Research ArticleA Hybrid and Secure Priority-Guaranteed MAC Protocol forWireless Body Area Network
Sana Ullah, Muhammad Imran, and Mohammed Alnuem
College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
Correspondence should be addressed to Sana Ullah; [email protected]
Received 26 November 2013; Accepted 7 January 2014; Published 23 February 2014
Academic Editor: Honggang Wang
Copyright Β© 2014 Sana Ullah et al. This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
This paper introduces a hybrid and secure MAC protocol (PMAC) for WBAN. The PMAC protocol uses two contention accessperiods (CAPs) for accommodating normal and life-critical traffic and one contention-free period (CFP) for accommodating largeamount of data packets. The priority-guaranteed CSMA/CA procedure is used in the CAP period, where different priorities areassigned to WBAN nodes by adjusting the backoff window size. In addition, a set of security keys is used to prevent illegal accessto the network. Analytical expressions are derived to analyze the average delay, power consumption, throughput, and packet lossprobability of the PMAC protocol. Results derived from these expressions are validated by computer simulations.
1. Introduction
Wireless body area networks (WBANs) are captivating sig-nificant attention from research and industrial communities.They provide unprecedented and limitless opportunities formedical and nonmedical applications [1, 2]. Medical appli-cations employ implantable or wearable tiny devices in, on,or around the human body for continuous health moni-toring such as predicting contingency abnormal conditionand treatment of chronic diseases including diabetes andhypertension. Non-medical applications include interactivebody computing, information exchange, social networking,monitoring forgotten things, entertainment, monitoring ofathletes, education, or assessing soldier fatigue and battlereadiness. Most of these applications require WBAN to stayoperational for a longer period of time which necessitatespower-efficient network operation. For example, a diabeticpatient requires round-the-clock real-time glucose monitor-ing over a period of years to decades in order to avoidcatastrophic consequences such as stroke or a heart attackthat may result in death. This requires WBAN node tocontinuously monitor and report glucose level for timelyaction.Nodes ofWBANprimarily rely on lowpower batteriesthat hinder their operation over longer period of time.Therefore, power-efficient network operation is extremelycrucial for prolonging network lifetime.
Medium access control (MAC) protocols play a criti-cal role in extending network lifetime by controlling thedominant sources of energy waste such as packet collisions,overhearing, idle listening, and control packet overhead.Most of the existing MAC protocols for WBAN are catego-rized into contention- and schedule-based MAC protocols.In contention-based MAC protocols, nodes compete forthe channel to transmit the data; carrier sensor multipleaccess with collision avoidance (CSMA/CA) protocol is thebest example of contention-based MAC protocols wherethe nodes contend for the channel using a random backoffperiod.These protocols are scalable and do not require estab-lishing infrastructure. However, they are unable to handleemergency situations where multiple nodes (with the samepriorities) are triggered to send life-critical data. Schedule-based MAC protocols divide the channel into multiple fixedor dynamic slots, which are used for data transmission.Theseprotocols reduce idle listening and overhearing; however,they incur significant protocol overhead.
This paper proposes a hybrid and secure MAC pro-tocol (PMAC) for WBAN. The PMAC protocol supportstwo contention access periods (CAPs) and one contentionfree period (CFP). In the CAPs, the operation is mainlybased on a priority-guaranteed CSMA/CA procedure, wheredifferentWBANnodes are assigned different priorities.Thesepriorities are adjusted by tuning the contention window
Hindawi Publishing CorporationInternational Journal of Distributed Sensor NetworksVolume 2014, Article ID 481761, 7 pageshttp://dx.doi.org/10.1155/2014/481761
2 International Journal of Distributed Sensor Networks
(CW) size. Depending on the application requirements, theCAPs may also employ the slotted-ALOHA protocol. TheCFP is used to carry large amount of data packets to thecoordinator. The PMAC protocol uses a set of securitykeys including master key (MK) and pairwise temporal key(PTK) in order to prevent adversaries from gaining resourceallocation information and from corrupting the CFP slots.The performance of the PMAC protocol is analyzed usingboth analytical and simulation-based methods. The resultsare derived in terms of average delay, power consumption,throughput, packet loss probability, and number of corruptedCFP slots.
