You are on page 1of 7

1

A Comparative Analysis of Energy Efficient


Medium Access Control Protocols for Wireless
Body Area Networks
Adil Sheraz, Wajid Ullah Khan, Sami Ullah, Faisal Naeem, Syed Irfan Ullah, Abdus Salam, Arshad Farhad and
Haseeb Zafar

Adil Sheraz is with the Department of Computing and Technology, Abasyn University, Peshawar, Pakistan (phone: +92-3339327436; e-mail:
adil_2engr@hotmail.com).
Wajid Ullah Khan is with the Department of Computing and Technology, Abasyn University, Peshawar, Pakistan (e-mail: arbabwajid.ullah@abasyn.edu.pk).
Sami Ullah is with the Department of Software Engineering, University of Engineering and Technology, Peshawar, Pakistan (e-mail:
eng.sami247@gmail.com).
Faisal Naeem is with the Department of Computing and Technology, Abasyn University, Peshawar, Pakistan (e-mail: faisal.naeem45@gmail.com).
Syed Irfan Ullah is with the Department of Computing and Technology, Abasyn University, Peshawar, Pakistan (e-mail: syed.irfanullah@abasyn.edu.pk).
Abdus Salam is with the Department of Computing and Technology, Abasyn University, Peshawar, Pakistan (e-mail: dr.salam@abasyn.edu.pk).
Arshad Farhad is with the Department of Computer Science, COMSATS Institute of Information Technology, Sahiwal, Pakistan (e-mail:
arshadfarhad@ymail.com).
Haseeb Zafar is with Department of Electrical Engineering, University of Engineering and Technology, Peshawar, Pakistan (e-mail:
haseeb@uetpeshawar.edu.pk).

ABSTRACT
Increasing developments in wireless communication has led to emergence of advanced technologies like Wireless Body Area
Networks (WBANs). It is now possible to monitor a critical patient remotely at a far distance using WBAN. WBAN nodes are
battery powered and charging and replacement of the battery is not feasible as some nodes may be implanted inside a human
body. It is required to design energy efficient Medium Access Control (MAC) protocol to control the radio communications for
the enhancement of lifetime of network. This paper reviews some of the most recent energy efficient MAC protocols, and
discusses their advantages and limitations as well as mentioning some important characteristics of MAC protocols.

Keywords:
Wireless Body Area Networks (WBANs); Medium Access Control (MAC) protocol; lifetime

The architecture of the WBAN communication employs


1. Introduction intra-WBAN, inter-WBAN and beyond WBAN [2]. In intra-
WBAN sensor node communicates with the coordinator
Wireless Body Area Networks (WBANs) are deployed to
(Personal Digital Assistant or smart phone etc), inter-WBAN
human body for patients real time monitoring especially in
communications offer exchange of data with one or different
cases of chronic diseases, and also in habitual tracking. Sensor
access points (i-e Personal Server) and beyond-WBAN
nodes can be implanted in, on or around the human body.
communication utilizes the existing public networks, internet
Sensor nodes are battery powered. Charging or replacing of
or cellular network. Energy efficient Medium Access Control
battery is not feasible in WBANs, in case of implanted sensor
(MAC) protocols are required to be designed to enhance the
nodes. The main functions of the sensor nodes include sensing,
lifetime of WBAN, as MAC layer is the controlling authority
processing, communication and or actuating (optionally). A
of the most energy consuming component of the node i-e radio
WBAN generally consists of sensor nodes and a coordinator
[3].
and actuators (optionally) with low power and short range
The rest of the paper is formulated as follows: Section 2
communications [1]. From the wireless sensor networks
describes details of different energy efficient MAC protocols.
perspective in Wireless Body Area Networks most of energy is
In section 3 we briefly present the comparative analysis of
consumed by communication as compared to sensing and
MAC protocols. Section 4 gives the future directions for
processing. Sensor radio is the main component used for
further research studies, and the paper is concluded in section
communication of monitored data.
5.
2

2. Energy Efficient MAC Protocols 2.3 MDTA-MAC

During the last decade a number of energy efficient MAC MDTA-MAC [6] modifies the duty cycle and superframe of
protocols have been proposed in the literature. The recent IEEE 802.15.6 to meet the energy efficiency and delay
energy efficient MAC protocols are discussed below: constraints. A star topology is assumed with a coordinator
which functions as a gateway for external networks. MDTA-
2.1 2L-MAC MAC categorizes the data into four types with priority from
This protocol uses two layers strategy. The first layer deals higher to lower. These are Critical data packet (CP), Reliable
with intra-WBAN by using polling mechanism to coordinate data packet (RP), Delay driven data packet (DP) and Ordinary
transmission to, and from sensor nodes. In second layer, data packet (OP). In contrast to IEEE 802.15.6 superframe
initially the coordinator examines the channel, if found unused, [14], MDTA-MAC uses one EAP (Exclusive Access Period),
then sends a polling frame to the sensor node. If the channel is one RAP (Random Access Phase) instead of two for each,
sensed busy by neighboring WBAN, coordinator halts and eliminating MAP (Manage Access Phase) while CAP
waits for a prescribed time interval (backoff timer), hence (Contention Access Period) is used. Traffic load is also
avoiding interference. When the polling frame is received by categorized as low load, moderate load, high load and
the sensor node, it then sends its data to the coordinator. As a overload. MDTA-MAC uses different frame structures
result interference within intra-WBAN is entertained by depending upon load type. Coordinator broadcast beacon to
polling frame mechanism and with inter-WBAN, carrier sense synchronize the network, recognize the data load type and
is used for interference minimization. 2L-MAC averts both category as well, EAP is allotted to send critical and delay
inter and intra WBAN interference [4]. The QoS is achieved driven data packets (CPs and DPs) while CAP period is
by channel switching mechanism. After wake up, a node waits utilized for RPs and OPs. This protocol provides less delay
for a defined interval of time, if it doesnt receive any polling with energy efficiency by prioritizing the load and traffic
frame from the coordinator it simply switches to another classes but at the same time offers network complexities and
channel. needs close synchronization among the nodes.
2.2 A-CSMA/CA 2.4 MP-MAC
In intra-wireless body area network interference may be According to [7] hard switching of radio from sleep mode to
avoided by using multiple access techniques like Time active mode consumes more energy as compared to a node
Division Multiple Access (TDMA), however the interference being active without transmission. This also compromises
due to the neighbor WBAN cant be ignored. This problem is latency. In MP-MAC (Multi-Priority MAC) Markoff chain
solved by A-CSMA/CA [5]. In A-CSMA/CA the star topology model is used for optimality between energy efficiency and
is used. The WBAN consist of one coordinator and multiple delay. Coordinator is named as BNC (Central Body Node) and
sensor nodes. The coordinator controls all operations of sensor node as BN (Body Node), data is also categorized as
WBAN. The coordinator measures the interference level of periodic or regular data and emergency data. To communicate
coexisting WBANs, and accordingly adopts the adjusted MAC regular data, BNC triggers the BN to wake up and transmit its
frame length to alleviate the interference with the neighbor data, whereas emergency data is directly transmitted by BN
WBANs. If the coordinator senses high interference level from without waiting to be triggered by BNC. The active/sleep cycle
coexisting WBAN, it minimizes the length of the frame to of BN is controlled by BNC. BN is supposed to have three
permit other WBANs to have maximum transmissions and less modules, Service Request (SR) for procurement and
delay. In other case the coordinator will maximize the length transmission of data, Queue module to store data and Service
of the MAC frame to have more transmission from its own Provider (SP) to mainly transmit traffic. This protocol
nodes, hence enhancing the performance. provides less overhead with no idle listening, and improved
Other issues, such as, power consumption is handled by data arrival rate. The network degrades when the number of
applying the proper sleeping and awaking mechanism, and nodes is increased largely.
limited sensing, which means that nodes do not sense or
2.5 I-MAC
sample the channel all the times or periodically, rather nodes
sample the channel intermittently. A sensing period, specific I-MAC provides improved energy, utilizing time slots
time interval of any value (x) is set for all nodes. When any efficiently and data delivery delay requirements [8]. Longer
node senses the channel unused, it goes to sleep mode and if a superframes are used to avoid unnecessary beaconing. Time
node finds the channel busy the node waits until the beacon is slot is periodically assigned and or allotted to nodes as data
received from the coordinator. As the nodes are in sleeping sources. More time slots are assigned to nodes for periodic
mode for x interval of time, the coordinator needs to take up reporting, because periodic traffic is huge as compared to
the channel as found free of communication, for the same emergency or urgent data. Short interruption slots are inserted
interval to ensure that the nodes will not miss the beacon. For inside the superframe to carry urgent data, which also
this purpose the coordinator will not send the beacon directly guarantees the real time requirements of the data. By using
on the free channel but rather it will broadcast a busy tone to interruption slots, the coordinator is allowed to cut the ongoing
occupy the channel, following the busy tone, beacon is superframe and begin with a new superframe. The coordinator
transmitted. This protocol also provides the facility of multi- controls the adjustment of interrupt interval slots according to
channel and QoS. the frequency of the urgent data. The coordinator is allowed to
shut the ongoing communication, and starts a new superframe
3

