So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of transmission time, system throughput, energy efficiency, and collision ratio.
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...IJCNCJournal
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkIJSRD
We consider QoS -aware band sharing in cognitive wireless networks where secondary users are allowed to access the band owned by a primary network provider. The intrusion from secondary users to primary users is forced to be below the tolerable limit. Also, signal to intrusion plus noise ratio (SINR) of each secondary user is maintained higher than a required level for QoS cover. When network load is high, admission control needs to be performed to satisfy both QoS and intrusion constraint. We propose an admission control algorithm which is performed jointly with power manage such that QoS needs of all admitted secondary users are satisfied while keeping the intrusion to primary users below the passable limit. When all secondary users can be supported at minimum rates, we allow them to increase their spread rates and share the spectrum in a fair manner. We formulate the joint power/rate allocation with max-min equality principle as an optimization problem. We show how to change it into a convex optimization problem so that its globally most favourable solution can be obtained. Numerical grades show that the proposed admission control algorithm achieves performance very close to the optimal solution.
This document evaluates the performance of different backoff algorithms for the IEEE 802.15.4 standard using double sensing. It simulates the binary exponential backoff algorithm defined in the standard as well as three other algorithms: exponential increase exponential decrease, exponential increase linear decrease, and exponential increase multiplicative decrease. The results show that for higher node loads, the three alternative algorithms generally perform better than the standard binary exponential backoff in terms of throughput, delay, and energy consumption. Of the four algorithms evaluated, exponential increase exponential decrease consistently provided the best performance.
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ijasuc
The document presents a new Collision Based Contention (CBC) MAC protocol for mobile ad hoc networks.
The CBC protocol aims to improve throughput by dynamically adjusting the contention window size based on the current collision level, rather than using a fixed binary exponential backoff as in 802.11. Under CBC, the contention window is incremented or decremented by varying factors depending on the number of consecutive collisions or successes. This allows the window size to better reflect current network conditions compared to alternatives like MILD, MIMD, and AETF. Simulation results showed CBC outperforms 802.11 BEB and other proposals in terms of throughput, fairness, and delay.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
- The document proposes a modified IEEE 802.15.6 MAC scheme to enhance the performance of wireless body area networks for e-health applications.
- The standard IEEE 802.15.6 MAC scheme is unable to fulfill all the requirements of medical applications in WBANs due to some limitations.
- The proposed MAC scheme modifies the superframe structure, user priorities, and access mechanism of the standard IEEE 802.15.6 to improve reliability, throughput, delay, energy consumption, and fairness.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). Themedical applications of WBAN hasseveral obligatory requirements and constrains
viz. high reliability, strict delaydeadlines and low power consumption.The standard IEEE 802.15.6 MAC
scheme is not able to fulfil the all requirements of medical applications of WBAN. To address this issue we
propose anIEEE 802.15.6-based MAC schemethat is the modification of superframe structure, user
priorities and access mechanism of standard IEEE 802.15.6 MAC scheme. The proposed superframe has
three access phases: random access phases (RAP), manage access phases (MAP) and contention access
phase (CAP). The proposed four user priorities nodes access the channel during RAP using CAMA/CA
mechanism with a large value of contention window. The proposed MAC scheme uses RTS/CTS access
mechanism instead of basic access mechanism to mitigate the effect of hidden and expose terminal
problem. Moreover, we develop an analytical model to evaluate the performance of proposed MAC scheme
and solve the analytical model using Maple. The results show that the modified IEEE802.15.6 MAC
scheme achieve the better performance in terms of reliability, throughput, average access delay, energy
consumption, channel utilization and fairness compared to standard IEEE 802.15.6 MAC scheme in Ehealth applications.
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of transmission time, system throughput, energy efficiency, and collision ratio.
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...IJCNCJournal
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkIJSRD
We consider QoS -aware band sharing in cognitive wireless networks where secondary users are allowed to access the band owned by a primary network provider. The intrusion from secondary users to primary users is forced to be below the tolerable limit. Also, signal to intrusion plus noise ratio (SINR) of each secondary user is maintained higher than a required level for QoS cover. When network load is high, admission control needs to be performed to satisfy both QoS and intrusion constraint. We propose an admission control algorithm which is performed jointly with power manage such that QoS needs of all admitted secondary users are satisfied while keeping the intrusion to primary users below the passable limit. When all secondary users can be supported at minimum rates, we allow them to increase their spread rates and share the spectrum in a fair manner. We formulate the joint power/rate allocation with max-min equality principle as an optimization problem. We show how to change it into a convex optimization problem so that its globally most favourable solution can be obtained. Numerical grades show that the proposed admission control algorithm achieves performance very close to the optimal solution.
This document evaluates the performance of different backoff algorithms for the IEEE 802.15.4 standard using double sensing. It simulates the binary exponential backoff algorithm defined in the standard as well as three other algorithms: exponential increase exponential decrease, exponential increase linear decrease, and exponential increase multiplicative decrease. The results show that for higher node loads, the three alternative algorithms generally perform better than the standard binary exponential backoff in terms of throughput, delay, and energy consumption. Of the four algorithms evaluated, exponential increase exponential decrease consistently provided the best performance.
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ijasuc
The document presents a new Collision Based Contention (CBC) MAC protocol for mobile ad hoc networks.
The CBC protocol aims to improve throughput by dynamically adjusting the contention window size based on the current collision level, rather than using a fixed binary exponential backoff as in 802.11. Under CBC, the contention window is incremented or decremented by varying factors depending on the number of consecutive collisions or successes. This allows the window size to better reflect current network conditions compared to alternatives like MILD, MIMD, and AETF. Simulation results showed CBC outperforms 802.11 BEB and other proposals in terms of throughput, fairness, and delay.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
- The document proposes a modified IEEE 802.15.6 MAC scheme to enhance the performance of wireless body area networks for e-health applications.
- The standard IEEE 802.15.6 MAC scheme is unable to fulfill all the requirements of medical applications in WBANs due to some limitations.