The rest of the paper is organized into the following sec-tions. Section 2 presents the related work. Section 3 explainsthe basic operation of the PMAC protocol. Sections 4 and5 present the analytical approximations and performanceresults. The final section concludes our work.
2. Related Work
Multiple research efforts are dedicated to the developmentof novel MAC protocols for WBANs. Some of these effortsanalyzed existing technologies such as IEEE 802.15.4 [3],while others have proposed new techniques for power-efficient communication in WBANs. The authors of [4]investigated the suitability of IEEE 802.15.4 MAC protocolfor WBANs; however, their analysis was confined to periodicand asymmetric traffic. In [5], the authors proposed arandom access protocol that supports quality of service formultiuser mobile WBANs. This protocol addressed inter-WBAN interference and energy wastage problems causedby network mobility and provided support for latency andenergy control. The authors of [6] proposed a reliablepower-saving mechanism that strives to reduce collisionsand idle listening. They also proposed a distributed queuingMAC protocol and evaluated its performance for differentnetwork loads [7, 8]. The performance of IEEE 802.15.6-based CSMA/CA procedure was investigated in [9] wherethe minimum delay and maximum throughput for differentnarrow band frequency bands were derived. The authorsof [10, 11] developed an analytical model to evaluate theperformance of contention-basedWBANs.They developed aMarkov chain to model backoff procedure of IEEE 802.15.6under saturated and nonsaturated conditions. Their studyalso investigated the effectiveness of exclusive and randomaccess phases. A similar study was conducted in [12] wherethe authors investigated the impact of different periods onthe IEEE 802.15.6 superframe structure. They consideredsaturated and error prone channel and developed a Markovchain for analyzing different traffic loads on the IEEE 802.15.6networks. In [13], the authors studied the integration of radiofrequency identification (RFID) technology with WBANsand concluded that RFID-based wakeup methods can playa significant role in extending the network lifetime to years.A superframe-level time hopping scheme for WBAN withvariable contention access period was presented in [14].While maintaining the similar interference mitigation, theproposed scheme improved performance of WBAN in terms
of energy dissipation, latency, and spectrum efficiency. Theauthors of [15] recently proposed an adaptive time divisionmultiple access (TDMA) protocol based on periodic wakeup schedules, which efficiently handles overhearing and idlelistening problems in WBANs. Another study presented in[16] proposed a traffic-aware dynamic MAC protocol thatdynamically adjusts wakeup intervals based on traffic statusregister bank.Thedynamicwakeup intervals save extra powerconsumed by idle listening, overhearing, collisions, andunnecessary beacon transmission. A priority-based TDMAprotocol is presented in [17], where the transmission sched-ules are based on priorities of data packets. This protocoldynamically adjusts the superframe structure according tothe traffic load, thereby minimizing power consumption ofthe network.
3. PMAC Protocol
The following sections discuss the general description,priority-guaranteed resource allocation, and security supportof PMAC protocol.
3.1. General Description. The PMAC protocol operates ina beacon-enabled mode, where beacons are transmitted atthe end of each superframe. The superframe consists of abeacon, two contention access periods (CAP1 and CAP2),and one contention-free period (CFP) as given in Figure 1.The beacon is used for resource allocation information. Italso carries security codes in order to allocate resources tolegitimate users. The CAP1 considers a priority-guaranteedCSMA/CA procedure for data transmission. The operationof the priority-guaranteed CSMA/CA is partially based onIEEE 802.15.6 standard [18].TheCAP1 has an optional periodfor slotted-ALOHA protocol (this is not considered in ouranalysis). Depending on the application requirements, theslotted-ALOHA protocol may be used to send short data andcommand frames. For example, for low-traffic situations, theslotted-ALOHAmay be used to allocate resources to nodes inthe CFP period. The CFP period consists of multiple TDMAslots and is used for a large amount of data packets includingstreaming data. The CAP2 is an optional period whichis used to finish the pending transmission of CAP1. Thisperiod is also used to inform the coordinator of incompletetransmission in the previous CFP slots. In addition, thePMAC considers a one-hop star topology network withuplink traffic only. The entire operation of the network iscontrolled by the WBAN coordinator.
