ALOHA-NOMA for Massive Machine-to-Machine IoT Communication

Balevi, Eren
Rabee, Faeik T. Al
Gitlin, Richard D.
© 2018 IEEE.This paper proposes a new medium access control (MAC) protocol for Internet of Things (IoT) applications incorporating pure ALOHA with power domain non-orthogonal multiple access (NOMA) in which the number of transmitters are not known as a priori information and estimated with multihypothesis testing. The proposed protocol referred to as ALOHA-NOMA is not only scalable, energy efficient and matched to the low complexity requirements of IoT devices, but it also significantly increases the throughput. Specifically, throughput is increased to 1.27 with ALOHA-NOMA when 5 users can be separated via a SIC (Successive Interference Cancellation) receiver in comparison to the classical result of 0.18 in pure ALOHA. The results further show that there is a greater than linear increase in throughput as the number of active IoT devices increases.
2018 IEEE International Conference on Communications, ICC 2018


A Random Access Scheme for Large Scale 5G/IoT Applications
Balevi, Eren; Gitlin, Richard D. (2018-01-01)
The integration of slotted Aloha with power domain non-orthogonal multiple access (NOMA), dubbed slotted Aloha-NOMA (SAN) can emerge as an appealing MAC protocol to be used for Internet-of-Things (IoT) applications over 5G networks. In this paper, SAN is discussed, and its performance is evaluated in detail. The simulation results demonstrate that the maximum normalized throughput can be increased from 0.37, which is the case for slotted Aloha, to 1 by means of SAN. Specifically, this full throughput effici...
Real-time intrusion detection and prevention system for SDN-based IoT networks
Sarıça, Alper Kaan; Angın, Pelin; Department of Computer Engineering (2021-9)
The significant advances in wireless networks with the 5G networks have made possible a variety of new IoT use cases. 5G and beyond networks will significantly rely on network virtualization technologies such as SDN and NFV. The prevalence of IoT and the large attack surface it has created calls for SDN-based intelligent security solutions that achieve real-time, automated intrusion detection and mitigation. In this thesis, we propose a real-time intrusion detection and mitigation system for SDN, which aims...
An Efficient Constrained mm-Wave Hybrid Massive MIMO Beamforming for JSDM based NOMA
Bayraktar, Murat; Güvensen, Gökhan Muzaffer (2021-06-01)
Massive MIMO and non-orthogonal multiple access (NOMA) are key technologies for next generation wireless systems due to their distinct advantages. We previously proposed a general framework on unification of code-domain NOMA and joint spatial division and multiplexing (JSDM) which is a spatial user-grouping based hybrid beamforming method for massive MIMO. In this paper, we propose a constrained analog beam-former design for JSDM based systems. Moreover, we propose joint group processing for the digital bea...
Differential K-band vector modulator IC design at 180 NM CMOS SOI process
Güngör, Ömer Fevzi; Aydın Çivi, Hatice Özlem; Koçer, Fatih; Department of Electrical and Electronics Engineering (2019)
Massive MIMO and beamforming are technologies that may enable ultrafast 5G network. They are predicted to be used widely in next-generation high capacity communication systems. In the implementation of beamforming and MIMO, the large number of antennas and RF control components are utilized. However; some challenges related to power consumption, control complexity, cost, and size of transceiver have arisen. Vector Modulator (VM) may be one possible effective solution to these challenges because it merges th...
Information-centric sensor networks for cognitive IoT: an overview
Al-Turjman, Fadi M. (2017-02-01)
Information-centric sensor networks (ICSNs) are a paradigm of wireless sensor networks that focus on delivering information from the network based on user requirements, rather than serving as a point-to-point data communication network. Introducing learning in such networks can help to dynamically identify good data delivery paths by correlating past actions and results, make intelligent adaptations to improve the network lifetime, and also improve the quality of information delivered by the network to the ...
Citation Formats
E. Balevi, F. T. A. Rabee, and R. D. Gitlin, “ALOHA-NOMA for Massive Machine-to-Machine IoT Communication,” Missouri, Amerika Birleşik Devletleri, 2018, vol. 2018-May, Accessed: 00, 2022. [Online]. Available: