You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

Published: 15 November 2018

Performance Evaluation of a Quality of Service Control Scheme in Multi-Hop WBAN Based on IEEE 802.15.6

,
,
,
and
1
Department of Information and Communication Engineering, Faculty of Computer Science and Systems Engineering, Okayama Prefectural University, 111 Kuboki, Soja, Okayama 719-1197, Japan
2
Graduate School of Information Sciences, Hiroshima City University, 3-4-1, Ozuka-Higashi, Asa-Minami-Ku, Hiroshima 731-3194, Japan
3
Faculty of Engineering, Yokohama National University, 79-5 Tokiwadai, Hodogaya-Ku, Yokohama 240-8501, Japan
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Wireless Body Area Networks and Connected Health

Abstract

The performance of a quality of service (QoS) control scheme in a multi-hop wireless body area network (WBAN) based on the IEEE Std. 802.15.6 is evaluated. In medical Internet of Things systems, WBANs are an important technology. In a previous study, an optimal quality of service control scheme that employs a multiplexing layer for priority scheduling and a decomposable error control coding scheme for WBANs were proposed. However, the two-hop extension supported by IEEE Std.802.15.6 has not been considered. Here, the two-hop extension is applied. Then, the packet error ratio, number of transmissions, and energy efficiency of our previously proposed system are compared to a standard scheme under several conditions. Also, novel evaluations based on communication distance are conducted. Numerical results demonstrate that our proposed scheme, in which coding rates change relative to channel conditions, outperforms standard schemes in many aspects. In addition, those systems show the best performance when the communication distance of the first hop equals that of the second hop. In addition, the above result is theoretically clarified.

1. Introduction

Health monitoring systems that employ wearable vital sign sensors and wireless communication (referred to as medical Internet of Things (m-IoT) systems) have received significant attention recently [,,,,,,,,,,,,,,,]. Wireless body area networks (WBAN) are an important key technology in the m-IoT field. WBAN sensors can sample, monitor, process, and communicate a significant amount of various vital data []. In addition, they can provide real-time feedback []. It is expected that WBANs will be implemented to monitor patient health. In particular, they are expected to monitor elderly people in hospitals, nursing homes, and their own homes [].
Recently, there have been various attempts to develop standards for WBAN systems [,]. In 2011, IEEE Std. 802.15.4a was issued as a standard for wireless personal area networks (WPAN) assuming a wide range of applications []. However, IEEE Std. 802.15.4a has not been optimized for medical and healthcare applications. Therefore, IEEE Std. 802.15.6 was published as a standard specialized mainly for implant and wearable WBAN assuming medical-healthcare uses (but not limited to them). In WBAN systems, a wearable vital sign sensor node can include various types of sensors with different data rates. In addition, the allowable communication error ratio and delay depend on the application. IEEE Std. 802.15.6 aims to provide an international standard for low power, short range, and extremely dependable wireless communication within the surrounding area of the human body, supporting a vast range of data rates []. Additionally, IEEE Std. 802.15.6 defines eight user priority levels. Quality of Service (QoS) control must ensure that different data types are communicated effectively and efficiently. Therefore, optimal QoS control for input data is an important feature in sensor data transmission procedures. To address this requirement, an optimal QoS control scheme that employs a multiplexing layer for priority scheduling and a decomposable error control coding scheme that adapts to varying channel conditions or QoS requirements have been proposed [,,]. Here, the target WBAN consists of a wearable sensor device that includes multiple sensors whose output data are transmitted using a common medium access control (MAC) and the physical layer (PHY). In those studies, simulations and a theoretical analysis were performed to evaluate the performance of the proposed system by comparing it to an IEEE Std.802.15.6-based system [,,].
Note that IEEE Std. 802.15.6 supports a two-hop extension. In this study, the performance of an error control scheme for a multi-hop WBAN based on IEEE Std. 802.15.6 is evaluated. Specifically, the packet delivery failure ratio (PDFR), number of transmissions as a replacement for delay, and energy efficiency which is throughput considering energy consumption of our previously proposed error control scheme and IEEE Std. 802.15.6 are evaluated relative to this standard’s two-hop extension [,,] like under multi-path fading channel of ultra-wideband (UWB) PHY. The main contribution and novelty of the manuscript are as follows:
  • The performance of our previously proposed QoS control scheme is improved by appropriately determining the coding rate using channel estimation. With this improvement, data packets can be relayed to the hub with a small number of transmissions even when the maximum number of retransmissions is limited by a two-hop extension.
  • Novel performance evaluations are conducted as a function of the distance between transmitter and receiver assuming a real environment, which were not considered in our previous work [,,]. Through these evaluations, we confirm that our proposed QoS control method is effective even assuming a real environment. It is also clear that it is better to perform two-hop expansion than one-hop case by setting the distance between transmitter and receiver in each hop appropriately. In addition, this paper contributes to theoretically clarifying the relevant optimum setting.
The remainder of this paper is organized as follows. Section 2 introduces the related research in the field of this manuscript. In Section 3, the related descriptions of IEEE Std. 802.15.6 are explained. Section 4 shows our previously proposed error control method. The system model is described in Section 5. Computer simulated performance evaluations and theoretical analysis of the results are presented in Section 6. Section 7 concludes the paper.