3.2. Priority-Guaranteed Resource Allocation. For resourceallocation, the coordinator continuously broadcasts beaconsto all nodes, and only active nodes are able to receive thebeacons. The PMAC protocol allows low duty cycle nodes toremain in sleepmode in order to save their energy (consumedby beacon overhearing). The nodes which have no data tosend or receive do not need to wakeup and receive thebeacons. The nodes requiring the allocation of TDMA slotssend a request to the coordinator in the CAP period. Uponreceiving the request, the coordinator allocates TDMA slots
International Journal of Distributed Sensor Networks 3
Beac
on Slotted-ALOHA Be
acon
1 2 3 n
CAP1 CFP CAP2
Optional
Priority-based
CSMA/CA
Priority-based
CSMA/CA
Figure 1: PMAC superframe structure.
Senderaddress
Superframelength
CFP slotlength CAP1 start
CAP2 start
CAP1 end
CAP2 end
CFP start
CFP end MACcapability
PHYcapability
Inactiveduration
6 1 1 1 1 1
1 1 1 3 1 1
Octets
Octets
Figure 2: PMAC beacon frame format.
in the CFP period of the following superframe. Figure 2shows the beacon format of PMAC protocol. The details ofeach field are present in [18].
In the CAP period, the PMAC protocol employs thepriority-guaranteed CSMA/CA procedure. The procedureof this protocol is based on IEEE 802.15.6 standard [18]where the node sets the backoff counter to a random integerthat is uniformly distributed over [1,CW] where CW β
(CWmin,CWmax). Traditional CSMA/CA procedure initiallysets its backoff counter to a random integer selected froma fixed-size CW. Because WBAN may have different nodeswith different priorities, the use of a fixed-size CW is not areliable approach, for example, electrocardiogram and bloodpressure nodesmay have high and low priorities, respectively.The priority-guaranteed CSMA/CA prioritizes all the nodesby assigning different CWmin and CWmax values to them asgiven in Table 1.
Nodes having high priorities will have a small CW andthose having low priorities will have a large CW. Once thebackoff counter is selected, the node starts decrementing thiscounter for each idle CSMA slot. Once the backoff counterreaches zero, the node transmits the data. If the channel isbusy due to a frame transmission, the node locks its backoffcounter until the channel becomes idle. Unlike IEEE 802.15.6CSMA/CA where the CW is doubled for even numberof failures, the CW in the priority-guaranteed CSMA/CAis doubled for each failure. Figure 3 shows the resourceallocation of a priority-guaranteed CSMA/CA procedure.
3.3. Security Support. Since WBANs are mostly used forhealth applications, attacks on these networks may createserious circumstances for their users. Each WBAN mustbe able to support strong security protocols in order toenable secure communication on the channel. In addition,these protocols must also be able to address other securityissues such as data confidentially, data authentication, datafreshness, data availability, and secure management. Thesecurity mechanism of the PMAC protocol is based on
Table 1: CW bounds for priority-guaranteed CSMA/CA [18].
Priority class CWmin CWmax
0 16 641 16 322 8 323 8 164 4 165 4 86 2 87 1 4
IEEE 802.15.6 standard [18]. The protocol supports threesecurity levels: (1)unsecured communication level, where thedata is transmitted in unsecured frames, (2) authenticationlevel, where the data is transmitted in secured authenticationwith no encryption, and (3) authentication and encryption,where the data is transmitted in authenticated and encryptedframes. The PMAC protocol uses a master key (MK) forestablishing a secure communication. The MK is presharedbetween the nodes and the coordinator. Once the pre-sharedMK is activated during association, the nodes generate apairwise temporal key (PTK) for a single session uponmutual agreement. The frames are then authenticated andencrypted using the AES-128 counter. The secure MK andPTK keys prevent adversaries from penetrating into thenetwork and from manipulating different active and passiveattacks including backoff manipulation and replay attacks.
