A Priority-Based Adaptive MAC Protocol for Wireless Body ... - MDPI

8 downloads 24574 Views 4MB Size Report
Mar 18, 2016 - a differentiated quality of service (QoS) for the various forms of traffic .... channel is statically selected by the network coordinator during the ...
sensors Article

A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks Sabin Bhandari and Sangman Moh * Department of Computer Engineering, Chosun University, 309 Pilmun-daero, Dong-gu, Gwangju 61452, Korea; [email protected] * Correspondence: [email protected]; Tel: +82-62-230-6032 Academic Editor: Leonhard M. Reindl Received: 23 January 2016; Accepted: 16 March 2016; Published: 18 March 2016

Abstract: In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio. Keywords: wireless body area networks; mobile healthcare; medium access control; quality of service; traffic priority; coexistence; unlicensed band

1. Introduction With rapid advancements in physiological sensors and wireless communication, wireless sensor networks have grown significantly, supporting a wide range of applications including healthcare and medical services. A wireless body area network (WBAN) is a special-purpose sensor network designed to connect various sensors and actuators located on/inside the human body for continuous monitoring of vital signs like heart rate, temperature, blood pressure, electrocardiograms (ECGs), electroencephalography (EEG), etc. [1]. Quality of service (QoS), flexibility, and cost effectiveness are important goals to be achieved for healthcare and medical applications in WBANs. Different sensors placed in different parts of the human body, collect critical and non-critical information, and send them to the coordinator. Moreover, different actuators can be placed within the vicinity, on/inside the human body to communicate with the coordinator. The inside or vicinity of a human body is a challenging environment for the design of adaptable, dynamic, and flexible protocols for WBANs. Therefore, in WBANs, low delay, high reliability, low power consumption, negligible electromagnetic interface with the human body, and effective communication are to be taken into consideration. In general, MAC protocols play a crucial role in providing QoS and in prolonging network lifetimes by controlling packet collisions, overhearing, control overheads, and idle listening [2,3]. Sensors 2016, 16, 401; doi:10.3390/s16030401

www.mdpi.com/journal/sensors

Sensors 2016, 16, 401

2 of 16

The IEEE 802.15.4 standard [4] exhibits desirable features for WBANs and has been applied to different WBAN platforms. However, there are several limitations for meeting specific requirements and considerations, for a successful implementation. In recent years, there have been several significant developments in MAC protocols for WBANs. A number of MAC protocols have been studied for specific purposes, but have been adopted with certain modifications to fulfill the inherent requirements of the WBANs. The IEEE 802.15.6 standard [5] defines the physical (PHY) and MAC layers to provide various services for healthcare and medical applications as well as other non-medical applications. The MAC layer in the IEEE 802.15.6 standard aims to support a low-complexity, low-cost, ultra-low power, and a highly reliable wireless communication. In WBANs, MAC protocols have a great impact on the energy efficiency, reliability of communication, interference, and the QoS provision. In [6], different design approaches for the PHY and MAC layers, for efficient and reliable mobile healthcare services in WBANs, are discussed. In [7,8], various issues concerning channel modeling, coexistence, energy consumption, MAC layer issues, and design features are analyzed and summarized. More recently, MAC protocols for cognitive radio body area networks have been developed [9]. The MAC protocols developed so far for WBANs will be overviewed in Section 2. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands. The beacon channel (BC) is used for the transmission and reception of beacon frames, while the data channel (DC) is used for the rest of the communication, unlike in IEEE 802.15.4. A fixed dedicated channel is assigned for a beacon. We prioritize the data traffic by using a priority-guaranteed carrier-sense multiple access with collision avoidance (CSMA/CA) procedure in the contention access period (CAP). To support the various QoS requirements, we classify the data traffic into four categories with different priorities and divide the CAP into four sub-phases dynamically, according to the number of nodes in each traffic category. The PA-MAC allocates time slots dynamically, based on the traffic priority. The proposed PA-MAC supports both the CAP and the contention free period (CFP). The CFP is used to transfer significant numbers of consecutive data packets to the coordinator. Further, multiple channels are effectively utilized to reduce the access delay in a WBAN, in the presence of coexistent systems. According to our simulation results, the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and the data collision ratio. The rest of this paper is organized as follows: in the following section, related works are reviewed and discussed briefly. In Section 3, the principles and operations of the proposed PA-MAC protocol are presented in detail. In Section 4, the analytical approximation of the PA-MAC is described and discussed. In Section 5, the performance of the proposed PA-MAC is evaluated via computer simulation and compared with the IEEE 802.15.4 standard protocol and the conventional priority-based MAC protocol. Finally, this paper is concluded in Section 6. 2. Related Works The IEEE 802.15.4 MAC protocol [4] operates in three frequency bands: 16 channels in the 2.4 GHz Industrial, Scientific, and Medical (ISM) band, 10 channels in the 915 MHz ISM band, and 1 channel in the European 868 MHz band. In the IEEE 802.15.4, two operational modes are defined: the beacon enabled mode and the non-beacon enabled mode. In the beacon-enabled mode, the communication is synchronized and controlled by the network coordinator. A superframe consists of active and inactive periods; the active period is further divided into three parts consisting of a beacon, a CAP using slotted CSMA/CA, and a CFP, as shown in Figure 1. The CFP contains up to seven guaranteed timeslots (GTS). All communication must take place during the active parts and the devices can sleep in an inactive part to conserve energy. The structure of the superframe is determined by the network coordinator using two parameters, the superframe order (SO) and the beacon order (BO). The SO is used to describe the length of superframe duration (SD), whereas, the BO defines the beacon interval (BI). There are mainly two types of devices in the IEEE 802.15.4: a full function device (FFD) and a reduced function

Sensors 2016, 16, 401

3 of 16

Sensors 2016, 16, 401

3 of 15

device (RFD). The FFD can support all the network functions and operate as the network coordinator Sensors 2016,and 16, 401 of 15 functions operate as the network coordinator as well as anasend whereas, theFFD RFD3performs can as well as an end device, whereas, the RFD can only be used andevice, end device. The only be used as an end device.the Thepeak FFD performs detection (ED) to the detect the peak energy of energy detection to detect energy ofenergy a channel and select appropriate channel and(ED) operate the network coordinator as well as an end device, whereas, the RFD can for afunctions channel and select theasappropriate channel for data transmission. data transmission. only be used as an end device. The FFD performs energy detection (ED) to detect the peak energy of a channel and select the appropriate channel for data transmission.

Figure1.1.IEEE IEEE 802.15.4 802.15.4 superframe. Figure superframe. Figure 1. IEEE 802.15.4 superframe. In IEEE 802.15.4, if a node wants to reserve the resources for periodic traffic, it should first send

In IEEE 802.15.4, if a the node wants reserve the resources for periodic traffic, it should a GTS request during CAP with to a CSMA/CA and the network coordinator will decide the first GTS send In IEEE 802.15.4, if a node wants to reserve the resources for periodic traffic, it should first send a GTSallocation request during the CAP with a CSMA/CA and the network coordinator will decide the GTS accordingly. The GTS allocation scheme in IEEE 802.15.4 is shown in Figure 2. The a GTS request during the CAP with a CSMA/CA and the network coordinator will decide the GTS allocation accordingly. The GTS allocation scheme in IEEE 802.15.4 is shown in Figure 2. The working working channel is statically selected by the network coordinator during the network initialization allocation Theby GTS allocation scheme in IEEE 802.15.4 is shown insetFigure 2. The channel is statically selected the network coordinator during the network process. process. A accordingly. WBAN working in an unlicensed band must share the medium with ainitialization of coexisting working channel is statically selected by the network coordinator during the network initialization systems like theinWi-Fi, Bluetooth, band and the Zigbee that might causewith beacon corruption and real-time A WBAN working an unlicensed must share the medium a set of coexisting systems like process. A WBAN working in an unlicensed band must share the medium with a set of coexisting connectivity problems. Moreover, 802.15.4 doescorruption not have any for data the Wi-Fi, Bluetooth, and the Zigbee the thatIEEE might causeMAC beacon andmechanism real-time connectivity systems like the Wi-Fi, Bluetooth, and the Zigbee that might cause beacon corruption and real-time prioritization and all data traffic are treated with the same priority in the superframe. problems. Moreover, the IEEE 802.15.4the MAC not have formechanism data prioritization connectivity problems. Moreover, IEEEdoes 802.15.4 MAC any doesmechanism not have any for data and all data traffic are treated with the same priority in the superframe. prioritization and all data traffic are treated with the same priority in the superframe.

