In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority
Traffic offloading impact on the performanceIJCNCJournal
Long Term Evolution (LTE) is defined by the Third Generation Partnership Project (3GPP) standards as
Release 8/9. The LTE supports at max 20 MHz channel bandwidth for a carrier. The number of LTE users
and their applications are increasing, which increases the demand on the system BW. A new feature of the
LTE-Advanced (LTE-A) which is defined in the 3GPP standards as Release 10/11 is called Carrier Aggregation (CA), this feature allows the network to aggregate more carriers in-order to provide a higher bandwidth. Carrier Aggregation has three main cases: Intra-band contiguous, Intra-band non-contiguous, Inter-band contiguous. In addition to the Carrier Aggregation feature, LTE-A supports Heterogeneous Networks (HetNets). HetNets consists of a mix of macro-cells, remote radio heads, and low power nodes such as pico-cells, and femto-cells. HetNets allow cellular network operators to support higher data traffic
by offloading it to a smaller cells such as femto-cells. The aim of this paper is to evaluate the Quality of Service (QoS) performance of the Modified Largest Weighted Delay First (MLWDF), the Exponential Rule (Exp-Rule), and the Logarithmic Rule (Log-Rule) scheduling algorithms while offloading 50% of the macro-cell's traffic to five femto-cells, 100% of the macro-cell's traffic to five femto-cells, 100% of the macro-cell's traffic to ten femto-cells, and to compare it with the case in-which traffic offloading is not
applied. The QoS performance evaluation is based on the system's average throughput, Packet Loss Rate (PLR), average packet delay, and fairness among users. The LTE-Sim-5 with modifications is used in the simulation process. Simulation results show that offloading 100% of the Macro-cell's traffic to five femtocells had the highest maximum throughput, and the best PLR values especially when using the Log-Rule, in-which using it maintained the PLR values around 0.15 despite increasing the number of users. The least average packet delay was achieved when offloading 100% of the Macro-cell's traffic to ten femto-cells, the delay dropped to below 5 ms. The fairness indicators for the three scheduling algorithms while traffic
offloading was applied fluctuated in a linear way between a range of values of 0.7 and 0.9.
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the ITS environment. Many of these applications require real-time communication with high reliability. To meet a real-time deadline, timely and predictable access to the channel is paramount. The medium access method used in 802.11p, CSMA with collision avoidance, does not guarantee channel
access before a finite deadline. The well-known property of CSMA is undesirable for critical communications scenarios. The simulation results reveal that a specific vehicle is forced to drop over 80% of its packets because no channel access was possible before the next message was generated. To overcome this problem, we propose to use STDMA for real-time data traffic between vehicles. The realtime properties of STDMA are investigated by means of the highway road simulation scenario, with promising results.
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
Maintaining network stability and extending network lifetime to cope with breaking links and topology changes remain nowadays a unsolved issues in Wireless Multimedia Sensor Networks (WMSNs), which aim to ensure flow delivery while guaranteeing QoS requirements, particularly, during data transmission phase. Therefore, in this paper, we jointly consider multipath transmission, load balancing and fault tolerance, to enhance the reliability of transmitted data. We propose a Dynamic Curative Mechanism for Geographic Routing in WMSNs. Theoricals results and those obtained from simulation study demonstrate the validity and efficiency of our proposed mechanism, and indicate that it is highly advised for multimedia transmission and network stability
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
Traffic offloading impact on the performanceIJCNCJournal
Long Term Evolution (LTE) is defined by the Third Generation Partnership Project (3GPP) standards as
Release 8/9. The LTE supports at max 20 MHz channel bandwidth for a carrier. The number of LTE users
and their applications are increasing, which increases the demand on the system BW. A new feature of the
LTE-Advanced (LTE-A) which is defined in the 3GPP standards as Release 10/11 is called Carrier Aggregation (CA), this feature allows the network to aggregate more carriers in-order to provide a higher bandwidth. Carrier Aggregation has three main cases: Intra-band contiguous, Intra-band non-contiguous, Inter-band contiguous. In addition to the Carrier Aggregation feature, LTE-A supports Heterogeneous Networks (HetNets). HetNets consists of a mix of macro-cells, remote radio heads, and low power nodes such as pico-cells, and femto-cells. HetNets allow cellular network operators to support higher data traffic
by offloading it to a smaller cells such as femto-cells. The aim of this paper is to evaluate the Quality of Service (QoS) performance of the Modified Largest Weighted Delay First (MLWDF), the Exponential Rule (Exp-Rule), and the Logarithmic Rule (Log-Rule) scheduling algorithms while offloading 50% of the macro-cell's traffic to five femto-cells, 100% of the macro-cell's traffic to five femto-cells, 100% of the macro-cell's traffic to ten femto-cells, and to compare it with the case in-which traffic offloading is not
applied. The QoS performance evaluation is based on the system's average throughput, Packet Loss Rate (PLR), average packet delay, and fairness among users. The LTE-Sim-5 with modifications is used in the simulation process. Simulation results show that offloading 100% of the Macro-cell's traffic to five femtocells had the highest maximum throughput, and the best PLR values especially when using the Log-Rule, in-which using it maintained the PLR values around 0.15 despite increasing the number of users. The least average packet delay was achieved when offloading 100% of the Macro-cell's traffic to ten femto-cells, the delay dropped to below 5 ms. The fairness indicators for the three scheduling algorithms while traffic
offloading was applied fluctuated in a linear way between a range of values of 0.7 and 0.9.
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the ITS environment. Many of these applications require real-time communication with high reliability. To meet a real-time deadline, timely and predictable access to the channel is paramount. The medium access method used in 802.11p, CSMA with collision avoidance, does not guarantee channel
access before a finite deadline. The well-known property of CSMA is undesirable for critical communications scenarios. The simulation results reveal that a specific vehicle is forced to drop over 80% of its packets because no channel access was possible before the next message was generated. To overcome this problem, we propose to use STDMA for real-time data traffic between vehicles. The realtime properties of STDMA are investigated by means of the highway road simulation scenario, with promising results.
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
Maintaining network stability and extending network lifetime to cope with breaking links and topology changes remain nowadays a unsolved issues in Wireless Multimedia Sensor Networks (WMSNs), which aim to ensure flow delivery while guaranteeing QoS requirements, particularly, during data transmission phase. Therefore, in this paper, we jointly consider multipath transmission, load balancing and fault tolerance, to enhance the reliability of transmitted data. We propose a Dynamic Curative Mechanism for Geographic Routing in WMSNs. Theoricals results and those obtained from simulation study demonstrate the validity and efficiency of our proposed mechanism, and indicate that it is highly advised for multimedia transmission and network stability
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
In Wireless Sensor Network (WSN), QoS (Quality of Service) in sensor application plays a very important
role. QoS based routing is required to ensure the best use of nodes in WSN. In this paper, a comparative
study of QoS based routing in Media Access Control (MAC) protocols are presented based on the traits to
solve problems like prioritization, timeliness, reliability etc. The study mainly focuses on some priority
based QoS protocols used in WSN and a comparison among them. The study reveals that among the five
mentioned protocols; QMAC, PRIMA, DB-MAC, RAP, GTS; PRIMA shows the best performance in the
category of Packet Prioritization, Scheduling Scheme, Queue Type, Energy Awareness and QoS.
