqueue status by taking into account collision events with givencollision probability, but they ignored the mutual interferencebetween devices. In [20], the authors combine queueing theoryand stochastic geometry to analyze the stability region in adiscrete-time slotted RA network, where devices are spatiallydistributed as a Poisson point process, and a infinite bufferis modelled in each device to track the time evolution of thequeue using queueing theory. In [19], the authors extend themodel proposed in [20] to analyze the preamble transmissionin RA, where three different preamble transmission schemesare studied and compared.

In our previous work [21], we provided a novel spatio-temporal mathematical framework to analyze the preamble

tranmission success probability of mIoT network, where thequeue evolution of IoT devices is modelled via probabilitytheory (i.e., a new approach is developed to track the queueevolution, which is different from [19, 20]), and the SINRoutage of preamble transmission is studied using stochasticgeometry. Due to the page limitation, we only focused onderiving the preamble transmission success probability asthe first work in analyzing RA procedure using stochasticgeometry and probability theory, and left the collision problemas the future work. In this work, different from [19–21], wetake into account the SINR outage events as well as thecollision events at the BS in evaluating the success RA. Thecontributions of this paper can be summarized in the following:

• We propose a tractable approach to jointly model andanalyze the SINR outage and collision problem ofcontention-based RA. The model is general and can beextended to analyze different RA schemes or/and differ-ent networks by considering different preamble transmis-sion policy and queue evolution.

• For the PR scheme, we derive the general exact expres-sion for the RA success probability in each time slotwith infinite number of power level units. Note that,different from [13] considering single cell, we studythe RA success probability of the PR scheme from thenetwork aspect, where the analysis is more challengingdue to the difficulty in capturing both interference andcollision generated from IoT devices transmitting withdifferent transmit powers.

• We extendedly study the ACB and back-off BO schemesanalyzed in our previous work [21] by taking into accountcollision, and we also analyze two hybrid schemes,namely, the hybrid ACB and back-off (ACB&BO)scheme, and the hybrid power ramping and back-off(PR&BO) scheme. We derive the exact expressions forthe RA success probability in each time slot with theseschemes, and our results show that the PR&BO schemeoutperforms all other schemes in all traffic scenarios.

• We derive the average queue length and the average wait-ing delay of each RA scheme to compensate for the factthat the RA success probability cannot reveal the packetaccumulation status and performance of packets servingefficiency in the time-aware network. Interestingly, ourresults shown that the average queue length and theaverage waiting delay of the PR&BO scheme outperformsthat of other schemes in heavy traffic scenarios.

• We verify the RA success probability, the average queuelength, and the average waiting delay of each RA schemeusing our proposed realistic simulation framework, whichcaptures the randomness location, preamble transmission,RA collision, as well as the real packets arrival, accumu-lation, and departure of each IoT device in each timeslot.

The rest of the paper is organized as follows. Section IIintroduces the system model. Sections III provides the singletime slot analytical model for the RA success probability.Sections IV presents the analytical results for the RA successprobabilities in each time slot with different schemes. Section

Page 3: Analyzing Random Access Collisions in Massive IoT Networks

3

V presents the analytical results for the average queue lengthand the average waiting delay. Section VI provides numericalresults. Finally, Section VII concludes the paper.

II. SYSTEM MODELWe consider a traffic-aware spatio-temporal model for the

cellular-based mIoT network: 1) the spatial model of BSs andIoT devices are distributed in R2 following two independenthomogeneous Poisson point process (HPPP), ΦB and ΦD, withintensities λB and λD, respectively; 2) the temporal model ofthe packets arrival at each IoT device in each time slot ismodelled as independent Poisson arrival process, ΛNew, withintensities εNew. A packet can only be transmitted via the ded-icated uplink data transmission channel, which is scheduled bythe associated BS. Before resource scheduling, the IoT deviceneed to execute a RA to request uplink channel resources withthe BS. We intend to analyzing the time-slotted contention-based RA in the mIoT network, and thus assume that theactual intended packet transmission is always successful if thecorresponding RA succeeds. Note that the data transmissionafter a successful RA can be easily extended following theanalysis of preamble transmission success probability in RA.Here, we limit ourselves to RA success to focus on the impactof masssive access to RA procedure.

IoT devices use the contention-based RA procedure toacquire synchronization and request uplink channel resourceswith the associated BS before data transmission. Specifically,an IoT device randomly selects a preamble from availablepreamble pool for transmitting to its associated BS via PRACHin the step 1, and exchanges control information via normaluplink/downlink channels in the step 2, 3, and 4 [9]. In step 1,we assume that ξ number of available preambles are reservedfor contention-based RA in the mIoT network. Without lossof generality, each IoT device has an equal probability (1/ξ)to choose a specific preamble, and the average density of IoTdevices using a same preamble is λDp = λD/ξ, where λDpis measured with unit devices/preamble/km2. The location ofeach active IoT device choosing the same preamble varies indifferent time slot due to that 1) IoT devices are randomlymoving such that their location are independent among differ-ent time slots; 2) the IoT devices randomly choose a preamblein each RA attempt, such that the set of active IoT devicesusing the same preamble changes in different time slot. Inthis case, the realizations of the active IoT devices that aredifferent is modeled as i.i.d random HPPP in each time slot.

The RA requests from massive number of IoT devicessimultaneously under limited number of available preamblesis the main challenge of mIoT network, thus we focus on thecontention of preamble in the step 1 of contention-based RA,and we assume that the step 2,3,4 of RA are always successfulwhenever the step 1 is successful. If the step 1 in RA fails,the IoT device needs to reattempt in the next available RAopportunity. In this case, a packet delayed in the buffer of anIoT device causing by the access failure in the step 1 of RAcan be contributed by the following two reasons: 1) the BScannot decode the preamble due to the low received SINR inthe step 1 of RA; 2) the BS successfully decodes the samepreamble from two or more IoT devices in the same time,such that the collision occurs.

It is known that collision event in the step 1 of RA canbe detected by the BS, when the collided IoT devices areseparable in terms of the power delay profile [9, 22]. Ourmodel follows the assumption of collision handling in [5],where collision events are detected by BS after it decodes thepreambles in the step 1 of RA, and then no response will befedback from the BS to the IoT devices, such that it can notproceed to the next step of RA [7, 23].

A. Physical Layer Description

Each IoT device is assumed to associates to its geographi-cally nearest BS, where a Voronoi tesselation is formed, andthe BSs are uniformly distributed in the Voronoi cell [24–28].To model the channel, a standard power-law path-loss modelis considered, where the path-loss is inversely proportionalto distance r with the path-loss exponent α. We assumethe Rayleigh fading multi-path channel between two genericlocations x, y ∈ R2, where the channel power gains h(x, y)is exponentially distributed random variables with unit mean.Note that all the channel gains are independent of each other,independent of the spatial locations, and identically distributed(i.i.d.). For the brevity of exposition, the spatial indices (x, y)are dropped.

Similar as [19, 21, 24, 29], we apply a full path-loss in-version power control at all IoT devices to solve ”near-far”problem, where each IoT device controls its transmit powerby compensating for its own path-loss to maintain the averagereceived signal power in the BS equalling to a same thresholdρ. We also assume the density of BSs is high enough and noIoT device suffers from truncation outage [21].

B. MAC Layer DescriptionWe consider a time-slotted cellular-based mIoT network,

where the channel resources of RA are reserved in the uplinkchannel and repeated in the system with a certain periodthat specified by the BS. According to LTE standard [9],most of uplink channel resources are scheduled for the datatransmission, and thus we assume that each time slot consistsof a front gap interval duration τg , which is relatively longerthan a following RA duration τc. We assume a geometric newpackets arrival process in each time slot at each IoT device,which is modelled as independent Poisson arrival process1 as[21, 30–32]. Specifically, the number of new packets in themth time slot Nm

New is described by the Poisson distributionwith Nm

New ∼ Pois(µmNew), where µmNew = (τc + τg)ε

mNew.

More details about RA duration stracture and traffic model(i.e., packets arriving and leaving) can be found in our previouswork [21, Section II.C]. We assume each IoT device has aninfinite buffer to store queueing packets until their successfultransmission, where none of packets will be dropped off, andeach IoT deivce transmits packets via a First Come First Servepackets scheduling scheme2 [33].

In the mIoT network, multiple RA attempts contribute tomassive concurrent signaling leading to RA fails frequently, so

1The traffic can also be modeled as the time limited Uniform Distributionand the time limited Beta distribution [5].

2With minor modification, this model can also support multiple packetstransmitted by an IoT device within a time slot.

Page 4: Analyzing Random Access Collisions in Massive IoT Networks

4

that progressively aggravates network congestion and servicedegradation, in such case efficient RA transmission mecha-nisms are required for congestion reduction [5]. In this paper,we focus on the SINR outage and collision problem of mIoTnetwork with the different RA schemes, including the PR, theACB, the BO, the ACB&BO, and the PR&BO schemes. Inthe following, we listed the five RA schemes:• PR scheme: If RA fails, the deferred packet will be

favored by stepping up the transmit power of preambleafter each unsuccessful RA attempt. Specifically, if aRA attempt fails, the IoT device uses the full path-lossinversion power control to maintain the average receivedpreamble power at a higher power level in the next RAattempt, where κi denotes the power level unit in theith RA attempt by adjusting the target received preamblepower at the BS equal to κiρ [13] (i.e., κ1 < κ2 < · · · <κi < · · · < κJ ). Note that κJ is the maximum allowablepower level unit.

• ACB&BO/ACB/BO scheme: In the ACB&BO scheme,IoT device draws a random number q ∈ [0, 1] beforeeach RA attempt, and performs the RA attempt with itsassociated BS only when q ≤ PACB (i.e., PACB is ACBfactor specified by the BS). If a RA attempt fails in themth time slot, the IoT device automatically defers itsfollowing RA attempt over next tBO time slots and retrya RA attempt for that packet in the (m + tBO + 1)thtime slot. The ACB and BO schemes correspond to theACB&BO scheme with the BO factor tBO = 0 and theACB factor PACB = 1, respectively.

• PR&BO scheme: If a RA attempt fails in the mth timeslot, the IoT device will first automatically defer itsfollowing RA attempts over next tBO time slots, and thenstep up the transmit power of preamble for the deferredpacket in the RA attempt of (m+ tBO + 1)th time slot.

C. SINR Expression

Different preambles represent orthogonal sub-channels,such that only IoT devices choosing the same preamble havecorrelations. The BS successfully decode a preamble when thereceived SINR is above the threshold. Based on Slivnyak’stheorem [34], we formulate the SINR of a typical BS locatedat the origin in the mth time slot as

SINRm =ρh0

Imintra + Iminter + σ2, (1)

where ρ is the full path-loss inversion power control threshold,ho is the channel power gain from the typical IoT device toits associated BS, σ2 is the noise power. Iintra and Iinter arethe aggregate intra-cell and inter-cell interference in the mthtime slot, which are represent as

Imintra =∑

uj∈Zin

1NmNewj+NmCumj

>01URρhj ,

Iminter =∑

ui∈Zout

1NmNewi+NmCumi

>01URPihi‖ui‖−α, (2)

where Zin is the set of intra-cell interfering IoT devices, Zout

is the set of inter-cell interfering IoT devices, NmNewj

is thenumbers of new arrived packets in the mth time slot of jth

interfering IoT device, NmCumj

is the numbers of accumulatedpackets in the mth time slot of jth interfering IoT device, 1·is the indicator function that takes the value 1 if the statement1· is true, and zero otherwise, ‖·‖ is the Euclidean norm, uiis the distance between the ith inter-cell IoT device and thetypical BS, Pi = ρri

α is the actual transmit power of the ithinter-cell IoT device with the distance from its associated BS.