Figure 2. GTS allocation in IEEE 802.15.4. Figure2.2.GTS GTS allocation in The channel schedulingFigure presented inallocation [10] reduces the802.15.4. mutual interference between nodes inIEEE IEEE 802.15.4. belonging to the same network. To reduce idle listening, the control channel is differentiated from The channels channel by scheduling presented in [10] reduces mutual interference between nodes the data using different frequency bands. The the channel information is announced using The channel scheduling presented in idle [10]listening, reducesthe thecontrol mutual interference between nodes belonging to the same network. To reduce channel is differentiated from beacon frames that are broadcast so that all the devices are aware of the assigned channels. belonging to the same network. To reduce idle listening, the control channel is differentiated from the data channels by using different frequency bands. The channel information is announced using However, this scheme does not consider priority differentiation mechanisms. beacon framesby that are broadcast so that allbands. thea contention-based devices are aware of the assigned the data channels using different frequency The channel information is [11] announced A priority-based channel access algorithm for MAC protocol ischannels. devisedusing However, this scheme does not consider priority differentiation mechanisms. beacon frames that are broadcast so that all the devices are aware of the assigned channels. to solve the contention complexity problems. The algorithm categorizes traffic packets into However, four A priority-based channel access algorithm for a contention-based MAC protocol [11]algorithm, is devised different levels divides the CAP into four sub-phases, dynamically. In this this scheme does notand consider priority differentiation mechanisms. to solve the complexity problems. The algorithm data categorizes traffic into four however, thecontention classification of continuous andfor discontinuous traffic and thepackets use [11] of GTSs are A priority-based channel access algorithm a contention-based MAC protocol is devised to different levels and divides the CAP into four sub-phases, dynamically. In this algorithm, solvenot theconsidered. contention complexity problems. The algorithm categorizes traffic packets into four different however, the classification of continuous and discontinuous databoth traffic and theand usenon-invasive of GTSs are A divides traffic-aware dynamic protocol (TAD-MAC) for levelsnot and the CAP into MAC four sub-phases, dynamically. In invasive this algorithm, however, the considered. WBANs is introduced in [12]. In this protocol, each node adapts its wakeup interval dynamically, classification of continuous and discontinuous data traffic and the use of GTSs are not considered. dynamic (TAD-MAC) for both invasive and basedAontraffic-aware a traffic status registerMAC bank. protocol The dynamic wakeup interval scheme saves thenon-invasive extra power A traffic-aware dynamic MAC protocol (TAD-MAC) for both its invasive and non-invasive WBANs WBANs is introduced in [12]. In this protocol, each node adapts wakeup interval dynamically, consumed by idle listening, overhearing, collisions, and unnecessary beacon retransmissions. is introduced [12]. status Intraffic-adaptive thisregister protocol, each node adapts its wakeup interval dynamically, based basedThe onlow-delay aintraffic bank. Theprotocol dynamic wakeup interval schemeinsaves the extra power MAC (LDTA-MAC) is reported [13], where GTS time on a consumed by idle listening, overhearing, collisions, and unnecessary beacon retransmissions. trafficslots status register bank. The dynamic wakeup interval scheme saves the extra power consumed are allocated dynamically, based on node traffic to overcome the shortcomings of the IEEE by The traffic-adaptive protocol (LDTA-MAC) is reported in [13], where GTS time idle listening,low-delay overhearing, collisions,MAC and unnecessary beacon retransmissions. slots are allocated dynamically, based on node traffic to overcome the shortcomings of the GTS IEEE time The low-delay traffic-adaptive MAC protocol (LDTA-MAC) is reported in [13], where

slots are allocated dynamically, based on node traffic to overcome the shortcomings of the IEEE 802.15.4

Sensors 2016, 16, 401

4 of 16

MAC protocol. Similarly, the schemes in [14] prioritize the data traffic based on the data features and adaptively allocate the CAP or CFP for the data according to the priority level. However, their traffic priority and backoff value are not considered. In [15], a traffic load-aware sensor MAC (named ATLAS) is presented for collaborative body area sensor networks. The superframe structure dynamically varies based on the traffic load and uses a multihop communication pattern. Nevertheless, the priority of the different packets and the back-off classes are not considered. A traffic priority and load-adaptive MAC (PLA-MAC) [16] provides QoS to the packets according to their traffic priority level. Packets with a higher priority level get better service than the packets with a lower priority. Although packet-level priority and reliability are considered, the channel adaptation of a condition-based network is not performed. The traffic-adaptive MAC protocol described in [17] uses a traffic-based wakeup mechanism and a wakeup radio mechanism, to reliably accommodate various types of data. It utilizes the traffic information to enable low-power communication. Wakeup tables are established to coordinate the transmission schedules of the nodes, while a wakeup radio mechanism is employed for emergencies. A schedule-based heartbeat driven MAC protocol (H-MAC) [18] uses the heart rhythm information to perform synchronization and reduces extra energy costs; however, the heart beat information is not always valid owing to variations in the patient’s health condition. A context-aware MAC protocol [19] can switch between the normal state and the emergency state. The data rates and duty cycles of the sensor nodes are dynamically changed to meet the requirements of latency and traffic loads, in a context-aware manner. The sensor nodes can obtain one or more time slots for periodic or bursty applications, according to their traffic characteristics. A hybrid and secure priority-guaranteed MAC protocol (PMAC) [20] uses two CAPs for accommodating normal and critical data, while one CFP is used for accommodating significant quantities of data packets. In addition, a set of security keys is used to prevent illegal access to the WBANs. A MAC protocol specially designed for energy-harvesting WBANs is presented in [21]. The nodes are assigned different priorities and access methods, based on the criticality of their data packets and the type of the energy-harvesting source. In [22], the robustness of the medical data packet transmission is experimentally investigated, based on the frequency hopping mechanism in heterogeneous environments. The measurement results demonstrate that the transmission reliability requirement depends significantly on the signal strength of the other signals as well as that of the chosen channel/frequency band. It is a fact that the heterogeneous working requirements of a WBAN, define different QoS issues that are specific to that particular application area only. WBAN applications are very sensitive; hence, QoS issues in WBANs require more attention and focus and are to be seriously considered. 3. Priority-Based Adaptive MAC (PA-MAC) In this section, the proposed PA-MAC is presented in detail. Multiple channel utilization, data traffic prioritization, dynamic time slot allocation, and data transfer procedures are discussed. 3.1. Multiple Channel Utilization In the proposed QoS-aware adaptive MAC, we exploit the channel switching capability of the IEEE 802.15.4 MAC radio hardware. Therefore, we implement two different channels: a dedicated beacon channel (BC) and a data channel (DC). The dedicated BC is available for exchange of control information like channel assignment broadcasts and access requests between the coordinator and the sensor nodes. The dedicated BC is used during the beacon frame transmission, whereas, the rest of the communication is done through the DC. During the beacon period, the node switches its channel to the BC and returns to its original DC at the end of the beacon period, as shown in Figure 3. The widely used transceivers for short range and low-power WPANs, e.g., the CC2420 and the more advanced