Sample-by-sample and block-adaptive robust constant modulus-based algorithmsDr. Ayman Elnashar, PhD
In this study, a robust sample-by-sample linearly constrained constant modulus algorithm (LCCMA) and a robust adaptive block-Shanno constant modulus algorithm (BSCMA) are developed. The well-established quadratic inequality constraint approach is exploited to add robustness to the developed algorithms. The LCCMA algorithm is implemented using a fast steepest descent adaptive algorithm, whereas the BSCMA algorithm is realised using a modified Newton’s algorithm without the inverse of Hessian matrix estimation. The developed algorithms are exercised to cancel the multiple access interference in a loaded direct sequence code division multiple access (DS/CDMA) system. Simulations are presented in a rich multipath environment with a severe near-far effect to evaluate the robustness of the proposed DS/CDMA detectors. Finally, a comprehensive comparative analysis between the sample-by-sample and block-adaptive constant modulus-based detectors is presented. It has been demonstrated that the developed robust BSCMA detector offers rapid convergence speed and very low computational complexity, whereas the developed robust LCCMA detector engenders about 5 dB improvement in the output signal-to-interference-plus-noise ratio over the BSCMA detector.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
In the development, standardization and implementation of LTE Networks based on Orthogonal Freq. Division Multiple Access (OFDMA), simulations are necessary to test as well as optimize algorithms and procedures before real time establishment. This can be done by both Physical Layer (Link-Level) and Network (System-Level) context. This paper proposes Network Simulator 3 (NS-3) which is capable of evaluating the performance of the Downlink Shared Channel of LTE networks and comparing it with available MatLab based LTE System Level Simulator performance.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc
Networks to conserve more energy in the system. This technique when combined with other power saving
systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing
result. In designing Medium Access Control (MAC), developing a framework and giving a detailed
implementation procedure are among the factors that hinder the process; specifically in MANETs not to
mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure
and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control
(UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of
transmission, channelization, and receiver pattern of the Physical layer is specified in this research work.
The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
Multi-layer heterogeneous network layout including small cell base stations are considered to be the key to further enhancements of the spectral efficiency achieved in mobile communication networks. It has been recognized that inter-cell interference has become the limiting factor when trying to achieve not only high average user satisfaction, but a high degree of satisfaction for as many users as possible. Therefore, inter-cell interference coordination (ICIC) lies in the focus of researchers defining next generation mobile communication standards, such as LTE-A.
Building upon [1], this paper provides an overview over the background calling for ICIC in heterogeneous LTE-A networks. It outlines techniques standardized in Rel. 10 of LTE-A, discusses them showing their benefits and limitations by means of system-level simulations and motivates the importance of self optimizing network (SON) procedures for ICIC in LTE-A.
Vehicular adhoc network (VANET) adopts or resembles a similar structure of Mobile adhoc network (MANET). The communication in VANET are generally classified into following three categories such as Vehicle to Infrastructure (V2I), Vehicle to Vehicle (V2V) and Hybrid network which is a combination of V2V and V2I network. VANET using the IEEE 802.11p standard has great potential of achieving objectives of Smart intelligent transport system (SITS) for improving transport and road safety efficiency. As more and more services is been provided for V2V based VANET network. It is a challenging task to provide QoS to end user, due to wireless medium that has limited channel availability for transmission. To guarantee QoS and provide efficient network performance, a prioritized MAC need to be designed. Many priority based MAC has been designed in recent times to improve the quality of data delivery to end user. However these do not consider the impact of environment and presence of obstacle which affects the signal attenuation at the receiver end and affecting the QoS of channel availability. To address, this work present an obstacle based radio propagation model, obstacle based CEV (City, Expressway and Village) environmental model and a selective MAC to provide QoS for different services. The proposed model efficiency is evaluated in term of throughput achieved per channel, Collison and success packet transmission. To evaluate the adaptive performance of proposed AMACexperiment are conducted under CEV environment and are compared with existing MAC NCCMA. The outcome achieved shows that the proposed model is efficient in term of reducing Collison, improving packet transmission and throughput performance considering two types of services.
In this project, we proposed a framework to support heterogenous traffic with different QoS demand in
WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival
connections based on network condition and service demand. The objective is to efficiently use the
available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to
transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic
bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission
policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this
architecture could provide QoS support by being fair to all classes of services.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). Themedical applications of WBAN hasseveral obligatory requirements and constrains
viz. high reliability, strict delaydeadlines and low power consumption.The standard IEEE 802.15.6 MAC
scheme is not able to fulfil the all requirements of medical applications of WBAN. To address this issue we
propose anIEEE 802.15.6-based MAC schemethat is the modification of superframe structure, user
priorities and access mechanism of standard IEEE 802.15.6 MAC scheme. The proposed superframe has
three access phases: random access phases (RAP), manage access phases (MAP) and contention access
phase (CAP). The proposed four user priorities nodes access the channel during RAP using CAMA/CA
mechanism with a large value of contention window. The proposed MAC scheme uses RTS/CTS access
mechanism instead of basic access mechanism to mitigate the effect of hidden and expose terminal
problem. Moreover, we develop an analytical model to evaluate the performance of proposed MAC scheme
and solve the analytical model using Maple. The results show that the modified IEEE802.15.6 MAC
scheme achieve the better performance in terms of reliability, throughput, average access delay, energy
consumption, channel utilization and fairness compared to standard IEEE 802.15.6 MAC scheme in Ehealth applications.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). Themedical applications of WBAN hasseveral obligatory requirements and constrains
viz. high reliability, strict delaydeadlines and low power consumption.The standard IEEE 802.15.6 MAC
scheme is not able to fulfil the all requirements of medical applications of WBAN. To address this issue we
propose anIEEE 802.15.6-based MAC schemethat is the modification of superframe structure, user
priorities and access mechanism of standard IEEE 802.15.6 MAC scheme. The proposed superframe has
three access phases: random access phases (RAP), manage access phases (MAP) and contention access
phase (CAP). The proposed four user priorities nodes access the channel during RAP using CAMA/CA
mechanism with a large value of contention window. The proposed MAC scheme uses RTS/CTS access
mechanism instead of basic access mechanism to mitigate the effect of hidden and expose terminal
problem. Moreover, we develop an analytical model to evaluate the performance of proposed MAC scheme
and solve the analytical model using Maple. The results show that the modified IEEE802.15.6 MAC
scheme achieve the better performance in terms of reliability, throughput, average access delay, energy
consumption, channel utilization and fairness compared to standard IEEE 802.15.6 MAC scheme in Ehealth applications.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
In Wireless Sensor Network (WSN), QoS (Quality of Service) in sensor application plays a very important
role. QoS based routing is required to ensure the best use of nodes in WSN. In this paper, a comparative
study of QoS based routing in Media Access Control (MAC) protocols are presented based on the traits to
solve problems like prioritization, timeliness, reliability etc. The study mainly focuses on some priority
based QoS protocols used in WSN and a comparison among them. The study reveals that among the five
mentioned protocols; QMAC, PRIMA, DB-MAC, RAP, GTS; PRIMA shows the best performance in the
category of Packet Prioritization, Scheduling Scheme, Queue Type, Energy Awareness and QoS.