In (1), 1UR presents that an IoT device generating in-terference only when its RACH attempt is not restricted bythe RACH scheme (such as in the ACB scheme, generatingq > PACB leads to 1UR = 0), and 1NmNewi

+NmCumi>0

presents that only an IoT device with non-empty buffer gen-erating interference. The queue status of an IoT device arejointly populated by the new arrival packets (i.e., according toPoisson arrival process ΛNew) and the accumulated packets inthe previous time slots. The evolution of queue status in eachIoT device has been detailed and analyzed in our previouswork [21, Section II.C and IV.A]. Briefly speaking, a packetis removed from the buffer once it has been successfullytransmitted (step 1 of RA of that IoT device is successful),otherwise, it will wait in the first place of the queue, and thisIoT device will reattempt to access the network in the nextavailable RA to transmit the packet. The main notations ofthe proposed protocol are summarized in Table I.

TABLE I: Notation Table

Notations Physical meansλB The intensity of BSsλD The intensity of IoT devicesξ The number of available preambles *λDp The average intensity of IoT devices using the same preambleγth The received SINR threshold *α The path-loss exponenth The Rayleigh fading channel power gainP The transmit power *ρ The full path-loss power control threshold *σ2 The noise powerr The distance between an IoT device and its associated BSu The distance between an interfering IoT device and the typical

BSIinter The aggregate inter-cell interferenceIintra The aggregate intra-cell interferenceτg The gap interval durationτc The PRACH durationεNew The intensity of new packets arrivalN The number of interfering IoT devices in the typical cellm The time slotc c = 3.575 is a constantµmCum The intensity of accumulated packets in the mth time slotµmNew The intensity of new arrival packets in the mth time slotT m The active probability of an IoT device in the mth time slotBm The non-BO probability of each IoT device in the mth time

slot with the BO schemeκj The power level unit in the jth RA attempt with the PR

scheme *J The maximum allowable power level with the PR scheme *PACB The ACB factor with the ACB scheme *tBO The BO factor with the BO scheme *Remarks The variables marked with * are configurable parameters.

III. GENERAL SINGLE TIME SLOT MODEL

In this section, we provide a general single time slotanalytical model for all RA schemes. Note that in the 1st timeslot, the queue status (number of packets in buffer) of eachIoT device only depends on the new packets arrival processΛ1New. We perform the analysis on a BS associating with a

Page 5: Analyzing Random Access Collisions in Massive IoT Networks

5

randomly chosen active IoT device in terms of the RA successprobability [23]. The RA success refers to the preamble beingsuccessfully transmitted to the associated BS (i.e., receivedSINR is greater than the SINR threshold) and no collisionoccurs (i.e., no other IoT devices successfully transmits a samepreamble to the typical BS simultaneously). The probabilitythat the received SINR at a randomly chosen BS exceedsa certain threshold γth has been studied in many stochasticgeometry works [24, 29, 35]. To the best of our knowledge,there has been no work in the literature considered andanalyzed collision problem during RA via stochastic geometryso far. The RA success probability P1 is defined as

P1 =

∞∑

n1=0

P[N1 = n1]

︸ ︷︷ ︸I

P[SINRo ≥ γth∣∣∣N1 = n1]

︸ ︷︷ ︸II

( n1∏

i=1

P[SINRi < γth

∣∣∣N1 = n1])

︸ ︷︷ ︸III

, (3)

where γth is the SINR threshold3, N1 is the number ofintra-cell interfering IoT devices (i.e., transmitting the samepreamble as the typical IoT device simultaneously), SINRo

and SINRi are the received SINR of preamble from thetypical and the ith interfering IoT device following from (1),I in (3) is the probability of N1 number of interfering IoTdevices located in the typical BS, II in (3) represents thepreamble transmission success probability that the typical IoTdevice successfully transmits the preamble to the associatedBS conditioning on N1 = n1, and III in (3) represents thepreamble transmission failure probability that the preamblestransmitting from other n1 intra-cell interfering IoT devices arenot successfully received by the BS conditioning on N1 = n1.The Probability Mass Function (PMF) of the number ofinterfering IoT devices located in a Voronoi cell P[N1 = n1]is obtained as [35, Eq.(3)]

P[N1 = n1] =c(c+1)Γ(n1 + c+ 1)(

T 1λDpλB

)n1

Γ(c+ 1)Γ(n1 + 1)(T 1λDpλB

+ c)n1+c+1 , (4)

where c = 3.575 is a constant related to the approximateProbability Mass function (PMF) of the PPP Voronoi cell [37],Γ (·) is the gamma function, λDp is the density of IoT devicesusing the same preamble, and

T 1 =

PACBT 1, the ACB and ACB&BO scheme,

T 1, the PR, BO, and PR&BO scheme.(5)

In (5), PACB is the ACB factor, T 1 is the active probabilityof each IoT device in the 1st time slot (i.e., an IoT device hasone or more than one packets stored in the buffer waiting fortransmission), which is expressed as

T 1 = PN1

New > 0

= 1− e−µ1New . (6)

3The part III of Eq. (3) is not required for γth ≥ 0 dB. Note thatdetermining the SINR threshold is based on characteristics of transceiver, suchas modulation scheme, coding technique, constellation size, matched filtering,signal recovery technique, etc, and thus it is worth to study the network withthe SINR threshold in any regions [36].

Remind that in (6), µ1New = (τc + τg)ε

1New, and N1

New is theintensity of new arrival packets at each IoT device in the 1sttime slot.

Next, we derive the preamble transmission success prob-ability presenting in II of (3). According to the Slivnyak’sTheorem [34], the locations of inter-cell IoT devices followthe Palm distribution of ΦDp, which is the same as the originalΦDp. The probability that the received SINR at the BS froma randomly chosen IoT device exceeds a certain threshold γthconditioning on the given number of interfering IoT devicesin that cell n1 is presented in following lemma.

Lemma 1. The probability that the received SINR at the BSfrom a randomly chosen IoT device exceeds a certain thresholdγth conditioning on a given number of interfering IoT devicesin that cell n1 is expressed as [21, Eq.(14)]

P[ ρhoIintra + Iinter + σ2

≥ γth∣∣∣N1 = n1

]

= P[ho ≥

γthρ

(Iintra + Iinter + σ2)∣∣∣N1 = n1

]

(a)= E

[expγthρ

(Iintra + Iinter + σ2)∣∣∣N1 = n1

]

= exp(−γthρσ2)LIinter(

γthρ

)LIintra(γthρ

∣∣∣N1 = n1), (7)

where the expectation in (a) is with respective to Iinterand Iintra, LIintra(·) denotes the Laplace Transform of theaggregate intra-cell interference Iintra, and LIinter(·) denotesthe Laplace Transform of the aggregate inter-cell interferenceIinter. In (7), the Laplace Transform of Iinter and Iintra werederived in [21, Appendix A and B], are respectively given as

LIinter(γthρ

) = exp(− 2(γth)

2αT 1λDpλB

∫ ∞

(γth)−1α

y

1 + yαdy),

LIintra(γthρ

∣∣∣N1 = n1) =1

(1 + γth)n1. (8)

Substituting (4) and (7) into (3), we derive the RA successprobability in the 1st time slot P1 in the following theorem.

Theorem 1. In the depicted cellular-based mIoT network, theRA success probability of a randomly chosen IoT device in the1st time slot is derived as

P1 =

∞∑

n1=0

c(c+1)Γ(n1 + c+ 1)(

T 1λDpλB

)n1

Γ(c+ 1)Γ(n1 + 1)(T 1λDpλB

+ c)n1+c+1

︸ ︷︷ ︸I

exp(−γthσ2

ρ − 2(γth)2αT 1λDpλB

∫∞(γth)

−1α

y1+yα dy

)

(1 + γth)n1

︸ ︷︷ ︸II

(1−

exp(−γthσ2

ρ − 2(γth)2αT 1λDpλB

∫∞(γth)

−1α

y1+yα dy

)

(1 + γth)n1

)n1

︸ ︷︷ ︸III

.

(9)In (9), it can be shown that the preamble transmission

success probability of the typical IoT device is inverselyproportional to the received SINR threshold γth, and the

Page 6: Analyzing Random Access Collisions in Massive IoT Networks

6

preamble transmission failure probabilities of other interferingIoT devices are directly proportional to the received SINRthreshold γth, which leads to the fact that the non-collisionprobability (i.e., the probability of a successful transmissionpreamble does not collide with others) of the typical IoTdevices is also directly proportional to the received SINRthreshold γth. Therefore, a tradeoff between preamble trans-mission success probability and non-collision probability isobserved. For illustration, the relationship among RA successprobability, the preamble tranmission success probability, andthe non-collision probability are shown in Fig. 1.

−20 −15 −10 −5 0 5 10

0.10.20.30.40.50.60.70.80.91

gth

Pro

bab

ilit

y

RA success probability (P )

Preamble transmission success

Non−collision

0

1

1

1

probability (P with III = 1)

probability (P with II = 1)

Fig. 1: Comparing RA success probability (P1), preamble transmission success proba-bility (P1 with III = 1), and non-collision probability (P1 with II = 1). The parametersare λB = 10 BS/km2, λDp = 100 IoT deivces/preamble/km2, ρ = −90 dBm,σ2 = −90 dBm, T 1 = T 1, and the new packets arrival rate µ1

New = 0.1packets/time slot).

IV. MULTIPLE TIME SLOTS MODELIn this section, we analyze the RA success probability of the

cellular-based mIoT network in each time slot with differentRA schemes. Apart from the physical layer modelling inthe spatial domain based on stochastic geometry, the queueevolution in the time domain is modelled and analyzed usingprobability theory.

A. Power Ramping SchemeRemind that the RA success probability with the PR scheme

in the 1st time slot P1PR has been derived in (9), and the power

ramping only happens from the 2nd time slot. To derive theRA success probability of each time slot, the main challengeis evaluating the number of the active IoT devices transmittingthe same preamble with each power level unit in the typicalcell. Thus, we first focus on deriving the PMF of the numberof interfering IoT devices transmitting with each power levelunit.

1) PMF of the Number of Interfering IoT Devices: We firstdenote the jth power level unit as κj (j ∈ [1, J ], where Jis the maximum allowable power level), and the number ofinterfering IoT devices transmitting the same preamble withthe power level unit κj being located in the same Voronoicell with the typical IoT device is denoted as Nj . The activeprobability of IoT devices transmitting with the power levelunits κj is denoted as TPR,κj . Note that the active probabilitieswith different power level units are derived based on iterationprocess, which will be represented in (25).

We assume the typical IoT device is transmitting with thepower level unit κ1 with N1 number of interfering IoT devicestransmitting with the same power level unit κ1 (i.e., the totalnumber of IoT devices transmitting with the power level unitκ1 is N1 + 1 in this typical cell). To derive the PMF of

N2 number of IoT devices transmitting with power level unitκ2 conditioning on N1 number of interfering IoT devicestransmitting with power level unit κ1 in the same cell, weneed to first obtain the Probability Density Function (PDF) ofthe area size of the Voronoi cell conditioning on N1 numberof interfering IoT devices transmitting with the power levelunit κ1 located in such cell, which is derived in the followingLemma.

