AT-MAC: Adaptive MAC-Frame Payload Tuning For Reliable Communication in Wireless Body Area Networks
AT-MAC: Adaptive MAC-Frame Payload Tuning For Reliable Communication in Wireless Body Area Networks
AT-MAC: Adaptive MAC-Frame Payload Tuning For Reliable Communication in Wireless Body Area Networks
6, JUNE 2017
Abstract—In wireless sensor networks, adaptive tuning of Medium Access Control (MAC) parameters is necessary in order to assure
the QoS requirements. In this paper, we propose an adaptive MAC-frame payload tuning mechanism for wireless body area networks
(WBANs) to maximize the probability of successful packet delivery or reliability of the associated sensor nodes based on real-time
situation. The enabling algorithm, Adaptively Tuned MAC (AT-MAC), has been proposed to tune the MAC-frame payload of a WBAN
sensor node, which is compliant with the IEEE 802.15.4 protocol. AT-MAC prioritizes sensor nodes based on the seriousness of the
health parameters that are being measured by the respective sensor nodes. Further, we consider a Markov chain-based analytical
approach that acknowledges the slotted CSMA/CA backoff mechanism with retry limits, as described in the IEEE 802.15.4 protocol.
We derive expressions for reliability, power consumption, and throughput, which are the key metrics to evaluate the network
performance of the proposed protocol, and analyze the impact of MAC parameters on them. Finally, results indicate that the low rate
and low power IEEE 802.15.4 can be used effectively in case of WBANs if the payload is tuned properly through the proposed
algorithm. The proposed AT-MAC algorithm yields around 70 percent increase in reliability of a critical node in a WBAN.
Index Terms—Wireless body area network, IEEE 802.15.4 standard, Markov chain model, adaptive payload tuning, critical sensor node,
criticality index
Ç
1 INTRODUCTION
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
MOULIK ET AL.: AT-MAC: ADAPTIVE MAC-FRAME PAYLOAD TUNING FOR RELIABLE COMMUNICATION IN WIRELESS BODY AREA... 1517
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
1518 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 6, JUNE 2017
However, apart from the payload optimization there is no However, a case always may exist that re-transmission of
difference among the critical and the non-critical sensor a packet fails continuously. In such cases, the proposed AT-
nodes. They all follow the same protocol for periodically MAC algorithm considers the approach stated in the IEEE
transmitting physiological data. If one of the nodes which 802.15.4 protocol itself [7], i.e., re-transmitting the packet
was previously a ‘non-critical’ node, exhibits the maximum only a fixed number of times, which is defined by the
health severity, the LPU considers it as the ‘critical’ node in parameter re-transmission counter ðrÞ in this paper. If packet
the current turn, and optimize it’s payload. Thus, critical transmission still fails then AT-MAC drops the current
and non-critical notions associated with the sensor nodes packet and chooses a new packet from the buffer, even if
are not static, rather changes with time, depending on the the current packet holds information that is sensed from a
severity of the sensed physiological data. critical node. It won’t be a problem as the next packet,
At a particular instant of time, it may be the case that the which contains fresh updated information, is picked up
sensed data have different range of medical severity. There- immediately. This whole process of transmission, re-trans-
fore, the default MAC-frame payload of these sensors may mission, dropping of the current packet, and selection of the
not always guarantee optimal satisfaction of QoS attributes, next packet for fresh transmission is very fast, approxi-
such as reliability of data transmission. For the sake of mately in a scale of fraction of seconds. Thus, it is highly
receiving critical health information reliably it is necessary unlikely to misjudge a critical node as non-critical, even if
to grant a privilege to the physiological sensor node that the patient faces irregular heart rate, or any such similar
senses the most critical data with respect to the other sen- health abnormality, as frequent ups and downs in physio-
sors at that particular time instant. Fig. 1 briefly elaborates logical severity is assumed not to occur within fraction of
all the major steps involved in the whole operation. In this seconds.
work, the proposed AT-MAC algorithm identifies the most
critical node at a particular time instant, and then based on 4 ANALYTICAL MODEL
the severity value of the measured physiological parameter, In the proposed work, we consider a WBAN with N physio-
i.e., the CI of that node, the system selects a priority mode logical sensor nodes that contend to send physiological data
for it. Three priority modes are envisioned in this work, viz. to the LPU. The Markov model analysis proposed in this
High Priority, Medium Priority, and Normal Mode. Each prior- work, is purely based on the principles of slotted CSMA/
ity mode has its own payload range, which is optimized in CA algorithm discussed in IEEE 802.15.4 protocol [7].
order to maximize its data transmission reliability. This pay- Thus the ideas of Clear Channel Assessments (CCAs),
load range also depends on the minimum reliability acknowledged transmission, macMaxCSMABackoffs (p), and
requirement of that mode, i.e., RhighPmin or RmedP normP
min or Rmin . macMaxFrameRetries (r) are used in Markov chain, as it is
Furthermore, the proposed AT-MAC algorithm handles discussed in the protocol.
packet re-transmissions, until the retry limit reaches, Let a1 and a2 be the probability of finding the channel
through payload tuning within the resultant payload range. busy during CCA1 due to data and ACK transmissions,
All associated calculations such as selecting the maximum respectively. Hence, the total probability of a channel to be
CI among a pool of CIs, assigning priority mode based on busy during CCA1 is given by: a ¼ a1 þ a2 . Let b denotes
the value of maximum CI, and optimization of MAC-frame the probability of finding the channel busy during CCA2 .
