Abstract
This paper introduces a hybrid and secure MAC protocol (PMAC) for WBAN. The PMAC protocol uses two contention access periods (CAPs) for accommodating normal and life-critical traffic and one contention-free period (CFP) for accommodating large amount of data packets. The priority-guaranteed CSMA/CA procedure is used in the CAP period, where different priorities are assigned to WBAN nodes by adjusting the backoff window size. In addition, a set of security keys is used to prevent illegal access to the network. Analytical expressions are derived to analyze the average delay, power consumption, throughput, and packet loss probability of the PMAC protocol. Results derived from these expressions are validated by computer simulations.
Highlights
Wireless body area networks (WBANs) are captivating significant attention from research and industrial communities
In contention-based Medium access control (MAC) protocols, nodes compete for the channel to transmit the data; carrier sensor multiple access with collision avoidance (CSMA/CA) protocol is the best example of contention-based MAC protocols where the nodes contend for the channel using a random backoff period
The basic operation of the PMAC protocol is simulated in an independent C++ simulator
Summary
Wireless body area networks (WBANs) are captivating significant attention from research and industrial communities. Non-medical applications include interactive body computing, information exchange, social networking, monitoring forgotten things, entertainment, monitoring of athletes, education, or assessing soldier fatigue and battle readiness Most of these applications require WBAN to stay operational for a longer period of time which necessitates power-efficient network operation. In contention-based MAC protocols, nodes compete for the channel to transmit the data; carrier sensor multiple access with collision avoidance (CSMA/CA) protocol is the best example of contention-based MAC protocols where the nodes contend for the channel using a random backoff period. These protocols are scalable and do not require establishing infrastructure.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Distributed Sensor Networks
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.