Sample-by-sample and block-adaptive robust constant modulus-based algorithmsDr. Ayman Elnashar, PhD
In this study, a robust sample-by-sample linearly constrained constant modulus algorithm (LCCMA) and a robust adaptive block-Shanno constant modulus algorithm (BSCMA) are developed. The well-established quadratic inequality constraint approach is exploited to add robustness to the developed algorithms. The LCCMA algorithm is implemented using a fast steepest descent adaptive algorithm, whereas the BSCMA algorithm is realised using a modified Newton’s algorithm without the inverse of Hessian matrix estimation. The developed algorithms are exercised to cancel the multiple access interference in a loaded direct sequence code division multiple access (DS/CDMA) system. Simulations are presented in a rich multipath environment with a severe near-far effect to evaluate the robustness of the proposed DS/CDMA detectors. Finally, a comprehensive comparative analysis between the sample-by-sample and block-adaptive constant modulus-based detectors is presented. It has been demonstrated that the developed robust BSCMA detector offers rapid convergence speed and very low computational complexity, whereas the developed robust LCCMA detector engenders about 5 dB improvement in the output signal-to-interference-plus-noise ratio over the BSCMA detector.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
In the development, standardization and implementation of LTE Networks based on Orthogonal Freq. Division Multiple Access (OFDMA), simulations are necessary to test as well as optimize algorithms and procedures before real time establishment. This can be done by both Physical Layer (Link-Level) and Network (System-Level) context. This paper proposes Network Simulator 3 (NS-3) which is capable of evaluating the performance of the Downlink Shared Channel of LTE networks and comparing it with available MatLab based LTE System Level Simulator performance.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc
Networks to conserve more energy in the system. This technique when combined with other power saving
systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing
result. In designing Medium Access Control (MAC), developing a framework and giving a detailed
implementation procedure are among the factors that hinder the process; specifically in MANETs not to
mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure
and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control
(UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of
transmission, channelization, and receiver pattern of the Physical layer is specified in this research work.
The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
Multi-layer heterogeneous network layout including small cell base stations are considered to be the key to further enhancements of the spectral efficiency achieved in mobile communication networks. It has been recognized that inter-cell interference has become the limiting factor when trying to achieve not only high average user satisfaction, but a high degree of satisfaction for as many users as possible. Therefore, inter-cell interference coordination (ICIC) lies in the focus of researchers defining next generation mobile communication standards, such as LTE-A.
Building upon [1], this paper provides an overview over the background calling for ICIC in heterogeneous LTE-A networks. It outlines techniques standardized in Rel. 10 of LTE-A, discusses them showing their benefits and limitations by means of system-level simulations and motivates the importance of self optimizing network (SON) procedures for ICIC in LTE-A.
Vehicular adhoc network (VANET) adopts or resembles a similar structure of Mobile adhoc network (MANET). The communication in VANET are generally classified into following three categories such as Vehicle to Infrastructure (V2I), Vehicle to Vehicle (V2V) and Hybrid network which is a combination of V2V and V2I network. VANET using the IEEE 802.11p standard has great potential of achieving objectives of Smart intelligent transport system (SITS) for improving transport and road safety efficiency. As more and more services is been provided for V2V based VANET network. It is a challenging task to provide QoS to end user, due to wireless medium that has limited channel availability for transmission. To guarantee QoS and provide efficient network performance, a prioritized MAC need to be designed. Many priority based MAC has been designed in recent times to improve the quality of data delivery to end user. However these do not consider the impact of environment and presence of obstacle which affects the signal attenuation at the receiver end and affecting the QoS of channel availability. To address, this work present an obstacle based radio propagation model, obstacle based CEV (City, Expressway and Village) environmental model and a selective MAC to provide QoS for different services. The proposed model efficiency is evaluated in term of throughput achieved per channel, Collison and success packet transmission. To evaluate the adaptive performance of proposed AMACexperiment are conducted under CEV environment and are compared with existing MAC NCCMA. The outcome achieved shows that the proposed model is efficient in term of reducing Collison, improving packet transmission and throughput performance considering two types of services.
In this project, we proposed a framework to support heterogenous traffic with different QoS demand in
WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival
connections based on network condition and service demand. The objective is to efficiently use the
available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to
transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic
bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission
policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this
architecture could provide QoS support by being fair to all classes of services.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). Themedical applications of WBAN hasseveral obligatory requirements and constrains
viz. high reliability, strict delaydeadlines and low power consumption.The standard IEEE 802.15.6 MAC
scheme is not able to fulfil the all requirements of medical applications of WBAN. To address this issue we
propose anIEEE 802.15.6-based MAC schemethat is the modification of superframe structure, user
priorities and access mechanism of standard IEEE 802.15.6 MAC scheme. The proposed superframe has
three access phases: random access phases (RAP), manage access phases (MAP) and contention access
phase (CAP). The proposed four user priorities nodes access the channel during RAP using CAMA/CA
mechanism with a large value of contention window. The proposed MAC scheme uses RTS/CTS access
mechanism instead of basic access mechanism to mitigate the effect of hidden and expose terminal
problem. Moreover, we develop an analytical model to evaluate the performance of proposed MAC scheme
and solve the analytical model using Maple. The results show that the modified IEEE802.15.6 MAC
scheme achieve the better performance in terms of reliability, throughput, average access delay, energy
consumption, channel utilization and fairness compared to standard IEEE 802.15.6 MAC scheme in Ehealth applications.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). Themedical applications of WBAN hasseveral obligatory requirements and constrains
viz. high reliability, strict delaydeadlines and low power consumption.The standard IEEE 802.15.6 MAC
scheme is not able to fulfil the all requirements of medical applications of WBAN. To address this issue we
propose anIEEE 802.15.6-based MAC schemethat is the modification of superframe structure, user
priorities and access mechanism of standard IEEE 802.15.6 MAC scheme. The proposed superframe has
three access phases: random access phases (RAP), manage access phases (MAP) and contention access
phase (CAP). The proposed four user priorities nodes access the channel during RAP using CAMA/CA
mechanism with a large value of contention window. The proposed MAC scheme uses RTS/CTS access
mechanism instead of basic access mechanism to mitigate the effect of hidden and expose terminal
problem. Moreover, we develop an analytical model to evaluate the performance of proposed MAC scheme
and solve the analytical model using Maple. The results show that the modified IEEE802.15.6 MAC
scheme achieve the better performance in terms of reliability, throughput, average access delay, energy
consumption, channel utilization and fairness compared to standard IEEE 802.15.6 MAC scheme in Ehealth applications.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
IJWMN -Effects Investigation of MAC and PHY Layer Parameters on the Performan...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layer and medium access control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area Networks (WBAN). The most suitable way for enhancing network performance is to be the choice of different MAC and PHY parameters based on quality of service (QoS) requirements of different applications. The impact of different MAC and PHY parameters on the network performance and the tradeoff relationship between the parameters are essential to overcome the limitations of exiting carrier sense multiple access with collision avoidance (CSMA/CA) scheme of IEEE 802.15.6 standard. To address this issue, we develop a Markov chain-based analytical model of IEEE 802.15.6 CSMA/CA for all user priorities (UPs) and apply this general model to different network scenarios to investigate the effects of the packet arrival rate, channel condition, payload size, access phase length, access mechanism and number of nodes on the performance parameters viz. reliability, normalized throughput, energy consumption and average access delay. Moreover, we conclude the effectiveness of different access phases, access mechanisms and user priorities of intra-WBAN.
EFFECTS INVESTIGATION OF MAC AND PHY LAYER PARAMETERS ON THE PERFORMANCE OF I...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layer and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). The most suitable way for enhancing network performance is to be the choice of
different MAC and PHY parameters based on quality of service (QoS) requirements of different
applications. The impact of different MAC and PHY parameters on the network performance and the tradeoff relationship between the parameters are essential to overcome the limitations of exiting carrier sense
multiple access with collision avoidance (CSMA/CA) scheme of IEEE 802.15.6 standard. To address this
issue, we develop a Markov chain-based analytical model of IEEE 802.15.6 CSMA/CA for all user
priorities (UPs) and apply this general model to different network scenarios to investigate the effects of the
packet arrival rate, channel condition, payload size, access phase length, access mechanism and number of
nodes on the performance parameters viz. reliability, normalized throughput, energy consumption and
average access delay. Moreover, we conclude the effectiveness of different access phases, access
mechanisms and user priorities of intra-WBAN.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWB-...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc
Networks to conserve more energy in the system. This technique when combined with other power saving
systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing
result. In designing Medium Access Control (MAC), developing a framework and giving a detailed
implementation procedure are among the factors that hinder the process; specifically in MANETs not to
mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure
and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control
(UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of
transmission, channelization, and receiver pattern of the Physical layer is specified in this research work.
