ArticlePDF Available

IoT Based Wireless Body Area Networks for Disaster Cases

Authors:

Abstract and Figures

Wireless Networks have many advantages for emergency situations especially disaster cases. A disaster might happen due to various reasons such as earthquakes, hurricanes, floods, tornadoes, etc. In these emergency situations, wireless communication technologies are very important for the rescue of human life. Wireless technologies especially body area networks might monitor, collect, and send data about human in trouble to rescue unit. In this paper, Internet of Things based Wireless Body Area Network is proposed for disaster cases. The proposed architecture guarantees lifesavings by using wireless technologies for location determination, vital signs transmission, and SOS calls. Also, a gateway selection algorithm based on fuzzy logic is developed for selecting more appropriate wireless technology.
This content is subject to copyright. Terms and conditions apply.
SPECIAL ISSUE ARTICLE
IoTbased wireless body area networks for disaster cases
Murtaza Cicioğlu
1
| Ali Çalhan
2
1
School of ElectricalElectronic and
Computer Engineering, Duzce University,
Duzce, Turkey
2
Computer Engineering Department,
Duzce University, Duzce, Turkey
Correspondence
Murtaza Cicioğlu, School of Electrical
Electronic and Computer Engineering,
Duzce University, Duzce, Turkey.
Email: murtazacicioglu@gmail.com
Summary
Wireless networks have many advantages for emergency situations especially
disaster cases. A disaster might happen because of various reasons such as
earthquakes, hurricanes, floods, and tornadoes. In these emergency situations,
wireless communication technologies are very important for the rescue of
human life. Wireless technologies, especially body area networks, might mon-
itor, collect, and send data about human in trouble to rescue unit. In this
paper, Internet of thingsbased wireless body area network is proposed for
disaster cases. The proposed architecture guarantees lifesavings by using wire-
less technologies for location determination, vital signs transmission, and SOS
calls. Also, a gateway selection algorithm based on fuzzy logic is developed for
selecting more appropriate wireless technology.
KEYWORDS
disaster case, IEEE 802.15.6, IoT, WBAN
1|INTRODUCTION
Wireless communication technologies have become indispensable for human life nowadays. There are various types of
wireless networks for different applications.
1
One of them is named as wireless body area network (WBAN) that consists
of the various sensor or actuator nodes placed in the clothes, on or in the body of a person. A WBAN suggests many
promising new applications in the health care monitoring, sports, military, and many others. All aforementioned appli-
cations take advantage of the unconstrained freedom of movement a WBAN offers. For example, a patient can be
equipped with a WBAN consisting of sensor nodes that constantly measure specific biological and vital functions, such
as blood pressure, temperature, respiration, heart rate, electrocardiogram (ECG), and electroencephalography (EEG).
So, the patient can move freely across the hospital or home and does not have to stay in bed or hospital.
Internet of things (IoT) interconnects various IP addressable physical devices like vehicles, sensors, and home appli-
ances over the Internet in order for them to communicate and cooperate for specific applications.
2
IoT is a very rapidly
growing hot topic of technology and connects with a number of other emerging technologies. In this context, WBAN
technology with IoT technology is more powerful for new applications. Different types of sensors and actuators in
WBANs might cooperate with various wireless technologies as an IoT architecture. For this purpose, a gateway node
selection process for interaction with different wireless technologies is proposed in the study.
A lot of people suffer in disasters because necessary help cannot reach on time or never. WBANequipped rescue
teams and people in danger will be in touch with other units for realtime communication. In this study, the IoTbased
WBAN structure provides the realtime communication for disaster cases for saving lives.
The remainder of the paper is as follows: In section 2, the related works are given for the necessity of doing this
study. Then, the proposed architecture and used technologies; IoTbased WBAN with IEEE 802.15.6, and gateway selec-
tion in disaster cases are presented respectively in section 4. The simulation results are given in section 5.
Received: 27 July 2018 Revised: 5 October 2018 Accepted: 1 November 2018
DOI: 10.1002/dac.3864
Int J Commun Syst. 2018;e3864.
https://doi.org/10.1002/dac.3864
© 2018 John Wiley & Sons, Ltd.wileyonlinelibrary.com/journal/dac 1of12
2|RELATED WORKS
There are many studies about IoT and WBAN in the literature. A wearable sensor node with solar energy harvesting
is proposed in a previous study.
3
It enables the implementation of an autonomous WBAN for IoTconnected applica-
tions. Various sensor nodes are used for sensing fall notification, heartbeat, and temperature. Also, a webbased
smartphone application is developed for monitoring the aforementioned data. Design of physical layer algorithms
for IEEE 802.15.6 narrowband receiver is presented in a previous study.
4
It uses multicarrier signal processing algo-
rithms, such as used in the 802.11a/b/g/n standard. Various scenarios are realized for performance analysis of the
proposed system.
A distributed protocol to enable WBAN operation and interaction within an existing IoT is developed in another
study.
5
The authors control the emerging Bluetooth Low Energy (BLE) technology and promote the integration of a
BLE transceiver and a cognitive radio (CR) module within the WBAN coordinator. The authors discuss various
health monitoring systems, taking the smart phone as a tool in a previous study.
6
And also, they discuss some secu-
rity techniques that are used in data security for health care applications that can be applied in IoT environment.
The authors propose a time synchronization algorithm for the WBAN frame structure specified by the IEEE
802.15.6 standard in a previous study.
7
The proposed algorithm is based on a noncoherent timing error detector
under a Rayleigh fading channel. The system complexity is minimized by getting rid of the phase recovery block
in the study.
A study on integrated IoT and WBAN is proposed in another study.
