Abstract

The standard IEEE 802.15.6 provides a new phys-ical layer (PHY) and medium access control sublayer (MAC) specifications that support several challenges of wireless body area networks (WBANs). The posting is the access method of the IEEE 802.15.6 MAC protocol that is used by the hub to send data to the nodes. In this paper, we use a formal method to evaluate the posting access method under the WBANs stochastic environment. Based on the statistical model checking (SMC) toolset UPPAAL-SMC, we model and evaluate the behavior of the posting access method in terms of scalability. The evaluation results showed that according to the allocated time intervals, the energy consumption, and the throughput the scalability was validated.

Highlights

  • Wireless body area network (WBAN) [1] [2] [3] [4] is composed of biomedical sensors nodes that can be worn on or placed in the human body to measure several physiological parameters of the human body, such as temperature and pressure

  • Following our earlier study [8] regarding the existing medium access control (MAC) protocols for the WBAN, we found that the MAC protocol of the IEEE 802.15.6 standard takes into consideration all the WBAN challenges

  • We first use the stochastic timed automata (STA) formalism provided by UPPAAL-statistical model checking (SMC) to construct a detailed model of this behavior

Read more

Summary

INTRODUCTION

Wireless body area network (WBAN) [1] [2] [3] [4] is composed of biomedical sensors nodes that can be worn on or placed in the human body to measure several physiological parameters of the human body, such as temperature and pressure These sensors nodes must wirelessly send their data to a control and monitoring device carried on the body. The problem here is that the WBAN is considered as a stochastic environment, where the prediction of when the physiological parameters change their values is non-deterministic This stochastic nature makes it difficult for the prediction of who it should allocate, between the hub and the nodes, the time interval to transmit their frames. The model-checking [11] has been used primarily in the verification www.ijacsa.thesai.org

Results
POSTING ACCESS METHOD
Energy Consumption
Throughput

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.