payload of the critical node, are done by the LPU. We consider the default values of macMaxCSMABackoffs (p)
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
MOULIK ET AL.: AT-MAC: ADAPTIVE MAC-FRAME PAYLOAD TUNING FOR RELIABLE COMMUNICATION IN WIRELESS BODY AREA... 1519
Proposition 1. If t is the probability that a node attempts the Pf ¼ 1 ð1 Pec Þð1 Pcoll Þ: (4)
first carrier sensing CCA1 in a random time slot, then the colli-
sion probability of the sensor node is given as In the simulation of the proposed model, we consider the
probability of the channel error (Pec ) as a function of
Pcoll ¼ 1 ð1 tÞN1 ða þ ð1 aÞbÞN1 : received signal strength indicator (RSSI), modulation, and
channel coding. RSSI depends on the path-loss model, shad-
Proof. Consider one sensor node (N1 ) among N sensor owing standard deviation, and Gaussian fading model. We
nodes, for which we derive the expression for collision also incorporate the packet error rate for the corresponding
probability. Now, a denotes the busy channel probabil- modulation scheme in our simulation. Interference due to
ity during CCA1 , and b is the busy channel probability multiple body sensor nodes is considered in the shadowing
during CCA2 . Hence, ð1 aÞb is the probability of and fading model.
finding the channel busy during CCA2 , given that the
channel is idle during CCA1 . Hence, the probability Definition 3 (Reliability). The reliability (R) of a sensor node
that the channel is busy for all other sensor nodes, is defined as the probability of successful packet delivery by that
except N1 , is given by node [18].
The expression of reliability of a sensor node is given by
Pidle ¼ ða þ ð1 aÞbÞN1 : (1)
R ¼ 1 ðPdcf [ Pdrl Þ ¼ 1 Pdcf Pdrl ; (5)
We have, ð1 tÞ, the probability that a node does not
perform carrier sensing. The probability that all ðN 1Þ where, Pdcf is the probability that the packet is discarded
nodes, other than N1 , do not attempt carrier sensing is due to channel access failure, and Pdrl is the packet drop
ð1 tÞN1 . Hence, for the sensor node N1 , the probability probability due to retry limits.
that there is no chance of collision, i.e., other ðN 1Þ
nodes are not sensing or they find the channel busy dur- Definition 4 (Payload). The payload (L) of the transmitted
ing CCA is given as data frame by a sensor node is defined as the length of data or
message in the transmitted frame.
Pcoll ¼ ð1 tÞN1 þ ða þ ð1 aÞbÞN1 : (2) From the simulation results obtained, we can express a
and b in terms of the MAC frame payload as shown below.
Therefore, for the sensor node N1 , the collision probabil-
ity is given as Lemma 1. The expressions of the busy channel probabilities a
and b can be approximated as linear functions of the MAC
Pcoll ¼ 1 ð1 tÞN1 ða þ ð1 aÞbÞN1 : (3) frame payload (Lp ).
u
t Proof. We study the variation of a and b for different values
of MAC-frame payload. From Fig. 2, it is evident that the
Park et al. [18] considered t as the carrier sensing proba-
variation of a and b with the payload (L) is almost linear.
bility as well as the transmission probability. However, in
For the sake of convenience, we interpolate the set of
practice, this may not be the case.
obtained values using polynomial fitting. We find that, in
Definition 2 (Failure Probability). The failure probability is the expressions of a and b, the coefficients of the higher
the conditional probability that a packet is not received by a sen- order terms are negligible in value. The coefficient of the
sor node, given that it was transmitted successfully from squared term in the expressions of a and b is of the order
another node. of 105 . Hence, only the linear term along with a constant
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
1520 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 6, JUNE 2017
is considered for the sake of our calculations in this work. Definition 6 (Critical Node). A Critical Node (sensor) in a
Therefore, the expressions of a and b are given as WBAN is defined as that node, which has the maximum CI at a
certain time slot.
a ¼ c1 L þ c2 (6)
In this paper, we ensure that the critical node is able to
b ¼ c3 L þ c4 ; (7) send data with maximum reliability, at any instant of time.
where c1 lies in the range (0.0029, 0.0033), and c2 lies in
the range (0.3051, 0.3428) so that the overall frame pay- 4.1 AT-MAC: The Proposed Algorithm
load is less than 127 bytes, as specified in the IEEE The proposed algorithm, AT-MAC, tunes the MAC-frame
802.15.4 standard [7]. Again, maintaining the above con- payload adaptively, as the name suggests. Algorithm 1 gov-
straint, the range of c3 is (0.0015, 0.0019) and that of c4 is erns the whole procedure of AT-MAC by sequentially call-
(0.1120, 0.1542). u
t ing the functions—FindCritical, SetPriority, and ACKSensing.
Corollary 1. Let us consider that the payload assigned to a critical Algorithm 1. AT-MAC Algorithm
node, corresponding to maximum reliability, at an instant be L0 ,
and let Lp be the payload assigned to all other sensor nodes. There- Input: Sensed physiological data from each sensor node.
Output: Assignment of payload that leads to maximum
fore, using Lemma 1, the normalized equations for a and b are
reliability for the critical node.
0
L N 1 1: In a WBAN, N number of nodes communicate with the
a ¼ c1 þ Lp þ c2 (8) LPU at fixed MAC parameters.