- The proposed MAC scheme modifies the superframe structure, user priorities, and access mechanism of the standard IEEE 802.15.6 to improve reliability, throughput, delay, energy consumption, and fairness.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). Themedical applications of WBAN hasseveral obligatory requirements and constrains
viz. high reliability, strict delaydeadlines and low power consumption.The standard IEEE 802.15.6 MAC
scheme is not able to fulfil the all requirements of medical applications of WBAN. To address this issue we
propose anIEEE 802.15.6-based MAC schemethat is the modification of superframe structure, user
priorities and access mechanism of standard IEEE 802.15.6 MAC scheme. The proposed superframe has
three access phases: random access phases (RAP), manage access phases (MAP) and contention access
phase (CAP). The proposed four user priorities nodes access the channel during RAP using CAMA/CA
mechanism with a large value of contention window. The proposed MAC scheme uses RTS/CTS access
mechanism instead of basic access mechanism to mitigate the effect of hidden and expose terminal
problem. Moreover, we develop an analytical model to evaluate the performance of proposed MAC scheme
and solve the analytical model using Maple. The results show that the modified IEEE802.15.6 MAC
scheme achieve the better performance in terms of reliability, throughput, average access delay, energy
consumption, channel utilization and fairness compared to standard IEEE 802.15.6 MAC scheme in Ehealth applications.
IJWMN -Effects Investigation of MAC and PHY Layer Parameters on the Performan...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layer and medium access control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area Networks (WBAN). The most suitable way for enhancing network performance is to be the choice of different MAC and PHY parameters based on quality of service (QoS) requirements of different applications. The impact of different MAC and PHY parameters on the network performance and the tradeoff relationship between the parameters are essential to overcome the limitations of exiting carrier sense multiple access with collision avoidance (CSMA/CA) scheme of IEEE 802.15.6 standard. To address this issue, we develop a Markov chain-based analytical model of IEEE 802.15.6 CSMA/CA for all user priorities (UPs) and apply this general model to different network scenarios to investigate the effects of the packet arrival rate, channel condition, payload size, access phase length, access mechanism and number of nodes on the performance parameters viz. reliability, normalized throughput, energy consumption and average access delay. Moreover, we conclude the effectiveness of different access phases, access mechanisms and user priorities of intra-WBAN.
EFFECTS INVESTIGATION OF MAC AND PHY LAYER PARAMETERS ON THE PERFORMANCE OF I...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layer and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). The most suitable way for enhancing network performance is to be the choice of
different MAC and PHY parameters based on quality of service (QoS) requirements of different
applications. The impact of different MAC and PHY parameters on the network performance and the tradeoff relationship between the parameters are essential to overcome the limitations of exiting carrier sense
multiple access with collision avoidance (CSMA/CA) scheme of IEEE 802.15.6 standard. To address this
issue, we develop a Markov chain-based analytical model of IEEE 802.15.6 CSMA/CA for all user
priorities (UPs) and apply this general model to different network scenarios to investigate the effects of the
packet arrival rate, channel condition, payload size, access phase length, access mechanism and number of
nodes on the performance parameters viz. reliability, normalized throughput, energy consumption and
average access delay. Moreover, we conclude the effectiveness of different access phases, access
mechanisms and user priorities of intra-WBAN.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc
Networks to conserve more energy in the system. This technique when combined with other power saving
systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing
result. In designing Medium Access Control (MAC), developing a framework and giving a detailed
implementation procedure are among the factors that hinder the process; specifically in MANETs not to
mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure
and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control
(UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of
transmission, channelization, and receiver pattern of the Physical layer is specified in this research work.
The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWB-...pijans
This paper proposes a framework, implementation procedure, and algorithm for an asynchronous power saving ultra-wideband medium access control (UWB-MAC) using a steerable directional antenna in mobile ad hoc networks (MANETs). It presents a framework with three main components: spectrum scheduling, energy optimization, and quality of service. It then describes the implementation procedure for the physical layer transmission including channelization and modulation. Finally, it concludes by presenting an algorithm for the asynchronous power saving of the proposed UWB-MAC protocol using a steerable directional antenna. The goal is to reduce energy consumption in MANETs through an efficient power management scheme.
Framework, Implementation and Algorithm for Asynchronous Power Saving of UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc Networks to conserve more energy in the system. This technique when combined with other power saving systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing result. In designing Medium Access Control (MAC), developing a framework and giving a detailed implementation procedure are among the factors that hinder the process; specifically in MANETs not to mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control (UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of transmission, channelization, and receiver pattern of the Physical layer is specified in this research work. The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkIRJET Journal
This document summarizes a proposed technique called Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Networks. The technique aims to determine congested paths using CCNF frames and provide rerouting to less congested paths before congestion occurs to reduce burden on congested nodes. It allows continued packet transmission on congested paths until a rerouting path is found during congestion scenarios. When a packet is transmitted on the new path, the previous path is deleted to avoid further delay. Sequence numbers are used to avoid flooding the network. The paper compares this Modified PREQ technique to other congestion avoidance techniques to improve throughput and average delay using an NS-3 simulator.
Secure and Service-Oriented Network Control Framework for WiMAX Networks
IEEE 802.16 supports both TDD ( time-division duplex) and FDD (frequency-division duplex)
Multihop communication is needed for deployment of wimax network. Because of multihop
Security is issues associated with wimax network
Issue is how to support different services and applications in WiMAX networks
The document discusses the Minimum Cost Forwarding (MCF) routing protocol for wireless sensor networks. MCF establishes optimal routing paths with few message exchanges and is scalable and simple to implement. The authors formally model MCF as timed automata and use model checking to verify its properties. Their analysis identified weaknesses in MCF concerning equal-cost paths and node failures. The authors present improvements to address deficiencies in the original MCF protocol.