Sensors 2016, 16, 401

5 of 16

CC2500, have a channel switching time of only 300 and 90 µs, respectively [23]. The DC information is conveyed to the sensor nodes by piggybacking the channel information on the beacon payload of Sensors 2016, 16, 401 5 of 15 the beacon frame, as shown in Figure 4. The entire network information can be determined Sensors 2016, 16, 401 5 of just 15 by scanning the BC [24]. In the 2.4 GHz ISM band, interference from high-power WLAN transmissions is the beacon payload of the beacon frame, as shown in Figure 4. The entire network information can the beacon payload of the14 beacon frame, as shown in Figurein4.the The2.4 entire network information can dominant. Channels 13 and of the IEEE 802.11 operating GHz ISM band are not used by be determined just by scanning the BC [24]. In the 2.4 GHz ISM band, interference from high-power be by scanning the BC [24]. In the 2.4 GHz ISM band,25 interference from 802.15.4 high-power mostWLAN of determined the transmissions WLANjust systems in North America. channel oroperating 26 of IEEE WPAN is dominant. Channels 13Therefore, and 14 of the IEEE 802.11 in the 2.4 GHz WLAN transmissions is dominant. Channels 13 and 14 of the IEEE 802.11 operating in the 2.4or GHz ISM notWLAN used byinterference most of the WLAN systems in North Therefore, channel 25 26 would beband free are from and can be used as theAmerica. dedicated BC. Although this scheme ISM band are not used by most of the WLAN systems in North America. Therefore, channel 25 or 26 of IEEE 802.15.4 from WPAN wouldinterference, be free from WLAN interference and can be used the dedicated protects the beacon WLAN interference from IEEE 802.15.1 orasother IEEE 802.15.4 of IEEE 802.15.4 WPAN would be free from WLAN interference and can be used as the dedicated BC. Although this scheme protects the beacon from WLAN interference, interference from IEEE WPANs may still exist. However, as the WPANs are generally operated at a lower transmission power, BC. Although this scheme protects the beacon from WLAN interference, interference from IEEE 802.15.1 or other IEEE 802.15.4 WPANs may still exist. However, as the WPANs are generally interference with these systems is negligible [25]. Channel selection schemes are not within the 802.15.1 or other IEEE 802.15.4 WPANs may still exist. However, as the WPANs are generallyscope operated at a lower transmission power, interference with these systems is negligible [25]. Channel of thisoperated paper. The coordinator continuously senses all the in theispool of candidate channels; at a lower transmission power, interference withchannels these systems negligible [25]. Channel selection schemes are not within the scope of this paper. The coordinator continuously senses all the selection schemes are not within the scopeslots of this paper. The nodes. coordinator continuously senses all the and it assigns white spaces as the transmission to the body The coordinator may choose channels in the pool of candidate channels; it assigns white spaces as the transmission slots to the channels in of candidate channels; it assigns white thechannel transmission to the remain tuned tothe an idle channel until it becomes unavailable or an is as degraded byuntil the activities of the body nodes. Thepool coordinator may choose and remain tunedspaces to idle itslots becomes body nodes. The coordinator may choose and remain tuned to an idle channel until it becomes coexisting systems. unavailable or is degraded by the activities of the coexisting systems. unavailable or is degraded by the activities of the coexisting systems.

Figure3.3.Channel Channel switching mechanism. Figure mechanism. Figure 3. Channel switching switching mechanism.

Figure 4. Data channel field in the IEEE 802.15.4 beacon frame.

Figure 4. Data channelfield fieldin in the the IEEE frame. Figure 4. Data channel IEEE802.15.4 802.15.4beacon beacon frame. 3.2. Data Traffic Prioritization and Dynamic Timeslot Allocation 3.2. Data Traffic Prioritization and Dynamic Timeslot Allocation 3.2. Data Medical Traffic Prioritization and Dynamic Timeslot and non-medical applications are Allocation the two major categories in WBANs. Medical Medical and non-medical applications are the two major in WBANs.whereas, Medical applications include healthcare and diagnosis-assistance relatedcategories signal monitoring, Medical andinclude non-medical applications are the two major in WBANs. Medical applications healthcare and diagnosis-assistance relatedcategories signal monitoring, whereas, non-medical applications cover signals related to consumer electronics (CE). In medical applications, applications include healthcare and diagnosis-assistance related(CE). signal monitoring, whereas, non-medical applications cover signals related to consumer electronics In medical applications, emergency vital signals are directly related to the life of the patient, therefore, they should be emergency vital signals are signals directly related related to consumer the life of electronics the patient, (CE). therefore, they should be non-medical applications cover In medical applications, regarded as first priority service. The priority levels for different kinds of data traffic are shown in regarded as signals first priority service.related The priority levels forthe different kinds of datathey traffic are shown in emergency vital are directly to the life of patient, therefore, should be regarded Table 1. Table 1. as first priority service. The priority levels for different kinds of data traffic are shown in Table 1. Table 1. Different levels of traffic priority. Table 1. Different levels of traffic priority. Traffic Category Priority Example Traffic Category Priority Example Emergency traffic P1 (highest) Emergency alarm signal Traffic Categorytraffic Priority Example Emergency P1 (highest) Emergency alarm signal On-demand traffic P2 Continuous medical signal (e.g., EEG, EMG) Emergency traffictraffic P1 (highest) Emergency alarm signal On-demand P2 Continuous medical signal (e.g., EEG, EMG) Discontinuous medical signal (e.g., temperature, blood pressure) Normal traffic P3 On-demand traffic P Continuous medical signal (e.g., EEG, EMG) 2 Discontinuous medical signal (e.g., temperature, blood pressure) Normal traffic P3 Non-medical PP43(lowest) Discontinuous medicalAudio/Video/Data Normal traffic traffic signal (e.g., temperature, blood pressure) Audio/Video/Data Non-medical traffic P4 (lowest)

Table 1. Different levels of traffic priority.

Non-medical traffic P4 (lowest) Audio/Video/Data In the IEEE 802.15.4 MAC, the performance of the CAP significantly influences the collision In the IEEE 802.15.4 MAC, the performance of the CAP significantly influences the collision probability and the final throughput. If the nodes are densely deployed in a narrow region, the probability and the final throughput. If the nodes are deployed in ainfluences narrow region,collision the In the IEEEcomplexities 802.15.4 MAC, the performance thedensely CAP significantly contention increase and lead to of high collision ratios and significant the energy contention complexities increase and lead to high collision ratios and significant energy probability and the If the nodes denselyQoS deployed a narrow region, the consumption. Thefinal mainthroughput. goal of the proposed MAC isare to provide and lowin power consumption consumption. The main goal ofand thelead proposed MAC is to provide QoS significant and low power consumption contention complexities increase high collision ratios and energy consumption. for various applications by dispersion ofto the contention complexity. Here, we divide the CAP into for various applications dispersion contention Here, 5.weEach divide the CAP into four sub-phases forproposed eachby priority level the traffic,QoS as complexity. shown in Figure specified access The main goal of the MAC isofof tothe provide and low power consumption for various four sub-phases for each priority level of the traffic, as shown in Figure 5. Each specified access phase has dynamically changing length and is calculated by the proposed algorithm at the applications by dispersion of the contention complexity. Here, we divide the CAP into four sub-phases phase has dynamically changing length and is calculated by the proposed algorithm at the central coordinator. for each priority level of the traffic, as shown in Figure 5. Each specified access phase has dynamically central coordinator.

changing length and is calculated by the proposed algorithm at the central coordinator.