8
The authors explain wireless sensor net-
works, IoT, and WBAN issues comprehensively. The authors discuss practical issues for implementation of WBAN
to health care service and a multihop WBAN construction scheme is proposed in a previous study.
9
The proposed
structure achieves an energyefficient feature by reducing the number of total control messages. They show that
the proposed system enhances the WBAN performance. A study is proposed in a previous work
10
for disaster relief
and emergency communication. An Internet of humansbased platform is presented in the study. The developed solu-
tion consists of the critical and rescue operation using wearable wireless sensor networks (CROW2) and internet of
humansbased platform.
Earlier, the authors present a new enhancement for an emergency and disaster relief system called Critical and Res-
cue Operations using Wearable Wireless sensors networks in a previous study.
11
CROW2 is executed based on the ORA-
CLE Net routing protocol. The authors deploy the routing protocol to evaluate the performance of the developed system
and the payload applications on Raspberry Pi and Android smartphone.
To the best knowledge of the authors of this paper, the differences from the literature in this paper are as follows:
i. IEEE 802.15.6based WBAN architecture is simulated with Riverbed Modeler
12
for intraWBANs and inter
WBANs.
ii. A gateway selection algorithm based on fuzzy logic is developed.
iii. The proposed system is a part of IoT technologies.
iv. The developed system is performed for disaster cases.
v. Consequently, there is no study in the literature about WBAN with IEEE 802.15.6, fuzzy logicbased gateway selec-
tion, and disaster cases together.
3|THE PROPOSED ARCHITECTURE
The proposed architecture is shown in Figure 1. Each person with sensor nodes and a coordinator (or called HUB) con-
structs a WBAN. All sensor nodes send collected data to the coordinator as intraWBAN communication. WBANs can
communicate with the other WBANs as interWBAN communication. In this situation, the coordinator nodes send rel-
evant data to the others.
The coordinator nodes have to transmit collected data from sensor nodes in WBANs to the destination. For trans-
mitting data to the destination, the coordinator nodes have to send data to a gateway such as WiFi access point (AP)
or other wireless technologies. One of the contributions of this study is the process of gateway selection. The parts of
the studies are explained in the next sections with details.
2of12 CICIOĞLU AND ÇALHAN
3.1 |IEEE 802.15.6based WBANs
WBAN technologies use IEEE 802.15.6 standard as physical and data link layer specifications.
13
This standard utilizes
industrial scientific medical (ISM) bands, as well as frequency bands, agreed by national medical and regulatory author-
ities. It also provides an international standard for short range, low power, and wireless communication within the sur-
rounding area of the human body, supporting various data rates for different applications.
This standard can use carrier sense multiple access (CSMA) and slotted Aloha techniques. However, in order to
obtain more realistic results, CSMA technique has been preferred in this study. IEEE 802.15.6 standard uses carrier
sense multiple access with collision avoidance (CSMA/CA)based medium access control (MAC) protocol and eight pri-
ority levels as can be seen from Table 1. The detailed information about IEEE 802.15.6 can be found in another study.
13
TABLE 1 User priorities
UP Traffic
Packet
type
CSMA/CA
CW
min
CW
max
0 Background D 16 64
1 Best effort D 16 32
2 Excellent effort D 8 32
3 Video D 8 16
4 Voice D 4 16
5 Medical data D/M 4 8
6 High priority medical data D/M 2 8
7 Emergency D 1 4
Abbreviations: CSMA/CA, carrier sense multiple access with collision avoidance; CW, contention window; D, data; M, management; UP, user priorities.
FIGURE 1 The proposed architecture
CICIOĞLU AND ÇALHAN 3of12
3.2 |Disaster case management
Disaster cases are created with natural events frequently such as earthquakes, an avalanche, or with unnatural events
such as explosions and fire disasters. Disaster case management is a timecritical process for affected people in order to
plan for and achieve realistic goals for recovery following a disaster.
14,15
In disaster cases, to identify survivors and rescue team's needs and to provide accurate and timely response are two
important topics. All interventions focus on urgent requirements like location determination. Therefore, communica-
tion technologies are very important in disaster cases. Wireless signals can pass into the buildings and reach destina-
tions. Nowadays, wireless technologies are used anytime and anywhere and densely found in any environment. So,
in disaster cases, some of wireless APs can be broken and some of them ready to serve. We ensure the wireless technol-
ogies help us in disaster cases.
3.3 |Fuzzybased gateway selection
The coordinator nodes have to send data from sensor nodes to the relevant destinations. It can be a mobile phone or
laptop as well as a sensor node. Also, it has to use some communication networks as gateway to transmit data to remote
locations. Therefore, a fuzzy logicbased gateway selection is proposed for WBANs in disaster cases in this study.
Received signal strength indicator (RSSI), signaltonoise ratio (SNR), and bandwidth parameters that indicate the qual-
ity of a wireless link are the inputs of the proposed fuzzy system. The coordinator node decides on which AP to be con-
nected according to these parameters.
Fuzzy logic is a decisionmaking and machinelearning method and it is an approach to computing based on
degrees of truthrather than the true or falseas Boolean logic. It is suitable for uncertain or approximate reasoning.
The idea of fuzzy logic was first created by Lotfi Zadeh of the University of California at Berkeley in the 1960s.
16
Fuzzy
logic consists of 0 and 1 as extreme cases of truth but also contains the several states of truth in between 0 and 1. Fuzzy
has an important role in our proposed scheme for selecting a gateway. The proposed fuzzy model is shown in Figure 2.