4. Previously Proposed Error Control Method

In a previous study, an optimal QoS control scheme that employs decomposable error control coding and Weldon’s ARQ scheme was proposed [,,]. As an example of the decomposable code, punctured convolutional code (constraint length K = 3 ; coding rates r c are 8/9 to 1/16) is used. The r c = 8 / 9 punctured code patterns (codeword 1 and codeword 1’) are generated from a convolutional code whose generator polynomial is [,] and the coding rate is r c = 1/2 as shown in Figure 3.
Figure 3. Punctured convolutional codes r c = 8 / 9 .
In our proposed method, retransmission is performed as follows (Figure 4) [,,]:
Figure 4. Method of reconstructing decomposable codes. (a) 1 / 2 r i 8 / 9 ; (b) r i 1 / 2 [,,].
  • Firstly, the information bit sequence m is encoded via the punctured convolutional code, and codeword 1 is transmitted.
  • If bit errors are detected after decoding codeword 1, the receiver stores the transmitted codeword 1, and the transmitter re-sends the sub-codeword of codeword 1′ n i times if 1   i   3 . At the receiver, the received sub-codeword and stored codeword are combined, and the reconstructed codeword is decoded.
  • After the third retransmission, codeword 1 is sent n 4 times and combined with a buffered codeword at the receiver. If bit errors are detected after decoding reconstructed codeword, the n 4   codeword 1 is buffered in the receiver, and codeword 1′ is transmitted n 5 times and combined with a stored codeword.
  • After that, codeword 1 and 1′ are sent alternately n i times and stored. Then, a receiver reconstructs and decodes low-rate decomposable codes by changing the number of data copies n i in Weldon’s ARQ protocol. At this time, a buffered old codeword is updated to a transmitted new codeword.
  • This operation continues until no bit errors are detected or the maximum number of transmissions q is achieved.
Figure 5 shows a flowchart of the protocol of our proposed error correcting scheme.
Figure 5. Flowchart of the proposed automatic repeat request (ARQ) protocol [,,].
This scheme has the following advantages [,]. The first one is that the coding rate is very wide. Hence, bit (or packet) errors can be sufficiently eliminated by the coding rate of r c = 8/9 under very good channel conditions, while very low coding rates can remove bit errors under bad channel conditions. As for the second advantage, in the case of a small number of retransmissions, it is sufficient to transmit a small number of redundant bits. This characteristic leads to improvement of energy efficiency and reduction of transmission delay on retransmission. Finally, combining characteristics of Weldon’s ARQ protocol makes it possible to perform wider QoS control. That is, by controlling the number of data copies n i in Weldon’s ARQ protocol for transmission, the error correcting capability can be changed even if an error correcting code with the same coding rate is used.