CAP leads to wasted time slots. The other drawback of the pure segregation is low scalability with the traffic load; i.e., the delay and data collision ratio also increase if the allocated time slot is not enough to handle offered traffic in the specific priority. When the offered traffic increases due to a Sensors 2016, 16, 401 6 of 15 large number of sensor nodes in the specific time slot, the collision probability increases Sensors 2016, 16, 401 6 of 16 significantly. On the other hand, the pure segregation of sub-phases for only one type of traffic in each in the CAP leads to wasted time slots. The other drawback of the pure segregation is low scalability with the traffic load; i.e., the delay and data collision ratio also increase if the allocated time slot is not enough to handle offered traffic in the specific priority. When the offered traffic increases due to a large number of sensor nodes in the specific time slot, the collision probability increases significantly.

Figure 5. Superframe structure of the proposed proposed MAC. MAC.

Traffic P1 pure can access the channel in all phases; a node that transmits traffic On the with otherpriority hand, the segregation of sub-phases for only one type of traffic in each with in thea priority P4to , can use time onlyslots. phase 4. other The drawback P2 priorityoftraffic cansegregation access theischannel in phases CAP leads wasted The the pure low scalability with2–4. the Similarly, P 3 can access the channel in Phases 3 and 4. In order to avoid wastage of the timeslots, the traffic load; i.e., the delay and data collision ratio also increase if the allocated time slot is not enough to lengthsoffered of the sub-phases calculated dynamically, Equation (1) [11]: due to a large number handle traffic in theare specific priority. When theusing offered traffic increases Figure 5. Superframe structure of the proposed MAC.

of sensor nodes in the specific time slot, the collision probability increases significantly. (1)aa = channel + in ∗ ( phases; / ) aa node Traffic Traffic with with priority priority PP11 can can access access the the channel in all all phases; node that that transmits transmits traffic traffic with with priority P , can use only phase 4. The P priority traffic can access the channel in phases 2–4. Similarly, 2 P2 priority traffic can access the channel in phases 2–4. priority P44, can use only phase 4. The P can access the channel in Phases 3 and 4. ,In(3order avoid wastage ofwastage the the lengths of 3 is the length of the sub-phase = 1,2,3,4) is taken from the timeslots, starting of CAP, where Similarly, P3 can access the channel in Phases and 4.toIn order to avoid of thepoint timeslots, the the sub-phases are calculated dynamically, using Equation (1) [11]: is the length of the CAP, is the dynamically, total number using of nodes in the (1) traffic lengths of the sub-phases are calculated Equation [11]:category of priority ,

is the total number of nodes, and is initially set to zero . To obtain information regarding the iÿ ´1 node’s priority classes, we modify lthe IEEE 802.15.4 association request command, as shown(1) in (1) “ lk ` +LCAP ˚∗ pN ( i {N / T )q i = Figure 6. Further, we assume that each node supports only one type of data. When newly arrived k “0 nodes join the network, the coordinator has the ability to sense the changes in the number of nodes the length the sub-phase taken from the starting point of CAP, where li isisthe where of of the sub-phase i , superframe pi ,“(1,=2,1,2,3,4) is 3, 4qand is taken from the starting point of CAP, LCAP of each class inlength the CAP of the previous calculate the value of the number of nodes is the length of the CAP, is the total number of nodes in the traffic category of priority , is the length of the CAP, N is the total number of nodes in the traffic category of priority P , N T is i i in each traffic category. Medical services must satisfy a delay of 125 ms or less and consumer is thenumber total number of nodes, is initially set to zero . To obtain information regarding the the total of nodes, andtol0 and is initially set to zero . To obtain regarding the node’s electronics (CE) services have satisfy a delay requirement of 250information ms or less. Based on these delay node’s priority classes, we modify the IEEE 802.15.4 association request command, as shown priority classes, we modifytransmission the IEEE 802.15.4 association request command, shown (2): in Figure in 6. requirements, the average delay of each category is calculated byas Equation Figure 6. Further, we assume that each node supports only one type of data. When newly arrived Further, we assume that each node supports only one type of data. When newly arrived nodes join (1 to ) ∗ the (2) =hasto ∗the +the − nodes join thethe network, the coordinator ability sense changes in of thenodes number of nodes the network, coordinator has the ability sense changes in the number of each class of eachCAP class the CAP of superframe the previousand superframe calculate thenumber value of the number of nodes in the ofinthe previous calculate and the value of the ofand nodes each traffic =in0.125. If the where is the delay of the k-th packet in the traffic category of priority in each traffic category. Medical services must satisfy a delay of 125 ms or less and consumer category. Medical services must satisfy a delay of 125 ms or less and consumer electronics (CE) services delay threshold is exceeded, the CAP is divided into “the number of exceeded categories + 1” electronics (CE)a services have to satisfy delay requirement 250 ms or less. Based on the these delay have to satisfy delay requirement of 250a ms or less. Based onofthese delay requirements, average sub-phases. requirements, the average transmission delay of each category is calculated by Equation (2): transmission delay of each category is calculated by Equation (2): (2) = ∗ + (1 − ) ∗ Dki “ α ˚ Dki ´1 ` p1 ´ αq ˚ dik (2) and = 0.125. If the where is the delay of the k-th packet in the traffic category of priority delay threshold is exceeded, CAPinisthe divided into “theofnumber categories + 1” where dik is the delay of the k-ththe packet traffic category priorityof Pi exceeded and α = 0.125. If the delay sub-phases. threshold is exceeded, the CAP is divided into “the number of exceeded categories + 1” sub-phases.

Figure 6. Association request command.

Figure 6. Association request command.

in the CFP, each node transmits the request packet for the CFP to the coordinator in the CAP using the CSMA/CA procedure. When the coordinator successfully receives the GTS request packet, it allocates the GTS to the node, accordingly. The data from the P1 and P3 nodes are transmitted immediately after accessing the channel in the CAP. However, the P2 and P4 nodes send the GTS request command in the CAP to apply for GTS allocation. The slot allocation mechanism and data Sensors 2016, 16, 401 7 of 16 transfer procedure for different traffic priorities are shown in Algorithm 1 and Figure 7, respectively. Algorithm 1. Algorithm for the CAP allocation 3.3. Data Transfer Procedure

1. while (!End of CAP)

In the IEEE 802.15.4 MAC, the superframe consists of a CAP and a CFP. The CAP is suitable for 1.1 if (An associate request command packet is received from a node) the transfer of the command messages and short data, whereas, the CFP is implemented for continuous 1.1.1 Calculate the number of nodes with different traffic priorities as Ni ← Ni + 1, where Ni is the data. In the CAP, each node transmits its packets to a coordinator using the CSMA/CA procedure. total number of nodes in the traffic category of priority Pi and is an integer that varies from In the CFP, each node transmits its packets to the coordinator by using dedicated guaranteed time 1 to 4. slots (GTSs) without contention with the other nodes. In order to transmit packets in the CFP, each end if the request packet for the CFP to the coordinator in the CAP using the CSMA/CA node transmits end while procedure. When the coordinator successfully receives the GTS request packet, it allocates the GTS to 2. Calculate the lengths the from sub-phases ∗ ( / ), where is the length the node, accordingly. The of data the P1asand=P3∑nodes+are transmitted immediately after accessing of sub-phase from the starting point of the CAP, is the length of the CAP, is the the channel in the CAP. However, the P2 and P4 nodes send the GTS request command total in the CAP number of nodes, and The is initially set to zero to apply for GTS allocation. slot allocation mechanism and data transfer procedure for different traffic3. priorities shownframe in Algorithm 1 and Figure 7, respectively. Broadcast are the beacon

Figure7.7. Data Data transfer Figure transferprocedure. procedure.