Figure 2 illustrates the fuzzy logicbased model, which is responsible for the calculation of the candidacy value
according to the SNR, RSSI, and bandwidth information belonging to APs.
The crisp values as RSSI, SNR, and bandwidth are collected from APs. The second process named fuzzification trans-
forms these crisp values into linguistic values. The linguistic values as can be seen from membership functions in
Figure 3. They are low, medium, and high. Membership functions are applied to the measurements and the degree
of memberships are determined.
The other step of the fuzzy is the rule evaluation. The fuzzy rules are used for decision of output in the fuzzy systems
and they are a series of ifthen statements. The inputs are applied to a set of if/then control rules as can be seen from
Table 2. There are three inputs of the proposed system, so there are 27 fuzzy rules that can be defined. Some of them are
written in Table 2.
FIGURE 2 Block diagram of the proposed fuzzy model
4of12 CICIOĞLU AND ÇALHAN
The results of various fuzzy rules are calculated together to generate a set of fuzzy outputs. The last step is the
defuzzification process. In this process, fuzzy outputs are combined into discrete values needed to make a decision in
the proposed mechanism.
In our case studies, the fuzzy steps of the proposed mechanism are illustrated in Figure 3. The inputs are taken to the
fuzzy system, and then candidacy values of APs are calculated between 0 and 1. The AP with the highest candidacy value
is selected as a gateway. In Figure 4, access point with the number of 3 is selected as a gateway. The sequence diagram of
the proposed system is outlined in Figure 5. The coordinator node scans the frequency band periodically for potential
APs considering the aforementioned input parameters (Bandwidth, SNR, and RSSI). When any AP is detected, its work-
ing parameters are stored in a database, for further consideration. As soon as the scan operation is completed, the coor-
dinator node compares the candidacy value of current AP with the ones added to the database, respectively.
FIGURE 3 Fuzzy membership functions
TABLE 2 Some fuzzy rules
If RSSI is low, and SNR is low, and bandwidth is low, then candidacy value is low
If RSSI is medium, and SNR is medium, and bandwidth is medium, then candidacy value is medium
If RSSI is low, and SNR is high, and bandwidth is low, then candidacy value is low
If RSSI is high, and SNR is low, and bandwidth is high, then candidacy value is low
If RSSI is high, and SNR is medium, and bandwidth is high, then candidacy value is high
Abbreviations: RSSI, received signal strength indicator; SNR, signaltonoise ratio.
FIGURE 4 Example fuzzy inputs/
outputs with a scenario
CICIOĞLU AND ÇALHAN 5of12
FIGURE 5 Sequence diagram of the proposed system
TABLE 3 Simulation parameters
Parameter Value
Simulation time 300 second
Slot length 100 ms
Frequency 2400 to 2483.5 GHz
Number of node 8
Number of coordinator 1
Bandwidth 1 MHz
Transmit power of node 0.1 W
Data rate 971.4 kbps
Packet length 1020 bits
MicaZ parameter 2 AA battery (3 V)
6of12 CICIOĞLU AND ÇALHAN
4|SIMULATION RESULTS
The performance analyses of the WBAN architecture and gateway selection process are introduced in this section. The
simulation parameters are given in Table 3. The proposed architecture's delay, throughput, and power consumption
results are shown respectively. Riverbed Modeler is utilized for simulating WBAN architecture.
WBAN architecture consists of eight sensor nodes as UP0, UP1 UP7, and one coordinator. These sensor nodes
have different priority as can be seen in Table 1. First, the delay results are taken from the simulation environment.
For example, delay results for different nodes with 0.5 packets per second are seen from Figure 6. The delay results
for different packet generation rates are given in Figure 6. The obtained results are compared with the literature, and
delay results are consistent.
17,18
FIGURE 6 A, Delay results for different nodes with 0.5 packets per second B, Delay results for different nodes with 1 packet per second C,
Delay results for different nodes with 2 packets per second D, Delay results for different nodes with 3 packets per second E,Delay results for
different nodes with 4 packets per second F, Delay results for different nodes with 5 packets per second
CICIOĞLU AND ÇALHAN 7of12
As throughput of sensor nodes with different priority increases, the delays vary according to the priority levels. The
sensor nodes with higher priority level (such as UP7) have little change in delay results, but the sensor nodes with lower
priority level (such as UP0) have much change in delay results. The most important reason for this situation arises from
the different contention windows (CWminCWmax) given in section 3.1. The sensor nodes with higher priority use
wireless environment first because of having less contention window sizes. So, the delay results are low. In disaster
cases, these results are quite important for using WBANs and sending data to the destination quickly.
The other performance metric is chosen as throughput. The throughput results are given with different packet gen-
eration frequency in Figure 7. Throughput is the amount of data moved successfully from one node to another in a
FIGURE 7 A,Throughput results for different nodes with 0.5 packets per second B, Throughput results for different nodes with 1 packet
per second C, Throughput results for different nodes with 2 packets per second D, Throughput results for different nodes with 3 packets per
second E, Throughput results for different nodes with 4 packets per second F,Throughput results for different nodes with 5 packets per
second
8of12 CICIOĞLU AND ÇALHAN
given time period and usually measured in bits or packets per second. The obtained throughput results satisfy the qual-
ity of service (QoS) requirements of WBANs.
13,19
The obtained results are compared with the literature, and throughput
results are consistent.
18,20
As can be seen in Figure 7, sensor nodes with different offered loads and different priorities
appear to have throughputs that match the priority levels. It is seen that the throughput of the nodes with higher pri-
ority levels are higher in the different offered loads of the nodes with the higher priority level and the throughput of the
nodes having the lower priority level are decreased with the different offered loads. The results are appropriate and con-
sistent for QoS requirements of WBANs in disaster cases.