N N
2: critical node = FindCriticalðNÞ
0 3: Mode = SetPriorityðCI½CriticalNodeÞ
L N 1
b ¼ c3 þ Lp þ c4 : (9) 4: ACKSensingðModeÞ
N N
Definition 5 (Criticality Index). The Criticality Index of the Algorithm 2 identifies the critical body sensor node in the
sth sensor is the measure of seriousness of the health parameter, WBAN. The function FindCritical returns the CI of that criti-
which is being measured by that physiological sensor at the cal node whose payload scheme is to be optimized, and the
time instant t [23]. function SetPriority described in Algorithm 3, assigns a par-
In crisp set theory, we interpret the severity of a health ticular priority mode for data transmission to that node,
parameter as ‘low’, ‘moderate’, and ‘high’, but cannot quan- depending on its CI. We envision three priority modes: high
tify the deviation, i.e., how much it is low, moderate, or high priority, medium priority, and normal mode. After selecting
from the expected measure. Thus, from one recent existing the priority mode, the most critical sensor node starts data
work [23], we incorporate the concept of fuzzy inference in transmission using the slotted CSMA/CA algorithm. The
order to achieve a justified formulation of CI. Mamdani model payload range varies between modes, and is set depending
[26], the most used fuzzy inference technique is used to derive on the reliability requirement of each mode—such as RhighPmin ,
the criticality of the physiological parameters. RmedP normP
min , and Rmin . These additional constraints represent
The CI considers the criticality of data collected through the minimum reliability requirement for the high priority,
different fuzzy sets and membership functions. In the fuzzy medium priority, and normal mode, respectively. This
rules, along with the internal factors (human physiological threshold can be varied in application level, depending on
parameters), external influences such as age that has signifi- the requirement, and accordingly the MAC-frame payload
cant effect on health parameters, are considered. Linguistic is tuned. The function ACKSensing finally assigns the pay-
fuzzy sets such as ‘LOW’, ‘MODERATE’, and ‘HIGH’ are load, as explained in Algorithm 4. This algorithm is
considered to categorize the severity of each physiological repeated till successful transmission occurs, or the retry
parameter. On the other hand, the external variable, human limit r becomes zero; whichever is earlier. For the case,
age, is represented through the fuzzy sets—‘YOUNG’, r ¼ 0, the packet is dropped. However, it is highly undesir-
‘ADULT’, and ‘AGED’. Next, some rules are considered able and should not occur for a high or medium priority
such as “if temperature = LOW and age = HIGH, then criti- critical node. Hence, the payload is tuned in order to ensure
cality = STAGE 3”. The Mamdani model fuzzifies the input highest reliability. The values of Lmax and Lmin are derived
variable combinations (such as the combination of tempera- from Markov chain analysis of the data transmission on the
ture and age), evaluates the rules, aggregates the rule out- critical node.
puts, and defuzzifies to get a crisp value, which is
considered as the CI of that particular physiological sensor. 4.2 Markov Chain Model for Critical Node
The value of CI strictly ranges between 0 and 1. The mathe- In this paper, Markov chain has been used for analytical
matical expression of the CI is given as follows: modeling. Exploiting this model we derive the expression
R1 of reliability, which, in turn, helps to derive the range of
mR;t ðcÞ:c dc payload for maximum reliability of the critical node.
CI ¼ R0 1 ; (10)
Using the Markov model we efficiently consider different
0 mR;t ðcÞ dc
steps of the slotted CSMA/CA algorithm, and deduce
where mR;t ðcÞ denotes the aggregated output of all the fuzzy corresponding expressions for power consumption, and net-
rules that are stored in a rule-base. The details of this mech- work parameters such as—throughput and delay, for fur-
anism are available in the original published article [23]. ther analysis.
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
MOULIK ET AL.: AT-MAC: ADAPTIVE MAC-FRAME PAYLOAD TUNING FOR RELIABLE COMMUNICATION IN WIRELESS BODY AREA... 1521
Algorithm 2. Algorithm for Determining the Critical We propose a Markov chain model considering the MAC
Node PIB attributes macMaxCSMABackoffs ¼ p and
macMaxFrameRetries ¼ r for each packet transmitted by
Input: Sensed physiological data from N sensor nodes. the critical node, which follows slotted CSMA/CA algo-
Output: The sensor node that senses critical physiological data rithm and acknowledged transmission. We design the
at that time instant.
Markov model with three variables sðtÞ, lðtÞ and rðtÞ repre-
1: function FindCriticalðNÞ
senting the backoff stage, payload of the transmitted data
2: temp = 0
frame, and the value of re-transmission counter at time t,
3: for all i = 1 to N do
respectively, as illustrated in Fig. 3. The transition to any of
4: Compute CI as described in [23]
5: if CI[i] > temp then the three priority mode considered in the Markov model, is
6: temp = CI[i] a stochastic process. Hence, we assign P1 , P2 , and P3 as the
7: CriticalNode = i transition probabilities respectively for high priority,
8: end if medium priority, and normal mode data transmission, such
9: i iþ1 that P1 þ P2 þ P3 ¼ 1. We consider t as the stationary inde-
10: end for pendent probability that a node performs carrier sensing in
11: return(CI[CriticalNode]) a randomly chosen time slot. The tuple (sðtÞ, lðtÞ, rðtÞ) repre-
12: end function sents each state in the proposed three-dimensional Markov
chain. We do not include the Markov model states for the
normal mode data transmission as it is the trivial case and
Algorithm 3. Algorithm for Assigning the Priority Mode payload tuning is not necessary for this case. We consider
Input: CI of the critical node. ð0; 0; 0Þ as the idle state, when the node does not have any
Output: The suitable priority mode for the critical node. packet to transmit or receive, and waits for new packet
1: function SetPriorityðCI½CriticalNodeÞ arrivals. In every scheme, the node, initially, performs Clear
2: if CI[CriticalNode] > 0:75 then Channel Assessment (CCA1 and CCA2 ), and if the channel
3: Assign Mode High Priority is idle, data transmission starts. The states ði; 0; 0Þ and
4: Set minimum reliability requirement as RhighP
min ði; Lmax ; 0Þ denote CCA1 and CCA2 , respectively. The suc-
5: Assign L0 Lmax , r 3 cessful and failed packet delivery are represented by the
6: else states ðps ; 0; 0Þ and ð0; 0; rÞ, respectively. The stationary dis-
7: if CI[critical-node] > 0:5 then tribution of the proposed Markov chain model is given by
8: Assign Mode Medium Priority
9: Set minimum reliability requirement as RmedP
min Si;j;k ¼ lim P ðsðtÞ ¼ i; lðtÞ ¼ j; rðtÞ ¼ kÞ;
10: Assign L0 Lmax , r 3 t!1
(11)
11: else 8i 2 ½0; p; j 2 ½Lmin ; Lmax ; k 2 ½0; r:
12: Assign Mode Normal Mode
13: Set minimum reliability requirement as RnormP The state transition probabilities in Fig. 3 are
min
14: Assign L0 ¼ Lp , r 3
15: end if P ðp; 0; 0 j 0; 0; 0Þ ¼ Px t; 8x 2 ½1; 3 (12)
16: end if
17: return(Mode) P ði; Lmax ; 0 j i; 0; 0Þ ¼ 1 a; 8i 2 ½1; p (13)
18: end function
P ði; Lmax ; r j i; Lmax ; 0Þ ¼ 1 b; 8i 2 ½1; p (14)
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
1522 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 6, JUNE 2017
Fig. 3. Markov chain model for the IEEE 802.15.4-based AT-MAC algorithm.