to communicate the urgent data. Unnecessary beaconing is 2.8 A-TDMA


avoided by adopting a long superframe in length and interrupt In A-TDMA [11] duty cycle is dynamically adjusted to
time slots, so the energy efficiency is maximized. manage the harvested energy amount that is more than power
The interrupt time slot is further subdivided into two consumption. The Energy Harvested Unit (EHU) and Energy
portions, first for urgent data and second for acknowledgment Store Device (ESD) are added to the sensor nodes. The MAC
in case of retransmission. The superframe consists of starting operation holds two phases: Link establishment process and
and ending beacons, in between them Guaranteed Time Slots Wake-up service process. The link establishment process is
(GTS) are found, and interrupt intervals are also inserted in further divided into three periods, i-e setup period, waiting
between several GTSs. At the end of the superframe period and beacon period.
Contention Access Period (CAP) is used for collision In setup period all sensor nodes send their ID to the
detection. Once collision occurs in interrupt slots due to more sink/coordinator. Each node shuts all the components except
than a single node occupy an interrupt slot, a CAP period is the power management system for energy harvesting and
activated for urgent data retransmission. When any node hoarding, then it goes to the charging mode. When the stored
having large urgent data, it sends a GTS request to coordinator energy attains certain level E [11], nodes wake up and upload
and an optional GTS is provided to the node and, remaining sensed data for transmission. As each node has different
GTSs are distributed to nodes for periodic reporting. Interrupt harvesting rate so the collision is avoided. Waiting period is
slots are used to interrupt the ongoing superframe to inform just used to inform the coordinator that the setup period is
the coordinator and other nodes with its urgent data or over. The coordinator broadcast a beacon for synchronization
command. The reduced beacon frame and interrupt time slots with all the nodes, and link establishment. In the wake up
along with CAP period provides efficient time slot utilization, process each frame consists of three periods, a control period,
hence improving the energy efficiency. an announcement period and data transmission period. Control
2.6 MEM-MAC period utilizes TDMA, nodes are allotted with different slots
for request messages. The request messages consist of two
In MEM-MAC [9] longer superframe with low duty cycle is
portions, one defines the sensor ID and other portion gives
maintained for energy efficient emergency traffic. Smaller
information of harvested energy and data amount in the
active time slots are inserted into long inactive periods of the
sensors buffer. When the coordinator gathers all request
superframe, to facilitate emergency traffic with less latency,
messages, it now has complete information of nodes data and
accommodating real time and trusty communication link
allocates time slots to nodes accordingly. Each node powers
avoiding unnecessary beaconing. The inserted time slots are
ON its radio in its own slot only. Announcement period is used
named as interposition time slots. The traffic is also divided
to broadcast the transmission schedule for all nodes.
into small data accommodated by single time slot and big data
Announcement period consist sensor ID, number of assigned
which cant be entertained by a single time slot. The length of
slots and synchronization information. In the transmission
the superframe is kept adaptive depending on the traffic type.
period actual sensed data and acknowledgements are
Superframe structure consists of starting and ending beacons,
exchanged and the frame ends with the transmission period.
optional broadcast, CAP1 and CAP2 [9], in between these,
couple of inactive periods along with interposition time slots 2.9 PA-MAC
are used. Interposition time slot is further subdivided into two PA-MAC [12] assigns time slots to sensor nodes dynamically,
portions, first one is used for emergency data and second for according to data priority/urgency using the ISM (Industrial
acknowledgement. CSMA/CA is adopted for both CAP1 and Scientific and Medical) band 2.4 GHz. A dedicated Beacon
CAP2 periods. Channel (BC) and Data Channel (DC) are employed, BC for
2.7 2R-MAC control data and DC for nodes data respectively. Traffic is
prioritized from higher to lower as Emergency traffic P 1, On-
2R-MAC segregates the sensors data into regular or periodic
Demand traffic P2, Normal traffic P3 and Non- Medical traffic
traffic and burst traffic. Hence provides two round reservations
P4 accordingly. PA-MAC divides CAP period into four phases,
for time slots allotment by sink node. Data is proclaimed as
each phase identifies the priority level of traffic. By using
burst when usual traffic is being monitored for long interval
these phases, QoS is achieved with less power utilization and
from prescribed range. Superframe of 2R-MAC consists of
avoiding delay too. The coordinator controls each phase
beacon followed by first and second round reservation periods
lengths variation accordingly. Emergency/urgent data is
(FRRP and SRRP) and ends with sleep period [10]. FRRP
transmitted in any available phase, while for other priority
facilitates normal usual traffic and SRRP provides flexibility
levels, channel can be accessed as: P2 can access channel in
of more slots allotment for burst traffic. Sensor node first
phase 2~4, for P3 phase 3~4 can be utilized and P 4 can only
sends Connection Request Frame to sink node, containing its
transmit in phase 4. It uses the same CAP (Contention Access
usual traffic rate. Sink node responds with Connection
Period), CFP (Contention Free Period) and GTS (Guaranteed
Assignment Frame, encompasses number of slots depending
Time Slot) approaches to transfer control messages and nodes
upon the nodes arrival traffic rate. Moreover, as large number
data as IEEE 802.15.4 defines.
of time slots desired for burst traffic, hence SRRP frame
request is used for more slots allotment. 2.10 TAD-MAC
TAD-MAC (Traffic Aware Dynamic MAC) works as self-
adaptive wake-up scheduling for latency and energy
4