The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs.
Framework, Implementation and Algorithm for Asynchronous Power Saving of UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc Networks to conserve more energy in the system. This technique when combined with other power saving systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing result. In designing Medium Access Control (MAC), developing a framework and giving a detailed implementation procedure are among the factors that hinder the process; specifically in MANETs not to mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control (UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of transmission, channelization, and receiver pattern of the Physical layer is specified in this research work. The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In this paper, a general model for MAC protocol to reduce the delay, maximize throughput and conserve the energy consumption in channel accessing in high density randomly distributed wireless sensor network is presented. The proposed model is simulated using MATLAB. The simulation results show that the average delay for sensors with sufficient memory is lower than sensors without
memory. Further, the throughput of the channel access method with memory is better than without memory.
The three-way need for higher data rates, good quality of service and ubiquity in a converged all IP
communication cloud drives research in wireless communication. Wireless access networks are envisaged
candidates of the next generation wireless networks. The various access networks will be integrated with
other technologies including the wired backbone. The major issues in an all IP and converged networks
are: quality of service, seamless handover and network capacity. Emerging research seeks to address these
open research issues; for example the implementation of multi-channel and multi radio MAC protocols in
WMN. In this paper we analyze and evaluate the effectiveness of multi-channel and multi radio techniques
in WMN. The shortcomings of these schemes are highlighted and possible solutions are suggested. The
signalling delay metric is used for evaluation purposes. The focus is on the performance of the control
channel identified as the critical performance metric of multi-channel MAC protocols.
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper we focus on the MAC layer modifications to meet the real time requirements of different priority data.Bandwidth partitioning among different priority transmissions is implemented through MAC layer modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower
priority packets and higher transfer rate for real
time packets with higher priority, minimizing the end to
end delay. The performance of the algorithm is evaluated with varying node distribution
.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
The Optimal Link State Routing (OLSR) protocol employs multipoint relay (MPR) nodes to disseminate topology control (TC) messages, enabling network topology discovery and maintenance. However, this approach increases control overhead and leads to wasted network bandwidth in stable topology scenarios due to fixed flooding periods. To address these challenges, this paper presents an Efficient Topology Maintenance Algorithm (ETM-OLSR) for Enhanced Link-State Routing Protocols. By reducing the number of MPR nodes, TC message generation and forwarding frequency are minimized. Furthermore, the algorithm selects a smaller subset of TC messages based on the changes in the MPR selection set from the previous cycle, adapting to stable and fluctuating network conditions. Additionally, the sending cycle of TC messages is dynamically adjusted in response to network topology changes. Simulation results demonstrate that the ETM-OLSR algorithm effectively reduces network control overhead, minimizes end-to-end delay, and improves network throughput compared to traditional OLSR and HTR-OLSR algorithms.
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxnikitacareer3
Looking for the best engineering colleges in Jaipur for 2024?
Check out our list of the top 10 B.Tech colleges to help you make the right choice for your future career!
1) MNIT
2) MANIPAL UNIV
3) LNMIIT
4) NIMS UNIV
5) JECRC
6) VIVEKANANDA GLOBAL UNIV
7) BIT JAIPUR
8) APEX UNIV
9) AMITY UNIV.
10) JNU
TO KNOW MORE ABOUT COLLEGES, FEES AND PLACEMENT, WATCH THE FULL VIDEO GIVEN BELOW ON "TOP 10 B TECH COLLEGES IN JAIPUR"
https://www.youtube.com/watch?v=vSNje0MBh7g
VISIT CAREER MANTRA PORTAL TO KNOW MORE ABOUT COLLEGES/UNIVERSITITES in Jaipur:
https://careermantra.net/colleges/3378/Jaipur/b-tech
Get all the information you need to plan your next steps in your medical career with Career Mantra!
https://careermantra.net/
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORITY IN WIRELESS BODY AREA NETWORKS
1. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
DOI: 10.5121/ijcnc.2019.11402 25
A MAC PROTOCOL WITH DYNAMIC ALLOCATION
OF TIME SLOTS BASED ON TRAFFIC PRIORITY IN
WIRELESS BODY AREA NETWORKS
Sabin Bhandari and Sangman Moh
Department of Computer Engineering, Chosun University, Gwangju, South Korea
ABSTRACT
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the
human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic
monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE
802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control
(MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe
structure with some improvements and adjustments. However, the MAC protocols do not provide the
required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC
(TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of
traffic priority, providing the required QoS. According to the performance evaluation results, the proposed
TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of
transmission time, system throughput, energy efficiency, and collision ratio.
KEYWORDS
Wireless body area network; Medium access control, Energy efficiency; Quality of service; Traffic priority;
IEEE 802.15.4
1. INTRODUCTION
With the rapid advancement of electronic and wireless communication technologies, wireless
sensor networks have grown significantly in a wide range of applications. A wireless body area
network (WBAN) connects various medical sensors and appliances located inside and around the
human body and is capable of monitoring health conditions remotely or within a hospital. The
general architecture of a WBAN is depicted in Figure 1. A WBAN consists of biomedical sensors
for monitoring physiological signals such as electromyography (EMG), electroencephalography
(EEG), temperature, heart rate, and blood pressure [1]. Quality of service (QoS) is an important
benchmark to achieve in WBANs. The key requirements in WBANs are small device size, low
power consumption, negligible electromagnetic effects to the human body, short transmission
delay, high reliability, and effective communication. The human body is a challenging
environment to design an adaptable, dynamic, and flexible protocol for WBANs. WBANs have
specific requirements and considerations that the IEEE 802.15.4 medium access control (MAC)
protocol does not fully address [2].
2. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
26
MAC protocols play a vital role in prolonging the lifespan of a network by controlling the sources
of energy waste such as packet collisions, overhearing, control packet overhead, and idle listening
[3, 4]. The main approaches adopted for energy savings in MAC protocols for WBANs are lower-
power listening (LPL), schedule contention, and time division multiple access (TDMA).
Figure 1. The general architecture of a WBAN
In the LPL mechanism, nodes wake up for a short duration to check the activity in the channel
without receiving data. If the channel is busy, the node remains in an active state for receiving
data, and other nodes go back to sleep mode. The LPL mechanism uses the non-persistent carrier
sense multiple access (CSMA) protocol and preamble sampling technique to mitigate idle
listening. Scheduled contention is a combination of scheduling and contention-based mechanism
to avoid the problem of scalability and collision. In contention-based protocols, contending nodes
attempt to access the channel for data transmission. Therefore, the probability of packet collision
is significantly increased. In the carrier sense multiple access/collision avoidance (CSMA/CA)
protocol, which is an example of contention-based MAC protocols, clear channel assessment
(CCA) is performed by nodes before transmitting data. Even though these protocols are scalable,
they cannot handle emergency situations in which the nodes with the same priority send critical
data. TDMA MAC protocols divide the channel into multiple slots for data transmission. The
protocols decrease idle listening and overhearing. However, the significant protocol overhead
results in the protocols. Code division multiple access (CDMA) and frequency division multiple
access (FDMA) schemes are also examples of scheduling mechanisms. However, CDMA and
FDMA are not suitable for WBANs because of their high computational overhead and bandwidth
limitation.