Lemma 2. The PDF of the size of the Voronoi cell condition-ing on N1 number of interfering IoT devices transmitting withthe power level unit κ1 is derived as

P [X = x |N1 = n1 ] =

(x)n1+ce−(TPR,κ1

λDp+λBc)x(TPR,κ1λDp + cλB)

n1+c+1

Γ (n1 + c+ 1),

(10)

where x is the area size of the cell, c = 3.757 is a constantrelated to the approximate PMF of the PPP Voronoi cell, andTPR,κ1 is the active probability of IoT devices transmittingwith the power level unit κ1 that will be derived in (25).

Proof. See Appendix A.

Next, we derive the PMF of N2 number of IoT devicestransmitting with the power level unit κ2 conditioning onthe number of interfering IoT devices transmitting with thepower level unit κ1 in the typical Voronoi cell N1 = n1 in thefollowing theorem.

Theorem 2. The PMF of N2 number of IoT devices transmit-ting with the power level unit κ2 in a Voronoi cell conditioningon the number of interfering IoT devices transmitting with thepower level unit N1 = n1 in the same cell is derived as

P[N2 = n2|N1 = n1] =Γ (n1 + n2 + c+ 1)

Γ(n2 + 1) Γ(n1 + c+ 1)×

(TPR,κ2λDp)

n2(TPR,κ1λDp + cλB)

n1+c+1

(TPR,κ1λDp + TPR,κ2

λDp + λBc)n1+n2+c+1 , (11)

where TPR,κ2 is the active probability of IoT devices transmit-ting with the power level unit κ2 (i.e., TPR,κ2 will be derivedin (25)).

Proof. See Appendix B.

For more than two levels PR scheme (J > 2), the PMFof Nj (j = 3, 4, · · · , J) number of active IoT devicestransmitting with the power level units κj (j = 3, 4, · · · , J) inthe Voronoi cell can be derived based on the iteration processfollowing Lemma 2 and Theorem 2. Thus, we derive thePMF of Nj number of active IoT devices transmitting withthe power level unit κj conditioning on the known numberof IoT devices with other power levels

(N1 = n1, N2 =

n2, · · · , Nj−1 = nj−1)

in the following proposition.

Proposition 1. The PMF of Nj number of IoT devicestransmitting with the power level unit κj in a Voronoi cellconditioning on number of IoT devices with other power levels

Page 7: Analyzing Random Access Collisions in Massive IoT Networks

7

PmPR,κl=

∞∑

n1=0

∞∑

n2=0

· · ·∞∑

nJ=0

P [Nl = nl]

J∏

j=1,j 6=l

P [Nj = nj |Nl = nl, N1 = n1, · · · , Nj−1 = nj−1 ]

︸ ︷︷ ︸I

P[ κlρhoJ∑i=1

(Iminteri + Imintrai

)+ σ2

≥ γth∣∣∣N1 = n1, · · · , NJ = nJ

]

︸ ︷︷ ︸II

J∏

j=1

P[ κjρhoJ∑i=1

(Iminteri + Imintrai

)+ σ2

< γth

∣∣∣N1 = n1, · · · , NJ = nJ

]nj

︸ ︷︷ ︸III

, (13)

(N1 = n1, N2 = n2, · · · , Nj−1 = nj−1

)and the typical IoT

device transmitting with the power level unit κ1 is

P [Nj = nj |N1 = n1, N2 = n2, · · · , Nj−1 = nj−1 ] =

Γ(( j∑

i=1

ni)

+ c+ 1)

Γ (nj + 1) Γ

(( j−1∑i=1

ni)

+ c+ 1

(TPR,κjλDp

)nj(( j−1∑i=1

TPR,κi

)λDp + cλB

)( j−1∑i=1

ni

)+c+1

(( j∑i=1

TPR,κi

)λDp + λBc

)( j∑i=1

ni

)+c+1

,

(12)

where TPR,κj is the active probability of IoT devices transmit-ting with the power level unit κj (i.e., TPR,κj will be derivedin (25)).

2) RA Success Probability: In the PR scheme, we assumethe maximum allowable power level unit is κJ . Based on thePMF of the number of IoT devices transmitting with eachpower level unit, we can derive the RA success probabilityof the typical IoT device with the lth power level unit κl inthe mth time slot PmPR,κl

(l ∈ [1, J ]), where the IoT devicetransmits preamble with the lth power level unit κl after itfails in RA for l − 1 times. The RA success probability ofthe IoT device transmits preamble with the lth power levelunit κl in the mth time slot PmPR,κl

is derived as Eq. (13).In Eq. (13), J is the maximum allowable power level, andIminteri and Imintrai denote the aggregate inter-cell and intra-cellinterference generating by IoT devices transmitting with theith level power unit κi, respectively. I in (13) consists of theprobabilities that the numbers of IoT devices transmitting withthe power level units (κ1, κ2, · · · , κJ) conditioning on thetypical device transmitting with the lth power level unit κl andN1 = n1, N2 = n2, · · · , NJ = nJ , II in (13) represents thepreamble transmission success probability that the typical IoTdevice successfully transmits the preamble to the associatedBS conditioning on N1 = n1, N2 = n2, · · · , NJ = nJ ,and III in (13) represents the preamble transmission success

probabilities that the preambles transmitting from all otherintra-cell interfering IoT devices are not successfully receivedby the BS conditioning on N1 = n1, N2 = n2, · · · , NJ = nJ .

Next, we present the RA success probability of a randomlychosen IoT device with multiple levels PR scheme (i.e., themaximum allowable power level unit is κJ (J ≥ 2)) in themth time slot in the next theorem.

Theorem 3. The RA success probability of a randomly chosenIoT device (i.e. each active IoT device transmitting preamblewith any power level unit is fairly chosen) in the mth timeslot is derived as

PmPR,all =( J∑

i=1

T mPR,κiPmPR,κi

)/T mPR,all, (14)

where J is the maximum allowable power level, the RA successprobability of IoT devices transmitting with the power levelunit κl (l ∈ [1, J ]) in the mth time slot is derived as

PmPR,κl=

∞∑

n1=0

∞∑

n2=0

· · ·∞∑

nJ=0

Θ(m, l, l, ~n)

J∏

j=1

Ω(m, l, j, ~n)

(1−Θ(m, l, j, ~n)

)nj.

(15)

In (15), ~n = n1, · · · , nJ, the probability that the number ofinterfering IoT devices transmitting with the power level unitκl is derived as

Ω(m, l, l, ~n) =c(c+1)Γ(nl + c+ 1)(

T mPR,κlλDp

λB)nl

Γ(c+ 1)Γ(nl + 1)(T mPR,κl

λDp

λB+ c)

nl+c+1 ,

(16)

the probability that the number of IoT devices transmittingwith the power level unit κj (when j 6= l) conditioning on thetypical device transmitting with the power level unit κl andNl = nl, N1 = n1, N2 = n2, · · · , Nj−1 = nj−1, is derived

Page 8: Analyzing Random Access Collisions in Massive IoT Networks

8

as

Ω(m, l, j, ~n) =

Γ(nl + (

j∑i=1,i6=l

ni) + c+ 1)

(TPR,κjλDp)nj

Γ(nj + 1)Γ(nl +

j−1∑i=1,i6=l

ni) + c+ 1)

×

((TPR,κl +

j−1∑i=1,i6=l

TPR,κi

)λDp + cλB

)nl+(j−1∑

i=1,i 6=lni)+c+1

((TPR,κl +

j∑i=1,i6=l

TPR,κi

)λDp + cλB

)nl+(j∑

i=1,i 6=lni)+c+1

,

(17)

the preamble transmission success probability that the receivedSINR from an IoT device transmitting with the power level unitκl exceeds the certain threshold γth are derived as

Θ(m, l, l, ~n) = exp

(− γthσ

2

κlρ− 2λDp(γth)

λB

( J∑

i=1

(κiκl

)2α×

T mPR,κi

∫ ∞

(γthκiκl

)−1α

y

1 + yαdy))/( J∏

i=1

(1 + γthκiκl

)ni),

(18)

and when j 6= l, the preamble transmission success probabilityof an IoT device transmitting with the power level unit κj is

Θ(m, l, j, ~n) = exp

(− γthσ

2

κjρ− 2λDp(γth)

λB

( J∑

i=1

(κiκj

)2α×

T mPR,κi

∫ ∞

(γthκiκj

)−1α

y

1 + yαdy))/

((1 + γth

κlκj

)nl+1(1 + γth)nj−1J∏

i=1,i6=l,j(1 + γth

κiκj

)ni).

(19)

Note that TPR,κi is derived based on iteration process, whichwill be given in (25).

Proof. The preamble transmission success probability of anIoT device transmitting with the power level unit κj isrepresented as

Θ(m, l, j, ~n) =

P κjρho

J∑i=1

(Iminteri + Imintrai

)+ σ2

≥ γth∣∣∣N1 = n1,· · ·,NJ = nJ

=exp(− γthκjρ

σ2) J∏

i=1

(LIminteri (

γthκjρ

)LImintrai (γthκjρ

∣∣∣Ni = ni)),

(20)

where LImintrai (·) and LIminteri (·) denote the Laplace Transformof the PDF of the aggregate intra-cell interference Iintrai andinter-cell interference Iinteri generating from the IoT devicestransmitting with power level unit κi. The Laplace Transformof aggregate inter-cell interference from IoT devices transmit-

ting with power level unit κi received at the typical BS isderived as

LIminteri (s)(a)= EZout

[ ∏

uk∈Zout

EPkEhk[e−sκiPkhk‖uk‖

−α]]

(b)= exp

(−2πT mPR,κiλDp

∫ ∞

(P/κiρ)1α

EPEh[1− e−sκiPhx−α

]xdx

)

(c)= exp

(−2πT mPR,κiλDp(κis)

2αEP [P

2α ]

∫ ∞

(sκiρ)−1α

y

1 + yαdy),

(21)

where s = γthκjρ

, Ex[·] is the expectation with respect to therandom variable x, T mPR,κi is the active probability of IoTdevice transmitting with ith power level unit κi in the mthtime slot, (a) follows from independence between λDp, Pk,and hk, (b) follows from the probability generation functional(PGFL) of the PPP, (c) obtained by changing the variablesy = x

(sP )1η

, and the moments of the transmit power EP [·] was

presented in [21, Eq. A.2]. Substituting the moments of thetransmit power into (21), we derive the Laplace Transform ofaggregate inter-cell interference.

The Laplace Transform of aggregate intra-cell interferencefrom IoT devices transmitting with the power level unit κireceived at the typical BS is derived as

LImintrai (s∣∣∣Ni = ni) = Ehk

[exp

(−s

ni∑

k=1

κiρhk)]

=( 1

1 + sκiρ

)ni (22)

where ni is the number of interfering IoT devices transmittingwith the power level unit κi.

