References [1] A. Aijaz and A. H. Aghvami. “A PRMA based MAC protocol for cognitive machine-to-machine communications”. Presented at Communications (ICC), 2013 IEEE International Conference on. 2013 DOI: 10.1109/ICC.2013.6654955. [2] F. V. Azquez-Gallego, J. Alonso-Zarate, I. Balboteo and L. Alonso. “DPCF-M: A medium access control protocol for dense machine-to-machine area networks with dynamic gateways”. Presented at Signal Processing Advances in Wireless Communications (SPAWC), 2013 IEEE 14th Workshop on. 2013, . DOI: 10.1109/SPAWC.2013.6612098. [3] Chen-Yu Hsu, Chi-Hsien Yen and Chun-Ting Chou. “An adaptive multichannel protocol for large-scale machine-to-machine (M2M) networks”. Presented at Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International. 2013, . DOI: 10.1109/IWCMC.2013.6583731. [4] Chul Wan Park, Duckdong Hwang and Tae-Jin Lee. “Enhancement of IEEE 802.11ah MAC for M2M communications”. Communications Letters, IEEE 18(7), pp. 1151-1154. 2014. . DOI: 10.1109/LCOMM.2014.2323311. [5] Guo Wang, Xiaofeng Zhong, Shunliang Mei and Jing Wang. “An adaptive medium access control mechanism for cellular based machine to machine (M2M) communication”. Presented at Wireless Information Technology and Systems (ICWITS), 2010 IEEE International Conference on. 2010, . DOI: 10.1109/ICWITS.2010.5611820. [6] Huasen Wu, Chenxi Zhu, R. J. La, Xin Liu and Youguang Zhang. “Fast adaptive S-ALOHA scheme for event-driven machine-to-machine communications”. Presented at Vehicular Technology Conference (VTC Fall), IEEE, 2012. DOI: 10.1109/VTCFall.2012.6398917. [7] Y. Liu, C. Yuen, X. Cao, N. U. Hassan, and J. Chen, “Design of a scalable hybrid MAC protocol for heterogeneous M2M networks,” IEEE Internet Things J., vol.1, no.1, pp. 99–111, 2014. [8] A. Lo, Y. W. Law, M. Jacobsson and M. Kucharzak. “Enhanced LTE-advanced random-access mechanism for massive machine-to-machine (M2M) communications”. Presented at 27th World Wireless Research Forum (WWRF) Meeting, 2011. [9] N. K. Pratas, H. Thomsen, C. Stefanovic and P. Popovski. “Code-expanded random access for machine-type communications”. Presented at Globecom Workshops (GC Wkshps), 2012 IEEE. 2012, . DOI: 10.1109/GLOCOMW.2012.6477838. [10] Yi Liu, Chau Yuen, Jiming Chen and Xianghui Cao. “A scalable hybrid MAC protocol for massive M2M networks”. Presented at Wireless Communications and Networking Conference (WCNC), 2013 IEEE. 2013, . DOI: 10.1109/WCNC.2013.6554572. [11] Yu Chen and Wei Wang. “Machine-to-machine communication in LTE-A”. Presented at Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd, 2010. DOI: 10.1109/VETECF.2010.5594218. [12] C.L. Fullmer and J.J. Garcia-Luna-Aceves, “Floor acquisition multiple access (FAMA) for packet-radio networks”, in: Proc. ACM SIGCOMM 95, Cambridge, MA (August 28–September 1, 1995). [13] G. Wang, X. Zhong, S. Mei, and J. Wang, “An adaptive medium access control mechanism for cellular based Machine to Machine (M2M) communication,” in Proc. of IEEE ICWITS 2010, 2010. [14] G. Khandelwal, K. Lee, A. Yener, and S. Serbetli, “ASAP: A MAC protocol for dense and time-constrained RFID systems,” EURASIP J. Wireless Commun. Netw., vol. 2007, no. 