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksIJMER
The document discusses the Minimum Cost Forwarding (MCF) routing protocol for wireless sensor networks. MCF establishes optimal routing paths with few message exchanges and is scalable and simple to implement. The authors formally model MCF as timed automata and use model checking to verify its properties. Their analysis identified weaknesses in MCF concerning equal-cost paths and node failures. The authors present improvements to address deficiencies in the original MCF protocol.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
The document analyzes the performance of the Hybrid Efficient and Reliable MAC (HER-MAC) protocol in Vehicular Ad Hoc Networks (VANETs) under non-saturated conditions. It develops 1-D and 2-D Markov chain models to evaluate the packet delivery ratio of safety and non-safety applications respectively. The models consider elements like backoff freezing timer, backoff stages, and short retry limit to better accommodate IEEE 802.11p specifications and provide more accurate estimations of channel access and packet delivery ratio. Simulation results validate the analytical models and show their performance outperforms existing models, especially in terms of packet delivery ratio under different numbers of vehicles and contention windows.
This document provides an overview of queuing theory models used to analyze the performance of IEEE 802.11 wireless networks. It discusses how queuing models can measure metrics like throughput, delay, and packet loss. It also reviews the IEEE 802.11 standard, including the distributed coordination function (DCF) used for medium access control and quality of service enhancements in 802.11e. The goal is to identify the most accurate queuing or probability models for designing wireless LANs that consider performance and meet QoS requirements.
This document summarizes a research paper that proposes a new routing algorithm called Quadrant-Based Directional Routing (Q-DIR) for multihop wireless networks. Q-DIR is implemented as a cross-layer with Contention Window Adaptation Mechanism (CWAM) to reduce network power consumption and increase throughput. Q-DIR limits flooding to the quadrant containing the source and destination nodes. CWAM adapts the contention window size based on node traffic to improve throughput. Simulation results show that Q-DIR with CWAM outperforms standard flooding protocols by utilizing fewer nodes and increasing throughput while reducing power consumption.
This document provides a progress report on research being conducted on energy management in wireless sensor networks using a modified MAC protocol. The report details work done so far, including modeling MAC protocols in OMNeT++, simulation results comparing BMAC, LMAC, and XMAC, and ongoing work to avoid collisions during packet transmission to improve energy efficiency. Future work includes further optimizing the modified MAC protocol and publishing results in peer-reviewed journals.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
This document summarizes an article that proposes an elastic hybrid medium access control (MAC) protocol for wireless sensor networks. The protocol aims to improve performance for diverse quality of service requirements by dynamically adapting between contention-based CSMA/CA and scheduled TDMA transmission schemes depending on traffic conditions. It allows nodes to transmit using CSMA/CA for low traffic, reserves more slots for TDMA scheduling as traffic increases, and provides an emergency contention-free period at the start of frames for urgent data. Simulation results showed improved performance over typical protocols in terms of queue delay, packet delivery ratio, and frame drops. The proposed elastic hybrid approach aims to balance efficiencies across various QoS metrics by flexibly distributing the transmission strategies in response
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
More Related Content
Similar to A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless Body Area Networks
IJWMN -Effects Investigation of MAC and PHY Layer Parameters on the Performan...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layer and medium access control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area Networks (WBAN). The most suitable way for enhancing network performance is to be the choice of different MAC and PHY parameters based on quality of service (QoS) requirements of different applications. The impact of different MAC and PHY parameters on the network performance and the tradeoff relationship between the parameters are essential to overcome the limitations of exiting carrier sense multiple access with collision avoidance (CSMA/CA) scheme of IEEE 802.15.6 standard. To address this issue, we develop a Markov chain-based analytical model of IEEE 802.15.6 CSMA/CA for all user priorities (UPs) and apply this general model to different network scenarios to investigate the effects of the packet arrival rate, channel condition, payload size, access phase length, access mechanism and number of nodes on the performance parameters viz. reliability, normalized throughput, energy consumption and average access delay. Moreover, we conclude the effectiveness of different access phases, access mechanisms and user priorities of intra-WBAN.
EFFECTS INVESTIGATION OF MAC AND PHY LAYER PARAMETERS ON THE PERFORMANCE OF I...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layer and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). The most suitable way for enhancing network performance is to be the choice of
different MAC and PHY parameters based on quality of service (QoS) requirements of different
applications. The impact of different MAC and PHY parameters on the network performance and the tradeoff relationship between the parameters are essential to overcome the limitations of exiting carrier sense
multiple access with collision avoidance (CSMA/CA) scheme of IEEE 802.15.6 standard. To address this
issue, we develop a Markov chain-based analytical model of IEEE 802.15.6 CSMA/CA for all user
priorities (UPs) and apply this general model to different network scenarios to investigate the effects of the
packet arrival rate, channel condition, payload size, access phase length, access mechanism and number of
nodes on the performance parameters viz. reliability, normalized throughput, energy consumption and
average access delay. Moreover, we conclude the effectiveness of different access phases, access
mechanisms and user priorities of intra-WBAN.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc
Networks to conserve more energy in the system. This technique when combined with other power saving
systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing
result. In designing Medium Access Control (MAC), developing a framework and giving a detailed
implementation procedure are among the factors that hinder the process; specifically in MANETs not to
mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure
and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control
(UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of
transmission, channelization, and receiver pattern of the Physical layer is specified in this research work.
The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWB-...pijans
This paper proposes a framework, implementation procedure, and algorithm for an asynchronous power saving ultra-wideband medium access control (UWB-MAC) using a steerable directional antenna in mobile ad hoc networks (MANETs). It presents a framework with three main components: spectrum scheduling, energy optimization, and quality of service. It then describes the implementation procedure for the physical layer transmission including channelization and modulation. Finally, it concludes by presenting an algorithm for the asynchronous power saving of the proposed UWB-MAC protocol using a steerable directional antenna. The goal is to reduce energy consumption in MANETs through an efficient power management scheme.
Framework, Implementation and Algorithm for Asynchronous Power Saving of UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc Networks to conserve more energy in the system. This technique when combined with other power saving systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing result. In designing Medium Access Control (MAC), developing a framework and giving a detailed implementation procedure are among the factors that hinder the process; specifically in MANETs not to mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control (UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of transmission, channelization, and receiver pattern of the Physical layer is specified in this research work. The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkIRJET Journal
This document summarizes a proposed technique called Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Networks. The technique aims to determine congested paths using CCNF frames and provide rerouting to less congested paths before congestion occurs to reduce burden on congested nodes. It allows continued packet transmission on congested paths until a rerouting path is found during congestion scenarios. When a packet is transmitted on the new path, the previous path is deleted to avoid further delay. Sequence numbers are used to avoid flooding the network. The paper compares this Modified PREQ technique to other congestion avoidance techniques to improve throughput and average delay using an NS-3 simulator.