4. Analytical Approximation of the PA-MAC

Algorithm 1. Algorithm forpresent the CAPthe allocation In this section, we analytical approximation of the channel status, energy consumption, the average delay of the proposed PA-MAC. 1. while (!End ofand CAP) 1.1 if associate 4.1.(An Channel Statusrequest command packet is received from a node) 1.1.1 Calculate the number of nodes with different traffic priorities as Ni Ð Ni + 1, where Ni is the The low power and the low transmission rate of the WBAN nodes do not change the access total number of nodes in the traffic category of priority Pi and i is an integer that varies from pattern of the coexisting systems contending on a shared ISM band. The channels in the ISM band 1 to 4. alternate between a busy state (occupied by a coexistent network) and an idle state when no

end if end while ř 1 2. Calculate the lengths of the sub-phases as li “ ik´ “0 lk ` LCAP ˚ pNi {NT q, where li is the length of sub-phase i from the starting point of the CAP, LCAP is the length of the CAP, NT is the total number of nodes, and l0 is initially set to zero 3. Broadcast the beacon frame 4. Analytical Approximation of the PA-MAC In this section, we present the analytical approximation of the channel status, energy consumption, and the average delay of the proposed PA-MAC. 4.1. Channel Status The low power and the low transmission rate of the WBAN nodes do not change the access pattern of the coexisting systems contending on a shared ISM band. The channels in the ISM band alternate between a busy state (occupied by a coexistent network) and an idle state when no coexistent

Sensors 2016, 16, 401

8 of 16

system is accessing the channel. The channel state can be characterized by a two-state Markov chain. The average length of idle and busy periods depends upon the channel usage patterns of the coexisting systems. The length of the busy and idle periods for j-th licensed channel follows an exponential distribution with a mean busy time λ j and mean idle time µ j [26]. The probability that the channel j is busy or idle at any time instant is given by: Pjpbusyq “

µj λj and Pjpidleq “ λ j ` µj λ j ` µj

(3)

The WBAN can access the medium as long as one of the n candidate channels is idle, and it loses its access when all the channels become busy owing to the activities of the coexisting systems. In the inactive state, all the WBAN operations and services are interrupted because there is no channel available for data transmission. The inactive state occurs with the probability: Pinactive “

n ź

Pjpbusyq

(4)

j“1

When at least one channel becomes idle, the WBAN transits to the active state and its services are resumed. The probability of at least one channel becoming idle is calculated by: Pactive “ 1 ´

n ź

Pjpbusyq

(5)

j “1

4.2. Energy Consumption Energy efficiency is one of the key measurement parameters for a reliable and efficient MAC protocol design. The energy consumption is based on the transceiver’s activity; the transition state of the transceiver is shown in Figure 8. To minimize the energy consumption, the idle and wakeup states play a vital role. We assume constant energy consumption by the sensing and processing units. Let EC be the total consumed energy in one cycle, E I is the energy consumed in an idle state, and EW is the energy consumed in a wakeup state. Then: EC “ E I ` EW

(6)

Sensors 2016, 16, 401

9 of 15

Figure Figure 8. 8. State State transition transition of of the the transceiver. transceiver.

In the wakeup time duration , the nodes consume a switching energy energy , and a reception energy . Therefore: =2



+

, a transmission

+

(10)

To switch between the ideal and wakeup state, the transceiver consumes an energy

=



=





: (11)

Sensors 2016, 16, 401

9 of 16

The average total energy consumption for C number of cycles is given by: ETpavgq “

C ÿ

Ec

(7)

c“1

Energy is a function of time and power and power itself is a function of voltage and current. In an idle state, the nodes consume less energy compared to the wakeup state. Therefore: E I “ TI ˚ PI “ TI ˚ I I ˚ V

(8)

TI “ TF ´ TW

(9)

where TF is the total time-frame duration, TI is an idle time duration, PI is the power consumed in an idle state, and I I is the current drawn in an idle state from the voltage source, V. In the wakeup time duration TW , the nodes consume a switching energy ESW , a transmission energy ETX , and a reception energy ERX . Therefore: EW “ 2 ˆ ESW ` ETX ` ERX

(10)

To switch between the ideal and wakeup state, the transceiver consumes an energy ESW : ESW “ TSW ˆ PSW “ TSW ˆ ISW ˆ V

(11)

where the node draws a current ISW from a voltage source during switching time duration TSW and PSW is the switching power. Let L be the length of the packet (control or data), TTX be the time needed for a single byte transmission, and ITX be the amount of current drawn during the packet transmission. Energy consumed during the transmission is given by: ETX “ L ˆ TTX ˆ PTX “ L ˆ TTX ˆ ITX ˆ V

(12)

Similarly, the energy consumed at the receiver end is calculated as: ERX “ L ˆ TRX ˆ PRX “ L ˆ TRX ˆ IRX ˆ V

(13)

where PTX and PRX are the power consumptions during the transmission and reception of the packets, respectively, TRX is the time needed for a single byte reception, and IRX is the amount of current drawn during the packet reception. Hence, the total average energy consumed is given by: ETpavgq “

C ÿ

pTI ˆ PI ` 2 ˆ TSW ˆ PSW ` L ˆ TTX ˆ PTX ` L ˆ TRX ˆ PRX q

(14)

c “1

4.3. Transmission Time The data frame transmission sequence is shown in Figure 9. Tbo is the total backoff time (i.e., channel access delay), Tpacket is the data packet transmission time, Tta is the transceiver’s turnaround time, Tack is an ACK frame transmission time, and Ti f s is the time for an interframe space (IFS). The IFS could be either short inter-frame spacing (SIFS) or long inter-frame spacing (LIFS), depending upon the size of the MAC frame. The average transmission delay Tl is the time needed to transmit a packet from the node to the coordinator and can be calculated as in [27] as follows: Tl “ Tbo ` Tpacket ` Tta ` Tack ` Ti f s

(15)

=

+

+

+

(19)

is the length of the PHY header in bytes, is the length of the MAC header in where bytes, is the length of the data bytes in the data packet, is the length of the MAC Sensors 2016, 16, 401 10 of 16 footer in bytes, and is the data transmission rate.

Figure 9. 9. IEEE IEEE 802.15.4 802.15.4 frame frame transmission transmission sequence. sequence. Figure

5. Performance Evaluation For K number of maximum back-off periods, the probability that the node can successfully access In this section, the channel is given the by: performance of the proposed PA-MAC is evaluated via computer simulation K ÿ and compared with the IEEE standard 802.15.4 and the conventional priority-based MAC. The four p b ´1 q p1 ´ P (16) P “ Patime, s a q network throughput, the average energy performance metrics-the average transmission the b “1 consumption, and the collision ratio are evaluated. where Pa is the probability that a node can access the idle channel at the end of a backoff period. For m number of nodes in the network, Pa is given by: 5.1. Simulation Environment p m ´1 q The performance of the proposed PA-MAC is qq evaluated and compared with the IEEE 802.15.4 Pa “ p1 ´ (17) standard using an ns-2 Network simulator, Version 2.35. The ns-2 simulator is a discrete event simulator targeted at networking research and is provides substantial foraverage the simulation where q is the probability that a network device transmitting at any support time. The number of various network protocols over wired andaswireless back-off periods, R, is calculated as in [27] follows:networks [28]. 20% of the total nodes generate emergency traffic; the on-demand traffic and the non-medical traffic categories each constitute 20% K ÿ of the total nodes and the normal traffic occupies 40% of the total traffic generated during each “ p1 ´ Ps q K ` bP p1 ´ Pa qpb´1q (18) simulation. The physical layer parameters are defineda according to the IEEE 802.15.4 standard. We b“1 have assumed that the several biomedical sensors are implanted or attached to the human body. The The packetintransmission time Tpacket is givenisby: star topology, which the central coordinator the master node, is used in our simulation as in other research works. The sensor nodes are randomly deployed within an area of 4 m radius, around ` L MHR by ` Lone ` All L MFR payload the central coordinator and the data“areL PHY transmitted hop. the nodes intend to transmit(19) the Tpacket R data first packet randomly during the contention access period. Small-scale fading has been neglected and it is assumed that packet loss is solely because of collision. The Poisson arrival is used to where L PHY is the length of the PHY header in bytes, L MHR is the length of the MAC header in bytes, approximate the random packet arrival process. For medical traffic, a payload size of 40 bytes is L payload is the length of the data bytes in the data packet, L MFR is the length of the MAC footer in bytes, used owing to lower end-to-end latency and an acceptable packet delivery rate [11,27]. Emergency and Rdata is the data transmission rate. traffic occurs randomly and the packet size is the same as the normal medical traffic. The network parameters usedEvaluation in the simulation are summarized in Table 2. 5. Performance