The power consumption results are given in Figure 8. All results for nodes are shown in Figure 8, and only UP7 and
coordinator node power consumption results for different offered loads are given in Figure 8. As shown in Figure 8,
energy consumption levels of nodes with different priorities also vary. This is due to the different contention windows
that have different priorities, as described in section 4.1 and Table 1. The UP7 node, which has a high priority, always
has first access to the environment and therefore has a low possibility of collision. However, nodes with a higher con-
tention window, such as the lowest priority UP0, are less able to use the environment and are therefore more likely to
collide. As a result, packet losses and then the process of resending the same packet is processed and more energy is
consumed. The results obtained are consistent with some studies in the literature.
16,17,19
For analysis of the proposed fuzzybased gateway selection process in WBAN, a scenario is evaluated as in Figure 9.
A WBAN walks through with a trajectory shown as below. There are some possible gateways in the area. The proposed
fuzzy system gets the relevant parameters and decides which AP to connect to a gateway.
In disaster cases, the wireless environment is unstable; so, RSSI and SNR values are so changeable, and there may be
not enough AP for serving people. In such a case, a scenario is evaluated for simulating disaster case. The proposed gate-
way selection process is run and the candidacy values of gateways are shown in Figure 10.
FIGURE 8 A, Average power consumption (joule per second) for 5 packet per second B, Power consumption results for different offered
loads
FIGURE 9 A scenario for evaluating the proposed system
CICIOĞLU AND ÇALHAN 9of12
As can be seen in Figure 10, first, AP 3 is selected as a gateway with the maximum candidacy value, and then the
other APs that have maximum candidacy values can be selected. The results have shown that the proposed fuzzybased
selection process has the ability to select the most appropriate AP as a gateway.
Furthermore, a case study is presented for performance analysis of the proposed system. As can be seen in Figure 11,
a disaster case has happened and a WBAN is found with various APs in the environment. Some of these APs are active
and some of them are passive because of disaster case. WBANequipped human moves along with trajectory and he/she
encounters other active and passive APs. So, the coordinator node of the WBAN scans the environment for possible APs,
and decides to connect the APs with the help of fuzzy logicbased gateway selection algorithm. The results of this case
study are shown in Figure 12.
FIGURE 10 Candidacy values of
gateways
FIGURE 11 A case study: gateway selection for a disaster case
FIGURE 12 The candidacy values of
the APs for a case study
10 of 12 CICIOĞLU AND ÇALHAN
Firstly, AP 3 is selected as a gateway between AP 2 and AP 3, because APs 1, 4, and 5 are passive. Then, AP 6 is
selected between AP 3 and AP 6, because APs 5 and 7 are passive. And then, AP 9 is selected between AP 6 and AP
9, because APs 7 and 8 are passive. Finally, AP 10 is selected between AP 9 and AP 10, because AP 8 is passive.
5|CONCLUSIONS
WBANs are very important for human beings in many aspects. For remote health monitoring, military applications, and
sports activities, WBAN may be used. In our study, WBAN is used in disaster cases where the people in danger have to
send some information to the destination. So, IEEE 802.15.6based WBAN architecture is designed and all QoS require-
ments are satisfied. Delay, throughput, and power consumption results are given in the paper. Also, a fuzzy logicbased
gateway selection process is proposed and the performance analysis is given with disaster case scenarios and a case
study. Consequently, the proposed system gives a good and correct performance in disaster cases. For future works,
some other IoT systems are included to the system like cell phone and new technologies are added such as cognitive
radio.
ORCID
Murtaza Cicioğlu https://orcid.org/0000-0002-5657-7402
Ali Çalhan https://orcid.org/0000-0002-5798-3103
REFERENCES
1. Bayrakdar ME, Çalhan A. Artificial bee colonybased spectrum handoff algorithm in wireless cognitive radio networks. Int J Commun
Syst. 2018;31(5):e3495. https://doi.org/10.1002/dac.3495
2. Atzori L, Iera A, Morabito G. From smart objectsto social objects: the next evolutionary step of the internet of things. IEEE Commun
Mag. 2014. https://doi.org/10.1109/MCOM.2014.6710070;52(1):97105.
3. Wu T, Wu F, Redoute JM, Yuce MR. An autonomous wireless body area network implementation towards IoT connected healthcare
applications. IEEE Access. 2017. https://doi.org/10.1109/ACCESS.2017.2716344;5:1141311422.
4. Yang J, Geller B, Arbi T. Proposal of a multistandard transceiver for the WBAN Internet of things. In: 2016 International Symposium on
Signal, Image, Video and Communications, ISIVC 2016; 2017 https://doi.org/10.1109/ISIVC.2016.7894017.
5. Ali M, Moungla H, Younis M, Mehaoua A. IoTenabled channel selection approach for WBANs. In: 2017 13th International Wireless Com-
munications and Mobile Computing Conference, IWCMC 2017; 2017 https://doi.org/10.1109/IWCMC.2017.7986554.
6. Begum Suriya V. Comparison of various techniques in IoT for healthcare system. Int J Comput Sci Mob Comput. 2016;5(3):5966.
7. Nasr I, Atallah LN, Cherif S, Geller B. Time synchronization in IoT networks: case of a wireless body area network. In: 2016 International
Symposium on Signal, Image, Video and Communications (ISIVC). Tunis, Tunisia: IEEE; 2016:297301 https://doi.org/10.1109/
ISIVC.2016.7894004.
