{"id":"https://openalex.org/W2773463326","doi":"https://doi.org/10.1109/smc.2017.8123041","title":"Dynamic extended access barring for improved M2M communication in LTE-A networks","display_name":"Dynamic extended access barring for improved M2M communication in LTE-A networks","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2773463326","doi":"https://doi.org/10.1109/smc.2017.8123041","mag":"2773463326"},"language":"en","primary_location":{"id":"doi:10.1109/smc.2017.8123041","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc.2017.8123041","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050333970","display_name":"Hyun Dong Kim","orcid":"https://orcid.org/0000-0003-2599-7137"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"HyunDong Kim","raw_affiliation_strings":["Department of Computer Science, Yonsei University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Yonsei University, Seoul, Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056857361","display_name":"Seung-seob Lee","orcid":"https://orcid.org/0000-0002-5224-8599"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seung-seob Lee","raw_affiliation_strings":["Department of Computer Science, Yonsei University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Yonsei University, Seoul, Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101964277","display_name":"SuKyoung Lee","orcid":"https://orcid.org/0000-0002-3497-3295"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"SuKyoung Lee","raw_affiliation_strings":["Department of Computer Science, Yonsei University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Yonsei University, Seoul, Korea","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050333970"],"corresponding_institution_ids":["https://openalex.org/I193775966"],"apc_list":null,"apc_paid":null,"fwci":1.1467,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.80631608,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"71","issue":null,"first_page":"2742","last_page":"2747"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8081392049789429},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.762881875038147},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7319285869598389},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7180529236793518},{"id":"https://openalex.org/keywords/machine-to-machine","display_name":"Machine to machine","score":0.6623459458351135},{"id":"https://openalex.org/keywords/random-access","display_name":"Random access","score":0.6577836275100708},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5664623975753784},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.5045140981674194},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4572652280330658},{"id":"https://openalex.org/keywords/radio-access-network","display_name":"Radio access network","score":0.43727922439575195},{"id":"https://openalex.org/keywords/access-network","display_name":"Access network","score":0.42643100023269653},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.3957502245903015},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35264644026756287},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1500261425971985},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.10508373379707336},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.10466784238815308},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09993165731430054},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06498554348945618}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8081392049789429},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.762881875038147},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7319285869598389},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7180529236793518},{"id":"https://openalex.org/C76763059","wikidata":"https://www.wikidata.org/wiki/Q251072","display_name":"Machine to machine","level":3,"score":0.6623459458351135},{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.6577836275100708},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5664623975753784},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5045140981674194},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4572652280330658},{"id":"https://openalex.org/C106365562","wikidata":"https://www.wikidata.org/wiki/Q3078360","display_name":"Radio access network","level":4,"score":0.43727922439575195},{"id":"https://openalex.org/C62793504","wikidata":"https://www.wikidata.org/wiki/Q228327","display_name":"Access network","level":2,"score":0.42643100023269653},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3957502245903015},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35264644026756287},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1500261425971985},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.10508373379707336},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.10466784238815308},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09993165731430054},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06498554348945618},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C207029474","wikidata":"https://www.wikidata.org/wiki/Q384018","display_name":"Mobile station","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc.2017.8123041","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc.2017.8123041","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1490674876","https://openalex.org/W1971698822","https://openalex.org/W1991828063","https://openalex.org/W1991996397","https://openalex.org/W2001565360","https://openalex.org/W2042604976","https://openalex.org/W2058915081","https://openalex.org/W2105103777","https://openalex.org/W2110767187","https://openalex.org/W2123899238","https://openalex.org/W2478503558"],"related_works":["https://openalex.org/W2023211731","https://openalex.org/W1996551586","https://openalex.org/W2168189133","https://openalex.org/W2108901500","https://openalex.org/W2762817092","https://openalex.org/W2095904812","https://openalex.org/W2514883743","https://openalex.org/W2001565360","https://openalex.org/W2042604976","https://openalex.org/W2552539840"],"abstract_inverted_index":{"Machine-to-machine":[0],"(M2M)":[1],"communication":[2,26,42,91],"is":[3,20,59,117],"an":[4],"up-and-coming":[5],"technology":[6],"for":[7,23],"Internet":[8],"of":[9,33,56,79,102],"Things.":[10],"However,":[11],"current":[12],"wireless":[13],"cellular":[14],"network":[15,48],"such":[16],"as":[17],"LTE-A":[18],"that":[19,127],"originally":[21],"designed":[22],"human-to-human":[24],"(H2H)":[25],"falls":[27],"short":[28],"in":[29,95,105],"supporting":[30],"massive":[31],"number":[32,78],"bursty":[34],"random":[35,46],"access":[36,47],"(RA)":[37],"requests":[38,81],"from":[39],"machine":[40],"type":[41],"(MTC)":[43],"devices.":[44],"Specifically,":[45],"(RAN)":[49],"overload":[50],"due":[51],"to":[52,75,82],"the":[53,77,84,89,107,123,128,133],"huge":[54],"amount":[55],"MTC":[57,93],"devices":[58,94,104],"a":[60,68],"critical":[61],"issue.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66,97],"propose":[67],"Dynamic":[69],"Extended":[70,109],"Access":[71,110],"Barring":[72,111],"(DEAB)":[73],"scheme":[74,116,121,130],"regulate":[76],"RA":[80,99],"mitigate":[83],"RAN":[85],"overload.":[86],"By":[87],"utilizing":[88],"direct":[90],"between":[92],"M2M,":[96],"exploit":[98],"success":[100],"rates":[101],"neighbour":[103],"choosing":[106],"optimal":[108],"(EAB)":[112],"parameters.":[113],"The":[114],"DEAB":[115],"evaluated":[118],"against":[119],"EAB":[120],"and":[122],"simulation":[124],"results":[125],"show":[126],"proposed":[129],"significantly":[131],"outperforms":[132],"EAB.":[134]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