P ð0; 0; r j 1; 0; 0Þ ¼ a (21)
Proposition 2. The idle state S0;0;0 is expressed as
P ð0; 0; r j 1; Lmax ; 0Þ ¼ b: (22) S0;0;0 ¼ ða þ ð1 aÞbÞp þ ð1 ða þ ð1 aÞbÞp Þ
1
1 1 1
Eq. (12) derives the probability that the sensor node ð1 Pcoll
r
Þ 1þ þ Pcoll
r
þ 1þ :
1 Pcoll 1b 1a
selects either of the three modes, as decided by the LPU.
(24)
Eq. (13) shows the probability of transition to the CCA2 state
from CCA1 . Eq. (14) denotes the probability that the sensor
node finds the channel idle in CCA2 and goes to the next Proof. The proof is given in the Appendix. u
t
state ði; Lmax ; rÞ, where maximum payload is assigned to
the transmission data frame of the critical sensor node, 4.3 Maximization of Reliability
depending on the priority mode. When the CI of the critical In a WBAN, we must ensure the successful data transmis-
node is less than 0.5, we choose normal mode of data trans- sion from the critical body sensor node and reception at the
mission, and set the maximum payload to Lp , a fixed opti- LPU, such that the reliability is maximum and collision
mal value. Eq. (16) denotes the decrement of retransmission probability, delay, and failure probability of the critical
counter due to collision of transmitted data packet. The size node is minimum. Hence, we develop a mathematical
of payload is set randomly between the previous payload model for tuning the payload of the critical node, in order to
value and the minimum payload for that scheme, as repre- find the range of payload for which the reliability of that
sented below node is maximum. The critical node in the WBAN is deter-
mined using the CI, as mentioned earlier in this section.
L0 ¼ RandðL0 1; Lmin þ 1Þ: (23) From Definition 3, reliability is given as R ¼ 1 Pdcf
Pdrl . In this expression, Pdcf is the probability of a packet
Eq. (17) derives the probability of packet failure after being discarded due to channel access failure. Channel
sensing the channel as idle in both CCA1 and CCA2 due access failure can occur if either of CCA1 or CCA2 is unsuc-
to r successive packet collisions. Eq. (18) derives the cessful. Hence, the overall probability of packet drop owing
probability of reaching the idle state from the transmit- to channel access failure is given by
ting state, which is unity. Eq. (19) denotes the probability
of finding the channel busy in CCA2 , and of selecting the X
r1
next state in the backoff stage of CCA1 . Eq. (20) repre- Pdcf ¼ ða þ ð1 aÞbÞp ½Pcoll ð1 ða þ ð1 aÞbÞp Þx
sents the transition from one backoff state to another x¼0 (25)
backoff state. Eqs. (21) and (22) denote the total probabil- ’p ð1 r Þ
¼ :
ity of packet drop due to channel access failure in CCA1 ð1 Þ
and in CCA2 , respectively.
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
MOULIK ET AL.: AT-MAC: ADAPTIVE MAC-FRAME PAYLOAD TUNING FOR RELIABLE COMMUNICATION IN WIRELESS BODY AREA... 1523
On the other hand, Pdrl is the probability of packet drop due 4.4 Energy Consumption
to packet collision after finding the channel idle, that is due Total energy dissipation by a sensor node is derived
to retry limits. Hence through the consideration of different states of a body sen-
sor node. When the node performs CCA, the total energy
Pdrl ¼ Pcoll
r
ð1 ða þ ð1 aÞbÞp Þr ¼ r : (26) consumption due to sensing is given as
Using Eqs. (25) and (26), we get the expression of reliability as X
p X
p
Esc;tot ¼ Esc Si;0;0 þ Esc Si;Lmax ;0 : (34)
’p ð1 r Þ i¼1 i¼1
R¼1 r
ð1 Þ (27) The first part of the above expression accounts for CCA1 and
¼ 1 ’p ð1 þ þ 2 þ . . . þ r1 Þ r ; the latter part corresponds to CCA2 . The energy consump-
tion when the sensor node is in the idle state is given as
where,
X
p LX
max X
r
’ ¼ a þ ð1 aÞb (28) Ei;tot ¼Ei ð1 Pcoll ÞðLs Lp LACK Þ Si;j;k Þ
i¼1 j¼Lmin k¼1
¼ Pcoll ð1 ’ Þ:p
(29)
X
p LX
max X
r
0
Let L be the payload of the critical sensor node, for which þ Ei Pcoll ðLc Lp Þ Si;j;k :
i¼1 j¼Lmin k¼1
reliability of the critical sensor node is maximum. Partially
differentiating Eq. (27) with respect to L0 , we have (35)
! ! The above equation sums up the energy consumption after
@R Xr
@ Xr
@’
¼ r þ ’
r1 p
i i1
p’p1
i
: successful packet delivery and the energy consumption due
@L 0 @L 0 @L0
i¼1 i¼0 to packet drop owing to collision.