Secure and Service-Oriented Network Control Framework for WiMAX Networks
IEEE 802.16 supports both TDD ( time-division duplex) and FDD (frequency-division duplex)
Multihop communication is needed for deployment of wimax network. Because of multihop
Security is issues associated with wimax network
Issue is how to support different services and applications in WiMAX networks
The document discusses the Minimum Cost Forwarding (MCF) routing protocol for wireless sensor networks. MCF establishes optimal routing paths with few message exchanges and is scalable and simple to implement. The authors formally model MCF as timed automata and use model checking to verify its properties. Their analysis identified weaknesses in MCF concerning equal-cost paths and node failures. The authors present improvements to address deficiencies in the original MCF protocol.
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksIJMER
The document discusses the Minimum Cost Forwarding (MCF) routing protocol for wireless sensor networks. MCF establishes optimal routing paths with few message exchanges and is scalable and simple to implement. The authors formally model MCF as timed automata and use model checking to verify its properties. Their analysis identified weaknesses in MCF concerning equal-cost paths and node failures. The authors present improvements to address deficiencies in the original MCF protocol.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
The document analyzes the performance of the Hybrid Efficient and Reliable MAC (HER-MAC) protocol in Vehicular Ad Hoc Networks (VANETs) under non-saturated conditions. It develops 1-D and 2-D Markov chain models to evaluate the packet delivery ratio of safety and non-safety applications respectively. The models consider elements like backoff freezing timer, backoff stages, and short retry limit to better accommodate IEEE 802.11p specifications and provide more accurate estimations of channel access and packet delivery ratio. Simulation results validate the analytical models and show their performance outperforms existing models, especially in terms of packet delivery ratio under different numbers of vehicles and contention windows.
This document provides an overview of queuing theory models used to analyze the performance of IEEE 802.11 wireless networks. It discusses how queuing models can measure metrics like throughput, delay, and packet loss. It also reviews the IEEE 802.11 standard, including the distributed coordination function (DCF) used for medium access control and quality of service enhancements in 802.11e. The goal is to identify the most accurate queuing or probability models for designing wireless LANs that consider performance and meet QoS requirements.
This document summarizes a research paper that proposes a new routing algorithm called Quadrant-Based Directional Routing (Q-DIR) for multihop wireless networks. Q-DIR is implemented as a cross-layer with Contention Window Adaptation Mechanism (CWAM) to reduce network power consumption and increase throughput. Q-DIR limits flooding to the quadrant containing the source and destination nodes. CWAM adapts the contention window size based on node traffic to improve throughput. Simulation results show that Q-DIR with CWAM outperforms standard flooding protocols by utilizing fewer nodes and increasing throughput while reducing power consumption.
This document provides a progress report on research being conducted on energy management in wireless sensor networks using a modified MAC protocol. The report details work done so far, including modeling MAC protocols in OMNeT++, simulation results comparing BMAC, LMAC, and XMAC, and ongoing work to avoid collisions during packet transmission to improve energy efficiency. Future work includes further optimizing the modified MAC protocol and publishing results in peer-reviewed journals.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
This document summarizes an article that proposes an elastic hybrid medium access control (MAC) protocol for wireless sensor networks. The protocol aims to improve performance for diverse quality of service requirements by dynamically adapting between contention-based CSMA/CA and scheduled TDMA transmission schemes depending on traffic conditions. It allows nodes to transmit using CSMA/CA for low traffic, reserves more slots for TDMA scheduling as traffic increases, and provides an emergency contention-free period at the start of frames for urgent data. Simulation results showed improved performance over typical protocols in terms of queue delay, packet delivery ratio, and frame drops. The proposed elastic hybrid approach aims to balance efficiencies across various QoS metrics by flexibly distributing the transmission strategies in response
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
International Conference on NLP, Artificial Intelligence, Machine Learning an...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless Body Area Networks
1. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
DOI: 10.5121/ijcnc.2024.16208 117
A NOVEL MEDIUM ACCESS CONTROL STRATEGY
FOR HETEROGENEOUS TRAFFIC IN WIRELESS
BODY AREA NETWORKS
Nabila Azdad and Mohamed Elboukhari
MATSI Laboratory. ESTO, Mohammed First University, 60000 Oujda, Morocco
ABSTRACT
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of
intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of
one or more types of sensors that can be embedded in clothing, attached directly to the body, or even
implanted beneath an individual's skin. These sensors typically serve a single application. However, the
traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual
approach: tailored treatment based on the specific needs of each traffic type and the fulfillment of
application requirements, such as reliability and timeliness. Nevertheless, the presence of energy
constraints and the unreliable nature of wireless communications make QoS provisioning under such
networks a non-trivial task. In this context, the current paper introduces a novel Medium Access Control
(MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency
when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular
focus on improving reliability, timeliness, and energy efficiency.
KEYWORDS
WBAN, Requirements, tailored treatment, MAC strategy, enhanced efficiency.
1. INTRODUCTION
In recent years, Wireless Body Area Networks have garnered worldwide attention due to their
immense potential to improve healthcare quality [1], [2]. This class of networks operates within,
on, or near to the human body, utilizing one or more types of miniaturized body sensors and a
single body central unit. Each sensor collects essential health data and wirelessly transmits it to
the central unit, which can then display the corresponding information on a user interface or
transmit the gathered data to off-site medical centers for further processingusing a long-range
wireless network [3].
The WBAN traffic is categorized into Normal, Emergency, and On-demand [4]. Normal traffic
comprises data generated periodically or at regular intervals without any unexpected events.
Emergency traffic is initiated by nodes when they exceed a predefined threshold, while On-
demand traffic is initiated by authorized personnel to acquire specific health status information.
In the overall architecture of WBANs, two levels of communications can be distinguished: intra-
WBAN communications taking place between sensors and the central unit, and extra-WBAN
communications that allow sensory data to be transmitted to remote destinations.