2, pp. 18 730-1–18 730-13, Jan. 2007. [15] D. Tarchi, R. Fantacci, and D. Marabissi, “Proposal of a cognitive based MAC protocol for M2M environments,” in Proc. 24th IEEE Int. Symp. Personal Indoor Mobile Radio Commun. (PIMRC), 2013, pp. 1609– 1613. [16] I. Park, D. Kim, and D. Har. "MAC achieving low latency and energy efficiency in hierarchical M2M networks with clustered nodes." IEEE Sensors Journal 15.3, 2015, 1657-1661. [17] A. Azari and G. Miao. “Energy efficient MAC for cellular-based M2M communications”. Presented at Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on. 2014, . DOI: 10.1109/GlobalSIP.2014.7032092. [18] P. K. Verma, R. Tripathi and K. Naik. “A robust hybrid-MAC protocol for M2M communications”. Presented at Computer and Communication Technology (ICCCT), 2014 International Conference on. 2014, . DOI: 10.1109/ICCCT.2014.7001503. [19] Boswarthick D, Elloumi O, Hersent O, editors. M2M communications: a systems approach. John Wiley & Sons; 2012 Mar 14. [20] H. Shariatmadari, et al., “Machine-Type Communications: Current Status and Future Perspectives Toward 5G Systems”, IEEE Communications Magazine, Comm. Standards Supplement, pp. 10-17, Sept. 2015. [21] C. Kahn, H. Viswanathan, “Connectionless Access for Mobile Cellular Networks”, IEEE Communications Magazine, Comm. Standards Supplement, pp. 26-31, Sept. 2015. [22] S. Andrew et al., “Efficient Small Data Access for Machine-Type Communications in LTE”, Proceedings of ICC, pp. 3569-74, June 2013. [23] J.J Nielson et al., ” What Can Wireless Cellular Technologies Do About the Smart Metering Traffic?”, IEEE Communications Magazine, Comm. Standards Supplement, pp. 41-47, Sept. 2015. [24] C. Pereira and A. Aguiar,”Towards Efficient Mobile M2M Communications: Survey and Open Challenges”, Sensors, 14, 19582-19608; doi:10.3390/s141019582, 2014. [25] A. Rajandekar and B. Sikdar,”A Survey of MAC Layer Issues and Protocols for Machine-to-Machine Communications”, IEEE Internet of Things Journal for Machine-to-Machine Communications, Vol. 2, No. 2, pp.175-186, April 2015. [26] C. Karuupongsiri, K. Munasinghe, and A. Jamalipour, “ Smart Meter Packet Transmission via the Control Signal of LTE Networks”, IEEE ICC-Mobile and Wireless Networking Symposium, pp. 2291-2996, 2015. [27] G. M. Madueno et al.,”Massive M2M Access with Reliability Guarantees in LTE Systems”, IEEE ICC-Mobile and Wireless Networking Symposium, pp. 2297-3002, 2015. [28] A. Gotsis, A. Lioumpas and A. Alexiou, “M2M Scheduling Over LTE”, IEEE Vehicular Technology Magazine, pp. 34—39, Sept. 2012. [29] A. Leon-Garcia and I. Widjaja, “Communication Networks”,McGraw Hill, 2nd ed., 2004. [30] Boswarthick, David, Omar Elloumi, and Olivier Hersent, eds. M2M communications: a systems approach. John Wiley & Sons, 2012. [31] J. Kim, J. Kim, & B. Kim, “Analysis of the M/G/1 queue with discriminatory random order service policy” Performance Evaluation, 68(3), 256-270, Mar. 2011. [32] J. Kaufman, ‘’Blocking in a shared resource environment’’ IEEE Transactions on communications, 29(10), 1474-1481, 1981. [33] J.F. Hayes, & T.V.G. Babu, Modeling and analysis of telecommunications networks. John Wiley & Sons, 2004.