The RA success probabilities are derived based on theiteration process. We assume m is a variable that denotes thetime slot from 2 to M . The iteration process for calculatingthe RA success probability in the M th time slot PMPR,all isshown in Fig. 2. Details of this process are described by thefollowing:

• Step 1: Calculate the RA success probability in the 1sttime slot P1

PR,κ1in (7) based on the known intensity

of the new arrival packets µ1New in (6) (i.e., the power

ramping is not executed in the 1st time slot);• Step 2: Calculate the intensity of accumulated packetsµmCum,PR in the mth time slot via Poisson approximationqueue status analysis approach, which is given in our pre-vious work [21, Section IV.A]. The intensity of numberof accumulated packets in the mth time slot µmCum,PR is

µmCum,PR = µm−1New + µm−1Cum,PR −J∑

i=1

T m−1PR,κiPm−1PR,κi

;

(23)

• Step 3: Calculate the active probability of each IoT devicein the mth time slot T mPR,all using

T mPR,all = 1− e−µmNew−µmCum,PR ; (24)

Page 9: Analyzing Random Access Collisions in Massive IoT Networks

9

• Step 4: Calculate the active probability of each IoT devicetransmitting with the power level unit κi (i ∈ (1, J)) inthe mth time slot T mPR,κi

using

T mPR,κi =

T mPR,all −J∑

i=1

T m−1PR,κi

(1− Pm−1PR,κi

), i = 1,

(1− Pm−1PR,κi−1

)T m−1PR,κi−1

, i 6= 1, i 6= J,(1− Pm−1PR,κi−1

)T m−1PR,κi−1

+(1− Pm−1PR,κi

)T m−1PR,κi

, i = J,

(25)

where Pm−1PR,κiis the RA success probability of the IoT

device transmitting with the power level unit κi in the(m− 1)th time slot given in (15);

• Step 5: Calculate the RA success probabilities of IoTdevices transmitting with power level unit κl (l =1, 2, · · · , J) in the mth time slot PmPR,κl

using (15);• Step 6: Calculate the RA success probability PmPR,all

using (14).Repeating the step 2 to 6 until m = M , the RA successprobability in the M th time slot PMPR,all is obtained.

of the transmit power EP [·] was presented in [21, Eq. A.2]. Substituting the moments of the

transmit power into (20), we derive the Laplace Transform of aggregate inter-cell interference.

The Laplace Transform of aggregate intra-cell interference from IoT devices transmitting with

the power level unit κi received at the typical BS is derived as

LImintrai (s∣∣∣Ni = ni) = Ehk

[exp

(−s

ni∑

k=1

κiρhk)]

=( 1

1 + sκiρ

)ni (21)

where ni is the number of interfering IoT devices transmitting with the power level unit κi.

The RA success probabilities are derived based on the iteration process. We assume m is a

variable that denotes the time slot from 2 to M . The iteration process for calculating the RA

success probability in the M th time slot PMPR,all is shown in Fig. 1. Details of this process are

described by the following:

Step 1: Calculate P1PR,κ1

in (7).

Step 2: Calculate µmCum,PR in (23).

Step 3: Calculate T mPR,all in (24).

Step 4: Calculate T mPR,κ1, T mPR,κ2

, · · · , T mPR,κJin (25).

Step 5: Calculate PmPR,κ1, PmPR,κ2

, · · · , PmPR,κJin (15).

Step 6: Calculate PmPR,all in (14).

m=M? m=m+1.

end.

m = 2

yes

no

Fig. 2: Flowchart for deriving the RA success probability in the M th time slot with the PR scheme PMPR,all.

• Step 1: Calculate the RA success probability in the 1st time slot P1PR,κ1

in (6) based on

the known intensity of the new arrival packets µ1New in (5) (i.e., the power ramping is not

executed in the 1st time slot);

• Step 2: Calculate the intensity of accumulated packets µmCum,PR in the mth time slot via

Poisson approximation queue status analysis approach, which is given in our previous work

[21, Section IV.A]. The intensity of number of accumulated packets in the mth time slot

µmCum,PR isµmCum,PR = µm−1New + µm−1Cum,PR −

J∑

i=1

T m−1PR,κiPm−1PR,κi

; (22)

Fig. 2: RA success probability in each time slot with five RA schemes.

For the purpose of simplicity, we provide a special caseof the PR scheme, where each IoT device can step up thepreamble transmit power for only one time (i.e., the maximumallowable power level J = 2), and the path-loss exponent isset as α = 4 (i.e., close-formed expression is obtained). Next,we present the overall RA success probability of a randomlychosen IoT device in the mth time slot in the followingproposition.

Fig. 4 plots the RA success probabilities with the PRscheme at the 10th time slot P10

PR,all versus the density ratiobetween IoT devices transmitting the same preamble and BSsλDp/λB . We study the geometric PR scheme, where thetransmit power steps up following the policy κl = gl−1 (i.e.,g is a constant denoting the root of power increase, l is thecurrent power level, and l ≤ J , where J is the maximumpower level), and its effectiveness has been shown in [13].

We compare the PR schemes with the maximum power levelJ = 5 and J = 2, where we set g = 2 for J = 5(κ1, · · · , κ5 = 1, 2, 4, 8, 16) and g = 2, 4, 8 for J = 2(κ1 = 1 and κ2 = 2, 4, 8). We observe that for J = 2,the RA success probabilities follow P10

PR,all(J = 2, g =8) > P10

PR,all(J = 2, g = 4) > P10PR,all(J = 2, g = 2),

due to that increasing g results in higher received SINRof reattempt access and lower collision probability. We alsonotice that P10

PR,all(J = 5, g = 2) performs worse thanP10PR,all(J = 2, g = 8) before a certain density ratio, due

to that in the low density ratio region, the network conditionprefers large power gap, as this is effective in improving thereceived SINR of reattempt access and reducing the collisionprobability (i.e., most packets only suffer from little times ofRA fails leading to that IoT devices always use small powerlevel unit to transmit preambles). After that density ratio,P10PR,all(J = 5, g = 2) surpasses P10

PR,all(J = 2, g = 8),due to that in the high density ratio region, the case withJ = 5 and g = 2 (κ1, · · · , κ5 = 1, 2, 4, 8, 16) has relativelysmooth increase in power that decreases the high aggregateinterference.

1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 60

0.050.1

0.150.2

0.250.3

0.35

0.40.450.5

Dp / B

Sim.P 10PR,all (J=2,g=2)

Sim.P 10PR,all (J=2,g=4)

Sim.P 10PR,all (J=2,g=8)

Sim.P 10PR,all (J=5,g=2)

RA

Succ

ess

Pro

bab

ilit

y

Ana.

l lFig. 3: RA success probability in the 10th time slot with the PR scheme. We present4 scenarios with different parameters of the PR scheme. The simulation parameters areλB = 10 BS/km2, γth = 1 (0 dB), ρ = −90 dBm, σ2 = −90 dBm, and µ1

New =µ2New = · · · = µmNew = 0.1 packets/time slot.

Proposition 2. The RA success probability of a randomlychosen IoT device with the PR scheme (α = 4, J = 2) inthe mth time slot is derived asPmPR,all =

(T mPR,κ1

PmPR,κ1+ T mPR,κ2

PmPR,κ2

)/T mPR,all. (26)

In (26), the RA success probability of a randomly chosen IoTdevice transmitting with the power level unit κ1 in the mthtime slot PmPR,κ1

is derived as

PmPR,κ1=

∞∑

n1=0

∞∑

n2=0

Θ(m, 1, 1, ~n)

2∏

j=1

Ω(m, 1, j, ~n)

(1−Θ(m, 1, j, ~n)

)nj, (27)

with ~n = n1, n2, the RA success probability of a randomlychosen IoT device transmitting with the power level unit κ2in the mth time slot PmPR,κ2

is derived as

PmPR,κ2=

∞∑

n1=0

∞∑

n2=0

Θ(m, 2, 2, ~n)

2∏

j=1

Ω(m, 2, j, ~n)

(1−Θ(m, 2, j, ~n)

)nj. (28)

Page 10: Analyzing Random Access Collisions in Massive IoT Networks

10

In (27) and (28), the probabilities that the numbers of IoT de-vices transmitting with different power level unit conditioningon N1 = n1, N2 = n2 are derived as

Ω(m, 1, 1, ~n) =c(c+1)Γ(n1 + c+ 1)(

T mPR,κ1λDp

λB)n1

Γ(c+ 1)Γ(n1 + 1)(TmPR,κ1

λDp

λB+ c)

n1+c+1 ,

(29)

Ω(m, 2, 2, ~n) =c(c+1)Γ(n2 + c+ 1)(

T mPR,κ2λDp

λB)n2

Γ(c+ 1)Γ(n2 + 1)(TmPR,κ2

λDp

λB+ c)

n2+c+1 ,

(30)

Ω(m, 1, 2, ~n) =Γ (n1 + n2 + c+ 1)

Γ (n2 + 1) Γ(n1 + c+ 1

)×(T mPR,κ2

λDp)n2(T mPR,κ1

λDP + cλB)n1+c+1

((T mPR,κ1

+ T mPR,κ2

)λDP + cλB

)n1+n2+c+1 ,

(31)

Ω(m, 2, 1, ~n) =Γ (n1 + n2 + c+ 1)

Γ (n1 + 1) Γ(n2 + c+ 1

)×(T mPR,κ1

λDp)n1(T mPR,κ2

λDP + cλB)n2+c+1

((T mPR,κ1

+ T mPR,κ2

)λDP + cλB

)n1+n2+c+1 ,

(32)

and the probabilities that the received SINRs at the BS exceedsthe certain threshold γth are derived as

Θ(m, 1, 1, ~n) =

exp

(−γthσ2

κ1ρ− 2λDp

√γth

λB

( 2∑i=1

√κiκ1T mPR,κi

arctg(√

κiκ1γth)

))

(1 + γth)n1(1 + γthκ2

κ1)n2

,

(33)

Θ(m, 1, 2, ~n) =

exp

(−γthσ2

κ2ρ− 2λDp

√γth

λB

( 2∑i=1

√κiκ2T mPR,κi

arctg(√

κiκ2γth)

))

(1 + γthκ1

κ2)n1+1(1 + γth)n2−1 ,

(34)

Θ(m, 2, 1, ~n) =

exp

(−γthσ2

κ1ρ− 2λDp

√γth

λB

( 2∑i=1

√κiκ1T mPR,κi

arctg(√

κiκ1γth)

))

(1 + γth)n1−1(1 + γthκ2

κ1)n2+1

,

(35)

Θ(m, 2, 2, ~n) =

exp

(−γthσ2

κ2ρ− 2λDp

√γth

λB

( 2∑i=1

√κiκ2T mPR,κi

arctg(√

κiκ2γth)

))

(1 + γthκ1

κ2)n1(1 + γth)n2

.

(36)

Generally, the power level unit κj (when j > 1) and themaximum allowable power level J are the major factors indetermining the RA success probability of the PR scheme, dueto it determines the interference generated by the IoT deviceswith large transmitting power. More specifically, it can be

shown in the special case of J = 2, the preamble transmissionsuccess probabilities of IoT devices transmitting with κ2(Θ(m, 1, 2, ~n) and Θ(m, 2, 2, ~n)) are directly proportional toκ2, and these probabilities of IoT devices transmitting withκ1 (Θ(m, 1, 1, ~n) and Θ(m, 2, 1, ~n)) are inversely proportionalto κ2. This could be concluded that κ2 introduces a tradeoffbetween the performances of IoT devices transmitting with κ1and κ2. Obviously, this special case is practical and easy toemploy to IoT devices. Furthermore, a proper κ2 guaranteeslarge overall RA success probability PmPR,all, that is, lessretransmissions. However, maintaining a proper κ2 is reallydifficult in a complex mIoT network system with dynamictraffic, which may result in two unexpected consequences: 1)A relatively small power increment leads to a high outageprobability; 2) A relatively large power increment causesserious power consumption in each retransmitting IoT device,and large mutual interference among IoT devices.

To solve this problem, the multi-level PR scheme (J >2) has been studied [13], where the transmit power steps upfollowing specific policies. This approach offers IoT devicesfinding their necessary transmitting power level by a number ofattempts. Generally, this approach avoids the two unexpectedconsequences, but IoT devices may suffer from large delay asthey attempt many power increments until a success preambletransmitting.