8. Chatterjee S, Chatterjee S, Choudhury S, et al. Internet of things and body area networkan integrated future. In: 2017 IEEE 8th Annual
Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE; 2017:396400 https://doi.org/10.1109/
UEMCON.2017.8249094.
9. Kim TY, Youm S, Jung JJ, Kim EJ. Multihop WBAN construction for healthcare IoT systems. In: 2015 International Conference on Plat-
form Technology and Service. IEEE; 2015:2728 https://doi.org/10.1109/PlatCon.2015.20.
10. Ben Arbia D, Alam MM, Attia R, Ben Hamida E, Kadri A. CROW 2: Internet of humansbased platform for disaster relief and emergency
communication. In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE; 2017:578579 https://
doi.org/10.1109/CCNC.2017.7983174.
11. Ben Arbia D, Alam M, Kadri A, Ben Hamida E, Attia R. Enhanced IoTbased endtoend emergency and disaster relief system. J Sens
Actuator Networks. 2017. https://doi.org/10.3390/jsan6030019;6(3).
12. SteelCentral. Riverbed. Riverbed Modeler Software, 2018.
13. IEEE Computer Society. IEEE Standard for Local and Metropolitan Area Networks Part 15.6: Wireless body area networks. IEEE Std
802.15.62012(2012). https://doi.org/10.1109/IEEESTD.2012.6161600
14. Gusev M, Ristov S, Prodan R, Dzanko M, Bilic I. Resilient IoT eHealth solutions in case of disasters. In: Proceedings of 2017 9th Interna-
tional Workshop on Resilient Networks Design and Modeling, RNDM 2017. ; 2017. https://doi.org/10.1109/RNDM.2017.8093024
CICIOĞLU AND ÇALHAN 11 of 12
15. Mouradian C, Yangui S, Glitho RH. Robots asaservice in cloud computing: Search and rescue in largescale disasters case study. In: 2018
15th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE; 2018:17 https://doi.org/10.1109/
CCNC.2018.8319200.
16. Zadeh LA. Fuzzy sets. Inf Control. 1965. https://doi.org/10.1016/S00199958(65)90241X;8(3):338353.
17. Sarkar S, Misra S, Bandyopadhyay B, Chakraborty C, Obaidat MS. Performance analysis of IEEE 802.15.6 mac protocol under nonideal
channel conditions and saturated traffic regime. IEEE Trans Comput. 2015. https://doi.org/10.1109/TC.2015.2389806;64(10):29122925.
18. Ullah S, Chen M, Kwak KS. Throughput and delay analysis of IEEE 802.15.6based CSMA/CA protocol. J Med Syst. 2012;36(6):38753891.
19. Tachtatzis C, Di Franco F, Tracey DC, Timmons NF, Morrison J. An energy analysis of IEEE 802.15.6 scheduled access modes for medical
applications. In: Lecture Notes of the Institute for Computer Sciences, SocialInformatics and Telecommunications Engineering ; 2012.
https://doi.org/10.1007/9783642290961_15
20. Jung BH, Akbar RU, Sung DK. Throughput, energy consumption, and energy efficiency of IEEE 802156 body area network (BAN) MAC
protocol. In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC. ; 2012. https://doi.org/
10.1109/PIMRC.2012.6362852
How to cite this article: Cicioğlu M, Çalhan A. IoTbased wireless body area networks for disaster cases. Int J
Commun Syst. 2018;e3864. https://doi.org/10.1002/dac.3864
12 of 12 CICIOĞLU AND ÇALHAN
... Although a significant number of IoT applications are not time-sensitive, there is a whole class of mission-critical applications, especially the ones which target human safety. For instance, health monitoring [3], critical control and fault detection applications [17,18,19]. Taking health monitoring as an example (Fig. 2.1), it involves the gathering, aggregation, and mining of information indicative of the health of patients, such as a heart rate. ...
... Time-sensitive, mission-critical services (e.g. health monitoring [3], safety control and fault detection [17,18,19]), require robust connectivity and strict reliability constraints. On the other hand, the IoT relies mainly on Low-power Lossy Networks (LLN), which are unreliable by nature due to their limited resources, hard duty cycles, dynamic topologies, and uncertain radio connectivity. ...
... The Internet of Things (IoT) [1] is a new paradigm that involves connecting hand-held gadgets and everyday devices with sensing, computing, and communication functionality to create a network. Object recognition and monitoring, sensing information visualization, security control [2,3], object networking, and other fields of IoT research are all included [4]. With the introduction of IoT, existing networks have become more important for data transfer in IoT applications. ...
Article
Full-text available
Since several Internet of Things (IoT) applications have been widely deployed on unstable wireless networks, such as the Delay Tolerant Network (DTN), data communication efficiency in DTN remains a challenge for IoT applications. Vehicular Delay Tolerant Network (VDTN) has become one of DTN’s potential applications, in which the network experiences connectivity interruption due to the lack of an end-to-end relay route. VDTNs focus on node cooperation to achieve this goal. As a result, it is essential to ensure that almost all network nodes adopt the protocol to preserve network performance. This is a challenging task since nodes may diverge from the basic protocol to optimize their effectiveness. This article presents an Efficient Monitoring System (EMS) to detect and respond to just selfish nodes to minimize their entire network and data communication efficacy. The scheme is based on a network-wide cooperative sharing of node reputation. It is also necessary to increase overall network efficiency by tracking selfish nodes. The NS-2 simulator is used to run this experimental setup. Simulation results indicate that the proposed scheme performs better in terms of probability of package delivery, package delivery delay, energy consumption, and amount of packet drops. For 80% selfish nodes in the network, the packet delivery of EMS is 37% and 31% better than SOS and IPS. Similarly, the average delivery delay of EMS is 22% and 18% lower than SOS and IPS when 80% selfish nodes are incorporated in the network.