(30) In case of successful packet transmission, the sensor node
uses Lp slot length for transmitting the data packet and con-
Again, using Eq. (28), we obtain sumes Etx Lp amount of energy in each state. Therefore,
@’ @a @b X
p LX
max X
r
¼ ð1 bÞ 0 þ ð1 aÞ 0 : (31)
@L0 @L @L Etx;tot ¼ Etx Lp Si;j;k : (36)
i¼1 j¼Lmin k¼1
From Eqs. (3) and (29), we have
Similarly, Erx LACK amount of energy is spent in each state
@ @’ to receive the ACK frame. Thus,
¼ ð1 ð1 tÞN1 ð1 aÞð1 bÞÞp’p1 0
@L0 @L
@’ X
p LX
max X
r
þ ð1 ’p Þð1 tÞN2 ð1 tÞ 0 (32) Erx;tot ¼ Erx LACK ð1 Pcoll Þ Si;j;k : (37)
@L
i¼1 j¼Lmin k¼1
@t
ð1 aÞð1 bÞðN 1Þ 0 :
@L Adding the Eqs. (34), (35), (36), and (37), we get the required
expression for energy consumption as follows:
As, the carrier sensing probability t is independent of pay-
load of the critical node L0 , we conclude @L @t
0 ¼ 0. Again, Etot ¼ Esc;tot þ Ei;tot þ Etx;tot þ Erx;tot
@a @b
using Eqs. (8) and (9) we have, @L0 ¼ N , and @L0 ¼ cN3 . There-
c1
p 1 1
fore, using Eqs. (31) and (32), we obtain the expression for ¼ Px tð1 ða þ ð1 aÞbÞ Þ Esc 1þ
1b 1a
@R 0
@L0 as a function of payload (L ) of the critical sensor node. 1 Pcoll
r
For maximum reliability of the critical body sensor node þ Ei ðð1 Pcoll ÞðLs Lp LACK Þ
1 Pcoll
@R þ Pcoll ðLc Lp Þ þ Etx Lp þ Erx LACK ð1 Pcoll ÞÞ ;
¼ 0: (33)
@L0
(38)
Solving Eq. (33), we obtain the range of payload for which
reliability of the critical sensor node is maximum, and it sat- where Ei , Etx , Erx , and Esc correspond to the average power
isfies the minimum reliability requirement of the selected consumption in the idle state, transmitting state, receiving
priority mode. Eq. (33) results in multiple solutions, satisfy- state, and sensing state, respectively.
ing the desired reliability criteria of different priority
modes. The minimum payload value for a particular mode 4.5 Throughput and Delay
may be obtained from the minimum value of these solu- Throughput is defined as the ratio of product of the slot
tions. Let us consider a WBAN with 20 sensor nodes, that is length equivalent to the delay due to successful transmission
N ¼ 20. Putting N ¼ 20 in Eq. (33), and ensuring that the of a packet ðLs Þ and packet size ðLp Þ, to the total delay in
@2 R
second order derivative is negative, i.e., @L 02 < 0, we have, terms of slot length ðLd Þ. The total slot length required to
L0min ¼ 366:25 and L0max ¼ 377:5. Hence, we need to tune the deliver a packet successfully depends on the probability of
payload of the critical sensor node in this range for maxi- successful delivery, and the slot length required to determine
mum reliability of the critical node. the successful packet delivery. The delay depends on the
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
1524 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 6, JUNE 2017
TABLE 1 and communicates using the 2.4 GHz ISM band. Simulation
Parameters for Simulation results are generated using Monte Carlo simulation where
the values of busy channel probabilities (a; b) are randomly
Parameters Values
generated. Using these values, we obtain the idle state S0;0;0 .
Maximum CSMA Backoffs 4 Accordingly, we calculate the throughput, reliability, colli-
Maximum Retry Limits 3
sion probability and other performance metrics. The system
Maximum Length of Payload 127 bytes
macMinBE 3 parameters used in our simulation are tabulated in Table 1.
macMaxBE 5 In this section, we compare the variation of reliability, colli-
Multiplicative constant to convert time 80 bits/slot sion probability, failure probability, power consumption,
length of frame to slot length average delay, and throughput against the offered payload
Data Rate 250 kbps corresponding to the General IEEE System [7] and the pro-
Symbol Rate 62.5 kbps posed AT-MAC system. General IEEE system refers to the
Length of ACK frame 88 bits
systems that follow IEEE 802.15.4 protocol but do not tune
MAC-frame payload in order to achieve maximum reliabil-
busy channel probability and the collision probability. Thus, ity, and also do not consider the severity of physiological
the probability of successful packet delivery is given as data during data transmission. The plots for the proposed
AT-MAC system are separately shown in terms of both
Ps Ls ¼ Px tð1 Pcoll
r
Þð1 ða þ ð1 aÞbÞp ÞLs ; (39) non-critical nodes and critical nodes. It is observed that the
plots corresponding to general IEEE systems and the non-
where Ps is the probability of successful packet delivery.
critical nodes in the AT-MAC system vary negligibly. The
Similarly, the delay is given as
reason is, our proposed AT-MAC algorithm always focuses
on the critical node at a certain time instant and tune it’s
Pd Ld ¼P1 tð1 ða þ ð1 aÞbÞp Þðð1 Pcoll
r
ÞLs þ Pcoll
r1
Lc Þ
MAC-frame payload.
þ ð1 tÞL0 ;
(40) 5.1 Simulations for Reliability
Fig. 4 illustrates the variation of reliability against the
where Pd denotes the probability that the packet is neither
offered load (frame arrival rate). For a WBAN system hav-
dropped nor transmitted. We define throughput as follows:
ing 20 sensor nodes, we compute the value of payload for
Ps Ls maximum reliability by ensuring that the reliability must
s¼ Lp : (41) not be less than the minimum reliability requirement for the
Pd Ld
high priority mode. The range of values of payload to
Hence, replacing Eqs. (39) and (40) in Eq. (41), we get the ensure the maximum reliability is obtained in the range
expression for throughput as (366.25, 377.5) in case of 20 sensor nodes, as mentioned ear-
lier in Section 4.3. Fig. 4a shows the variation of reliability
Px tð1 Pcoll
r
Þð1 ða þ ð1 aÞbÞp ÞLs Lp with the offered load, while payload assigned to the critical
s¼
Px tð1 ða þ ð1 aÞbÞp Þðð1 Pcoll
r ÞL Þ þ P r1 L Þ
s coll c sensor node (L0 ) = 366.25 bits and the other nodes in the net-
work are assigned payload as 800 bits. Solving Eq. (33), for
þ ð1 tÞL0 : (42) 30 nodes, we get the range of payload of the critical node as
(347.9, 359.1), and similarly for 40 nodes, L0 ranges between
5 PERFORMANCE EVALUATION 338.75 and 349.8 bits. The corresponding offered loads and
In this work we use MATLAB as the simulation tool along their effects on the reliability are isillustrated in Figs. 4b
with a physical layer modeling in it. For modeling the phys- and 4c, for 30 and 40 nodes, respectively.