optimization. This protocol works in two phases, before 3. Comparative Analysis


convergence (Evaluation phase) and after convergence. In the
The energy efficient characteristics of MAC protocols
first phase every sensor node waits for beacon, and beacon
discussed in previous section are organized in the following
contains each nodes ID. The beacon destined node, starts
two tables. The Protocols are listed in both tables in the same
transmitting to coordinator, while other nodes waits for their
order as presented in section 2, Table 1 provides a brief
corresponding beacon. The coordinator manages its Iwu (wake-
comparison of the presented protocols with key advantages
up interval), after some beacons/wake-ups, depending upon the
and limitations extracted from the published articles. Their
traffic it catches from the sensor nodes. In second phase the
merits and demerits are listed according to the gained
coordinator has now adapted its Iwu by keeping the idle
knowledge from their respective papers.
listening at minimum level. TAD-MAC is receiver-initiated
mechanism [13], the coordinator approximates the traffic load
and on the basis of this approximation it adapts the wake-up
interval for the purpose of synchronization with the transmit
nodes data transmission time. As a result next wake-up time is
calculated, that is used by the coordinator. For traffic
estimation a Traffic Status Register (TSR) is introduced to
store the status of the coming traffic. The receiving node when
wakes-up, it transmits a wake-up beacon, after that it checks Table 1: Key Advantages and Limitations of energy efficient
the channel whether it receives data or not and updates its TSR MAC Protocols
accordingly.