B. Hybrid Access Class Barring and Back-Off SchemeIn the ACB&BO scheme, the BS first broadcasts the ACB

factor PACB, then each active IoT device attempts a RAwith probability PACB or defers this RA with probability(1−PACB). If a RA fails, the back-off mechanism is executed,where the IoT device defers its access request and waits fortBO time slots. The RA success probability of a randomlychosen IoT device with the ACB&BO scheme in the mth timeslot is presented in the following Theorem.

Theorem 4. The RA success probability of a randomly chosenIoT device with the ACB&BO scheme in the mth time slot isderived as

PmACB&BO =

∞∑

n1=0

Ω(n1,m)ΘACB&BO(n1,m)

(1−ΘACB&BO(n1,m)

)n1, (37)

where the probability of the number of interfering IoT devicesin the typical cell is derived as

Ω(n1,m) =

c(c+1)Γ(n1 + c+ 1)(BmPACBT mACB&BOλDp

λB)n1

Γ(c+ 1)Γ(n1 + 1)(BmPACBTmACB&BOλDp

λB+ c)

n1+c+1 , (38)

and the preamble transmission success probabilities that thereceived SINR exceeds the certain threshold γth is derived as

ΘACB&BO(n1,m) =

exp(−γthσ2

ρ − 2(γth)2αBmPACBTmACB&BOλDp

λB

∫∞(γth)

−1α

y1+yα dy

)

(1 + γth)n1.

(39)

Page 11: Analyzing Random Access Collisions in Massive IoT Networks

11

Proof. As the flowchart in Fig. 2, the detailed process ofcalculating the RA success probability with the ACB&BO inthe M th time slot PMACB&BO are described in the following:

Proof. As the flowchart in Fig. 2, the detailed process ofcalculating the RA success probability with the ACB&BO inthe M th time slot PMACB&BO are described in the following:• Step 1: Calculate the RA success probability in the 1st

time slot P1ACB&BO,1 using (7);

• Step 2: Calculate the intensity of accumulated packetsµmCum,ACB&BO in the mth time slot using

µmCum,ACB&BO = µm−1New + µm−1Cum,ACB&BO−Bm−1PACBPm−1ACB&BOT m−1ACB&BO; (39)

• Step 3: Calculate the active probability4 in the mth timeslot T mACB&BO using

T mACB&BO = 1− e−µmNew−µmCum,ACB&BO ; (40)• Step 4: In the back-off mechanism, each IoT device

fails to RA in the last tBO time slots will not allow totransmit a preamble in the current mth time slot, which isclearly introduced and analyzed in [21, Eq.(43)]. Brieflyspeaking, we calculate the probability of a packet that isnot blocked in the buffer of IoT device by the back-offmechanism in the mth time slot Bm using

Bm =

1−(m−1∑

j=1

(1−Pm−jACB&BO)PACBT m−jACB&BOBm−j)/T mACB&BO, m ≤ (tBO+1) ,

1−(tBO∑

j=1

(1−Pm−jACB&BO)PACBT m−jACB&BOBm−j)/T mACB&BO, m>tBO;

(41)

• Step 5: Calculate the RA success probability in the mthtime slot PmACB&BO using (36);

Repeating the step 2 to 5 till m = M , the RA successprobability in the M th time slot PMACB&BO is obtained.

of the transmit power EP [·] was presented in [21, Eq. A.2]. Substituting the moments of the

transmit power into (20), we derive the Laplace Transform of aggregate inter-cell interference.

The Laplace Transform of aggregate intra-cell interference from IoT devices transmitting with

the power level unit κi received at the typical BS is derived as

LImintrai (s∣∣Ni = ni) = Ehk

[exp −s

ni∑

k=1

κiρhk)]

=1

1 + sκiρ

)ni (21)

where ni is the number of interfering IoT devices transmitting with the power level unit κi.

The RA success probabilities are derived based on the iteration process. We assume m is a

variable that denotes the time slot from 2 to M . The iteration process for calculating the RA

success probability in the M th time slot PMPR,all is shown in Fig. 1. Details of this process are

described by the following:

Step 1: Calculate P1PR,κ1

in (8).

Step 2: Calculate µmCum,PR in (22).

Step 3: Calculate T mPR,all in (23).

Step 4: Calculate T mPR,κ1, T mPR,κ2

, · · · , T mPR,κJin (24).

Step 5: Calculate PmPR,κ1, PmPR,κ2

, · · · , PmPR,κJin (14).

Step 6: Calculate PmPR,all in (13).

m=M? m=m+1.

end.

m = 2

yes

no

Fig. 2: Flowchart for deriving the RA success probability in the M th time slot with the PR scheme PMPR,all.

• Step 1: Calculate the RA success probability in the 1st time slot P1PR,κ1

in (6) based on

the known intensity of the new arrival packets µ1New in (5) (i.e., the power ramping is not

executed in the 1st time slot);

• Step 2: Calculate the intensity of accumulated packets µmCum,PR in the mth time slot via

Poisson approximation queue status analysis approach, which is given in our previous work

[21, Section IV.A]. The intensity of number of accumulated packets in the mth time slot

µmCum,PR isµmCum,PR = µm−1New + µm−1Cum,PR −

J∑

i=1

T m−1PR,κiPm−1PR,κi

; (22)

Fig. 4: RA success probability in each time slot with five RA schemes.

It is important to know that the analytical results of theACB&BO scheme in Theorem 4 reduces to that of the ACBscheme by setting the back-off factor tBO = 0, and reduces tothat of the BO scheme by setting the ACB factor PACB = 1.4IoT devices may remain the radio resource control (RRC) connection withthe associated BS for a while after the RA procedure succeeded, where they donot need to initiate RA again when new packets arrive within this duration. Tofocus on studying the feature of RA schemes in the spatio-temporal model,we assume that IoT devices release RRC connection immediately after thepacket transmission as [7, 10, 17, 19].

Step 1:Calculate P1

ACB&BO in (7).

Step 2: Calculate µmCum,ACB&BO in (40).

Step 3: Calculate T mACB&BO in (41).

Step 4: Calculate Bm in (42).

Step 5: Calculate PmACB&BO in (37).

m=M? m=m+1.

end.

m = 2

yes

no

Fig. 5: Flowchart for deriving the RA success probability in the M th time slot with theACB&BO scheme PMACB&BO.

C. Hybrid Power Ramping and Back-Off SchemeIn the PR&BO scheme, we limit ourselves to two levels PR

policy (J = 2) with the back-off factor tBO. In detail, if theRA fails, the IoT device defers the current RA and waits fortBO time slots, after that the IoT device reattempt the RA bytransmitting preamble with the 2nd power level unit κ2. Whenm < tBO + 2, the power ramping mechanism is not executed,and each IoT device requests access with the BO scheme (i.e.,IoT devices fails in RA in the 1st time slot will wait for tBOtime slot, and then reattempt RA transmitting the preamblewith power level unit κ2 in the (tBO + 2)th time slot), wherethe RA success probability is derived as (36) in Theorem 4by setting the ACB factor as PACB = 1. When m ≥ tBO + 2,the RA success probability of a randomly chosen IoT devicewith the PR&BO scheme in the mth time slot is derived inthe following proposition.Proposition 3. The RA success probability of a randomlychosen IoT device with the PR&BO scheme (J = 2) in themth time slot is derived as

PmPR&BO,all =T mPR&BO,κ1

PmPR&BO,κ1+ T mPR&BO,κ2

PmPR&BO,κ2

T mPR&BO,all

.

(42)

Proof. As the flowchart in Fig. 1, the details of the process tocalculate the RA success probability with the PR&BO scheme(J = 2) in the mth time slot (m 6= 1) PmPR&BO,all aredescribed by the following:• Step 1: Calculate the RA success probability in the 1st

time slot P1PR&BO,κ1

using (7);• Step 2: Calculate the intensity of accumulated packetsµMCum,PR&BO in the mth time slot using

µmCum,PR&BO =

µm−1New + µm−1Cum,PR&BO − T m−1PR&BO,κ1Pm−1PR&BO,κ1

, 1 < m < tBO + 2,

µm−1New + µm−1Cum,PR&BO −2∑

i=1

T m−1PR&BO,κiPm−1PR&BO,κi

, m ≥ tBO + 2;

(43)

Fig. 4: Flowchart for deriving the RA success probability in the M th time slot with theACB&BO scheme PMACB&BO.

• Step 1: Calculate the RA success probability in the 1sttime slot P1

ACB&BO,1 using (7);• Step 2: Calculate the intensity of accumulated packetsµmCum,ACB&BO in the mth time slot usingµmCum,ACB&BO =µm−1New + µm−1Cum,ACB&BO−

Bm−1PACBPm−1ACB&BOT m−1ACB&BO;(40)

• Step 3: Calculate the active probability4 in the mth timeslot T mACB&BO using

T mACB&BO = 1− e−µmNew−µmCum,ACB&BO ; (41)• Step 4: In the back-off mechanism, each IoT device

fails to RA in the last tBO time slots will not allow totransmit a preamble in the current mth time slot, which isclearly introduced and analyzed in [21, Eq.(43)]. Brieflyspeaking, we calculate the probability of a packet that isnot blocked in the buffer of IoT device by the back-offmechanism in the mth time slot Bm using

Bm =

1−

m−1∑j=1

(1−Pm−jACB&BO)PACBT m−jACB&BOBm−j

T mACB&BO

,

m ≤ (tBO+1) ,

1−

tBO∑j=1

(1−Pm−jACB&BO)PACBT m−jACB&BOBm−j

T mACB&BO

m>tBO;(42)

4IoT devices may remain the radio resource control (RRC) connection withthe associated BS for a while after the RA procedure succeeded, where they donot need to initiate RA again when new packets arrive within this duration. Tofocus on studying the feature of RA schemes in the spatio-temporal model,we assume that IoT devices release RRC connection immediately after thepacket transmission as [7, 10, 17, 19].

• Step 5: Calculate the RA success probability in the mthtime slot PmACB&BO using (37);

Repeating the step 2 to 5 till m = M , the RA successprobability in the M th time slot PMACB&BO is obtained.

It is important to know that the analytical results of theACB&BO scheme in Theorem 4 reduces to that of the ACBscheme by setting the back-off factor tBO = 0, and reduces tothat of the BO scheme by setting the ACB factor PACB = 1.

C. Hybrid Power Ramping and Back-Off SchemeIn the PR&BO scheme, we limit ourselves to two levels PR

policy (J = 2) with the back-off factor tBO. In detail, if theRA fails, the IoT device defers the current RA and waits fortBO time slots, after that the IoT device reattempt the RA bytransmitting preamble with the 2nd power level unit κ2. Whenm < tBO + 2, the power ramping mechanism is not executed,and each IoT device requests access with the BO scheme (i.e.,IoT devices fails in RA in the 1st time slot will wait for tBOtime slot, and then reattempt RA transmitting the preamblewith power level unit κ2 in the (tBO + 2)th time slot), wherethe RA success probability is derived as (37) in Theorem 4by setting the ACB factor as PACB = 1. When m ≥ tBO + 2,the RA success probability of a randomly chosen IoT devicewith the PR&BO scheme in the mth time slot is derived inthe following proposition.