In this section, the performance of the proposed PA-MAC is evaluated via computer simulation and compared with the IEEE standard 802.15.4 and the conventional priority-based MAC. The four performance metrics-the average transmission time, the network throughput, the average energy consumption, and the collision ratio are evaluated. 5.1. Simulation Environment The performance of the proposed PA-MAC is evaluated and compared with the IEEE 802.15.4 standard using an ns-2 Network simulator, Version 2.35. The ns-2 simulator is a discrete event simulator targeted at networking research and provides substantial support for the simulation of various network protocols over wired and wireless networks [28]. 20% of the total nodes generate emergency traffic; the on-demand traffic and the non-medical traffic categories each constitute 20% of the total nodes and the normal traffic occupies 40% of the total traffic generated during each simulation. The physical layer parameters are defined according to the IEEE 802.15.4 standard. We have assumed that the several biomedical sensors are implanted or attached to the human body. The star topology, in which the central coordinator is the master node, is used in our simulation as in other research works. The sensor nodes are randomly deployed within an area of 4 m radius, around the central coordinator and the data are transmitted by one hop. All the nodes intend to transmit the first packet randomly during the contention access period. Small-scale fading has been neglected and it is assumed that packet loss

Sensors 2016, 16, 401

11 of 16

is solely because of collision. The Poisson arrival is used to approximate the random packet arrival Sensors 2016, 16,medical 401 11 and of 15 process. For traffic, a payload size of 40 bytes is used owing to lower end-to-end latency an acceptable packet delivery rate [11,27]. Emergency traffic occurs randomly and the packet size is the Table 2. Simulation Parameters. same as the normal medical traffic. The network parameters used in the simulation are summarized in Table 2. Parameter Value

Channel rate 250 kbps Table 2. Simulation Parameters. Frequency band 2.4 GHz Parameter Symbol time 16Value μs Channel rate 250 kbps Superframe duration 122.88 ms Frequency band 2.4 GHz Transition time 192 μs Symbol time 16 µs aUnitBackoffPeriod 20 122.88 symbols Superframe duration ms Transition time 192 µs macMaxCSMABackoffs 5 aUnitBackoffPeriod 20 symbols macMinBE 3 macMaxCSMABackoffs 5 macMaxBE 53 macMinBE macMaxBE 5 Idle power 712 μW Idle power 712 µW Transmission power 36.5 mW Transmission power 36.5 mW Reception power 41.4 mW Reception power 41.4 mW 5.2. Simulation Results and Discussion The overall overall performance performance of of the the average average transmission transmission time time is is illustrated illustrated in in Figure Figure 10. 10. In In the the The proposed MAC, a fixed dedicated channel is assigned for the beacon. The WBAN utilizes the single proposed MAC, a fixed dedicated channel is assigned for the beacon. The WBAN utilizes the single channel statically; statically; the the channel channel access access opportunities opportunities experience channel experience less less interference interference and and interruptions. interruptions. Moreover, the proposed PA-MAC and the conventional NPCA-MAC perform slotted CSMA/CA Moreover, the proposed PA-MAC and the conventional NPCA-MAC perform slotted CSMA/CA with a priority-based channel access policy, whereas, the IEEE 802.15.4 MAC protocol operates the with a priority-based channel access policy, whereas, the IEEE 802.15.4 MAC protocol operates the slotted CSMA/CA CSMA/CA without Figure 10, 10, the the overall overall slotted without aa priority-based priority-based channel channel access access policy. policy. Thus, Thus, as as in in Figure average transmission time of the IEEE 802.15.4 protocol has the largest delay, compared to the average transmission time of the IEEE 802.15.4 protocol has the largest delay, compared to the proposed proposed and PA-MAC and the NPCA-MAC. Additionally, the PA-MAC a better performance PA-MAC the NPCA-MAC. Additionally, the PA-MAC exhibits aexhibits better performance than the than the NPCA-MAC, as theof number nodes increase. NPCA-MAC, as the number nodes of increase.

Figure 10. 10. Average transmission time. time. Figure Average transmission

In the NPCA-MAC, continuous and discontinuous data transfer procedures and the use of In the NPCA-MAC, continuous and discontinuous data transfer procedures and the use of GTSs GTSs are not considered. There is no difference in the transmission of emergency traffic in the are not considered. There is no difference in the transmission of emergency traffic in the proposed proposed MAC and the NPCA-MAC. Figure 11 shows the emergency traffic average transmission MAC and the NPCA-MAC. Figure 11 shows the emergency traffic average transmission time for the time for the proposed PA-MAC, NPCA-MAC, and the IEEE 802.15.4 MAC. The main contributor to proposed PA-MAC, NPCA-MAC, and the IEEE 802.15.4 MAC. The main contributor to the transmission the transmission delay is the channel access delay. The emergency nodes have to transmit a delay is the channel access delay. The emergency nodes have to transmit a small-size data packet in a small-size data packet in a very small time interval. If the channel becomes extremely busy, the sensor nodes have to back off more periods to complete the channel access, thereby causing longer channel access delays. Here, we can see that the average transmission time of all the three protocols increases with the increase in the number of sensor nodes. However, the proposed PA-MAC and the NPCA-MAC exhibit a better performance than the IEEE 802.15.4 MAC protocol.

Sensors 2016, 16, 401

12 of 16

very small time interval. If the channel becomes extremely busy, the sensor nodes have to back off more periods to complete the channel access, thereby causing longer channel access delays. Here, we can see that the average transmission time of all the three protocols increases with the increase in Sensors 2016, 16, 401 12 of 15 the number of sensor nodes. However, the proposed PA-MAC and the NPCA-MAC exhibit a better Sensors 2016, 16, 401 than the IEEE 802.15.4 MAC protocol. 12 of 15 performance

Figure 11. Emergency traffic average transmission time. Figure 11.Emergency Emergency traffic traffic average time. Figure 11. averagetransmission transmission time.