Table 2 provides a tabular summary of the characteristics of


protocols like, the topology used, energy efficiency,
QoS/Reliability, whether synchronization is required or not for
the protocol operation and many others.
5

Table 2: Characteristics of energy efficient MAC Protocols

References
4. Future Work
1. Cavallari, R., Martelli, F., Rosini, R., Buratti, C. and
There are two directions for future work. First, we try to Verdone, R. "A survey on wireless body area networks:
remove the limitations of the presented protocols given in table technologies and design challenges".IEEE Communications
1, and second is to add some or all of the deficient Surveys & Tutorials, 16-3, pp.1635-1657, 2014.
characteristics to the given protocols tabulated in table 2. As in
table 1 the protocols are compared with some other protocols
2. Chen, M., Gonzalez, S., Vasilakos, A., Cao, H. and
like IEEE 802.15.4, IEEE 802.15.6 etc, it is desirable to
Leung, V.C.. Body area networks: "A survey. Mobile networks
compare all these protocols with each other to make the
and applications", 16-2, pp.171-193, 2011.
scenario more clear for the upcoming researchers.
3. Langendoen, K. "Medium access control in wireless
5. Conclusion sensor networks.Medium access control in wireless
Energy efficiency is the main concern of WBAN MAC networks", 2, pp.535-560, 2008.
protocols. It is important to design an energy efficient MAC
protocol to enhance the lifetime of the Wireless Body Area 4. Chen, G.T., Chen, W.T. and Shen, S.H, 2L-MAC: "A
network, as most of the energy is consumed in the MAC protocol with two-layer interference mitigation in
communication process. It is the radio that make wireless body area networks for medical applications". In 2014
communication possible among the nodes, and MAC layer is IEEE International Conference on Communications ICC pp.
responsible to decide when and how to transmit the data 3523-3528. IEEE, June. 2014.
packets, keeping energy factor in check. This paper
investigates some energy efficient MAC protocols and 5. Huang, W. and Quek, T.Q, "Adaptive CSMA/CA MAC
discusses their advantages and limitations by comparing with protocol to reduce inter-WBAN interference for wireless body
given protocols and provides some of the characteristics of the area networks". In 2015 IEEE 12th International Conference
aforementioned protocols. on Wearable and Implantable Body Sensor Networks pp. 1-6.
IEEE, June, 2015.

6. Hossain, M.U., Kalyan, M., Rana, M.R. and Rahman,


M.O. "Multi-dimensional traffic adaptive energy-efficient
MAC protocol for Wireless Body Area Networks".
6

In Strategic Technology IFOST, 2014 9th International Forum DTN, MANETs, Vehicular Networks, Routing, and
on pp. 161-165. IEEE, October, 2014. Protocol Design.
E-mail: adil_2engr@hotmail.com
7. Jinbao, Z. and Lei, C. "Energy-efficient multipriority
MAC of wireless body area network". In General Assembly Wajid Ullah Khan is currently
and Scientific Symposium URSI GASS, 2014 XXXIth URSI pp.
working as Lecturer in
1-4. IEEE, Aug, 2014.
department of Computing and
8. Shu, M., Yuan, D., Zhang, C., Wang, Y. and Chen, C. Technology, Abasyn University
"A MAC protocol for medical monitoring applications of Peshawar campus, Pakistan. He
wireless body area networks". Sensors,15-6, pp.12906-12931, has completed his MS degree in
2015. Telecommunication and
Networking from Abasyn
9. Zhang, C., Wang, Y., Liang, Y., Shu, M. and Chen, C. University, Peshawar, Pakistan in 2015. He received his
"An Energy-Efficient MAC Protocol for Medical Emergency BS degree in Information Technology from University
Monitoring Body Sensor Networks". Sensors, 16-3, p.385, of Peshawar, Peshawar, Pakistan in 2012. His research
2016.
interests include mobile ad hoc network, wireless body
10. Yang, L., Li, C., Song, Y. and Yuan, X. "An Energy-
area networks and sensor networks.
Efficient 2R MAC Based on IEEE 802.15. 6 for Health E-mail: arbabwajid.ullah@abasyn.edu.pk
Monitoring". In 2015 IEEE Globecom Workshops pp. 1-6.
IEEE, Dec, 2015. Samiullah is currently pursuing
his MS degree in Software
11. Qi, X., Wang, K., Yue, D., Shu, L., Liu, Y. and Zhao, H, Engineering from University of
"Adaptive TDMA-based MAC protocol in energy harvesting Engineering and Technology
wireless body area network for mobile health". In Industrial Peshawar, Pakistan. He received
Electronics Society, IECON 2015-41st Annual Conference of his BS degree in Computer
the IEEE, pp. 004175-004180. IEEE, Nov, 2015.
Science from Virtual University
of Pakistan in 2014. His
12. Bhandari, S. and Moh, S. "A Priority-Based Adaptive
MAC Protocol for Wireless Body Area research interests include
Networks". Sensors, 16-3, p.401, 2016. wireless body area networks and sensor networks.
E-mail: eng.sami247@gmail.com
13. Alam, M.M., Hamida, E.B., Berder, O., Menard, D. and
Sentieys, O. "A Heuristic Self-Adaptive Medium Access Faisal Naeem is currently
Control for Resource-Constrained WBAN Systems". IEEE working as Lecture in Abasyn
Access, 4, pp.1287-1300, 2016. University. He has completed his
MS in Electrical Engineering
14. Liu, B., Yan, Z. and Chen, C.W, "CA-MAC: A hybrid from NWFP UET , PESHAWAR.
context-aware MAC protocol for wireless body area
He received his bachelors in
networks". In e-Health Networking Applications and Services-
Healthcom, 2011 13th IEEE International Conference pp. Telecommunication Engineering
213-216. IEEE, June, 2011. from NUCES-FAST. His
research area includes Delay
Tolerant Networks , Wireless Body Area Network and
Smart Grids.
Adil Sheraz is a postgraduate E-mail: faisal.naeem45@gmail.com
student in the Department of
Computing and Technology, Syed Irfan Ullah received
Abasyn University, his master degree from
Peshawar, Pakistan. He University of Peshawar and
completed his BS degree in received his MS and PhD
Telecommunications from from Islamic International
Preston Institute of University Islamabad. His
Management Science and field of research is Data and
Technology (PIMSAT) Karachi Network Security, Secure
in 2013. His research interests include WSNs, WBANs, algorithm Design, Securing
7