Based on the literature, the great majority of the MAC protocols proposed for intra-WBAN
communications are primarily derived from the beacon-enabled mode with superframe of the
2. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
118
IEEE norms 802.15.4 and 802.15.6 [5][6]. According to our literature review, all these works try
to differentiate the channel access of nodes based on their data priority or traffic category and
enhance the overall network performance at the expense of some specific nodes within the
regular traffic category.
In the current paper, we propose a new Fairness-oriented MAC protocol (F-MAC) for the
regular traffic applications of WBAN, derived from the beacon-enabled operation of the
standardized protocol IEEE 802.15.4-MAC. The main aim of our proposal is to ensure equitable
access configuration among the different categories of the accommodated traffic by configuring
the access of each traffic category in a way that suits it for better performance
The remainder of this paper is organized as follows. In section 2, we explain briefly the beacon-
enabled operation of IEEE 802.15.4. Some related works are presented in section 3. In section 4,
we describe and evaluate our new protocol. Finally, section 5 concludes the paper.
2. THE BEACON-ENABLED OPERATION OF IEEE802.15.4
In the beacon-enable mode of IEEE 802.15.4 [7], [8], the channel time is divided into periodic
superframe structures, at the beginning of which, the coordinator node sends a beacon frame to
sensor nodes. At the reception of this frame, each body sensor gets knowledge of two important
events, which are, superframe duration, and when it can transmit its data to the coordinator. This
is done through two MAC parameters included in the beacon, the Beacon Order (BO) and the
Superframe Order (SO).
Each superframe consists of two parts: the active part during which sensors transmit their data to
the coordinator node, and the inactive part where sensors turntheir radios off and go into power-
saving mode (sleep). The active period consists of 16 equally spaced slots and can be divided in
turn into two sub-parts: Contention Access Period (CAP) where node contend for channel access
using Slotted CSMA/CA mechanism, and an optional Contention Free Period (CFP) where up to
7 Guaranteed Time Slots (GTS) may be reserved for some specific sensor to access the channel
without contention.
The duration of the active period (AP), as well as the beacon interval (BI) of IEEE 802.15.4
superframes, are respectively determined through SO and BO parameters as follows:
AP = aBaseSuperframeDuration * 2SO
(1)
BI = aBaseSuperframeDuration * 2BO
(2)
Where a Base Superframe Duration is the minimum superframe duration, and 0 ≤ SO ≤ BO ≤ 14.
Within superframes [9], all transmissions should be synchronized with the beacon frame to take
place between the superframe limits and end before the arrival of the next beacon. Furthermore,
The Slotted CSMA/CA mechanism uses a basic time unit called Backoff Period (BP), the BP
boundaries of every node must be aligned with the superframe slot boundaries, andeach operation
of Slotted CSMA/CA can only occur at the boundary of a BP.
The contention-based mechanism Slotted CSMA/CA mainly depends on three parameters:
BE (Backoff-Exponent): Determines the duration for which a node has to wait before attempting
a frame transmission (backoff). The value of BE is initialized to a variable of the CSMA/CA
algorithm, namely macMinBE.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
119
macMaxFrameRetries: This represents the maximum number of retransmissions that a node can
perform before dropping a frame if no acknowledgment is received.
macMaxCSMABackoffs: This represents the maximum number of times the node will check
if thechannel is busy before dropping a frame.
Using this mechanism [10], whenever a node has a packet to transmit, it waits for a random value
of backoff period (BP) chosen in the range of [0, 2BE
–1]. At the end of this period, it performs a
clear channel assessment (CCA) to sense the channel status. If the channel is continuously
detected idle for CW = 2 times, it transmits one packet and waits for the acknowledgment (ack).
If no ACK is received, it should repeat the process of packet transmission (up to
macMaxFrameRetries times). However, if the channel is sensed busy, it increments its BE(up to
macMaxBE) and repeats the CSMA/CA wait as well as the CCA execution. If the channel is
detected busy even after macMaxCSMABackoffs re-attempts, no further attempt is made to send
the packet.
3. RELATED WORKS
Based on the literature, the beacon-enabled mode of the IEEE 802.15.4 standard has attracted
increasing interest over the last two decades, and several researchers have tried to make it more
suitable for WBANs using different techniques. Some of these techniques have exploited the
MAC parameters to improve the performance of the standard while remaining within the same
operating logic, whereas others have changed its overall logic. The improvement(s) adopted in
each technique are either static by defining new parameter settings of MAC parameters or/and a
novel communication strategy, or dynamic through dynamically adapting the protocol operation
according to traffic conditions. For example in [11], IEEE 802.15.4 MAC was modified bysetting
the minBE parameter of some nodes to a lower value and changing it based on the traffic
conditions. Due to this enhancement, the modified nodes will have more chances to transmit their
data as compared to the non-modified nodes, which results in a higher throughput performance
for them. In [12], a new solution is proposed to dynamically adjust the backoff exponent value
depending on the buffer state of each node and to vary the number of clear channel assessments
according to traffic conditions. This solution can reduce backoff delay, the probability of collision
as well as the number of retransmissions in the deployed networks. In [13], a dynamic technique
that adapts the size of the Contention Access Period according to the actual traffic load is proposed
in combination with a new policy that avoids collisions and access congestion problem. In [14], A
new adaptation is proposed for IEEE 802.15.4 MAC parameters to ensure an improved QoS for
time-critical messages. In this solution, instead of having the same CSMA/CA parameters for
high-priority traffic related to command frames and low-priority traffic related to data frames,
authors have assigned each traffic class its own BE and CW. To achieve high energyefficiency and
high performance simultaneously under IEEE 802.15.4-based networks, The authors in [15] have
proposed a new algorithm that increases the active duty cycle in high traffic conditions for higher
packet delivery and throughput and decreases it in low traffic conditions to save more energy.