4. Analytical Approximations of PMAC
Let π = (0, 1, 2, . . . , 7) represent the priority class of the nodesin the CAP period (CFP periods are not considered in theanalysis) and let π
π(π = 0, 1, . . . , πβ1) be the number of finite
stations in the priority π class. Let ππrepresent the probability
that a node transmits in the priority π class.The probability ππ
4 International Journal of Distributed Sensor Networks
Sleeping
Coordinator
High priority node 1
Medium priority node 2
Beacon
Beacon
Beacon
Back off
Back off
CCA
Data ACK
Data ACK
CCA BusyLow priority node 3
Figure 3: A priority-guaranteed CSMA/CA procedure.
that ππsenses the channel busy in the backoff stage is given by
[19]
ππ= 1 β [
πβ1
βπ₯=0
(1 β ππ₯)ππ₯] (1 β π
π)ππβ1[
πβ1
βπ₯=π+1
(1 β ππ₯)ππ₯] .
(1)
The probability π is that the channel is busy or there is anongoing transmission during a slot time is given by
π = 1 β [
πβ1
βπ₯=0
(1 β ππ₯)ππ₯] . (2)
The transmission probability ππis given by the fraction of
average number of attemptsπΈ[π΄π] for the priority class π to the
average number of backoffπΈ[π΅π] that a node needs to transmit
the data successfully. According to [19], the expressions forπΈ[π΄π] and πΈ[π΅
π] are given by
πΈ [π΄π] =
ππ
βπ=0
[πππ
π(1 β π
π)
1 β πππ+1] . (3)
The probability that the data is successfully transmittedafter πth retry is ππ
π(1βππ)/(1βπ
ππ +1), whereπ
πis the retry
limit of ππin the priority class π. The number of backoff slots
in the πth retry is βππ₯=0(ππ,π₯β 1)/2. The expression for πΈ[π΅
π]
is given by
πΈ [π΅π] = [
[
ππ
βπ=0
ππ
π(1 β π
π)
1 β πππ+1]
]
[
π
βπ₯=0
(ππ,π₯β 1)
2] . (4)
The probability ππ= πΈ[π΄
π]/πΈ[π΅
π] can be used to solve (1)
and (2).
4.1. Average Delay. The average delay πΈ[π·PMAC] includes thedelay of the packet when it arrives at the queue and the delayof the successful transmission. It is given by
πΈ [π·PMAC] = πΈ [π΅π] πΏ + πΈ [ππ] + ππ· + 2ππ + 2ππΆ, (5)
where ππ·, ππ, ππΆ, and πΏ represent the data packet transmis-
sion time, the turn around time, control packet transmissiontime, and empty slot time, respectively.TheπΈ[π
π] is themean
waiting time of the packets for priority class π. According tothe nonpreemptive M/G/1 priority queuing system, πΈ[π
π] is
given by
πΈ [ππ] =
ππΈ [π ]
[1 β βπ
π=0ππ] [1 β β
π
π=0ππ], (6)
where π = [πΈ[π΅π] + π
π·+ 2π
π+ 2π
πΆ]/πΏ is the traffic
intensity and πΈ[π ] is the residual service time. The variableπΏ represents the average interarrival time of the packets.
4.2. Average Power Consumption. The average power con-sumptionπΈ[πPMAC] includes the power consumedduring idleπIDLE, transmit πTX, and receive πRX states. The πΈ[πPMAC] isgiven by
πΈ [ππππ΄πΆ
]
=[πIDLE (πΏ β πΈ [π·PMAC]) + πTXππ· +πRX (ππ + 2ππ + 2ππΆ)]
[πΏ + πΈ [π·PMAC]],
(7)
where ππis the time to switch from idle to transmit or receive
states.