ical layer in our code, we incorporate the noise figure (23 dB Inference: From Fig. 4, it is evident that the reliability of
for our device) and bandwidth, as per the IEEE 802.15.4 the critical node is enhanced significantly, compared to the
standard. Again, our system being low power enabled and general IEEE systems. Similarly the critical node also exhib-
having low sensor-LPU distance, we consider the path loss its better reliability than the other non-critical nodes in the
exponent to be 4. Simulations are performed for an intra- AT-MAC system. We see that as the offered load increases,
WBAN that follows star topology of IEEE 802.15.4 standard, the reliability decreases gradually, due to the channel access
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
MOULIK ET AL.: AT-MAC: ADAPTIVE MAC-FRAME PAYLOAD TUNING FOR RELIABLE COMMUNICATION IN WIRELESS BODY AREA... 1525
failure and buffer overflow. We also observe that as the The collision probability of the critical node is much less
number of nodes increases, the maximum reliability of the compared to the rest, and the rate of increment with the
critical sensor node decreases, as the collision probability, increase in number of nodes in the system is comparatively
and thus, the failure probability increases. From the results, small. It is because of the judicious choice of the payload of
it is evident that the proposed AT-MAC algorithm yields the critical node by the proposed AT-MAC algorithm.
average 70 percent improvement on the reliability of the
critical node. 5.3 Simulations for Failure Probability
As defined in Section 4, Definition 4, the failure probability
5.2 Simulations for Collision Probability of a sensor node is considered as a function of channel error
Fig. 5 shows the variation of collision probability with the and collision probability. Thus, similar to the results for col-
offered load, for 20, 30, and 40 sensor nodes. We see that the lision probability, the failure probability for the critical node
collision probability is much reduced for the critical node in is much reduced, compared to that of the general IEEE sys-
AT-MAC system, compared to the general IEEE system. tem, and the non-critical nodes of the proposed AT-MAC
Collision probability for the other non-critical nodes in the system, as illustrated in Fig. 6. We observe that the failure
AT-MAC system is approximately same with the general probability of the critical node in AT-MAC system lies
IEEE system, as the MAC-frame payloads of these sensor within 0:2-0:3. It varies from 0.4 to 0.9 in case of the general
nodes are not optimized. The proposed AT-MAC algorithm IEEE system, and the non-critical nodes in the AT-MAC
is able to bound the collision probability of the critical node system.
within a very little value (such as 0.1, in case of analyzing Inference: The chances of failure in end-to-end communica-
with maximum 40 sensor nodes). tion is more than the chances of collision between source and
Inference: Negligible collision probability exerts a positive destination, as failure also includes the factor of channel error.
effect to increase the reliability of a node, and it is already Comparison between Figs. 5 and 6 further validate the fact.
verified in Fig. 4. For a fixed number of sensor nodes, as the We also observe that, as the number of nodes increases, the
offered load increases, i.e., when the incoming frame arrival failure probability increases. Though the rate of increment is
rate is high, the transmission rate also increases, and hence, much less in case of the critical node in AT-MAC system. Due
the collision probability increases. However, the rate of to the judicious choice of the critical node and efficient optimi-
increment is much lower for the critical node in the pro- zation of its MAC-frame payload guided by the proposed AT-
posed AT-MAC system. In case of general IEEE systems, MAC algorithm, the failure probability of the critical node
the rate of increment of collision probability is approxi- reduces to the one-third of it’s previous value.
mately 6 times larger than that of the critical node in AT-
MAC systems. Again, as the number of nodes increases, the 5.4 Simulations for Power Consumption
collision probability increases for general IEEE systems and Fig. 7 depicts the variation of power consumption (in mW)
the proposed AT-MAC system. However, for the critical with the offered load. We observe that the power consump-
node the increment is negligible and mainly carried out by tion of the non-critical nodes in AT-MAC system is almost
the non-critical nodes in the system. same with the general IEEE standard. The critical sensor
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
1526 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 6, JUNE 2017
node in the AT-MAC system consumes more power, com- the critical node of AT-MAC system decreases initially upto
pared to the non-critical nodes and the general IEEE system. a certain offered load value, and beyond that it remains
Again, as the number of nodes increases, the power con- almost stable.
sumption of every individual sensor node decreases. Inference: Average delay primarily depends on the chan-
Inference: The approximate increment in the power con- nel access failure probability, which in turn is directly pro-
sumption of the critical node lies within 12-16 percent. portional to the packet arrival rate. Thus, normally the
However, with this little more expense in energy the critical delay increases with the increase of offered load. However,
node exhibits low collision and failure probability, and in case of the AT-MAC critical node we already observe in
thus, achieves maximum possible reliability. It is appropri- Fig. 6 that the rate of increase of failure probability with the
ate to consider this expense as a trade-off between between increase of offered load is almost negligible. Thus, the aver-
energy and reliability. Moreover, when the number of sen- age delay witnesses a different behavior in case of the criti-
sors increase, the probability of finding channel idle for cal node.
data transmission is less. As a consequence, the energy con-
sumption is less, as the share of transmission energy is max- 5.6 Simulations for Throughput
imum in the total amount of energy consumption. Fig. 9 depicts the variation of throughput with the offered
load. As the offered load increases, throughput for both the
5.5 Simulations for Average Delay general IEEE system and AT-MAC increases. However, in
The critical node in the proposed AT-MAC system attains case of general IEEE systems the throughput increase till it
significant achievement in reducing end-to-end delay. Fig. 8 reaches the congestion area. Again, with more number of
illustrates that the average delay increases with the incre- sensors the system throughput gets affected, especially in
ment in the offered load, in case of the general IEEE systems case of general IEEE systems. In all cases the proposed AT-
along with the non-critical nodes of AT-MAC. However, we MAC system yields better throughput than the general
observe an interesting phenomena that the average delay of IEEE systems.