TaMAC protocol [16] is a Traffic-adaptive MAC protocol that dynamicallyadjusts the duty cycle
of the sensor nodes according to their traffic patterns and data volume. It uses a configurable CAP
period dedicated to transmitting short data using the Slotted Aloha access scheme while the CFP
slots are used for actual data transmission. Furthermore, The TaMAC protocol uses two wakeup
mechanisms: a traffic-based wakeup mechanism for normal traffic, and a wakeup radio
mechanism for emergency and on-demand traffic. PA-MAC [17] protocol prioritizes the traffic
according to different data classes and divides the CAP period into four sub-phases for each
priority level. Furthermore, it implements two different channels: a dedicated beacon channel
(BC) and a data channel (DC). The first one is available for control information exchange. While
the rest of the communication is done through the second. ATLAS protocol [18] adapts the
4. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
120
superframe structure of IEEE 802.15.4 according to the estimated traffic load. And to avoid
energy loss associated with long-range transmission, the proposed design uses a multi-hop
communication pattern. LDTA-MAC protocol [19] proposes a revised superframe structure,
where the CFP and the inactive periods vary according to the dynamic allocation of GTS. The
CAP is used only for sending GTS requests, while the CFP period is dedicated to data
transmissions. To schedule GTS allocation time slots, the coordinator node serves at first the
preexisting GTSs, and then it broadcasts a notification frame for informing nodes about an
extended CFP period that will be used to serve the current allocation requests. U MAC (Urgency
MAC) [20] is a contention-based MAC protocol that allows the transmission of higher priority
information by reducing the number of retransmissions of non-prioritized data.
4. F-MAC:ANEW MAC PROTOCOL FOR WBAN
Based on our performance analysis of IEEE 802.15.4 presented in [9], we have noticed that
although increasing the values of Slotted CSMA/CA parameters can significantly improve the
performance of WBAN under low traffic conditions, it degrades the performance of networks
under moderate to high traffic loads. Thus, a single choice for the values of the CSMA/CA
parameters does not achieve optimum performance in all traffic conditions. On the other hand,
we have noted that the manipulation of superframe parameters may enhance the QoS whatever
the traffic conditions.
In this section, we propose a new Fairness-oriented MAC protocol (F-MAC) with the primary
goal of ensuring equitable access to the channel among the different categories of the
accommodated traffic. This is achieved by configuring the access of each category in a way that
optimizes its performance. To serve this purpose, F-MAC distinguishes between two classes of
traffic:
1. Light-periodic traffic: In this class, all nodes generate data at low rates (< 1000 bits/second).
2. Heavy-periodic traffic: In this class, all nodes generate data at moderate to high rates (≥ 1000
bits/second).
To implement our new protocol using the same frames of the IEEE 802.15.4 standard withoutthe
need to add another frame, we have exploited the three reserved bits of the "frame control field"
in the association request for transmitting the traffic class of each sensor. The value of thisfield is
set to 0 if the traffic rate of the node is inferior to 1000 bits/second, and 1 if the sensor node has a
packet rate superior to 1000 bits/second. The detailed operation of our protocol is discussed
below.
4.1. Superframe Structure of F-MAC
As illustrated in Figure 1, the structure of the first superframe in F-MAC is similar to that of the
IEEE 802.15.4 and consists of two parts: a contention access period (CAP1) where nodes contend
for channel access using Slotted CSMA/CA, and an inactive period. Then, each superframe is
further divided into two periods: CAP1 and CAP2. CAP1 handles light traffic, while CAP2 is
designed for heavy traffic. Light traffic is not allowed to access the CAP2 period,during which it
should enter into sleep mode to conserve energy, and vice versa. Figure 2 shows the procedure
adopted by F-MAC for communicating sensory data to the coordinator node."
Figure 1. Transmission channel in F-MAC
5. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
121
At the beginning of each superframe, the coordinator node determines the lengths of its sub-
periods based on the number of nodes in each traffic category. When receiving an association
request from a new sensor node, it extracts the traffic class from the 'reserved field' of the
received frame. If the field value is 0 (indicating the sensor has light data traffic), it increments
NL; if the field value is 1 (indicating the sensor has heavy traffic), it increments NH (cf. Algorithm
1)."
Figure 2. F-MAC data transfer
Algorithm1: Computing the lengths of CAP1 and CAP2
Input:
Let ni ∈ N denotes a node with association request, ci traffic class of ni,
and LCAP1 : The length of CAP1 period in the previous superframe
Output:
NL: Number of nodes with light traffic,
NH: Number of nodes with heavy data traffic,
LCAP1-current :Length of CAP1 in the current superframe
LCAP2-current : Length of CAP2 in the current superframe
NL 0;
NH 0;
while (! End of LCAP1) do
if ci == 1
Increment in NH , i.e., NH + +
else if ci == 0
Increment in NL , i.e., NL + +
end-if
end
LCAP1-current (LCAP1*NL) / (NL + NH)
LCAP2-current (LCAP1*NH ) / (NL + NH)
6. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
122
4.2. Channel Access Schemes
Using Slotted CSMA/CA, sensor nodes must wait for a period of time (backoff period) before
monitoring the channel status and attempting each transmission. This period is selected randomly
within a range determined by the value of BE. If a node detects the channel as busy, it increments
the value of this parameter and hence, its next backoff period will expand. Based on our analyses
presented in [9], choosing a high value for this parameter in low traffic conditions will decrease
the probability of nodes to finishing their backoff periods during the transmission process of
other nodes, which improves the reliability of the deployed networks. However, when contending
nodes require high data rates, the number of transmissions becomes significant, and increasing
the BE value after each transmission failure will, on one hand, increase the competition time
between packets. On the other hand, it will decrease the chances of nodes accessing as compared
to those that did not expand their backoff periods, which increases their buffer overflow
probabilities.
Based on these analyses and to achieve more reliable and fair communications, we have decided
to adopt two versions of Slotted CSMA/CA in our proposal: the traditional profile of Slotted
CSMA/CA for light traffic. And for heavy traffic, we have proposed a new version of slotted
CSMA/CA, namely Fast-CSMA/CA (F-CSMA/CA). In F-CSMA/CA, the contending nodes will
use the same value of BE during all steps of the algorithm without increasing it if the channel is
sensed busy. This new version can decrease buffer overflow probabilities as wellas contention
time under the mentioned conditions.