... We proposed two novel algorithms in our suggested approach and also computed their complexity as explained in Section 4.3. Furthermore, in existing work where fuzzy logic is used [28,29], used in the context of performance improvement of IEEE 802.15.6 with reference to other aspects but not for the optimization/ adjustment of CW. Never the less, our proposed FuCWO approach's generated results for PDR are minimum 3% to maximum 9%, and for E2D minimum 2% to maximum 11% on average are better when compared with the results of [29]. ...
Article
Full-text available
Due to its low-powered, low-cost implementation, 802.15.6 standard dedicated for Wireless Body Area Networks (WBANs) have become important, and the urge to increase their performance has become a necessity. With low / heavy traffic, the most notable persisting problems are packet delivery ratio (PDR), packet loss ratio (PLR), and end-to-end (E2D) delay; improvements in wireless technology emphasise surmounting these challenges. To accomplish the stated goals, FuCWO: an approach of contention window optimization through fuzzy logic is proposed, which makes use of FLC the Fuzzy Logic Controller. Two algorithms are proposed for this purpose: Algo-1: FuCWO Procedure for WBANs and Algo-2: Fuzzy Logic Procedure for FuCWO. The proposed FuCWO approach is evaluated for ABEB i.e. Alternate Binary-Exponential Back-off, which was chosen as a de facto standard, and an improvement of the Contention Window (Improved-CSMA/CA) algorithm, chosen as a foundation-based paper and implemented in Castalia OMNeT++. For ABEB, Improved-CSMA/CA, and FuCWO, the simulated values of four participating nodes/sensors were recorded. These values were later used to calculate the PDR, PLR, E2D delay for low and heavy traffic, and also produced a graphical illustration of the results. Furthermore, the obtained results from the proposed FuCWO approach for PDR, PLR are minimum 3% to maximum 9%, and for E2D minimum 2% to maximum 11% on average are better, which confirmed that the FuCWO significantly improved performance.
... Sensor nodes collect data on parameters such as electro cardiogram (ECG), photoplethysmogram (PPG), electro ence phalography (EEG) pulse, temperature of the body, blood flow, and pressure and glucose level and send it to BCU [9]. ...
Article
Full-text available
Movement and posture change of human body plays a crucial role in energy consumption while data transmission between strategically deployed nodes in wireless body area networks (WBANs). The majority of energy is used in transmission rather than processing of the data. Nodes within body are there for long time and need to be energy efficient so that the network lifetime is increased. In this paper, we propose an energy efficient data transmission for multi-hop network that uses particle swarm optimization (PSO) for optimizing the parameters on which energy consumption relies. An energy efficient data transmission and reception takes place by altering the parameters like node to node distance and packet size of data. The obtained results show a significant reduction of energy consumed by reducing the packet size and keeping the node-to-sink distance a constant value. The total energy consumed per hop per bit length of data packet Emh/L shows 75% optimization. The energy consumed in data transmission per bit length of data E tx /L and the energy consumed for data received per bit length of data packet E rx /L is optimized by approximately 70% and 50% respectively for hope count 2 to 5.
Article
Among the wireless body area network (WBAN) scarce resources, energy resource is an essential resource on which most of the WBAN biomedical devices activities depend upon. The biomedical devices are usually battery-powered and if they fail to operate as required because of battery power drain, the WBAN system would become unreliable, and this could lead to life-threatening situations. Consequently, it would be of advantage and logical to minimize energy consumption and energy wastage issues to achieve an energy efficient WBAN system. Following this, we proposed a coordinated superframe duty cycle hybrid MAC (SDC-HYMAC) protocol to enhance energy efficiency and to prolong the biomedical devices lifetime. To improve the energy efficiency of the WBAN system, we introduced different energy resource management strategies including the design of a priority-based slot-allocation scheme to minimize timeslot and energy wastage. Also, we proposed a coordinated superframe duty cycle (SDC) scheme to accurately select an appropriate superframe order (SO) based on the traffic information and the priority level of the biomedical devices to save energy and prolong the devices lifetime. We compared the SDC-HYMAC protocol with other related protocols like MG-HYMAC, HyMAC, and CPMAC for the sake of validation, and is simulated in MATLAB. The outcome of the simulation results revealed that the SDC-HYMAC protocol performed better than the existing protocols using performance metrics like convergence speed, energy efficiency, delay, packet drop ratio, and devices lifetime.
Article
Full-text available
Wireless Body Area Network (WBAN) is the most important recent trending approaches to provide Medical care for patients through remote monitoring and data collection using body sensors. It's a well-known system offering a high standard of security and also privacy. Therefore, it provides us a very big interest for discussing the issues of privacy and security in WBAN. In this paper, the architecture of WBAN communication network, various safety threats and it’s measures, several types of research methodologies to secure health records and research issues are reviewed on the basis of various secure routing protocols of recent publications. Also, this paper tabulated the detailed comparison study of analysis of security requirements, resistance to various attacks, computing costs during authentication and running time between the application provider and the customer. At last, open fields are investigated for future research.