The IEEE 802.15.6 standard [5] describes physical (PHY) and MAC layers to address healthcare
and nonmedical applications with diverse emerging requirements. The MAC layer in the IEEE
802.15.6 standard defines short-range wireless communication in and around the human body. In
the standard, low complexity, low cost, ultra-low power, and highly reliable wireless
communication are supported for use in close proximity to or inside the human body to support
various entertainment and healthcare products and services.
The design of MAC protocols has a significant impact on energy efficiency, interference,
reliability, and QoS provision. High channel utilization, error-free communications between
nodes, low delay, and reduced energy consumption are key parameters for MAC protocols. One
3. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
27
MAC protocol cannot satisfy all the requirements of various kinds of applications because the
different kinds of protocols assume different hardware and applications [6].
The MAC protocol suitable for WBANs must cover up-to-date challenging issues with regard to
WBAN topology and sensor constraints. In [7], the different approaches to PHY and MAC layer
design for developing efficient mobile health applications are reviewed and extensively
discussed. The key design issues, MAC layer parameters, energy consumption, coexistence, and
channel modelling issues are investigated and summarized in [8, 9].
In this paper, a traffic-aware MAC protocol (TA-MAC) for WBANs is proposed, which
prioritizes the sensor nodes by using a priority-aware CSMA/CA algorithm in the contention
access period (CAP). For TA-MAC, we classify data traffic into four priorities and categorize the
CAP into four sub-phases with dynamically changing length. This protocol is designed to support
various QoS requirements for the data classified by priorities in WBANs. The proposed TA-MAC
supports CAP and contention-free period (CFP). In the CAPs, the operation is based on a priority-
guaranteed CSMA/CA procedure in which different WBAN nodes are assigned different
priorities. The CFP is used to carry a number of data packets to the coordinator. The proposed
TA-MAC operates on the basis of a beacon-enabled mode in which beacons are transmitted at the
end of the superframe. In beacon-enabled mode, synchronization, association, and data
transmission are controlled by the central coordinator by using periodic beacons. The beacon-
enabled mode uses a superframe that consists of active and inactive periods. The active period of
the superframe consists of three parts: CAP using slotted CSMA/CA, CFP, and beacon as shown
in Figure 2. The operation of the priority-guaranteed CSMA/CA is based on the IEEE 802.15.6
[5] and 802.11e [10] standards. The proposed TA-MAC considers a one-hop star topology
network, and the entire operation is controlled by the WBAN coordinator.
Figure 2. IEEE 802.15.4 superframe
The rest of this paper is organized as follows: In the following section, some related research is
reviewed and discussed briefly. The proposed TA-MAC is presented in detail in Section 3. In
Section 4, the performance of the proposed TA-MAC is evaluated via extensive computer
simulation and then compared with IEEE 802.15.4 MAC and the conventional priority-based
MAC protocol. Section 5 concludes the paper.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
28
2. RELATED WORKS
The IEEE 802.15.4 MAC protocol was designed for low-data-rate applications and is the most
commonly used MAC protocol in wireless sensor networks to support low power and low data
rate in cases where latency and bit rate are not critical [11]. The IEEE 802.15.4 MAC has the
general characteristics of low power consumption, support for low-latency devices, star or peer-
to-peer operation, and dynamic device addressing.
The superframe structure of IEEE 802.15.4 MAC consists of a CAP, a CFP, and an inactive
period. The CFP includes at most seven guaranteed timeslots (GTS). The superframe duration is
denoted by the values of macBeaconOrder (BO) and macSuperFrameOrder (SO). The BO
describes the beacon interval at which the coordinator may transmit its beacon. IEEE 802.15.4
MAC does not provide any prioritizing mechanism for the different kinds of data traffic, and low-
priority data can block the transmission of high-priority data.
There have been many significant developments of MAC protocols for WBANs. Most of the
MAC protocols are already used for specific purposes, but they can be adopted with certain
modifications to meet the requirements of WBANs. Most research has focused on the IEEE
802.15.4 standard for low-rate wireless personal area networks. An IEEE 802.15.3-based MAC
protocol was designed as part of a body area networking system for multimedia applications [12].
A body MAC [13] was designed to provide energy-efficient and flexible operation in terms of
bandwidth allocation and to support a sleep mode in WBANs. The MAC frame is adaptive and
flexible for improving the efficiency of the sleep mode. The gateway controls the duration of the
downlink, CAP, and CFP adaptively on the basis of traffic characteristics. The severe problem of
the MAC protocol is that all nodes listen to the long preamble.
The context-aware MAC protocol [14] tries to support the real-time transmission of critical and
emergency data. In order to address the problems of collision, idle listening, and overhearing, a
TDMA-based scheme is used because the sensors transmit data only in their own slots. Data slots
are assigned to sensors for contention-free transmission. One or more slots are assigned to sensor
nodes for periodic or bursty applications according to their traffic characteristics. The context-
aware MAC protocol performs well in terms of latency, but it does not respond to an emergency
immediately.
In heartbeat-driven MAC protocol (H-MAC) [15], the TDMA approach boosts up the network
efficiency by reducing idle listening and collisions. Although the H-MAC protocol reduces the
extra energy cost for synchronization, it is not accessible to all sensors. In addition, the TDMA
slots are not traffic adaptive.
In [16], multiple physical layers are taken into account including ultra-wideband. Also, the CAP
uses mini slotted ALOHA scheme in order to enhancing the contention efficiency. The sufficient
slot allocation in the CFP makes the protocol adaptive to different kinds of network traffic.
In [17], a multichannel management scheme for WBANs is presented. To reduce idle listening,
the control channel is differentiated from data channels with different frequency bands. However,
this scheme does not consider any priority differentiation mechanism.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
29
In the traffic priority and load-adaptive MAC protocol presented in [18], the transmission
schedules of packets are determined based on their priorities. The superframe structure of the
proposed protocol varies according to the traffic load and thereby minimizes energy consumption.
In the traffic-adaptive MAC protocol (TaMAC) [19], a wake-up mechanism based on traffic and a
wakeup radio to accommodate various traffic in a reliable manner are supported. In TaMAC,
channels are tightly bounded by the superframe structure. The nodes for emergency traffic and the
coordinator for on-demand traffic send wakeup radio signals to each other. TaMAC uses traffic
information for low-power communication. It updates the traffic-based wake-up table but is
inefficient for a dynamic topology.
In [20], a traffic-aware sensor MAC is introduced for collaborative body area sensor networks.
The superframe structure dynamically varies based on the traffic load, and a multihop
communication channel is used. However, it does not include the priority of different
applications.
In [21], a traffic-aware dynamic MAC protocol (TAD-MAC) designed for WBANs is reported.
Every node adapts its wakeup interval dynamically. The dynamic wakeup interval results in low
energy consumption for idle listening, overhearing, collisions, and unnecessary wakeup beacon
transmissions.
In [22], a priority-based channel access algorithm for contention-based MAC protocol (NPCA-
MAC) is designed to resolve the contention complexity issue. The algorithm categorizes the
packets into four different priority levels by defining delay thresholds and divides the CAP into
sub-phases. However, this algorithm may not consider the classification of continuous and
discontinuous data or the use of GTSs in the CFP.
In [23], two CAPs are used in a hybrid and secure MAC protocol (PMAC) for WBANs for
accommodating normal and critical data. On the other hand, one CFP is utilized to accommodate
a number of data packets. Moreover, security keys are used for preventing unallowable access to
WBANs.
In low-delay traffic-adaptive MAC protocol (LDTA- MAC) [24], GTSs are allocated dynamically
based on traffic load to improve some of the shortcomings of the IEEE 802.15.4 MAC protocol.
Data packets are transmitted in the current superframe after a successful GTS request. However,
there is no consideration of traffic priority.