data on Private and public channels, Secure Mohammad Haseeb Zafar


Communication, Cryptanalysis and Breaking code. received the BSc degree in
Currently, he is doing his job as Assistant Professor in Electrical Engineering from the
Abasyn University Peshawar and is supervising MS and University of Engineering and
PhD research Projects. Technology, Peshawar, Pakistan
E-mail: syed.irfanullah@abasyn.edu.pk in 1996, the MS degree in
Telecommunications and
Computers from the Department
Abdus Salam is currently of Electrical and Computer
working as Head of Engineering, George
Department of Computing and Washington University,
Technology at Abasyn Washington DC, USA in 2003 and the PhD degree in
University Peshawar campus, Wireless Networks from the Department of Electronic
Pakistan. He received his PhD and Electrical Engineering, University of Strathclyde,
Degree in Computer Science Glasgow, UK in 2009. From 2011 to 2012, he was a
from International University, postdoctoral researcher at the University of Strathclyde,
Islamabad. He also received Glasgow, UK. He has more than 18 years of teaching,
his MSc in Computer Science research and industrial experience. He is currently a
from Quaid-e-Azam Professor in the Department of Electrical Engineering
University, Islamabad. His research interest include and Secretary Board of Advanced Studies & Research at
Cluster Computing, WSN, Wireless Body Area the University of Engineering and Technology,
Networks, and Artificial Intelligence. Peshawar, Pakistan. His research interests include
E-mail: dr.salam@abasyn.edu.pk WSNs, MANETs, Wireless Mesh Networks, WPANs,
Routing, Network Traffic Estimation, Smart Grids,
Software Defined Networks, Genetic Algorithms, Data
Arshad Farhad currently Centre Architectures, Machine 2 Machine
working as Lecturer in Communications, Femtocells, ITS and Signal
department of computer, Processing.
COMSATS Institute of E-mail: m.h.zafar@ieee.org
Information Technology, haseeb@uetpeshawar.edu.pk
Sahiwal, Pakistan. He has
completed his MS degree in
Telecommunication and
Networking from Bahria
University, Islamabad,
Pakistan in 2015 with distinction as a Silver Medalist.
He received his BS degree in Information Technology
from University of Peshawar, Peshawar, Pakistan in
2012. His research interests include design and
performance evaluation of communication protocols for
wireless ad hoc, wireless body area networks and sensor
networks.
E-mail: arshadfarhad@ymail.com

You might also like