Article
Energy efficiency is an important quality-of-service requirement that needs to be considered when designing an efficient MAC protocol for a WBAN system due to the limited power resources of biomedical sensor devices. To address this, an energy-aware multi-group hybrid MAC (MG-HYMAC) protocol is proposed in this work to improve energy efficiency as well as the lifetime of the biomedical sensor devices in a personalized healthcare system. The proposed protocol combines both the advantages of the CSMA/CA and the TDMA schemes to enable the biomedical sensors to efficiently contend for transmission opportunities and to allow them to efficiently transmit health data. The MG-HYMAC protocol is combined with a transmission scheduling technique to duty cycle the operations of the biomedical devices with less critical data to determine when and how the biomedical sensor devices will transmit their health data packets in order to reduce collisions to save energy and prolong the battery lifetime of the biomedical sensor devices so as to improve the overall network lifetime. Also, a stochastic probability model and a heuristic-based power control scheme are developed to solve time allocation and power control problems to improve energy efficiency and the biomedical sensor devices lifetime. To validate the MG-HYMAC protocol, it was compared with other related protocols (including HyMAC and CPMAC) and simulated in MATLAB. The simulation results proved that the proposed MG-HYMAC protocol outperformed the existing MAC protocols using standard metrics like energy efficiency, biomedical sensor devices lifetime, and convergence speed.
Chapter
5G wireless network, commercially launched in recent years, promises to improve network performance and ensure ubiquitous connectivity. However, numerous emerging applications like extended reality, telepresence, telesurgery, autonomous driving etc. require very high data rate while simultaneously maintaining the related reliability and latency constraints. Coupled with a massive surge in number of smart devices and Internet of Things (IoT), these requirements are likely to saturate the 5G network in future and have, therefore, motivated the research community to think beyond 5G wireless technology. The discussions on 6G wireless technology have started taking shape with the primary objective to serve future demands in 2030. The 6G cellular wireless network will intend to satisfy the huge data rate, latency, and reliability requirements across a myriad of smart devices. Through this chapter, we explain the interesting and novel applications of 6G along with its key requirements and performance metrics.
Chapter
The sixth generation of mobile networks (6G) is expected to be deployed in the early 2030s. By this time, the density of autonomous Internet-connected machines is expected to explode up to hundreds of devices per cubic meter. These devices (1) generate voluminous multisensory data, (2) access sophisticated artificial intelligence-based services with high frequency, and (3) have widely diverse constraints in terms of latency, bandwidth, energy, and computation power. Such devices are not operated by humans, and communicate with each other and with remote servers located on the network core or edge. The wireless communications between these machines are called machine-type communications (MTC) and can either be between multiple machines that collectively collect and process multidimensional information or between machines that interact with services located on servers. Representative examples include autonomous driving, piloting crewless aerial vehicles, smart grid energy trading, and others. In this chapter, we define the following requirements for 6G, following the predicted density and heterogeneity of the autonomous connected device landscape: (1) ultra-dense wireless communication networks, (2) massive multi-access edge computing, (3) large-scale autonomous operation of devices with heterogeneous requirements and constraints. To address these requirements, 6G will enable a convergence of computing, energy, and communication for device- and application-aware communications. We discuss how 6G can achieve such convergence and highlight the future trends for MTC to ubiquitously integrate the computing landscape.
Chapter
The fifth generation (5G) system was marketed as a true enabler of latency-aware ultra-reliable low latency communications (uRLLC), bandwidth-devouring enhanced mobile broadband (eMBB), and unlimited-things-centric massive machine type communication (mMTC) services for vertical industries and internet-of-everything (IoE). Among other promises, the eMBB services have gained significant momentum in various 5G deployments, such as using millimeter wave (mmWave) frequency band in the next-generation radio access network (NG-RAN). The early rollouts of the uRLLC and mMTC services show that the 5G system supports their basic features, however, supporting advanced and complicated use-cases of such services remains uncertain. These drawbacks are due to, but not limited to, the existing limitations in the adaptation of current technologies, such as multi-access cloud computing, network function virtualization, software-defined networking (SDN), network slicing, etc. in NG-RAN. In this regard, we aim to (i) provide a comprehensive overview on key concepts towards the RAN of sixth generation (6G) system; (ii) study various legacy RAN implementations, reported in literature, from different perspectives, and the motivation of their reconstruction and redesign with respect to the requirements of their forth-coming generations; (iii) present an exclusive review of the NG-RAN with special emphasize on the cloudification and virtualization of resources and services, and on the management and orchestration of RAN slices; (iv) identity the key drivers that leverage advanced mMTC, uRLLC, and eMBB services and applications; and (v) address key challenges and future research arising from the deployment of NG-RAN.
Article
Full-text available
In this paper, we present a new enhancement for an emergency and disaster relief system called Critical and Rescue Operations using Wearable Wireless sensors networks (CROW 2). We address the reliability challenges in setting up a wireless autonomous communication system in order to offload data from the disaster area (rescuers, trapped victims, civilians, media, etc.) back to a command center. The proposed system connects deployed rescuers to extended networks and the Internet. CROW 2 is an end-to-end system that runs the recently-proposed Optimized Routing Approach for Critical and Emergency Networks (ORACE-Net) routing protocol. The system integrates heterogeneous wireless devices (Raspberry Pi, smart phones, sensors) and various communicating technologies (WiFi IEEE 802.11n, Bluetooth IEEE 802.15.1) to enable end-to-end network connectivity, which is monitored by a cloud Internet-of-Things platform. First, we present the CROW 2 generic system architecture, which is adaptable to various technologies integration at different levels (i.e., on-body, body-to-body, off-body). Second, we implement the ORACE-Net protocol on heterogeneous devices including Android-based smart phones and Linux-based Raspberry Pi devices. These devices act as on-body coordinators to collect information from on-body sensors. The collected data is then pushed to the command center thanks to multi-hop device-to-device communication. Third, the overall CROW 2 system performance is evaluated according to relevant metrics including end-to-end link quality estimation, throughput and end-to-end delay. As a proof-of-concept, we validate the system architecture through deployment and extracted experimental results. Finally, we highlight motion detection and links' unavailability prevention based on the recorded data where the main factors (i.e., interference and noise) that affect the performance are analyzed.