4.3. Performance Analysis
4.3.1. Simulation setting
For evaluating the performance of our proposal, we have used Castalia Simulator. And we
considered different network configurations, where several sensor nodes are deployed with the
coordinator node (Node #0) in a star topology.
To take into consideration the rapidly changing environments of WBANs (body moving), we
have used the temporal variation model provided by Castalia Simulator.
The considered performance metrics are:
Delivery reliability (measured in terms of packets reception rate (PDR)): which reflectsthe
percentage of data packets that have reached the coordinator node.
Timeliness (measured in terms of the average transmission delay (AD)): this presents the
average of the end-to-end delays of all the packets received by the coordinator node. For
every packet received by the coordinator node, the end-to-end delay is defined by
computing the difference between its generation and arrival times.
Energy efficiency (EE): this presents the global cost (nJ) involving the transmission of a
single bit.
Our simulations were performed under two scenarios:
In scenario A, we set the number of nodes with heavy traffic to 10 and varied the numberof
nodes with light traffic from 5 to 40. Nodes with light traffic generate 60 bits/s (5 packets/s
with a payload of 1.5 bytes), while those with heavy traffic generate 18000bits
/ s (25 packets/s with a payload of 90 bytes).
In scenario B, we fixed the number of nodes with light traffic at 10 and varied the number
7. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
123
of nodes with heavy traffic from 5 to 40. Nodes with light traffic generate 80bits/s (5
packets/s with a payload of 2 bytes), while heavy traffic ones generate 20000bits/s (25
packets/s with a payload of 100 bytes).
Tables 1 and 2 list the considered simulation parameters.
Table I. Radio Parameters
Parameter IEEE
802.15.4
IEEE
802.15.6
F- MAC
Data rate (kbps) 250 1024 1024
Modulation Type PSK DIFFQPSK DIFFQPSK
Bits Per Symbol 4 2 2
Bandwidth (MHz) 20 20 20
Noise Bandwidth
(MHz)
194 1000 1000
Noise Floor (dBm) -100 -104 -104
Sensitivity (dBm) -95 -87 -87
Power Consumed on
reception mode (mW)
62 3.1 3.1
transmission power
(dBm)
-15 -15 -15
Power Consumed on
transmission mode
(mW)
32.67 2.93 2.93
Power consumed on
transition (transmission,
reception) (mW)
62 3 3
Time of transition
(transmission,
reception)
0.01 0.02 0.02
Table II. Simulation Parameters
Parameter IEEE
802.15.4
IEEE
802.15.6
F-MAC
Channel Access
scheme
Slotted
CSMA/CA CSMA/CA
-Slotted
CSMA/CA
-F-CSMA/CA
Simulation time
(second)
600 (10 repetitions)
Packet header
overhead (Bytes)
5
MAC Buffer 32
Mac frame
overhead (Bytes) 14 7 14
Phy Layer
overhead (Bytes)
6
Channel Model Log shadowing wireless model
Path loss
exponent
2.4
For the remaining parameters, we took the default values proposed by Castalia simulator.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
124
4.3.2. Performance Results
a) Delivery reliability
Figures 3 and 4 illustrate the evaluation results of F-MAC under the scenarios A and B in
terms of PDR.
Figure 3. Reliability results under scenario A
Figure 4. Reliability results under scenario B
We can observe that our protocol ensures a significant performance improvement over the IEEE
standards, reaching up to 351.85% improvement over IEEE 802.15.4 and 359.1% improvement
over IEEE 802.15.6. For instance, in a WBAN consisting of 40 sensors with light traffic and 10
sensors generating heavy traffic, F-MAC achieves a Packet Delivery Ratio (PDR) of 79%,
whereas the two standards do not exceed 22%.
In F-MAC, the channel access is restricted according to the traffic category. Indeed, the access
during CAP1 is limited to light traffic, while the access during CAP2 is limited to heavy traffic.
This restriction will, on one hand, reduce the number of collisions and, on the other hand, offer
fair channel access to the different traffic categories, thus improving the deployed network
reliability. However, the performance degradation observed in the topologies consisting of 10
sensors in each traffic category is due to the inefficient use of the bandwidth under such
conditions. Since the number of nodes in the two categories of traffic is equal under this
9. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
125
configuration, the period lengths of CAP1 and CAP2 will be equal, although the traffic of CAP2
is more important than that of CAP1, which degrades the efficiency of the deployed network and
increases the rate of packets loss.
b) Timeliness
Figures 5 and 6 illustrate the delays observed in scenarios A and B.
Figure 5. Timeliness results under scenario A
Figure 6. Timeliness results under scenario B
The results obtained under the two scenarios show that our protocol provides negligible delays
compared to the two IEEE standards and performs better regardless of the traffic conditions. This
improvement can be attributed to the revised superframe structure, which decreases the waiting
time of packets in the buffers (Queuing Delay). In addition, the fair and rapid nature of the access
mechanism adopted by F-MAC under high traffic conditions strongly justifies these results.
c) Energy efficiency
Figures 7 and 8 illustrate the performance results of F-MAC under scenarios A and B in terms of
energy efficiency.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
126
Figure 7. Energy efficiency results under scenario A
Figure 8. Energy efficiency results under scenario B
F-MAC proves to be more economical than the IEEE 802.15.4 standard and demonstrates lower
power consumption than IEEE 802.15.6 in the vast majority of cases. However, the degradation
observed over IEEE 802.15.6-MAC when the number of nodes with light traffic equals that of
nodes with heavy traffic indicates that inefficient bandwidth utilization under suchconditions can
hurt the energy efficiency of the protocol. As nodes would consume more energy while
transmitting their packets. Nevertheless, this degradation is still negligible compared to the
overall improvement in terms of QoS.