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
MOULIK ET AL.: AT-MAC: ADAPTIVE MAC-FRAME PAYLOAD TUNING FOR RELIABLE COMMUNICATION IN WIRELESS BODY AREA... 1527
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
1528 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16, NO. 6, JUNE 2017
7 CONCLUSION X
p X
p1
Si;Lmax ;0 ¼ Px tð1 aÞ ða þ ð1 aÞbÞx
In this paper, we present an adaptively-tuned MAC algorithm i¼1 x¼0
for enhancing the reliability of a critical sensor node, by opti- 1 ða þ ð1 aÞbÞp
mizing the MAC-frame payload of the critical node. Based on ¼ Px t : (48)
1b
the AT-MAC algorithm, we propose a Markov chain-based
analytical model for slotted CSMA/CA of IEEE 802.15.4 with
retry limits and backoffs. Numerical results show that the pro- By adding Eqs. (44), (45), (46), (47), and (48), and equat-
posed scheme is efficient and ensures maximum reliability of ing them to 1 using Eq. (43), we get the desired expres-
the critical sensor node. In case of medical emergency, the crit- sion for S0;0;0 . &
ical sensor node in a WBAN-assisted health monitoring sys-
tem, exploits the benefits of the proposed AT-MAC system REFERENCES
with less failure probability and delay. [1] D. Tobon, T. Falk, and M. Maier, “Context awareness in WBANs:
In the future, we wish to extend this work with a multi- A survey on medical and non-medical applications,” IEEE Wire-
less Commun., vol. 20, no. 4, pp. 30–37, Aug. 2013.
objective optimization approach, where we plan to maxi- [2] B. Liu, Z. Yan, and C. W. Chen, “MAC protocol in wireless body
mize reliability and minimize energy consumption of a criti- area networks for E-health: Challenges and a context-aware
cal node simultaneously. On the other hand, we performed design,” IEEE Wireless Commun., vol. 20, no. 4, pp. 64–72, Aug.
the Markov chain formulation and analysis for a saturated 2013.
[3] X. Liu, Y. Zheng, M. W. Phyu, F. Endru, V. Navaneethan, and
network. However, in case of an unsaturated network the B. Zhao, “An ultra-low power ECG acquisition and monitoring
analysis is different. Therefore, in the future, we also wish ASIC system for WBAN applications,” IEEE J. Emerg. Sel. Topics
to extend this work for unsaturated networks. Circuits Syst., vol. 2, no. 1, pp. 60–70, Mar. 2012.
[4] M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. C. M. Leung,
“Body area networks: A survey,” Mobile Netw. Appl., vol. 16,
APPENDIX pp. 171–193, Apr. 2011.
[5] C.-S. Lin and P.-J. Chuang, “Energy-efficient two-hop extension
Proof of Proposition 2. From the proposed Markov chain protocol for wireless body area networks,” IET Wireless Sensor
model, by the normalization condition, we have Syst., vol. 3, pp. 37–56, Mar. 2013.
[6] E. Reusens, et al., “Characterization of on-body communication
p
1 X LX max X X
r p channel and energy efficient topology design for wireless body
Si;j;k þ Sps ;0;r þ Si;0;0 þ S0;0;r area networks,” IEEE Trans. Inf. Technol. Biomedicine, vol. 13, no. 6,
Px t i¼1 j¼L k¼1 i¼1
pp. 933–945, Nov. 2009.
min
(43) [7] IEEE Standard for Local and Metropolitan Area Networks-Part 15.4:
Xp
Low-Rate Wireless Personal AreaNetworks (LR-WPANs)-Amendment
þ Si;Lmax ;0 ¼ 1: 6: TV White Space Between 54 MHz and 862 MHz Physical Layer,
i¼1 IEEE Std 802.15.4m-2014, pp. 1–118, Apr. 2014.
[8] A. Koubaa, M. Alves, and E. Tovar, “A comprehensive simulation
Using Eqs. (12), (13), (14), (15), (16), (17), (18), (19), (20), study of slotted CSMA/CA for IEEE 802.15.4 wireless sensor
networks,” in Proc. IEEE Int. Workshop Factory Commun. Syst.,
(21), and (22) and owing to chain regularities, we obtain 2006, pp. 183–192.
[9] J. Zheng and M. J. Lee, “A comprehensive performance study of
X
p LX
max X
r IEEE 802.15.4,” Sensor Network Operations. Hoboken, NJ, USA:
Si;j;k Wiley, 2006, pp. 218–237.
i¼1 j¼Lmin k¼1 [10] V. Vishnevsky, A. Lyakhov, A. Safonov, S. Mo, and A. Gelman,
“Study of beaconing in multihop wireless PAN with distributed
X
r1 X
p1
control,” IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 113–126,
¼ Px tð1 aÞð1 bÞ Pcoll ða þ ð1 aÞbÞu S0;0;0 Jan. 2008.
x¼0 u¼0 [11] A. C. Pang and H. W. Tseng, “Dynamic backoff for wireless
1 Pcoll
r
personal networks,” in Proc. IEEE Global Telecommun. Conf.,
¼ Px t ð1 ða þ ð1 aÞbÞp ÞS0;0;0 Nov./Dec. 2004, pp. 1580–1584.
1 Pcoll
[12] J. G. Ko, Y. H. Cho, and H. Kim, “Performance evaluation of IEEE
(44) 802.15.4 MAC with different backoff ranges in wireless sensor
networks,” in Proc. IEEE Int. Conf. Commun. Syst., Oct. 2006, pp. 1–5.