Existing standards such as IEEE 802.11 and IEEE 802.15.4 cannot meet all requirements of
WBANs. Therefore, numerous MAC protocols have been studied. Many of them are the
modification of the IEEE 802.15.4 superframe structure with some adjustments to address the
requirements of WBANs. However, they do not support differentiated QoS for various kinds of
traffic coexisting in a WBAN.
3. TRAFFIC-AWARE MEDIUM ACCESS CONTROL
In this section, we present the proposed TA-MAC protocol in detail. The priority level of
different kinds of data traffic, dynamic timeslot allocation algorithms, and data transfer
procedures are discussed in the following subsections.
6. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
30
3.1. Traffic Priority
Among WBAN applications, medical and consumer electronics (CE) signals represent the
majority of data traffic in the network. Emergency traffic, which is directly related to the life of a
patient (e.g., emergency alarm signals) should be regarded as the most important service and must
be at the top priority level. Continuous medical traffic with common vital signals (e.g., EEG,
electromyography) ranks in the second priority level. Discontinuous medical traffic (e.g.,
temperature, blood pressure) ranks in the third priority level. CE traffic (e.g., audio/videos
transmitted in an event-driven manner) is ranked in the fourth priority level. The different levels
of traffic priority are summarized in Table 1.
Table 1. Levels of traffic priority.
Traffic Priority Example
Emergency
traffic (ET)
P1 Emergency alarm signal
On-demand
traffic (OT)
P2 Continuous medical signal (e.g.,
EEG, EMG)
Normal traffic
(NT)
P3 Discontinuous medical signal (e.g.,
temperature, blood pressure)
Nonmedical
traffic (NMT)
P4 Audio/video/data
3.2. Dynamic Timeslot Allocation Algorithms
The IEEE 802.15.4 MAC protocol comprises CAPs and CFPs. In this paper, we focus on the
channel access of CAP because the performance of a CAP significantly influences the collision
probability and the final throughput. When a number of nodes are densely deployed within a
small area, contention complexity increases and leads to more energy consumption and collisions.
Contention complexity is one of the requirements of WBANs that must be satisfied. Here we
divide the CAP into sub-phases for each priority level of traffic; i.e., ET-CAP (Phase 1), ODT-
CAP (Phase 2), NT-CAP (Phase 3), and NMT-CAP (Phase 4) as shown in Figure 3. Nodes that
transmit P1 traffic can access channels through all phases from 1 to 4. P2 can access channels
from Phases 2 to 4. Similarly, P3 can access channels through Phases 3 and 4. The node that
transmits P4 can use only Phase 4 to access the channel. Phase 1 always occupies the first time
slot of the CAP [25]. To avoid wasted timeslot utilization, the length of sub-phases L2, L3, and L4
dynamically change and are calculated by the coordinator according to a number of priority nodes
on that sub-phase using equations (1), (2), and (3), respectively.
Figure 3. Superframe structure of the proposed MAC
7. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
31
The length of Phase 1 in Figure 3 is fixed; it is one time slot long and always occupies the first
time slot of the CAP. However, the lengths of the remaining phases are variable and represented
as
∑=
−
= 4
2
2
2
)1(
i iN
LN
L , (1)
∑=
−
= 4
2
3
3
)1(
i iN
LN
L , (2)
and
1234 −−−= LLLL , (3)
where Ni is the number of i-th priority nodes and L is the CAP length in the unit of network
timeslot.
The step-by-step algorithms for the slot allocation of the coordinator and the data transfer
procedure for sensor nodes are shown in Figure 4 and Figure 5, respectively.
Figure 4. Algorithm for the coordinator
3.3. Data Transmission Procedure
In the IEEE 802.15.4 MAC protocol, the CAP is appropriate for the transmisison of short data
and command messages, and the CFP is designed to transmit continuous data. The coordinator
continuously broadcasts beacons to all nodes, and active nodes receive the beacons. The nodes
Algorithm for the coordinator
1. while (!End of CAP)
2. if (receive associate request command from nodes)
2.1 if (nodes transmit P2 traffic)
N2=N2+1
end if
2.2 if (nodes transmit P3 traffic)
N3=N3+1
end if
2.3 if (nodes transmit P4 traffic)
N4=N4+1
end if
end if
end while
3. Calculate the lengths of phase L1, L2, L3, and L4
L1 = 1
∑ =
−
= 4
2
2
2
)1(
i iN
LN
L
∑=
−
= 4
2
3
3
)1(
i iN
LN
L
L4 = L – L3 – L2 – 1
4. Add the phase information into a beacon frame
5. Broadcast the beacon frame
8. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
32
send a request to the coordinator for the allocation of time slots in the CAP. According to the
number of requests received, the coordinator also allocates TDMA slots in the CFP. To alleviate
the collision of data traffic, a GTS scheduling criterion is defined. For P1 and P3, the data are
transmitted immediately after successfully accessing the channel in the CAP. However, for P2
and P4, the nodes uniformly send GTS request command frames in the CAP to apply for GTS
allocation. The data transfer procedures for different priorities of traffic are shown in Figures 6
and 7. In the CAP, TA-MAC employs the priority-based CSMA/CA procedure, which is based on
the IEEE 802.15.6 standard. Each priority class has differentiated maximum/minimum contention
windows and contention probability values to provide priority-based channel access to satisfy the
QoS requirements of WBANs [5]
Figure 5. Algorithm for nodes
Figure 6. Data transfer for P1 and P3 Figure 7. Data transfer for P2 and P4
Algorithm for nodes
1. Start of CAP
2. Receive a beacon from the coordinator
3. if (new nodes)
Send associate request to the coordinator
end if
4. if (node is already in the network and data packet is available)
4.1 if (P1)
Send P1 data
end if
4.2 if (P2)
Send GTS request
end if
4.3 if (P3)
Send P3 data
end if
4.4 if (P4)
Send GTS request
end if
end if
5. End of CAP
9. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
33
4. PERFORMANCE EVALUATION
In this section, the performance of the proposed TA-MAC is evaluated via computer simulation
and then compared to the existing IEEE 802.15.4 MAC [2] and NPCA-MAC [22] protocols.
4.1. Performance Metrics
The performance metrics used in our simulation are average transmission time, throughput,
energy efficiency, and collision ratio. In this subsection, they are summarized in brief.
Average transmission time: In a WBAN, sensor nodes transmit their packets to the coordinator.
In this paper, the transmission time is defined as the end-to-end delay from a sensor node to the
coordinator. Many packets are transmitted from different sensor nodes to the coordinator for
extended periods of time; therefore, the average transmission time is used in our performance
study.
Throughput: Throughput refers to the actual level of network traffic put through the network
across an end-to-end communication path between a transmitting node and one or more receiving
nodes. It is defined as the average transmission rate of successfully delivered bits per second over
a communication channel.
Energy Efficiency: Energy efficiency is one of the key requirements for WBAN MAC protocol
designs. Energy consumption depends on the behaviour of the nodes on the network. A network
with heavy traffic has higher energy consumption than one with low traffic activity. To
comprehensively compare the MAC protocols, we calculated average energy consumption per bit
to evaluate energy efficiency. The energy consumption per bit is defined as the total energy
consumption over the total number of bits delivered during a simulation run [26].
Collision Ratio: The main objectives for WBANs are to achieve the maximum throughput,
minimum delay, and maximum lifespan by controlling the primary sources of energy waste; i.e.,
idle listening, overhearing, control packet overhead, and collision. A collision occurs when two or
more nodes transmit data packets simultaneously. If the network contains a large number of nodes,
the number of collisions increases. In general, the network load can be indicated as the ratio of the
number of collisions over the number of packets transmitted.