4.3. Throughput. The saturated throughput STπis fraction of
average transmission time in a slot for a priority class π to thetotal slot duration [20]. It is given by
STπ=
πππΈ [π]
[1 β π] πΏ + πππ + [π β π]πCOL, (8)
where ππand πCOL represent the average time the channel
is sensed busy due to a successful transmission and dueto a collision, respectively [21]. In addition, πΈ[π] is theaverage packet length. The π
πis the successful transmission
probability occurred in a slot time for a priority class π andπ is the successful transmission probability in a slot time.According to [19], the expressions for π
πand π are given by
ππ= ππππ(1 β π
π)ππβ1[
πβ1
βπ₯=0
(1 β ππ₯)ππ₯] ,
π = (1 β π) [
πβ1
βπ₯=0
ππ₯ππ₯
1 β ππ₯
] .
(9)
For PMAC, the expressions for ππand πCOL are
ππ= PHY +MAC + SIFS + DIFS + 2π + π
π+ ππ·,
πCOL = PHY +MAC + DIFS + ππ·,
(10)
where PHY, MAC, SIFS, DIFS, and π represent the physicallayer header, MAC layer header, short interframe spacing,distributed coordination function (DCF) interframe spacing,and propagation delay, respectively.
International Journal of Distributed Sensor Networks 5
Table 2: Simulation parameters (the symbol rate is calculated basedon [18]).
CCA 63/Symbol rate pSIFS 50 πsπ0
4 π1
7CSMA slotlength CCA + 20 πs MAC 56 bits
MAC footer 16 bits Propagationdelay π 1 πs
πIDLE 5 πW πTX 27mWπRX 1.8mW π
π0.8ms
ππ
0.4ms ππΆ
1.9msπΈ[π] 245 bytes PHY 31 bits
5. Performance Results
The basic operation of the PMAC protocol is simulated inan independent C++ simulator. The nodes generate uplinkPoisson traffic in a star topology network. Initially, we con-sider two priority classes (class 0 and class 1) for performanceanalysis; however, the analysis is valid for all types of priorityclasses. The CWmin and CWmax for priority classes 0 are 16and 64 and for priority class 1 are 16 and 32, respectively. Thesimulation parameters are listed in Table 2. We are interestedin analyzing the PMAC protocol in terms of the followingparameters.(i) Average Delay. This is the average delay of a packet in thequeuing, backoff, and transmit states for a priority class π.(ii) Average Power Consumption. This is the average powerconsumed in the backoff, transmit, and receive states for apriority class π.(iii) Throughput.This is the saturation throughput of WBAN.(iv) Packet Loss Probability.The packet loss probability π
π,LOSSis the probability of a packet when it fails atπ
π+ 1 attempts
and is derived as ππ,LOSS = π
ππ+1
π.
(v) Number of Corrupted CFP Slots. This is the total numberof CFP slots that are corrupted by an attacker. The attackerfirst listens to the beacon in the beginning of the superframeperiod and grabs knowledge about the slot boundaries of CFPperiod. Once the CFP slots are known, the attacker createsinterference in these slots.
Figure 4 shows the average delay as a function of numberof nodes in priority class 0 and class 1. Because class 0has longer waiting and queuing delays, its average delay iscomparatively more than that of class 1. In addition, when thenumber of nodes increases, the average delay increases; this isbecause of increase in packet loss and collision probabilities.In addition, the average power consumption for class 0 ismore than that of class 1 for a few number of nodes asillustrated in Figure 5. However, when the number of nodesin a high priority class is increased (for a fixed CW), thepower consumptionwill eventually increase andwill bemuchhigher than that of a low priority class. This figure also showsthe average power consumption of IEEE 802.15.4 protocol,which ismuch higher than class 0 and class 1.This is due to the
101
102100 101
Number of nodes in priority class i
Aver
age d
elay
(s)
Priority class 1Priority class 0
Figure 4: Average delay of PMAC for priority class 0 and class 1.