In Figure 12, the overall performance of the network throughput as a function of the number of nodesInisFigure illustrated. All threeperformance schemes show a network similar throughput performance, theofnumber of of sensor 12, 12, thethe overall of network throughput a function of number the number of In Figure overall performance of the as as awhen function the nodes is less than 10. The proposed PA-MAC and the conventional NPCA-MAC, however, provide nodes is illustrated.All Allthree three schemes a similar performance, when the number sensor nodes nodes is illustrated. schemesshow show a similar performance, when the of number of sensor better performances compared to the IEEE 802.15.4 MAC protocol. In the IEEE 802.15.4 MAC, the is less than 10. The proposed PA-MAC and the conventional NPCA-MAC, however, provide better nodes is less than 10. The proposed PA-MAC and the conventional NPCA-MAC, however, provide performances compared to thewith IEEE 802.15.4 MAC In the IEEE MAC, the collision collision ratio increases sharply number ofprotocol. sensor Hence, more resources are wasted better performances compared to thethe IEEE 802.15.4 MAC nodes. protocol. In802.15.4 the IEEE 802.15.4 MAC, the ratio increases sharply with the number of sensor nodes. Hence, more resources are wasted on data on data packet collision rather than on effective data transmission. The throughput of all the three collision ratio increases sharply with the number of sensor nodes. Hence, more resources are wasted packetseems collision than as on effective data transmission. The throughput of allof theathree schemes schemes to rather decrease the on number of data nodestransmission. exceeds 35, The because high on data packet collision rather than effective throughput of allcontention the three seems toand decrease as the number of nodes exceeds 35,Although because ofthe a high contention complexity with and the complexity an decrease increased packet collision schemes seems to as the number ofrate. nodes exceeds 35,collision becauserate of increases a high contention an increased packet collision rate. Although the collision rate increases with the number of data number of data the radio resource on rate. the data channels efficiently managed in with both the complexity and packets, an increased packet collision Although theiscollision rate increases the packets, the radio resource on the data channels is efficiently managed in both the PA-MAC and the PA-MAC and the NPCA-MAC, according to the data traffic. However, in the channel access pattern, number of data packets, the resource on the data channels efficiently managed in both NPCA-MAC, according to radio the data traffic. However, in the channelisaccess pattern, prioritization of the prioritization of data traffic, and the GTS allocation for continuous data traffic, the proposed PA-MAC and the according to the data However, inPA-MAC the channel access pattern, data traffic, andNPCA-MAC, the GTS allocation for continuous datatraffic. traffic, the proposed performs better PA-MAC performs better than the conventional NPCA-MAC. prioritization of data traffic, and the GTS allocation for continuous data traffic, the proposed than the conventional NPCA-MAC. PA-MAC performs better than the conventional NPCA-MAC.

Figure throughput. Figure12. 12. Network Network throughput. Figure 12. Network throughput.

Energy efficiency is a key parameter in the design of efficient and reliable MAC protocols for the WBAN. consumption is related behavior. A network withMAC busy protocols traffic hasfor a Energy Energy efficiency is a key parameter in to thenode design of efficient and reliable higher energy consumption compared to atonetwork with less traffic. To evaluate the energy the WBAN. Energy consumption is related node behavior. A network with busy traffic has a efficiency comprehensively, average energy consumption is used.To The average the energy per higher energy consumptionthe compared to a network with per lessbittraffic. evaluate energy

Sensors 2016,2016, 16, 401 Sensors 16, 401

13 of 15 13 of 16

consumption of the IEEE 802.15.4 MAC protocol increases sharply with the number of nodes, Energy is acomplexity. key parameter in the design of complexity efficient andcauses reliableaMAC for because of high efficiency contention High contention highprotocols packet collision the WBAN. Energy consumption is related to node behavior. A network with busy traffic has a rate and results in a large number of retransmissions. The traffic prioritization scheme reduces the higher energy consumption compared to a network with less traffic. To evaluate the energy efficiency contention complexity and decreases packet collision and packet retransmission. The proposed comprehensively, the average energy consumption per bit is used. The average energy per bit is PA-MAC and the conventional NPCA-MAC show better performances than that of the IEEE 802.15.4 given by: MAC protocol. Above all, the proposed PA-MACEavg prioritizes channel access and incorporates the Eb “ (20) classification of the data transfer procedure, thereby Sbreducing the contention complexity, the packet collision, retransmission. Therefore, thethroughput proposedachieved. PA-MAC outperforms the where and Eavg isthe the packet average energy consumption and Sb is the conventional NPCA-MAC and the IEEE 802.15.4. The evaluation of the average energy consumption per bit is shown in Figure 13. The increase Figure 14consumption shows the collision of the overallcollision traffic in a network as a functionThe of the number in energy is mainlyratio because of packet and packet retransmission. energy consumption of the IEEE 802.15.4 MAC protocol increases sharplyinwith number nodes,nodes because of nodes. The number of collisions increases with the increase the the number ofofsensor in the of high contention complexity. High contention complexity a high packet collision ratesolve and the WBAN. In the IEEE 802.15.4, a slotted CSMA/CA without acauses prioritization policy did not results in a large number of retransmissions. The traffic prioritization scheme reduces the contention contention complexity problems; the collision ratio increased discernibly when the number of nodes complexity andproposed decreases PA-MAC packet collision andNPCA-MAC packet retransmission. proposed PA-MAC the exceeded 20. The and the provide The a low collision ratio asand compared conventional NPCA-MAC show better performances than that of the IEEE 802.15.4 MAC protocol. to the IEEE 802.15.4 MAC protocol, owing to the prioritization of data traffic and the classification of Above all, the proposed PA-MAC prioritizes channel access and incorporates the classification of the continuous and discontinuous data transfer procedures. With features including channel access data transfer procedure, thereby reducing the contention complexity, the packet collision, and the patterns and GTS allocations for continuous traffic, the proposed PA-MAC outperforms packet retransmission. Therefore, the proposeddata PA-MAC outperforms the conventional NPCA-MAC the conventional NPCA-MAC. and the IEEE 802.15.4.

Figure consumption per Figure13. 13.Average Average energy energy consumption per bit.bit.

Figure 14 shows the collision ratio of the overall traffic in a network as a function of the number of nodes. The number of collisions increases with the increase in the number of sensor nodes in the WBAN. In the IEEE 802.15.4, a slotted CSMA/CA without a prioritization policy did not solve the contention complexity problems; the collision ratio increased discernibly when the number of nodes exceeded 20. The proposed PA-MAC and the NPCA-MAC provide a low collision ratio as compared to the IEEE 802.15.4 MAC protocol, owing to the prioritization of data traffic and the classification of continuous and discontinuous data transfer procedures. With features including channel access patterns and GTS allocations for continuous data traffic, the proposed PA-MAC outperforms the conventional NPCA-MAC.

Figure 14. Collision ratio.

6. Conclusions Sharing of the ISM band leads to unpredictable service interruptions because of mutual

Sensors 2016, 16, 401

Figure 13. Average energy consumption per bit.

14 of 16

Figure Figure 14. 14. Collision Collision ratio. ratio.

6. Conclusions 6. Conclusions Sharing Sharing of the the ISM ISM band band leads leads to to unpredictable unpredictable service service interruptions interruptions because because of of mutual mutual interference inin highly coexistent interferences may be interference between betweencoexisting coexistingsystems. systems.WBANs WBANsoperating operating highly coexistent interferences may affected by beacon drops, data collisions, packet delays, low network throughput, and high-energy consumption. To address these issues, in this paper, a priority-based adaptive MAC protocol called the PA-MAC, has been proposed for WBANs in unlicensed bands. A fixed dedicated channel is assigned for the beacon and the rest of the communication is through the data channel. We have also differentiated the access phase of the CAP and have classified the transfer procedure of the priority-based traffic in WBANs. The proposed PA-MAC supports both CAP and CFP. The CFP is used to transfer continuous and large numbers of data packets to the coordinator. According to the simulation results, the PA-MAC shows substantial improvements in terms of transmission time, throughput, energy efficiency, and collision ratio, compared to the IEEE standard 802.15.4 and the conventional NPCA-MAC. In the proposed MAC, it is assumed that the coordinator and sensor nodes are within the communication range and their mobility is not critical for communication between the coordinator and sensors. Any security and privacy mechanisms are not considered, either. In the proposed MAC, the GTS slots are assigned for both medical data traffic and CE traffic, but the number of GTS slots is limited and, thus, the substantial high collision ratio might result in significant performance degradation, especially in case of heavy and high data rate traffic. Functional extension of the PA-MAC for WBANs with a cognitive ratio capability may be undertaken in the future. Acknowledgments: The authors wish to thank the editor and anonymous referees for their helpful comments to improve the quality of this paper. This research was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2013R1A1A2011744). Correspondence should be addressed to Sangman Moh ([email protected]). Author Contributions: The individual contributions of authors are as follows. Sabin Bhandari developed and simulated the MAC protocol. Sangman Moh directed the research and contributed to the refinement of the protocol and the interpretation of simulation results. The paper was drafted by the Sabin Bhandari and subsequently revised and approved by Sangman Moh. Conflicts of Interest: The authors declare no conflict of interest.