4.2. Simulation Environment
Our performance simulation was extensively performed by the ns-2 network simulator version
2.35. It is assumed that several biomedical sensors are attached to or implanted into the human
body. The sensors collect the sensed data and transmit them to the central coordinator, resulting in
a star topology. All sensor nodes are randomly deployed within a 5 m radius around the central
coordinator, and data are transmitted using one-hop communication [22].
10. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
34
Table 2. Simulation parameters.
Parameter Value
Channel rate 250 kbps
Frequency band 2.4 GHz
Symbol times 16 µs
Superframe duration 122.88 ms
Transition time 194 µs
aUnitBackoffPriod 20 symbols
macBeaconOrder (BO) 3*
macMaxCSMABackoffs 5*
macMinBE 3*
macMaxBE 5*
Idle power 712 µW
Transmission power 36.5 mW
Reception power 41.4mW
*
No specific unit is used for the four system parameters [2].
The network parameters used for simulation are summarized in Table 2 as in [27]. Only 20
percent of the nodes generate P1 traffic during each simulation. In our simulation, the physical
layer parameters conform to the IEEE 802.15.4 standard. The protocols under evaluation are
based on the beacon enable mode, and the values of the two parameters SO and BO in Table 2
determine the superframe duration (SD) and the beacon interval (BI), respectively. We assume
that the channel gain is stationary for both control and data packet transmission durations. Packet
loss is only due to collision, and small-scale fading is neglected. Poisson arrival is assumed to
model the random packet arrival process [26]. In addition, we consider only the general
application scenario of WBANs where all data transmissions are initiated by sensor nodes toward
the coordinator. In the proposed TA-MAC, the contention window values based on priority are
modelled as in the IEEE 802.15.6 MAC standard. This is because not only random backoff
exponential but also contention window values are not prioritized in the IEEE standard.
4.3. Simulation Results and Discussion
Figure 8 shows the average transmission time as a function of the number of nodes. IEEE
802.15.4 MAC operates slotted CSMA/CA without a priority-based channel access policy
whereas TA-MAC and NPCA-MAC perform slotted CSMA/CA with a priority-based channel
access policy. Thus, as shown in Figure 8, the average transmission time of IEEE 802.15.4 MAC
has the largest delay compared to the proposed TA-MAC and the conventional NPCA-MAC.
Also, the average transmission time is gradually increased as the number of nodes increases.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
35
Figure 8. Average transmission time
Figure 9 shows the overall network throughput of TA-MAC, IEEE 802.15.4 MAC, and NPCA-
MAC. The network throughput is the total amount of data packets received by the central
coordinator in a time interval. Here, we can see that the throughput of all three protocols increases
as the number of sensor nodes increases. When the network has low traffic load (i.e., less than 15
sensor nodes), all the three protocols perform similarly. With the increased number of sensor
nodes, TA-MAC shows improved throughput over NPCA-MAC and IEEE 802.15.4 MAC. In fact,
the classification of data transfers and the allocation of GTSs makes TA-MAC outperform
NPCA-MAC and IEEE 802.15.4 MAC.
Figure 9. Network throughput
12. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
36
Figure 10. Average energy consumption per bit
The average energy consumption per bit is illustrated in Figure 10. The proposed TA-MAC and
NPCA-MAC show better performance than IEEE 802.15.4 MAC in all network scenarios.
However, TA-MAC shows slightly better performance than NPCA-MAC when the number of
nodes is greater than 15. In general, packet collision and retransmission result in more energy
consumption. As the number of nodes increases, the energy consumption of IEEE 802.15.4 MAC
is increased because of increased contention complexity. However, in the proposed TA-MAC,
prioritized channel access with differentiated contention window, classification of data transfer,
and backoff exponential values reduce the contention complexity, number of collisions, and
packet retransmissions.
The collision ratio is shown in Figure 11. The number of collisions increases proportionately with
the number of nodes in the network. IEEE 802.15.4 MAC shows a large number of collisions
compared to TA-MAC and NPCA-MAC. In IEEE 802.15.4 MAC, the collision ratio increases
when the number of nodes is greater than 15. This is because the slotted CSMA/CA without
prioritization does not resolve the contention complexity issue. However, the number of collisions
for TA-MAC and NPCA-MAC is lower than IEEE 802.15.4 MAC due to the prioritized CCA and
random backoff algorithm. For the classification of continuous and discontinuous data transfer,
the proposed TA-MAC shows marginally better performance than NPCA-MAC as the number of
nodes is increased.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
37
Figure 11. Collision ratio
Figure 12 shows the effects of four different priority levels in terms of average transmission time.
In Figure 12, the average transmission time of each priority traffic is shown for TA-MAC and
IEEE 802.15.4 MAC, but the average transmission time of NPCA-MAC is not shown because it
is almost the same as that of the proposed TA-MAC. This is primarily because NPCA-MAC also
divides the CAP into four sub-phases according to the different priority levels of traffic as in TA-
MAC. In NPCA-MAC, however, the continuous and discontinuous data transfer and the use of
GTSs were not taken into account. From Figure 12, we can infer that there is no difference in the
transmission time among all priority traffic under the same MAC. However, TA-MAC shows
better performance than IEEE 802.15.4 MAC.
In the IEEE 802.15.4 based MAC, the collision ratio increases sharply as the number of nodes
and the packet arrival rate are increased. The increased collision ratio causes a serious waste of
radio and network resources. The emergency nodes transmit a small-size data packet in a small
time interval. The throughput is not necessarily a major concern for such an emergency medical
traffic. For CE applications, however, high data rate is a must for improved user experience.
Therefore, the throughput is a key performance metric for CE applications and needs to be given
prime importance. In the proposed TA-MAC, the GTS slots are assigned to the continuous
medical data traffic and CE traffic. Because the number of GTS slots is limited, a significant
number of collisions are more likely to occur and thereby degrade the system performance with
regard to delay and energy efficiency.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
38
Figure 12. Effects of different priority levels
5. CONCLUSIONS
In this paper, we have proposed a novel traffic-aware MAC named TA-MAC in order to support
various QoS requirements in WBANs. The proposed TA-MAC differentiates the access phase of
the CAP and classifies the transfer procedure of priority-based traffic in WBANs. TA-MAC uses
CFPs for continuous and large amounts of data. According to the simulation results, TA-MAC
showed substantial improvements in terms of transmission time, throughput, energy efficiency,
and collision ratio compared to IEEE 802.15.4 MAC and NPCA-MAC.
The various kinds of wireless network services based on IEEE 802.11 (Wi-Fi), IEEE 802.15.1
(Bluetooth), and IEEE 802.15.4 (ZigBee) are possible nowadays in the industrial, scientific, and
medical (ISM) band. The technologies coexist in the same frequency band and, thus, may cause
mutual interference. WBANs operating in highly coexisting environments may suffer from long
packet delay, low network throughput, and high-energy consumption. A possible future work is to
apply cognitive radio and multichannel access to the design of a MAC protocol for WBANs in
order to mitigate the coexisting interference and improve network performance including QoS.
ACKNOWLEDGEMENTS
A preliminary version of this work was presented at the InfoWare 2017 Conference, Nice, France,
July 2017 [28]. The authors wish to thank the editor and anonymous referees for their helpful
comments on improving this paper. This research was supported in part by research fund from
Chosun University, 2018. Correspondence should be addressed to Dr. Sangman Moh
(smmoh@chosun.ac.kr).
15. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
39
REFERENCES
[1] D. Fernandes, A. G. Ferreira, R. Abrishambaf, J. Mendes, andJ. Cabral, (2018) “Survey and
taxonomy of transmissions power control mechanisms for wireless body area networks,” IEEE
Communications Surveys and Tutorials, vol. 20, no. 2, pp. 1292-1328
[2] IEEE, (2006) “IEEE Std.802.15.4: Wireless medium access control (MAC) and physical layer (PHY)
specifications for low data rate wireless personal area networks (WPAN),” Piscataway, NJ, USA
[3] X. Yang, L. Wang, and Z. Zhang, (2018) “Wireless body area networks MAC protocol for energy
efficiency and extending lifetime,” IEEE Sensors Letters, vol. 2, no. 1, pp. 1-4
[4] B. Liu, Z. Yan, and C. W. Chen, (2017) “Medium access control for wireless body area networks with
QoS provisioning and energy efficient design,” IEEE Transactions on Mobile Computing, vol. 16, no.
2, pp. 422-434
[5] S. Ullah, M. Chen, and K. Kwak, (2012) “Throughput and delay analysis of IEEE 802.15.6 based
CSMA/CA protocol,” Journal of Medical Systems, vol. 36, no. 6, pp. 3875-3891
[6] S. Bhandari and S. Moh, (2015) “A survey of MAC Protocols for cognitive radio body area
networks,” Sensors, vol. 15, pp. 9189-9209
[7] E. Kartsakli, A. Lalos, A. Antonopoulos, S. Tennina, M. Renzo, L. Alonso, and C. Verikoukis,
(2014) “A survey on M2M systems for mHealth: A wireless communications perspective,” Sensors,
vol. 14, pp. 18009-18052
[8] R. Cavallari, F. Martelli, R. Rosini, C. Buratti, and R. Verdone, (2014) “A survey on wireless body
area networks: Technologies and design challenges,” IEEE Communications Surveys & Tutorials,
vol. 16, pp. 1635-1657
[9] T. Le and S. Moh, (2015) “Interference mitigation schemes for wireless body area sensor networks: A
comparative survey,” Sensors, vol. 15, pp. 13805-18838
[10] S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, (2003) “Analysis of IEEE 802.11e for
QoS support in wireless LANs,” IEEE Wireless Communications, vol. 10, No. 3, pp. 40-50
[11] N. F. Timmons and W. G. Scanlon, (2004) “Analysis of the performance of IEEE 802.15.4 for
medical sensor body area networking,” in Proc. of 1st Annual IEEE Communications Society
Conference on Sensor and Ad Hoc Communications and Networks, pp. 16-24
[12] T. Falck, J. Espina, J. P. Ebert, and D. Dietterle, (2006) “BASUMA – The sixth sense for chronically
ill patients,” in Proc. of International Workshop on Wearable and Implantable Body Sensor Networks,
pp. 1-6
[13] G. Fang and E. Dutkiewicz, (2009) “BodyMAC: Energy efficient TDMA-based MAC protocol for
Wireless Body Area Network,” in Proc. of 9th International Symposium on Communications and
Information Technology, pp. 1455-1459
[14] Z. Yan and B. Liu, (2011) “A context aware MAC protocol for medical wireless body area network,”
in Proc. of 7th Int. Wireless Communication and Mobile Computing Conf. (IWCMC 2011), pp. 2133-
2138
[15] L. Huaming and T. Jindong, (2010) “Heartbeat-driven medium-access control for body sensor
networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 44-51
16. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
40
[16] C. Li, L. Wang, J. Li, B. Zhen, H.-B. Li, and R. Kohno, (2009) “Scalable and robust medium access
control protocol in wireless body area networks,” in Proc. of IEEE 20th International Symposium on
Personal, Indoor and Mobile Radio Communications, pp. 2127-2131
[17] W. Lee, S. H. Rhee, Y. Kim, and H. Lee, (2009) “An efficient multi-channel management protocol
for wireless body area networks,” in Proc. of International Conference on Information Networking,
pp.1-5
[18] I. Anjum, N. Alam, M. A. Razzaque, M. Mehedi Hassan, and A. Alamri, (2013) “Traffic priority and
load adaptive mac protocol for qos provisioning in body sensor networks,” International Journal of
Distributed Sensor Networks, vol. 2013, pp. 1-9
[19] K. S. Kwak and S. Ullah, (2010) “A traffic-adaptive MAC protocol for WBAN,” in Proc. of IEEE
GLOBECOM Workshops, pp. 1286-1289
[20] O. Md. Rahman, C. S. Hong, S. Lee, and Y.-C. Bang, (2011) “ATLAS: A traffic load aware sensor
MAC design for collaborative body area sensor networks,” Sensors, vol. 11, no.12, pp. 11560-11580
[21] M. M. Alam, O. Berder, D. Menard, and O. Sentieys, (2012) “TAD-MAC: traffic-aware dynamic
MAC protocol for wireless body area sensor networks,” IEEE Journal on Emerging and Selected
Topics in Circuits and Systems, vol. 2, no. 1, pp. 109-119
[22] B. Kim and J. Cho, (2012) “A novel priority-based channel access algorithm for contention-based
MAC protocol in WBANs,” in Proc. of 6th International Conference on Ubiquitous Information
Management and Communication (ICUIMC 2012), pp. 1-5
[23] S. Ullah, M. Imran, and M. Alnuem, (2014) “A hybrid and secure priority-guaranteed MAC protocol
for wireless body area network,” International Journal of Distributed Sensor Networks, vol. 2014, pp.
1-7
[24] C. Li, B. Hao, K. Zhang, Y. Liu, and J. Li, (2011) “A novel medium access control protocol with low
delay and traffic adaptivity for wireless body area networks,” Journal of Medical Systems, pp. 1265-
1275
[25] S. Jin, Z. Weixia, and Z. Zheng, (2013) “Priority-based adaptive timeslot allocation scheme for
wireless body area network,” in Proc. of 13th International Symposium on Communications and
Information Technologies, pp. 609-614
[26] Y. Zhang and G. Dolmans, (2010) “Priority-guaranteed MAC protocol for emerging wireless body
area networks,” Annals of Telecommunications, vol. 66, pp. 229-241
[27] X. Liang and I. Balasingham, (2007) “Performance analysis of the IEEE 802.15.4 based ECG
monitoring network,” in Proc. of 7th International Conferences on Wireless and Optical
Communications, pp. 99-104
[28] S. Bhandari, K. Singh, and S. Moh, (2017) “Traffic-Aware Medium Access Control Protocol for
Wireless Body Area Networks,” in Proc. of InfoWare 2017 Conference, pp. 1-6
17. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
41
AUTHORS
Sabin Bhandari received his B.E. degree in electronics and communication
engineering from Tribhuvan University, Nepal in 2010. He worked as a
lecturer and project assistant in Kantipur Engineering College, Nepal from
2011 to 2014. He completed his M.E. degree in computer engineering from
Chosun University, Gwangju, South Korea in 2016. His current research
interests include wireless body area networks, wireless sensor networks, and
cognitive radio.
Sangman Moh received his Ph.D. degree in computer engineering from Korea
Advanced Institute of Science and Technology (KAIST), Korea in 2002. Since
late 2002, he has been a professor at the Dept. of Computer Engineering at
Chosun University, Korea. From 2006 to 2007, he was on leave at Cleveland
State University, USA. His research interests include mobile computing and
networking, ad hoc and sensor networks, cognitive radio networks, and parallel
and distributed computing systems. He has published more than 200 papers in
international and domestic journals and conference proceedings, and has held
more than 40 overseas and domestic patents. He serves on the program
committees of international conferences and workshops in his areas of interest
as a chair or member. Dr. Moh is a member of the IEEE, the ACM, the IEICE, the
KIISE, the IEIE, the KIPS, the KICS, the KMMS, the IEMEK, the KISM, and the
KPEA.