Proposition 3. The RA success probability of a randomlychosen IoT device with the PR&BO scheme (J = 2) in themth time slot is derived as

PmPR&BO,all =

T mPR&BO,κ1PmPR&BO,κ1

+ T mPR&BO,κ2PmPR&BO,κ2

T mPR&BO,all

. (43)

Proof. As the flowchart in Fig. 1, the details of the process tocalculate the RA success probability with the PR&BO scheme(J = 2) in the mth time slot (m 6= 1) PmPR&BO,all aredescribed by the following:

• Step 1: Calculate the RA success probability in the 1sttime slot P1

PR&BO,κ1using (7);

• Step 2: Calculate the intensity of accumulated packetsµMCum,PR&BO in the mth time slot using

µmCum,PR&BO =

µm−1New + µm−1Cum,PR&BO − T m−1PR&BO,κ1Pm−1PR&BO,κ1

,

1 < m < tBO + 2,

µm−1New + µm−1Cum,PR&BO −2∑

i=1

T m−1PR&BO,κiPm−1PR&BO,κi

,

m ≥ tBO + 2;(44)

• Step 3: Calculate the active probability in the mth timeslot T mPR&BO,all using

T mPR&BO,all = 1− exp(−µmNew − µm−1Cum,PR&BO); (45)

Page 12: Analyzing Random Access Collisions in Massive IoT Networks

12

• Step 4: Calculate the active probability T mPR&BO,κ1and

T mPR&BO,κ2using

T mPR&BO,κ1=T mPR&BO,all−

2∑

i=1

tBO+1∑

t=1

T m−tPR&BO,κi

(1− Pm−tPR&BO,κi

),

(46)

T mPR&BO,κ2=

2∑

i=1

T m−1−tBOPR&BO,κi

(1− Pm−1−tBOPR&BO,κi

); (47)

• Step 5: Calculate the RA success probability in the mthtime slot PmPR&BO,κ1

and PmPR&BO,κ2using (27) and (28)

with T mPR&BO,κigiven in (46) and (47);

• Step 6: Calculate the overall RA success probability in themth time slot PmPR&BO,all using (43) with PmPR&BO,κi

.Repeating the step 2 to 6 till m = M , the RA successprobability in the M th time slot PMPR&BO,all is obtained.

V. AVERAGE QUEUE LENGTH AND AVERAGEWAITING DELAY

The works on RA has been mainly focused on minimizingthe failure probabilities and the service delays [6, 8]. The RAsuccess probability provides insights on the probability ofaccess for a random IoT device in each time slot, but does notevaluate the packets accumulation status and the packets delayover all the time slots. Many previous works have indicatedthat the queue length and waiting delay are the good indicationof network congestion [4, 6, 38]. The queue length refers to thenumber of packets that are waiting in buffer to be transmitted,and the waiting delay is the duration of the time between whena packet arrives and leaves the buffer, respectively [39].

Next, we evaluate the average queue length E[Qm] andthe average waiting delay E[Dm]. The average queue length5

denotes the average number of packets accumulated in thebuffer in the mth time slot, which is measured by meanaverage the queue over all IoT devices in the network [39].The average waiting delay6 is defined as the average time slotsspent in the queue of each packet, which is measured by meanaverage the waiting time over all transmitted packets betweenthe 1st and the mth time slot in the network [39]. Note thatthere are always a number of packets being accumulated inbuffers in the mth time slot (i.e., fail to access, or still inthe queue and never been serviced before the mth time slot),and we assume the waiting delay of these packets is the timeelapsed from the packets start to wait in the buffer to the mthtime slot. The average queue length and the average waitingdelay of each packet with the PR scheme over m time slotsare derived as

E[QmPR] = µmNew + µmCum,PR −J∑

i=1

T mPR,κiPmPR,κi , (48)

5The average queue length is looking at the average in space in a specifictime slot.

6The average waiting delay is looking at the average both in space andtime over a period of time slots.

and

E[DmPR] =

( m∑

t=1

E[QtPR])/( m∑

t=1

µtNew

), (49)

where J is the maximum allowable power level, µmCum,PR isthe intensity of number of accumulated packets in the mthtime slot given in (23), µtNew = τgε

tNew is the intensity of

the new arrival packets in the tth time slot, and T mPR,κiand

PmPR,κiare the active probability and RA success probability

of each IoT device transmitting with ith power level unit κiin the mth time slot given in (25) and (15), respectively.

The average queue length and the average waiting delay ofeach packet with the ACB&BO scheme over m time slots arederived as

E[QmACB&BO] =µmNew + µmCum,ACB&BO−BmPACBPmACB&BOT mACB&BO, (50)

and

E[DmACB&BO] =

( m∑

t=1

E[QtACB&BO])/( m∑

t=1

µtNew

), (51)

where PACB is the ACB factor, Bm is the probability of apacket is not blocked in the buffer by the back-off mechanismin the mth time slot given in (42), µmCum,ACB&BO, T mACB&BO,and PmACB&BO are given in (37), (41), and (40), respectively.

The average queue length and the average waiting delay ofeach packet with the PR&BO scheme over m time slots arederived as

E[QmPR&BO] =µmNew + µmCum,PR&BO−2∑

i=1

T mPR&BO,κiPmPR&BO,κi , (52)

and

E[DmPR&BO] =

( m∑

t=1

E[QtPR&BO])/( m∑

t=1

µtNew

), (53)

where µmCum,PR&BO, T mPR&BO,κ1, and T mPR&BO,κ2

are given in(44), (46), and (47), respectively.

For each RA scheme, the network is considered stable if arandomly selected queue is finite, which requires the packetsarrival rate to be less than the service rate. In other words,the stability only occurs when the queue distribution reachesa steady state. Therefore, the stability condition is related tothe average queue length, which is given by

limm→+∞

(E[Qm]− E[Qm−1]) ≈ 0. (54)

VI. NUMERICAL RESULTSIn this section, we validate the derived analytical results

via independent system level simulations. The BSs and IoTdevices are deployed via independent PPPs in a 400 km2 area,and each IoT device associated with its closest BS and transmitwith the channel inversion power control policy. Note that wesimulate the real buffer at each IoT device to capture the pack-ets accumulated process evolved over time. In each time slot,IoT devices randomly move to a new position, and the activeones randomly choose a preamble for the current RA attempt.In all figures of this section, “Analytical” and “Simulation”

Page 13: Analyzing Random Access Collisions in Massive IoT Networks

13

are abbreviated as “Ana.” and “Sim.”, respectively. Unlessotherwise stated, we choose the same new packets arrival ratefor each time slot (µ1

New = µ2New = · · · = µmNew = 0.1

packets/time slot), σ2 = −90 dBm, ρ = −90 dBm, γth = 1(0 dB), α = 4, λB = 10 BS/km2. Unless otherwise stated, weconsider tBO = 1 for the schemes with the back-off policy(i.e., BO, ACB&BO, and PR&BO scheme), PACB = 0.8 forthe schemes with the ACB policy (i.e., ACB&BO, and ACBscheme), and the power level unit κ1 = 1 as well as themaximum allowable power level unit κJ = κ2 = 10 for theschemes with the PR policy (i.e., PR and PR&BO scheme).

0 10 15 20 25 30time slot

0.77

0.78

0.79

0.8

0.81

0.82

0.83

RA

Succ

ess

Pro

bab

ilit

y

(a) RA Success Probability

Ana.Sim.BOSim.ACBSim.ACB&BOSim.PRBOSim.PR

5

0 10 15 20 25 30time slot

0.02

0.04

0.06

0.08

0.1

0.12

0.14

Av

erag

e Q

ueu

e L

eng

th

(b) Average Queue Length

Ana.Sim.BOSim.ACBSim.ACB&BOSim.PRBOSim.PR

5

Fig. 5: The RA success probability and the average queue length when γth = −10 dB.

Fig. 5 and Fig. 6 plot the RA success probability and theaverage queue length with five RA schemes within the 30time slots when γth = −10dB and γth = 0dB, respectively.The density ratios between IoT devices transmitting the samepreamble and BSs is set as λDp/λB = 1. The analyticalcurves of the PR scheme PmPR,ALL and the PR&BO schemePmPR&BO,ALL are plotted using (14) and (43), and the ana-lytical curves of the ACB&BO, ACB, and BO schemes areall plotted using (37). The close match between the analyt-ical curves and simulation points validates the accuracy ofdeveloped spatio-temporal mathematical framework. We firstobserve that for all RA schemes, the RA success probabilitiesin Fig. 5(a) outperform those in Fig. 6(a). This is due tothat the lower SINR threshold leading to higher preambletransmission success probability. The stability condition isgiven in (54). As can be seen in Fig. 5(b), all of the schemes

can reach stability. The average queue lengths follow PR>PR&BO>BO>ACB>ACB&BO, which shed lights on thebuffer flushing capability of each scheme in this networkcondition. In Fig. 6(b), we observe that the RA successprobabilities of the PR&BO and the PR schemes can reachstability, rather than the other three schemes. This is due to thatthe PR policy provides higher RA success probabilities (i.e., asshow in Fig. 6(a), and thus provides faster buffer flushing thatcan maintain the average accumulated packets in an acceptablelevel.

0 10 15 20 25 30time slot

0.15

0.2

0.25

0.3

0.35

0.4

0.45

RA

Succ

ess

Pro

bab

ilit

y

(a) RA Success Probability

Ana.Sim.BOSim.ACBSim.ACB&BOSim.PRBOSim.PR

5

0 10 15 20 25 30time slot

0

0.2

0.4

0.6

0.8

1

1.2

Av

erag

e Q

ueu

e L

eng

th

(b) Average Queue Length

Ana.Sim.BOSim.ACBSim.ACB&BOSim.PRBOSim.PR

5

Fig. 6: The RA success probability and the average queue length when γth = 0 dB.

Interestingly, in both Fig. 5(a) and Fig. 6(a), theRA success probabilities follow the performancePR&BO≈PRACB&BO>BO>ACB. The PR&BO schemeand the PR scheme outperform the other schemes due tothat the deferred packets are favored by stepping up thetransmit power, which significantly increases the preambletransmission success probability. The consistent performancefollowing ACB&BO>BO>ACB is due to that higherprobability of an RA attempt being deferred in the IoT devicesite leads to less interference and collision probability (i.e.,the RA success probabilities are lower than 50% leading tomore than half IoT devices deferring their RA attempts in theBO and ACB&BO scheme, but the ACB scheme leads to onlyabout 20% deferring their RA attempts (i.e., PACB = 0.8),and thus the probabilities of deferring RA attempt followsACB&BO>BO>ACB).

Fig. 7 plots the RA success probabilities of the PR, BO, and

Page 14: Analyzing Random Access Collisions in Massive IoT Networks

14

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

0.18

0.2

RA

Su

cces

s P

rob

abil

ity

5 10 15 20 25 302

1k

lDp=3

4

5

Ana.Sim.

(a) The PR scheme

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

0.18

0.2

RA

Su

cces

s P

robab

ilit

y

Ana.Sim.

0 1 2 3 4tBO

lDp=3

4

5

(b) The BO scheme

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

0.16

0.18

0.2

RA

Su

cces

s P

rob

abil

ity

Ana.Sim.

lDp=3

4

5

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.81−PACB

(c) The ACB schemeFig. 7: RA success probability in the 10th time slot with the PR, BO, and ACB scheme.

0.50

0.55

0.60

0.65

0.70

0.75

0.80

0.85

0.90

0.95

1

Aver

age

Queu

e L

ength

5 10 15 20 25 302

1k

lDp=

Ana.Sim.

5

4

3

(a) The PR scheme

0.50

0.55

0.60

0.65

0.70

0.75

0.80

0.85

0.90

0.95

1

Aver

age

Queu

e L

ength

0 1 2 3 4tBO

Ana.Sim.

lDp=5

4

3

(b) The BO scheme

0.50

0.55

0.60

0.65

0.70

0.75

0.80

0.85

0.90

0.95

1

Aver

age

Queu

e L

ength

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.81−PACB

5

4

3

lDp=

Ana.Sim.

