{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:27:33Z","timestamp":1760239653391,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2020,12,27]],"date-time":"2020-12-27T00:00:00Z","timestamp":1609027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Non-orthogonal multiple access schemes with grant free access have been recently highlighted as a prominent solution to meet the stringent requirements of massive machine-type communications (mMTCs). In particular, the multi-user shared access (MUSA) scheme has shown great potential to grant free access to the available resources. For the sake of simplicity, MUSA is generally conducted with the successive interference cancellation (SIC) receiver, which offers a low decoding complexity. However, this family of receivers requires sufficiently diversified received user powers in order to ensure the best performance and avoid the error propagation phenomenon. The power allocation has been considered as a complicated issue especially for a decentralized decision with a minimum signaling overhead. In this paper, we propose a novel algorithm for an autonomous power decision with a minimal overhead based on a tight approximation of the bit error probability (BEP) while considering the error propagation phenomenon. We investigate the efficiency of multi-armed bandit (MAB) approaches for this problem in two different reward scenarios: (i) in Scenario 1, each user reward only informs about whether its own packet was successfully transmitted or not; (ii) in Scenario 2, each user reward may carry information about the other interfering user packets. The performances of the proposed algorithm and the MAB techniques are compared in terms of the successful transmission rate. The simulation results prove that the MAB algorithms show a better performance in the second scenario compared to the first one. However, in both scenarios, the proposed algorithm outperforms the MAB techniques with a lower complexity at user equipment.<\/jats:p>","DOI":"10.3390\/s21010116","type":"journal-article","created":{"date-parts":[[2020,12,27]],"date-time":"2020-12-27T20:52:21Z","timestamp":1609102341000},"page":"116","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Autonomous Power Decision for the Grant Free Access MUSA Scheme in the mMTC Scenario"],"prefix":"10.3390","volume":"21","author":[{"given":"Wissal","family":"Ben Ameur","sequence":"first","affiliation":[{"name":"INSA Rennes, CNRS, IETR, University Rennes, 35000 Rennes, France"},{"name":"Orange Labs, 38240 Meylan, France"}]},{"given":"Philippe","family":"Mary","sequence":"additional","affiliation":[{"name":"INSA Rennes, CNRS, IETR, University Rennes, 35000 Rennes, France"}]},{"given":"Jean-Fran\u00e7ois","family":"H\u00e9lard","sequence":"additional","affiliation":[{"name":"INSA Rennes, CNRS, IETR, University Rennes, 35000 Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5652-2162","authenticated-orcid":false,"given":"Marion","family":"Dumay","sequence":"additional","affiliation":[{"name":"Orange Labs, 38240 Meylan, France"}]},{"given":"Jean","family":"Schwoerer","sequence":"additional","affiliation":[{"name":"Orange Labs, 38240 Meylan, France"}]}],"member":"1968","published-online":{"date-parts":[[2020,12,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"55765","DOI":"10.1109\/ACCESS.2018.2872781","article-title":"5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View","volume":"6","author":"Popovski","year":"2018","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCOM.2017.1600618","article-title":"Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations","volume":"55","author":"Shirvanimoghaddam","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1109\/COMST.2020.2996032","article-title":"Grant-free non-orthogonal multiple access for IoT: A survey","volume":"22","author":"Shahab","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MCOM.2015.7263367","article-title":"Machine-type communications: Current status and future perspectives toward 5G systems","volume":"53","author":"Shariatmadari","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_5","unstructured":"(2020, December 20). NTT Docomo, Uplink Multiple Access Schemes for NR. Available online: https:\/\/www.3gpp.org\/DynaReport\/TDocExMtg--R1-85--31662.htm."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Saito, Y., Kishiyama, Y., Benjebbour, A., Nakamura, T., Li, A., and Higuchi, K. (2013, January 2\u20135). Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access. Proceedings of the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), Dresden, Germany.","DOI":"10.1109\/VTCSpring.2013.6692652"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Nikopour, H., and Baligh, H. (2013, January 8\u201311). Sparse code multiple access. Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK.","DOI":"10.1109\/PIMRC.2013.6666156"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yuan, Z., Yu, G., Li, W., Yuan, Y., Wang, X., and Xu, J. (2016, January 15\u201318). Multi-User Shared Access for Internet of Things. Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China.","DOI":"10.1109\/VTCSpring.2016.7504361"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3185","DOI":"10.1109\/TVT.2016.2596438","article-title":"Pattern Division Multiple Access\u2014A Novel Nonorthogonal Multiple Access for Fifth-Generation Radio Networks","volume":"66","author":"Chen","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Lee, S., Kim, J., Park, J., and Cho, S. (2020). Grant-Free Resource Allocation for NOMA V2X Uplink Systems Using a Genetic Algorithm Approach. Electronics, 9.","DOI":"10.3390\/electronics9071111"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Azari, A., Popovski, P., Miao, G., and Stefanovic, C. (2017, January 4\u20138). Grant-Free Radio Access for Short-Packet Communications over 5G Networks. Proceedings of the GLOBECOM 2017\u20142017 IEEE Global Communications Conference, Singapore.","DOI":"10.1109\/GLOCOM.2017.8255054"},{"key":"ref_12","first-page":"981","article-title":"Grant-Free NOMA with Device Activity Learning Using Long Short-Term Memory","volume":"9","author":"Miao","year":"2020","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Hasan, S.M., Mahata, K., and Hyder, M.M. (2020). Fast Uplink Grant-Free NOMA with Sinusoidal Spreading Sequences. arXiv.","DOI":"10.1109\/TCOMM.2021.3062389"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2436","DOI":"10.1109\/TCOMM.2018.2881120","article-title":"A novel analytical framework for massive grant-free NOMA","volume":"67","author":"Abbas","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1109\/TWC.2019.2950000","article-title":"Iterative receiver design for FTN signaling aided sparse code multiple access","volume":"19","author":"Yuan","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1109\/TWC.2018.2878571","article-title":"Message-passing receiver design for joint channel estimation and data decoding in uplink grant-free SCMA systems","volume":"18","author":"Wei","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_17","unstructured":"Nam, S.H., and Lee, K.B. (2002, January 15\u201318). Transmit power allocation for an extended V-BLAST system. Proceedings of the 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"5855","DOI":"10.1109\/TWC.2019.2939820","article-title":"Fairness and sum-rate maximization via joint subcarrier and power allocation in uplink SCMA transmission","volume":"18","author":"Evangelista","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_19","first-page":"6325","article-title":"Dynamic User Clustering and Power Allocation for Uplink and Downlink Non-Orthogonal Multiple Access (NOMA) Systems","volume":"4","author":"Ali","year":"2016","journal-title":"IEEE Access"},{"key":"ref_20","unstructured":"Kaufmann, E. (2014). Analyse De Strat\u00e9gies Bay\u00e9siennes Et Fr\u00e9quentistes Pour L\u2019allocation S\u00e9quentielle De Ressources. [Ph.D. Thesis, ENST]."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Slivkins, A. (2019). Introduction to multi-armed bandits. arXiv.","DOI":"10.1561\/9781680836219"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Adjif, M.A., Habachi, O., and Cances, J. (2019, January 15\u201318). Joint Channel Selection and Power Control for NOMA: A Multi-Armed Bandit Approach. Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW), Marrakech, Morocco.","DOI":"10.1109\/WCNCW.2019.8902878"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1112","DOI":"10.1109\/LWC.2019.2908371","article-title":"Distributed NOMA-Based Multi-Armed Bandit Approach for Channel Access in Cognitive Radio Networks","volume":"8","author":"Tian","year":"2019","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Feki, A., and Capdevielle, V. (2011, January 11\u201314). Autonomous resource allocation for dense LTE networks: A Multi Armed Bandit formulation. Proceedings of the 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, Toronto, ON, Canada.","DOI":"10.1109\/PIMRC.2011.6140047"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ameur, W.B., Mary, P., Dumay, M., H\u00e9lard, J., and Schwoerer, J. (2019, January 8\u201310). Performance study of MPA, Log-MPA and MAX-Log-MPA for an uplink SCMA scenario. Proceedings of the 2019 26th International Conference on Telecommunications (ICT), Hanoi, Vietnam.","DOI":"10.1109\/ICT.2019.8798841"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Cho, Y.S., Kim, J., Yang, W.Y., and Kang, C.G. (2010). MIMO-OFDM Wireless Communications with MATLAB, John Wiley & Sons.","DOI":"10.1002\/9780470825631"},{"key":"ref_27","unstructured":"Proakis, J.G., and Salehi, M. (2001). Digital Communications, McGraw-Hill."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TWC.2005.847103","article-title":"MMSE reception and successive interference cancellation for MIMO systems with high spectral efficiency","volume":"4","author":"Zanella","year":"2005","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_29","unstructured":"Kennedy, J., and Eberhart, R. (December, January 27). Particle swarm optimization. Proceedings of the ICNN\u201995-International Conference on Neural Networks, Perth, Australia."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Sahab, M.G., Toropov, V.V., and Gandomi, A.H. (2013). A review on traditional and modern structural optimization: Problems and techniques. Metaheuristic Applications in Structures and Infrastructures, Elsevier.","DOI":"10.1016\/B978-0-12-398364-0.00002-4"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Mach. Learn."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Bonnefoi, R., Besson, L., Moy, C., Kaufmann, E., and Palicot, J. (2017, January 20\u201321). Multi-Armed Bandit Learning in IoT Networks: Learning helps even in non-stationary settings. Proceedings of the International Conference on Cognitive Radio Oriented Wireless Networks, Lisbon, Portugal.","DOI":"10.1007\/978-3-319-76207-4_15"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Gupta, N., Granmo, O., and Agrawala, A. (2011, January 18\u201321). Thompson Sampling for Dynamic Multi-armed Bandits. Proceedings of the 2011 10th International Conference on Machine Learning and Applications and Workshops, Honolulu, HI, USA.","DOI":"10.1109\/ICMLA.2011.144"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/1\/116\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:46:38Z","timestamp":1760179598000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/1\/116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,27]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,1]]}},"alternative-id":["s21010116"],"URL":"https:\/\/doi.org\/10.3390\/s21010116","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,12,27]]}}}