References 1.

Movassaghi, S.; Abolhasan, M.; Lipman, J.; Smith, D.; Jamalipour, A. Wireless Body Area Network: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1658–1686. [CrossRef]

Sensors 2016, 16, 401

2.

3.

4. 5. 6.

7. 8. 9. 10.

11.

12. 13. 14.

15. 16.

17. 18. 19.

20. 21.

22.

15 of 16

Ye, W.; Heidemann, J.; Estrin, D. An Energy-Efficient MAC Protocol for Wireless Sensor Networks. In Proceedings of the 21st Annual Joint Conference of IEEE Computer Communications Societies (INFOCOM 2002), New York, NY, USA, 23–27 June 2002; pp. 1567–1576. El-Hoiydi, A.; Decotignie, J.-D. WiseMAC: An Ultra-Low Power MAC Protocol for the Downlink of Infrastructure Wireless Sensor Networks. In Proceedings of the 9th IEEE Symposium on Computers and Communication (ISCC 2004), Alexandria, Egypt, 28 June–1 July 2004; pp. 244–251. IEEE Std.802.15.4. In Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Data Rate Wireless Personal Area Networks (WPAN); IEEE: Piscataway, NJ, USA, 2006. Ullah, S.; Chen, M.; Kwak, K.S. Throughput and Delay Analysis of IEEE 802.15.6-based CSMA/CA protocol. J. Med. Syst. 2012, 36, 3875–3891. [CrossRef] [PubMed] Kartsakli, E.; Lalos, A.S.; Antonopoulos, A.; Tennina, S.; Renzo, M.D.; Alonso, L.; Verikoukis, C. A survey on M2M Systems for mHealth: A Wireless Communications Perspective. Sensors 2014, 14, 18009–18052. [CrossRef] [PubMed] Cavallari, R.; Martelli, F.; Rosini, R.; Buratti, C.; Verdone, R. A Survey on Wireless Body Area Networks: Technologies and Design Challenges. IEEE Commun. Surv. Tutor. 2014, 16, 1635–1657. [CrossRef] Le, T.T.; Moh, S. Interference Mitigation Schemes for Wireless Body Area Sensor. Sensors 2015, 15, 13805–13838. [CrossRef] [PubMed] Bhandari, S.; Moh, S. A Survey of MAC Protocols for Cognitive Radio Body Area Networks. Sensors 2015, 15, 9189–9209. [CrossRef] [PubMed] Lee, W.; Rhee, S.H.; Kim, Y.; Lee, H. An Efficient Multi-Channel Management Protocol for Wireless Body Area Networks. In Proceedings of the International Conference on Information Networking (ICOIN 2009), Chiang Mai, Thailand, 21–24 January 2009; pp. 1–5. Kim, B.; Cho, J. A Novel Priority-Based Channel Access Algorithm for Contention-Based MAC Protocol in WBANs. In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2012), Kuala Lumpur, Malaysia, 20–22 February 2012; pp. 1–5. Alam, M.M.; Berder, O.; Menard, D.; Sentieys, O. TAD-MAC: Traffic-Aware Dynamic MAC Protocol for Wireless Body Area Sensor Networks. IEEE J. Emerg. Sel. Top. Circuits Syst. 2012, 2, 109–119. [CrossRef] Li, C.; Hao, B.; Zhang, K.; Liu, Y.; Li, J. A Novel Medium Access Control Protocol with Low Delay and Traffic Adaptivity for Wireless Body Area Networks. J. Med. Syst. 2011, 35, 1265–1275. [CrossRef] [PubMed] Shuai, J.; Zou, W.; Zhou, Z. Priority-Based Adaptive Timeslot Allocation Scheme for Wireless Body Area Network. In Proceedings of the 13th International Symposium on Communications and Information Technologies (ISCIT 2013), Surat Thani, Thailand, 4–6 September 2013; pp. 609–614. Rahman, M.O.; Hong, C.S.; Lee, S.; Bang, Y.-C. ATLAS: A Traffic Load Aware Sensor MAC Design for Collaborative Body Area Sensor Networks. Sensors 2011, 11, 11560–11580. [CrossRef] [PubMed] Anjum, I.; Alam, N.; Razzaque, M.A.; Mehedi Hassan, M.; Alamri, A. Traffic Priority and Load Adaptive MAC Protocol for QoS Provisioning in Body Sensor Networks. Int. J. Distrib. Sens. Netw. 2013, 2013, 1–9. [CrossRef] Kwak, K.S.; Ullah, S. A Traffic-adaptive MAC Protocol for WBAN. In Proceedings of the 2010 IEEE GLOBECOM Workshops (GC Wkshps), Miami, FL, USA, 6–10 December 2010; pp. 1286–1289. Li, H.; Tan, J. Heartbeat-Driven Medium-Access Control for Body Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 44–51. [PubMed] Yan, Z.; Liu, B. A Context Aware MAC Protocol for Medical Wireless Body Area Network. In Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011), Istanbul, Turkey, 4–8 July 2011; pp. 2133–2138. Ullah, S.; Imran, M.; Alnuem, M. A Hybrid and Secure Priority-Guaranteed MAC Protocol for Wireless Body Area Network. Int. J. Distrib. Sens. Netw. 2014, 2014, 1–7. [CrossRef] Ibarra, E.; Antonopoulos, A.; Kartsakli, E.; Verikoukis, C. HEH-BMAC: Hybrid Polling MAC Protocol for Wireless Body Area Networks Operated by Human Energy Harvesting. Telecommun. Syst. 2015, 58, 111–124. [CrossRef] Hellbruck, H.; Esemann, T. Limitations of Frequency Hopping in 2.4 GHz ISM-Band for Medical Applications due to Interference. In Proceedings of the Consumer Communications and Networking Conference (CCNC 2011), Las Vegas, NV, USA, 9–12 January 2011; pp. 242–246.

Sensors 2016, 16, 401

23.

24. 25. 26.

27.

28.

16 of 16

So, H.-S.W.; Nguyen, G.; Walrand, J. Practical Synchronization Techniques for Multi-Channel MAC. In Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, Los Angeles, CA, USA, 24–29 September 2006; pp. 134–145. Sthapit, P.; Jae-Young, P. Mobility Support in IEEE 802.15. 4 Based Mobile Sensor Network. IEICE Trans. Commun. 2014, 97, 555–563. [CrossRef] Torabi, N.; Leung, V.C.M. Realization of Public M-Health Service in License-Free Spectrum. IEEE J. Biomed. Health Inform. 2013, 17, 19–29. [CrossRef] [PubMed] Hang, S.; Xi, Z. Design and Analysis of a Multi-channel Cognitive MAC Protocol for Dynamic Access Spectrum Networks. In Proceedings of the IEEE Military Communications Conference (MILCOM 2008), San Diego, CA, USA, 16–19 November 2008; pp. 1–7. Liang, X.; Balasingham, I. Performance Analysis of the IEEE 802.15.4 Based ECG Monitoring Network. In Proceedings of the IASTED Wireless and Optical Communications Conference (WOC 2007), Montreal, QC, Canada, 30 May–1 June 2007; pp. 99–104. The Network Simulator—NS-2. Available online: http://www.isi.edu/nsnam/ns/ (accessed on 18 March 2015). © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).