(c) The ACB schemeFig. 8: Average queue length over 10 time slots with the PR, BO, and ACB scheme.

5 10 15 20 25 302

1k

3.0

3.2

3.4

3.6

3.8

4.0

4.2

4.4

4.6

4.8

5.0

Av

erag

e W

aiti

ng

Del

ay 5

4

3

lDp=

Ana.Sim.

(a) The PR scheme

3.0

3.2

3.4

3.6

3.8

4.0

4.2

4.4

4.6

4.8

5.0

Aver

age

Wai

ting D

elay

0 1 2 3 4tBO

5

4

3

lDp= Ana.Sim.

(b) The BO scheme

3.0

3.2

3.4

3.6

3.8

4.0

4.2

4.4

4.6

4.8

5.0

Aver

age

Wai

ting D

elay

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.81−PACB

5

4

3

lDp= Ana.Sim.

(c) The ACB schemeFig. 9: Average Waiting delay over 10 time slots with the PR, BO, and ACB scheme.

ACB schemes in the 10th time slot versus the number of powerlevel unit κ2 (the PR scheme with J = 2), the back-off factortBO, and the non-ACB probability 1−PACB, respectively. InFig. 7(a), the RA success probabilities increase with increasingκ2 until reaching the performance ceilings, due to that theaverage SINR2/SINR1 in Table I are much larger/smaller thanthe SINR threshold, which leads to slow increasing trend ofpreamble transmission success probability and slow decreasingtrend of collision probability. Fig. 7(b) and (c) show that theRA success probabilities increase with increasing tBO and1 − PACB, due to that the increasing number of IoT devices

deferring access requests leads to the reduction in interferenceand collision probability.

Fig. 8 and Fig. 9 plot the average queue length E[Q10]and the average waiting delay E[D10] over 10 time slots ofthe PR, BO, and ACB schemes using (48) and (49) (i.e., thePR scheme), as well as (50) and (51) (i.e., the BO and ACBschemes), respectively. As expected, in Fig. 8 (a) and Fig. 9(a), the average queue length and the average waiting delaydecrease with increasing κ2 until reaching the performancefloors. In Fig. 8 (b) and (c), and Fig. 9 (b) and (c), we can seethat the average queue length and the average waiting delay

Page 15: Analyzing Random Access Collisions in Massive IoT Networks

15

RA

Su

cces

s P

robab

ilit

y

0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

1 2 3 4 5 6 7 8 9 10lDp/lB

Sim.PR&BO

Sim.PRSim.BO

Sim.ACB&BOSim.ACB

Ana.

(a) RA success probability

1 2 3 4 5 6 7 8 9 100.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Aver

age

Queu

e L

ength

lDp/lB

Sim.PR&BO

Sim.PRSim.BO

Sim.ACB&BOSim.ACB

Ana.

(b) Average queue length

1 2 3 4 5 6 7 8 9 101

1.5

2

2.5

3

3.5

4.5

5

5.5

Aver

age

Wai

ting D

elay

4

Sim.PR&BO

Sim.PRSim.BO

Sim.ACB&BOSim.ACB

Ana.

lDp/lB

(c) Average waiting delayFig. 10: RA success probability at the 10th time slot, and the average queue length as well as the average waiting delay over 10 time slots with five RA schemes

first decrease and achieve the lowest value, and then graduallyincrease. The first decreasing trends of the average queuelength and waiting delay are mainly due to the increasingnumber of IoT devices deferring their access requests, whichincreases the RA success probabilities, and then the followingincreasing trends are mainly due to that the continuouslyincreasing number of IoT devices deferring access requestsleads to the reduction in channel resources utilization. Forinstance, the ACB scheme with a small PACB can providerelatively high RA success probability sacrificing that a largeproportion of IoT devices blocks their packets by deferringaccess requests, which leads to low packets serving rate andlarge number of packets accumulated in buffers.

Fig. 10 plots the RA success probabilities at the10th time slot, and the average queue length as wellas the average waiting delay over 10 time slots withfive RA schemes versus the density ratio λDp/λB . InFig. 10(a), we observe that the RA success prob-abilities follow PR&BO>PR>ACB&BO>BO>ACB andthen PR&BO>ACB&BO>BO>PR>ACB before and afterλDp/λB = 4. As expected, the RA success probability ofthe PR scheme decreases rapidly, due to that it does notdefer any access requests in any network condition, whichleads to the most rapid increasing interference and collisionprobability. In Fig. 10(b) and (c), the RA success probabilitiesof the PR and PR&BO schemes always outperform otherschemes, due to that the advantages of PR policy (i.e. asexplained in Fig. 5 and Fig. 6) leads to faster buffer flushing(i.e., the speed of packets been served and removed from thebuffer) than other schemes. The average queue length andthe average waiting delay of schemes with PR policy followPR<PR&BO and then PR>PR&BO before and after certaindensity ratios, due to that the BO policy leads to the reductionin channel resources utilization in the low density ratio region,however after certain density ratios, the increasing density ratioincreases traffic burden that leads to higher interference andcollision probability severely degrading those performances,and thus the BO policy becomes efficient by deferring accessrequests to control traffic. As seen from Fig. 10(a), (b), and (c),all the performance of the schemes without PR policy followACB>BO>ACB&BO and then ACB<BO<ACB&BO before

and after a density ratio, which can also be explained by thesame reason that the efficiency of traffic control improves withincreasing the density ratio.

VII. CONCLUSIONIn this paper, we developed a spatio-temporal mathematical

model to analyze the contention-based RA in the mIoT net-work by taking into account the SINR outage problem as wellas the collision problem. We derived the exact expressions forthe RA success probability, the average queue length, and theaverage waiting delay in each time slot with the PR, ACB, BO,ACB&BO, and PR&BO schemes. In the light traffic scenario,the PR scheme outperforms other schemes in terms of theaverage queue length and the average waiting delay, due toits relatively high RA success probability and no deferring ofaccess requests leading to high utilization of channel resources.In the heavy traffic scenario, the PR&BO scheme outperformsother schemes in terms of RA success probability, the averagequeue length, and the average waiting delay, due to that it canmaintain the efficiency of the PR policy by releasing the trafficburden in the network via BO policy.

APPENDIX AA PROOF OF LEMMA 2

Using the Bayes’ theorem [40, Eq. 2-44], the PDF of thearea size of the Voronoi cell X conditioning on N1 = n1 is

P[X = x

∣∣N1 = n1]

=P[N1 = n1

∣∣X= x]P[X= x

]

P[N1 = n1

] . (A.1)

In (A.1), P [N1 = n1 |X= x ] is the PMF of the number ofinterfering IoT devices N1 in a cell conditioning on the areasize of the cell X = x, presented as

P [N1 = n1 |X= x ] =(TPR,κ1

λDpx)n1

Γ (n1 + 1)e−TPR,κ1λDpx,

(A.2)

P [X= x] is the PDF of the size of a voronoi cell that arandomly chosen IoT device belongs to, given in [35, Lamma2]

P [X= x] = λBcc+1

Γ(c+ 1)(λBx)

ce−(λBcx), (A.3)

Page 16: Analyzing Random Access Collisions in Massive IoT Networks

16

and P [N1 = n1] is the PMF of N1 number of interfering IoTdevices transmitting with the power level unit κ1 in the voronoicell selected by the randomly chosen IoT device, given as [35,Eq.(3)]

P N1 = n1 =c(c+1)Γ(n+ c+ 1)(

TPR,κ1λDpλB

)n1

Γ(c+ 1)Γ(n1 + 1)(TPR,κ1λDp

λB+ c)

n1+c+1 .

(A.4)

Substituting (A.2), (A.3), and (A.4) into (A.1), we verified(10) in Lemma 2.

APPENDIX BA PROOF OF THEOREM 2

Using the law of the total probability [40, Eq. 2-80], thePMF of N2 number of IoT devices transmitting with the powerlevel unit κ2 in a Voronoi cell conditioning on N1 = n1 isexpressed as

P [N2 = n2 |N1 = n1 ] =∫ ∞

0

P [N2 = n2 |X= x]P [X = x |N1 = n1 ] dx. (B.1)

Substituting (10) and (A.2) into (B.1), we obtain

P [N2 = n2 |N1 = n1 ]

=(TPR,κ2

λDp)n2(TPR,κ1

λDp + cλB)n1+c+1

Γ (n2 + 1) Γ (n1 + c+ 1)×

∫ ∞

0

x(n2+n1+c)e−(TPR,κ2λDp+TPR,κ1

λDp+λBc)xdx

=(TPR,κ2

λDp)n2(TPR,κ1

λDp + cλB)n1+c+1

Γ (n2 + 1) Γ (n1 + c+ 1)×

Lx(n2+n1+c) (TPR,κ2λDp + TPR,κ1

λDp + λBc)

=Γ (n2 + n1 + c+ 1)

Γ (n2 + 1) Γ (n1 + c+ 1)×

(TPR,κ2λDp)n2(TPR,κ1λDp + cλB)

n1+c+1

(TPR,κ2λDp + TPR,κ1

λDp + λBc)n2+n1+c+1 . (B.2)

REFERENCES

[1] N. Jiang, Y. Deng, A. Nallanathan, X. Kang, and T. Q. Quek, “Collisionanalysis of mIot network with power ramping scheme,” in IEEE Int.Conf. Commun. (ICC), Kansas City, MO, USA, May. 2018, pp. 1–7.

[2] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things(IoT): A vision, architectural elements, and future directions,” FutureGener. Comp. Sy., vol. 29, no. 7, pp. 1645–1660, Sep. 2013.

[3] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, andM. Ayyash, “Internet of things: A survey on enabling technologies,protocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17, no. 4,pp. 2347–2376, Nov. 2015.

[4] A. Ksentini, Y. Hadjadj-Aoul, and T. Taleb, “Cellular-based machine-to-machine: overload control,” IEEE Netw., vol. 26, no. 6, pp. 54–60,Nov. 2012.

[5] “Study on RAN improvements for machine-type communications,”3GPP, Sophia, Antipolis, France, TR 37.868 V11.0.0,, Sep. 2011.

[6] A. Laya, L. Alonso, and J. Alonso-Zarate, “Is the random access channelof LTE and LTE-A suitable for M2M communications? a survey ofalternatives.” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 4–16,Jan. 2014.

[7] I. Leyva-Mayorga, L. Tello-Oquendo, V. Pla, J. Martinez-Bauset, andV. Casares-Giner, “Performance analysis of access class barring forhandling massive M2M traffic in LTE-A networks,” in Int. Conf.Commun. (ICC). IEEE, 2016, pp. 1–6.

[8] M. Hasan, E. Hossain, and D. Niyato, “Random access for machine-to-machine communication in LTE-advanced networks: issues and ap-proaches,” IEEE Commun. Mag., vol. 51, no. 6, pp. 86–93, Jun. 2013.

[9] E. Dahlman, S. Parkvall, and J. Skold, 4G: LTE/LTE-advanced formobile broadband. Academic press, 2013.

[10] S. Duan, V. Shah-Mansouri, and V. W. Wong, “Dynamic access classbarring for M2M communications in LTE networks,” in IEEE GlobalCommun. Conf. (GLOBECOM), Dec. 2013, pp. 4747–4752.