[13] Z. Fang, B. Bensaou, and Y. Wang, “Performance evaluation of a
Sps ;0;r ¼ Px tð1 Pcoll Þð1 aÞð1 bÞ
fair backoff algorithm for IEEE 802.11 DFWMAC,” in Proc. 3rd
X
r1 X
p1 ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Jun. 2002, pp. 48–57.
u
Pcoll ða þ ð1 aÞbÞx S0;0;0 (45) [14] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed
u¼0 x¼0 coordination function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3,
pp. 535–547, Mar. 2000.
¼ Px tð1 Pcoll
r
Þð1 ða þ ð1 aÞbÞp ÞS0;0;0 [15] J. Misic, V. Misic, and S. Shafi, “Performance of IEEE 802.15.4 bea-
con enabled PAN with uplink transmissions in non-saturation
X
p X
p1 mode-access delay for finite buffers,” in Proc. 1st Int. Conf. Broad-
Si;0;0 ¼ Px t ða þ ð1 aÞbÞx S0;0;0 band Netw., Oct. 2004, pp. 416–425.
[16] P. K. Sahoo and J.-P. Sheu, “Modeling IEEE 802.15.4 based wire-
i¼1 x¼0 (46)
less sensor network with packet retry limits,” in Proc. 5th ACM
1 ða þ ð1 aÞbÞp Symp. Performance Evaluation Wireless Ad Hoc Sensor Ubiquitous
¼ Px t S0;0;0 Netw., 2008, pp. 63–70.
ð1 aÞð1 bÞ
[17] S. Pollin, et al., “Performance analysis of slotted carrier sense IEEE
802.15.4 medium access layer,” IEEE Trans. Wireless Commun.,
X
p1
vol. 7, no. 9, pp. 3359–3371, Sep. 2008.
S0;0;r ¼ Px tðð1 aÞð1 bÞPcoll
r
ða þ ð1 aÞbÞx [18] P. Park, C. Fischione, and K. H. Johansson, “Adaptive IEEE
x¼0 (47) 802.15.4 protocol for energy efficient, reliable and timely
þ ða þ ð1 aÞbÞp ÞS0;0;0 communications,” in Proc. 9th ACM/IEEE Int. Conf. Inf. Process.
Sensor Netw., Apr. 2010, pp. 327–338.
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.
MOULIK ET AL.: AT-MAC: ADAPTIVE MAC-FRAME PAYLOAD TUNING FOR RELIABLE COMMUNICATION IN WIRELESS BODY AREA... 1529
[19] P. Park, P. Marco, C. Fischione, and K. Johansson, “Modeling and Sudip Misra (SM’11) received the PhD degree in
optimization of the IEEE 802.15.4 protocol for reliable and timely computer science from Carleton University,
communications,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 3, Ottawa, Canada. He is currently an associate pro-
pp. 550–564, Mar. 2013. fessor in the School of Information Technology,
[20] J. J. Rodrigues, O. R. Pereira, and P. A. Neves, “Biofeedback data Indian Institute of Technology Kharagpur. Prior to
visualization for body sensor networks,” J. Netw. Comput. Appl., this, he was associated with Cornell University,
vol. 34, no. 1, pp. 151–158, 2011. Yale University, Nortel Networks (Canada), and
[21] O. Pereira, J. M. Caldeira, and J. J. Rodrigues, “Body sensor net- the Government of Ontario (Canada). He has been
work mobile solutions for biofeedback monitoring,” Mobile Netw. a recipient of eight research paper awards in differ-
Appl., vol. 16, no. 6, pp. 713–732, 2011. ent conferences. He was awarded the IEEE Com-
[22] I. Anjum, N. Alam, M. A. Razzaque, M. M. Hassan, and Soc Asia Pacific Outstanding Young Researcher
A. Alamri, “Traffic priority and load adaptive MAC protocol for Award at IEEE GLOBECOM 2012. He was also awarded the Canadian
QOS provisioning in body sensor networks,” Int. J. Distrib. Sensor Governments prestigious NSERC post-doctoral fellowship and the Hum-
Netw., vol. 9, no. 1, Feb. 2013, Art. no. 205192. boldt research fellowship in Germany. He is a senior member of the IEEE.
[23] S. Moulik, S. Misra, C. Chakraborty, and M. Obaidat, “Prioritized
payload tuning mechanism for wireless body area network-based
healthcare systems,” in Proc. IEEE Global Commun. Conf., Debayan Das received the BE degree in elec-
Dec. 2014, pp. 2393–2398. tronics and telecommunication engineering from
[24] S. Misra, S. Moulik, and H. C. Chao, “A cooperative bargaining Jadavpur University, West Bengal, India, in 2015.
solution for priority-based data-rate tuning in a wireless body After graduation, he worked with xSi Semicon-
area network,” IEEE Trans. Wireless Commun., vol. 14, no. 5, ductors, India, as an analog design engineer. He
pp. 2769–2777, May 2015. will be joining the SPARC Lab, Purdue University,
[25] H. Cao, V. Leung, C. Chow, and H. Chan, “Enabling technologies in August 2016 as a doctoral student. His
for wireless body area networks: A survey and outlook,” IEEE research interests include mixed signal circuit
Commun. Mag., vol. 47, no. 12, pp. 84–93, Dec. 2009. design and wireless networks.
[26] E. Mamdani and S. Assilian, “An experiment in linguistic synthe-
sis with a fuzzy logic controller,” Int. J. Man-Mach. Studies,
vol. MMS-7, pp. 1–13, Jan. 1975.
" For more information on this or any other computing topic,
Soumen Moulik (S’14) received the BTech please visit our Digital Library at www.computer.org/publications/dlib.
degree in computer science and engineering from
the West Bengal University of Technology, Kolkata,
India, in 2010. He is presently working toward the
PhD degree in the School of Medical Science
and Technology, Indian Institute of Technology
Kharagpur, India. His current research interests
include ubiquitous healthcare systems, networking
and communication aspects of wireless body area
networks, and its association with cloud and big
data. He is a student member of the IEEE.
Authorized licensed use limited to: R V College of Engineering. Downloaded on July 04,2020 at 08:42:06 UTC from IEEE Xplore. Restrictions apply.