Article
Full-text available
Internet of Things (IoT) is a new technological paradigm that can connect things from various fields through the Internet. For the IoT connected healthcare applications, the wireless body area network (WBAN) is gaining popularity as wearable devices spring into the market. This paper proposes a wearable sensor node with solar energy harvesting and Bluetooth low energy (BLE) transmission that enables the implementation of an autonomous WBAN. Multiple sensor nodes can be deployed on different positions of the body to measure the subject’s body temperature distribution, heartbeat and detect falls. A web-based smartphone application is also developed for displaying the sensor data and fall notification. To extend the lifetime of the wearable sensor node, a flexible solar energy harvester with an output based maximum power point tracking (MPPT) technique is used to power the sensor node. Experimental results show that the wearable sensor node works well when powered by the solar energy harvester. The autonomous 24 hours operation is achieved with the experimental results. The proposed system with solar energy harvesting demonstrates that long-term continuous medical monitoring based on WBAN is possible provided that the subject stays outside for a short period of time in a day.
Conference Paper
Full-text available
In this paper, we propose a time synchronization algorithm for the WBAN frame structure specified by the IEEE 802.15.6 standard. This algorithm is based on a non coherent timing error detector under a Rayleigh fading channel. With the use of a such detector, the system complexity is reduced by getting rid of the phase recovery block. Simulation results show an enhancement in the system performance in terms of mean square errors (MSE) with respect to Non Data Aided (NDA) techniques.
Conference Paper
Full-text available
During a disaster incident, existing network in-frastructures might either be damaged or overloaded. However, disaster operations require real-time and low latency data communication , especially live video and audio streaming, as well as in integration with social networks. Thus, deployed tactical networks face several challenges to connect intervening teams. To date, there is still a lack of routing standards for such networks. Indeed, in such harsh environment, medical rescue teams, firefighters, military, police and even victims need to be steadily connected to a distant command center (CC) which conducts the rescue operations. In our recent works, a new routing protocol called ORACE-Net was proposed, evaluated and compared to the existing approaches. ORACE-Net aims to create a tactical Internet of Humans (IoH) emergency network. ORACE-Net is implemented on mobile devices and evaluated within realistic conditions. The complete proposed solution consists of the CROW 2 , an Internet of Humans-based platform for disaster relief and emergency communication. In this paper we describe the setup and the demonstration of the CROW 2 platform based on the our conducted experimentation. Keywords—CROW 2 , disaster relief, ORACE-Net, Internet of Humans; I. OVERVIEW The important growing number of natural or human-made disasters, make the wireless communication technologies facing several challenges. Indeed, during the disaster incident, existing network infrastructures might be either damaged or over saturated. Thus, tactical wireless networks are deployed along the incident areas in order to connect rescue teams to a distant Command Center (CC) which is conducting the operations. Rescue teams must be able to send their real-time feedback and receive missions to execute such as: i) medical teams may have live medical assistance from the CC, ii) firefighters, police and army may record their missions or use live broadcast within the CC, iii) civilians and injured persons may use the tactical network to tag, share their locations, or search and find their contacts on social networks. With regards to these required services, limitations are expected on the state of the art of the wireless technology. Indeed, in addition to radio technologies inter-operability, coexistence, and energy consumption issues, routing is an important and critical challenge for the tactical emergency networks [1], [2]. In this context, some researches have evaluated existing routing standards in the disaster and emergency relief. Based on our recent works [3], we have concluded that our proposed approach, which is called Optimized Routing Approach for Critical and Fig. 1: CROW 2 system wireless communication levels. Emergency Networks (ORACE-Net), outperformed the existing protocols under realistic assumptions in terms of packet delivery rate and energy efficiency. ORACE-Net provides also higher connectivity than the studied approaches. Finally, we have implemented a complete solution under the CROW 2 project built as an Internet of Humans Disaster Relief and Emergency Communication System. The Critical Rescue Operation using Wearable Wireless sensor networks (CROW 2) project aims at designing next generation wearable wireless networks system for disaster and emergency relief.
Article
In this work, we proposed a new artificial bee colony–based spectrum handoff algorithm for wireless cognitive radio systems. In our wireless cognitive radio system, primary users, secondary users, and related base stations exist in the same communication environment. For our artificial bee colony–based algorithm, secondary users that always struggle to discover an idle channel have a leading role. While honey bees work hard to find the best-quality nectar source for foraging, secondary users try to find idle channels for making communication. In this way, secondary users are organized for different missions such as sensing and handoff similar to honey bees to minimize spectrum handoff delay by working together. In the spectrum handoff stage, some secondary users must sense the spectrum so that the interrupted secondary user may perform the spectrum handoff process. In our developed spectrum handoff algorithm, the spectrum availability characteristic is observed on the basis of the missions of the bees in the artificial bee colony algorithm with the aim of minimizing the spectrum handoff delay and maximizing probability of finding an idle channel. With the help of the algorithm that is developed using the artificial bee colony, spectrum handoff delay of secondary users is considerably decreased for different number of users without reducing probability of finding an available channel.
Conference Paper
In this paper, an original physical layer design of the IEEE 802.15.6 narrowband receiver is proposed, including frame synchronization, timing synchronization, and carrier frequency synchronization. This proposed single-carrier system can be incorporated into a conventional multi-carrier system of the IEEE 802.11 transceiver by reusing its hardware resource. Simulation results show that the performances of the proposed system approach closely to the theoretical performances.