Packet interarrival time (s)
Pow
er co
nsum
ptio
n (in
πW
)
Priority class 0, analyticalPriority class 1, analyticalPriority class 0, simulation
Priority class 1, simulationIEEE 802.15.4, no priority
102
102
103
100 101
Figure 5: Average power consumption of PMAC for priority class 0and class 1.
fact that all nodes in IEEE 802.15.4 network compete for thechannelwith the samepriorities.The saturation throughput isshown in Figure 6, where class 0 hasmuch higher throughputthan that of class 1 and class 2. The latter two classes havesmall CWs and therefore have high chances of collisions.Since class 0 has a low retry limit, it is unable to transmit allpacket successfully and has a higher packet loss probabilityas illustrated in Figure 7. The trend in Figure 7, however,depends on the number of retry limit π
π. Figure 8 shows
different attacks on the CFP slots of the superframe, wherethe attacker corrupts the CFP slots by gaining the resourceallocation information through beacons. It can be seen thatproper authentication and encryption procedure is able toprevent most of the CFP attacks. This is due to the use ofsecure MK and PTK keys which do not allow adversaries tograb beacons and to penetrate the CFP slots.
6. Conclusion
This paper introduced a hybrid and secure MAC protocolwhich prioritizes the nodes by using a priority-guaranteed
6 International Journal of Distributed Sensor Networks
Number of nodes in priority class i
Satu
ratio
n th
roug
hput
Priority class 2Priority class 1Priority class 0
101
102100 101
Figure 6: Saturation throughput of PMAC for priority class 0, class1, and class 2.
0
0.01
0.02
0.03
0.04
0.05
0.06
Pack
et lo
ss p
roba
bilit
y
Priority class 0Priority class 1
Number of nodes in priority class i102100 101
Figure 7: Packet loss probability ππ,LOSS of PMAC for priority class
0 and class 1.
0 5 10 15 20 25 30 35 40 45 50
Number of attackers
Num
ber o
f cor
rupt
ed C
FP sl
ots
Unsecured communicationAuthentication and encryption
102
103
104
101
Figure 8: Number of corrupted CFP slots.
CSMA/CA procedure in the CAP period. The priorities areadjusted according to the CW. The PMAC protocol usedCFP periods for large amount of data packets. Analyticalapproximations were derived to analyze the performance ofCAP period in terms of average delay, power consumption,throughput, packet loss probability, and number of corruptedCFP slots. The analytical approximations were validated bycomputer simulations. In future, we will derive analyticalapproximations for the CFP period and will study its feasi-bility for multimedia WBANs.
Conflict of Interests
The authors declare that they have no conflict of interests.
Acknowledgment
Thisworkwas supported by the ResearchCenter of College ofComputer and Information Sciences, King Saud University,Riyadh, Saudi Arabia, through the Research Project no.RC121244.
References
[1] S. Ullah,H.Higgins, B. Braem et al., βA comprehensive survey ofwireless body area networks: on PHY,MAC, and network layerssolutions,β Journal of Medical Systems, vol. 36, no. 3, pp. 1065β1094, 2012.
[2] B. Latre, B. Braem, I. Moerman, C. Blondia, and P. Demeester,βA survey on wireless body area networks,β Wireless Networks,vol. 17, no. 1, pp. 1β18, 2011.
[3] IEEE, 802. 15. 4: Wireless Medium Access Control (MAC) andPhysical Layer (PHY) Specifications for Wireless Personal AreaNetworks (WPANs) Used in or around a Body, IEEE, Piscataway,NJ, USA, 2006.
[4] N. F. Timmons andW.G. Scanlon, βAnalysis of the performanceof IEEE 802.15.4 for medical sensor body area networking,β inProceedings of the 1st Annual IEEECommunications SocietyCon-ference on Sensor and Ad Hoc Communications and Networks(SECON β04), pp. 16β24, Santa Clara, Calif, USA, October 2004.
[5] S. Cheng, C. Huang, and C. C. Tu, βRACOON: a multiuserQoS design for mobile wireless body area networks,β Journal ofMedical Systems, vol. 35, no. 5, pp. 1277β1287, 2011.
[6] B. Otal, L. Alonso, and C. Verikoukis, βHighly reliable energy-saving mac for wireless body sensor networks in healthcaresystems,β IEEE Journal on Selected Areas in Communications,vol. 27, no. 4, pp. 553β565, 2009.
[7] B. Otal, L. Alonso, and C. Verikoukis, βTowards energy savingwireless body sensor networks in health care systems,β inProceedings of the IEEE International Conference on Communi-cations Workshops (ICC β10), pp. 1β5, May 2010.