[11] S.-Y. Lien, T.-H. Liau, C.-Y. Kao, and K.-C. Chen, “Cooperative accessclass barring for machine-to-machine communications,” IEEE Trans.Wireless Commun., vol. 11, no. 1, pp. 27–32, Jan. 2012.

[12] M. I. Hossain, A. Azari, and J. Zander, “DERA: Augmented randomaccess for cellular networks with dense H2H-MTC mixed traffic,” inIEEE Global Commun. Conf. (GLOBECOM) Workshops, Dec. 2016,pp. 1–7.

[13] Y. Yang and T.-S. Yum, “Analysis of power ramping schemes for UTRA-FDD random access channel,” IEEE Trans. Wireless Commu., vol. 4,no. 6, pp. 2688–2693, Nov. 2005.

[14] J. Misic and V. B. Misic, “To shout or not to shout: Performance ofpower ramping during random access in LTE/LTE-A,” in IEEE GlobalCommun. Conf. (GLOBECOM), Dec. 2016, pp. 1–6.

[15] A. Azari, “Energy-efficient scheduling and grouping for machine-typecommunications over cellular networks,” Ad Hoc Netw., vol. 43, pp.16–29, 2016.

[16] A. Laya, C. Kalalas, F. Vazquez-Gallego, L. Alonso, and J. Alonso-Zarate, “Goodbye, aloha!” IEEE access, vol. 4, pp. 2029–2044, 2016.

[17] M. N. Soorki, W. Saad, M. H. Manshaei, and H. Saidi, “Stochastic coali-tional games for cooperative random access in M2M communications,”IEEE Trans. Wireless Commun., Jun. 2017.

[18] H. M. Gursu, M. Vilgelm, W. Kellerer, and M. Reisslein, “Hybridcollision avoidance-tree resolution for M2M random access,” IEEETrans. Aerosp. Electron. Syst., Mar. 2017.

[19] M. Gharbieh, H. ElSawy, A. Bader, and M.-S. Alouini, “Spatiotemporalstochastic modeling of IoT enabled cellular networks: Scalability andstability analysis,” IEEE Trans. Commun., May. 2017.

[20] Y. Zhong, M. Haenggi, T. Q. Quek, and W. Zhang, “On the stability ofstatic poisson networks under random access,” IEEE Trans. Commun.,vol. 64, no. 7, pp. 2985–2998, Jul. 2016.

[21] N. Jiang, Y. Deng, X. Kang, and A. Nallanathan, “Random accessanalysis for massive IoT networks under a new spatio-temporal model:A stochastic geometry approach,” IEEE Trans. Commu., 2018.

[22] C. Anton-Haro and M. Dohler, Machine-to-machine (M2M) communi-cations: architecture, performance and applications. Elsevier Press,2014.

[23] G.-Y. Lin, S.-R. Chang, and H.-Y. Wei, “Estimation and adaptation forbursty LTE random access,” IEEE Trans. Veh. Technol., vol. 65, no. 4,pp. 2560–2577, Apr. 2016.

[24] T. D. Novlan, H. S. Dhillon, and J. G. Andrews, “Analytical modelingof uplink cellular networks,” IEEE Trans. Wireless Commun., vol. 12,no. 6, pp. 2669–2679, Jun. 2013.

[25] Y. Deng, L. Wang, S. A. R. Zaidi, J. Yuan, and M. Elkashlan, “Artificial-noise aided secure transmission in large scale spectrum sharing net-works,” IEEE Trans. Commun., vol. 64, no. 5, pp. 2116–2129, May.2016.

[26] Y. Deng, L. Wang, M. Elkashlan, A. Nallanathan, and R. K. Mallik,“Physical layer security in three-tier wireless sensor networks: Astochastic geometry approach,” IEEE Trans. Inf. Forensics Security,vol. 11, no. 6, pp. 1128–1138, Jun. 2016.

[27] S. Akbar, Y. Deng, A. Nallanathan, M. Elkashlan, and A.-H. Aghvami,“Simultaneous wireless information and power transfer in K-tier het-erogeneous cellular networks,” IEEE Trans. Wireless Commun., vol. 15,no. 8, pp. 5804–5818, Aug. 2016.

[28] Y. Deng, L. Wang, M. Elkashlan, M. Di Renzo, and J. Yuan, “Mod-eling and analysis of wireless power transfer in heterogeneous cellularnetworks,” IEEE Trans. Commun., vol. 64, no. 12, pp. 5290–5303, Dec.2016.

[29] H. ElSawy and E. Hossain, “On stochastic geometry modeling of cellularuplink transmission with truncated channel inversion power control,”IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4454–4469, Aug.2014.

[30] L. Chen, W. Chen, X. Zhang, and D. Yang, “Analysis and simulation forspectrum aggregation in LTE-advanced system,” in 70th Veh. Technol.Conf. (VTC Fall). IEEE, 2009, pp. 1–6.

[31] A. G. Gotsis, A. S. Lioumpas, and A. Alexiou, “Evolution of packetscheduling for machine-type communications over LTE: algorithmicdesign and performance analysis,” in IEEE Global Commun. Conf.(GLOBECOM). IEEE, Dec. 2012, pp. 1620–1625.

[32] K. Zhou, N. Nikaein, and T. Spyropoulos, “LTE/LTE-A discontinuousreception modeling for machine type communications,” IEEE Commun.Lett., vol. 2, no. 1, pp. 102–105, Feb. 2013.

Page 17: Analyzing Random Access Collisions in Massive IoT Networks

17

[33] G. Gow and R. Smith, Mobile and wireless communications: an intro-duction. McGraw-Hill Education (UK), 2006.

[34] M. Haenggi, Stochastic geometry for wireless networks. Cambridge,U.K.: Cambridge University Press, 2012.

[35] S. M. Yu and S. L. Kim, “Downlink capacity and base station density incellular networks,” in Proc. Int. Symp. Modeling Mobile Ad Hoc WiOptNetw., May. 2013, pp. 119–124.

[36] H. ElSawy, A. Sultan-Salem, M.-S. Alouini, and M. Z. Win, “Modelingand analysis of cellular networks using stochastic geometry: A tutorial,”IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 167–203, Jan. 2017.

[37] J.-S. Ferenc and Z. Neda, “On the size distribution of Poisson Voronoicells,” Phys. A: Statistical mech. appl., vol. 385, no. 2, pp. 518–526,Nov. 2007.

[38] M. Chen, X. Fan, M. N. Murthi, T. D. Wickramarathna, and K. Pre-maratne, “Normalized queueing delay: congestion control jointly utiliz-ing delay and marking,” IEEE/ACM Trans. Netw., vol. 17, no. 2, pp.618–631, Apr. 2009.

[39] A. S. Alfa, Queueing theory for telecommunications: discrete timemodelling of a single node system. New York, USA: Springer Press,2010.

[40] A. Papoulis and S. U. Pillai, Probability, random variables, and stochas-tic processes. McGraw-Hill Education Press, 2002.

Nan Jiang (S’16) is currently working toward thePh.D. degree in electronic engineering at QueenMary University of London, London, U.K.

His research interests include internet of things,machine learning, and radio resource management.

Yansha Deng (S’13-M’18) is currently a Lecturer(Assistant Professor) in department of Informatics,Kings College London, U. K. She received the Ph.D.degree in Electrical Engineering from the QueenMary University of London, UK in 2015. From2015 to 2017, she was a Post-Doctoral ResearchFellow with Kings College London, UK. Her re-search interests include molecular communication,internet of things, and 5G wireless networks. Shewas a recipient of the Best Paper Awards from ICC2016 and Globecom 2017 as the first author. She

is currently an Editor of IEEE Transactions on Communications and IEEECommunication Letters. She also received Exemplary Reviewer for the IEEETransactions on Communications in year 2016 and 2017. She has also servedas TPC member for many IEEE conferences, such as IEEE GLOBECOM andICC.

Arumugam Nallanathan (S’97-M’00-SM’05-F’17)is Professor of Wireless Communications and Headof the Communication Systems Research (CSR)group in the School of Electronic Engineering andComputer Science at Queen Mary University ofLondon since September 2017. He was with theDepartment of Informatics at King’s College Londonfrom December 2007 to August 2017, where he wasProfessor of Wireless Communications from April2013 to August 2017 and a Visiting Professor fromSeptember 2017. He was an Assistant Professor in

the Department of Electrical and Computer Engineering, National Universityof Singapore from August 2000 to December 2007. His research interestsinclude 5G Wireless Networks, Internet of Things (IoT) and MolecularCommunications. He published nearly 400 technical papers in scientificjournals and international conferences. He is a co-recipient of the Best PaperAwards presented at the IEEE International Conference on Communications2016 (ICC’2016) , IEEE Global Communications Conference 2017 (GLOBE-COM’2017) and IEEE Vehicular Technology Conference 2018 (VTC’2018).He is an IEEE Distinguished Lecturer. He has been selected as a Web ofScience Highly Cited Researcher in 2016.

Xin Kang (S’08-M’11) received his B.Eng degree inElectrical Engineering from Xi’an Jiaotong Univer-sity, China, in 2005. He received his Ph.D. degree inElectrical and Computer Engineering from NationalUniversity of Singapore, Singapore, in 2011. Hewas a research scientist at Institute for InfocommResearch (I2R), A*STAR, Singapore, from 2011 to2014. At the end of 2014, he joined Shield Lab,Huawei Singapore as a senior researcher. From July2016, he has joined University of Electronic Scienceand Technology of China as a full professor. His re-

search interests include massive IoT, eV2X, energy harvesting, data offloading,cognitive radio, network optimization, game theory, and 5G security protocoldesign.

Tony Q.S. Quek (S’98-M’08-SM’12-F’18) receivedthe B.E. and M.E. degrees in electrical and electron-ics engineering from the Tokyo Institute of Technol-ogy, Tokyo, Japan, in 1998 and 2000, respectively,and the Ph.D. degree in electrical engineering andcomputer science from the Massachusetts Instituteof Technology, Cambridge, MA, USA, in 2008.Currently, he is a tenured Associate Professor withthe Singapore University of Technology and Design(SUTD). He also serves as the Acting Head of ISTDPillar and the Deputy Director of the SUTD-ZJU

IDEA. His current research topics include wireless communications andnetworking, internet-of-things, network intelligence, wireless security, and bigdata processing.

Dr. Quek has been actively involved in organizing and chairing sessions,and has served as a member of the Technical Program Committee as well assymposium chairs in a number of international conferences. He is currentlyan elected member of IEEE Signal Processing Society SPCOM TechnicalCommittee. He was an Executive Editorial Committee Member for theIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, an Editor forthe IEEE TRANSACTIONS ON COMMUNICATIONS, and an Editor for theIEEE WIRELESS COMMUNICATIONS LETTERS. He is a co-author of thebook “Small Cell Networks: Deployment, PHY Techniques, and ResourceAllocation” published by Cambridge University Press in 2013 and the book“Cloud Radio Access Networks: Principles, Technologies, and Applications”by Cambridge University Press in 2017.

Dr. Quek was honored with the 2008 Philip Yeo Prize for OutstandingAchievement in Research, the IEEE Globecom 2010 Best Paper Award, the2012 IEEE William R. Bennett Prize, the 2015 SUTD Outstanding EducationAwards – Excellence in Research, the 2016 IEEE Signal Processing SocietyYoung Author Best Paper Award, the 2017 CTTC Early Achievement Award,the 2017 IEEE ComSoc AP Outstanding Paper Award, and the 2017 ClarivateAnalytics Highly Cited Researcher. He is a Distinguished Lecturer of the IEEECommunications Society and a Fellow of IEEE.