5. CONCLUSION
In this research, we have introduced a novel MAC protocol for the periodic heterogeneous traffic
of Wireless Body Area Networks, namely, F-MAC. This protocol uses a fairness-oriented
approach that aims, on the one hand, to ensure a fair access configuration among the different
trafficcategories, and on the other hand, to mitigate high channel contention and collisions. To
evaluatethe performance of F-MAC, we have compared it with the original versions of the IEEE
standards 802.15.4 and 802.15.6 under different traffic patterns using the latest version of the
Castalia Simulator (3.3). Overall, the simulation results show that F-MAC performs more
efficiently, regardless of the traffic conditions, and achieves significant improvements over the
11. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
127
two norms in terms of delivery reliability, timeliness, and energy efficiency. For our future work,
we plan to evaluate the performance of our protocol under other scenarios and adapt it to further
traffic patterns.
CONFLICTS OF INTERESTS
The authors declare no conflict of interest.
REFERENCES
[1] V. O. Nyangaresi, “Privacy Preserving Three-factor Authentication Protocol for Secure Message
Forwarding in Wireless Body Area Networks,” Ad Hoc Networks, vol. 142, p. 103117, 2023.
[2] C. A. Tavera, J. H. Ortiz, O. I. Khalaf, D. F. Saavedra, and T. H. Aldhyani, “Wearable Wireless Body
Area Networks for Medical Applications,” Computational and Mathematical Methods in Medicine,
vol. 2021, 2021.
[3] R. S. Pawar and D. R. Kalbande, “Optimization of quality of service using ECEBA protocol in
wireless body area network,” International Journal of Information Technology, vol. 15, no. 2, pp.
595–610, 2023.
[4] N. Bradai, L. C. Fourati, and L. Kamoun, “WBAN data scheduling and aggregation under
WBAN/WLAN healthcare network,” Ad Hoc Networks, vol. 25, pp. 251–262, 2015.
[5] A. Nabila, “A QoS based comparative analysis of the IEEE standards 802.15. 4 & 802.15. 6 in
WBAN-based healthcare monitoring systems,” presented at the 2019 International Conference on
Wireless Technologies, Embedded and Intelligent Systems (WITS), IEEE, 2019, pp. 1–5.
[6] A. Nabila, “MAC Protocols for WBAN healthcare applications,” presented at the 2019 International
Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), IEEE, 2019, pp.
1–8.
[7] A. M. O. Alawadhi, M. H. Omar, and N. Nordin, “IEEE 802.15. 4 MAC protocol optimisation in
body sensor networks: a survey, outlook and open issues,” International Journal of Communication
Networks and Distributed Systems, vol. 29, no. 3, pp. 315–340, 2023.
[8] I. Howitt and J. A. Gutierrez, “IEEE 802.15. 4 low rate-wireless personal area network coexistence
issues,” presented at the 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003.,
IEEE, 2003, pp. 1481–1486.
[9] N. Azdad and M. el Boukhari, “Performance analysis of the beacon-enabled operation of IEEE
802.15. 4 under WBANs,” presented at the 2019 International Conference on Wireless Networks and
Mobile Communications (WINCOM), IEEE, 2019, pp. 1–5.
[10] A. Nabila and E. Mohamed, “An enhanced backoff strategy for fair channel access in WBAN- based
health monitoring systems,” presented at the 2020 International Conference on Intelligent Systems
and Computer Vision (ISCV), IEEE, 2020, pp. 1–4.
[11] J. Ko, Y. Cho, and H. Kim, “1Performance Evaluation of IEEE 802.15.4 MAC with Different
Backoff Ranges in Wireless Sensor Networks,” in 2006 10th IEEE Singapore International
Conference on Communication Systems, Singapore: IEEE, 2006, pp. 1–5. doi:
10.1109/ICCS.2006.301525.
[12] J. Bhar, “2A Mac Protocol Implementation for Wireless Sensor Network,” Journal of Computer
Networks and Communications, vol. 2015, pp. 1–12, 2015, doi: 10.1155/2015/697153.
[13] J. Hurtado-López and E. Casilari, “3An adaptive algorithm to optimize the dynamics of IEEE 802.15.
4 networks,” presented at the International Conference on Mobile Networks and Management,
Springer, 2013, pp. 136–148.
[14] A. Koubaa, M. Alves, B. Nefzi, and Y.-Q. Song, “4Improving the IEEE 802.15. 4 slotted CSMA/CA
MAC for time-critical events in wireless sensor networks,” 2006.
[15] Y. Kwon and Y. Chae, “5Traffic adaptive IEEE 802.15. 4 MAC for wireless sensor networks,”
presented at the International Conference on Embedded and Ubiquitous Computing, Springer, 2006,
pp. 864–873.
[16] S. Ullah and K. S. Kwak, “An ultra low-power and traffic-adaptive medium access control protocol
for wireless body area network,” Journal of medical systems, vol. 36, no. 3, pp. 1021–1030, 2012.
[17] S. Bhandari and S. Moh, “A priority-based adaptive MAC protocol for wireless body area networks,”
Sensors, vol. 16, no. 3, p. 401, 2016.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.16, No.2, March 2024
128
[18] M. Rahman, C. S. Hong, S. Lee, and Y.-C. Bang, “ATLAS: A traffic load aware sensor MAC design
for collaborative body area sensor networks,” Sensors, vol. 11, no. 12, pp. 11560–11580, 2011.
[19] C. Li, B. Hao, K. Zhang, Y. Liu, and J. Li, “A novel medium access control protocol with low delay
and traffic adaptivity for wireless body area networks,” Journal of medical systems, vol. 35, no. 5, pp.
1265–1275, 2011.
[20] K. A. Ali, J. H. Sarker, and H. T. Mouftah, “Urgency-based MAC protocol for wireless sensor body
area networks,” presented at the 2010 IEEE international conference on communications workshops,
IEEE, 2010, pp. 1–6.
AUTHORS
Nabila Azdad received a Master’s degree in “Intelligent Systems and Networks” from the Faculty of
Sciences and Technologies, Fez, Morocco, in 2016. She is currently a PhD in MATSI Laboratory at
Mohammed First University, Oujda, Morocco. Her research interests include wireless sensor networks and
mobile healthcare.
Mohamed Elboukhari received an MSc degree in computer science in 2005 from the University of
Science, Oujda, Morocco. He is currently a professor at the University of Oujda in the field of computer
science. His research interests include web tracking, and wireless network security.