[8] B. Otal, L. Alonso, andC. Verikoukis, βDesign and analysis of anenergy-saving distributed MAC mechanism for wireless bodysensor networks,β EURASIP Journal on Wireless Communica-tions andNetworking, vol. 2010,Article ID 571407, 13 pages, 2010.
[9] S.Ullah,M.Chen, andK.Kwak, βThroughput and delay analysisof IEEE 802. 15. 6-basedCSMA/CAprotocol,β Journal ofMedicalSystems, vol. 36, no. 6, pp. 3875β3891, 2012.
International Journal of Distributed Sensor Networks 7
[10] S. Rashwand, J. Misic, and H. Khazaei, βIEEE 802.15.6 undersaturation: some problems to be expected,β Journal of Commu-nications and Networks, vol. 13, no. 2, pp. 142β148, 2011.
[11] S. Rashwand and J. Misic, βPerformance evaluation of IEEE802.15.6 under non-saturation condition,β in Proceedings ofthe 54th Annual IEEE Global Telecommunications Conference(GLOBECOM β11), pp. 1β6, Houston, Tex, USA, December 2011.
[12] S. Rashwand and J. Mii, βEffects of access phases lengthson performance of IEEE 802. 15. 6 CSMA/CA,β ComputerNetworks, vol. 56, no. 12, pp. 2832β2846, 2012.
[13] S. Ullah and A. Alamri, βA secure RFID-based WBAN forhealthcare applications,β JournalMedical Systems, vol. 37, ArticleID 9961, 2013.
[14] Z. Jian, L. W. Hanlen, A. Y. Wang, and H. Xiaojing,βSuperframe-level time-hopping system with variable con-tention access period for wireless body area communications,βin Proceedings of the IEEE 22nd International Symposium onPersonal, Indoor and Mobile Radio Communications (PIMRCβ11), pp. 2178β2182, Toronto, Canada, September 2011.
[15] A. Rahim, N. Javaid, M. Aslam, U. Qasim, and Z. A. Khan,βAdaptive-reliable medium access control protocol for wirelessbody area networks,β in Proceedings of the Annual IEEE Com-munications Society Conference on Sensor, Mesh and Ad HocCommunications and Networks (SECON β12), pp. 56β58, 2012.
[16] M. M. Alam, O. Berder, D. Menard, and O. Sentieys, βTAD-MAC: traffic-ware dynamic MAC protocol for wireless bodyarea sensor networks,β IEEE Journal on Emerging and SelectedTopics in Circuits and Systems, vol. 2, no. 1, pp. 109β119, 2012.
[17] I. Anjum, N. Alam, M. A. Razzaque, M. M. Hassan, andA. Alamri, βTraffic priority and load adaptive MAC protocolfor QoS provisioning in body sensor networks,β InternationalJournal of Distributed Sensor Networks, vol. 2013, Article ID205192, 9 pages, 2013.
[18] IEEE 802. 15. 6, Wireless Medium Access Control (MAC)andPhysical Layer (PHY) Specifications for Wireless Personal AreaNetworks (WPANs) used in or around a body, 2012.
[19] Y. Xiao, βPerformance analysis of priority schemes for IEEE802.11 and IEEE 802.1 le wireless LANs,β IEEE Transactions onWireless Communications, vol. 4, no. 4, pp. 1506β1515, 2005.
[20] S. Ullah, M. Chen, and W. Alsalih, βPerformance analysis ofcontention access period of IEEE 802. 15. 3 MAC protocol,βInternational Journal of Ad Hoc and Ubiquitous Computing, vol.13, no. 3/4, pp. 158β166, 2013.
[21] G. Bianchi, βPerformance analysis of the IEEE 802.11 distributedcoordination function,β IEEE Journal on Selected Areas inCommunications, vol. 18, no. 3, pp. 535β547, 2000.
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Journal ofEngineeringVolume 2014
Submit your manuscripts athttp://www.hindawi.com
VLSI Design
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
DistributedSensor Networks
International Journal of