5. System Model in Two-Hop Case

5.1. System Model and QoS Requirement

It is assumed that a sensor node (N1) includes multiple sensors that produce different data types that are transmitted via a relaying node (N2) to the target hub (H) (Figure 6). Here, t r A B is the number of transmissions from nodes A to B and q A B is the maximum number of transmissions from nodes A to B. If bit errors are detected, the system retransmits until the maximum number of retransmissions is reached. Then, the transmission is considered to have failed if the data from a sensor node do not reach the target hub.
Figure 6. System model.
The average number of transmissions from node A to node B t r A B ¯ is expressed as follows:
  t r A B ¯ = i = 1 q A B 1 i j = 1 i P f a i l , j 1 ( 1 P f a i l , i ) + q A B j = 1 q A B P f a i l , j 1 ( *   P f a i l , 0 = 1 ) .
Here, P f a i l , i is the probability of transmission failure in the i th transmission. In this study, P f a i l , i [] is the same as PER because packet collisions in the MAC layer are not considered. Hence, bit errors are taken into account due to noise and multipath fading. Then, the average number of transmissions in a two-hop case is expressed as follows:
  t r 2 h o p ¯ = { q N 1 N 2   ( P f a i l , 1 s t = 1 ) t r N 1 N 2 ¯ + t r N 2 H ¯   ( P f a i l , 1 s t 1 ) ( *   i = 1 1 f ( i ) = 0 ,   i = 1 0 f ( i ) = 0 ) .
Here, P f a i l , 1 s t is the probability of transmission failure at the first hop.
In this study, two data (Data A and Data B) with different types of QoS requirements are considered. Here, it is assumed that a low PER is desired for Data A and high energy efficiency is important for Data B as an example [,,]. As the first reason for selecting those QoSs, this paper particularly focused on an error controlling scheme utilizing a hybrid ARQ, and then PER and the energy efficiency are very important parameters for evaluation of such a scheme. Secondly, those two parameters are related to a trade-off. Hence, we also aimed to show the relationship in some evaluations. Data A is assumed to be a physiological parameter with a low data rate, for example blood pressure, SpO2, or temperature, and Data B to be a waveform, such as an ECG output [,,]. The transmission order and error control process of different types of data packets depend on such QoS requirements. The characteristics of different data types are summarized in Table 1 [,,].
Table 1. QoS requirements of different data types.
Then, each q A B is set as shown in Table 2. The maximum number of retransmissions is four in high QoS mode in the IR-UWB (impulse radio ultra-wideband) PHY of the standard. However, the default mode in the IR-UWB PHY, the narrowband PHY, and the Human Body Communication PHY in IEEE Std. 802.15.6 do not define a maximum number of retransmissions. Thus, in the current study, this parameter was set according to the QoS requirements of the data in our previous work [,,]. Figure 7 shows examples of each t r 2 h o p ¯ . P f a i l , 1 s t , i and P f a i l , 2 n d , i denote the probability of transmission failure at the i th transmission of the first and second hop, respectively. With Data A, t r 2 h o p ¯ increases steeply under high P f a i l , 2 n d , i conditions, especially in low P f a i l , 1 s t , i cases, because t r N 2 H increases towards q m a x as P f a i l , 2 n d , i increases. On the other hand, t r 2 h o p ¯ increases gradually with Data B because q N 1 N 2 and q N 2 H are constant.
Table 2. Maximum number of transmissions.
Figure 7. Examples of t r 2 h o p ¯ . P f a i l , 1 s t , i = 0.9 ,     0.5 , and 0.1. P f a i l , 2 n d , i is in the range 0.1–0.9.

5.2. Two Proposed Schemes

In this study, two proposed schemes are assumed. The first scheme (Scheme 1) transmits data depending on preset parameters, which was used in our previous study [,,]. On the other hand, in the second scheme (Scheme 2), coding rates are varied with the SNR estimated using a preamble signal according to each QoS requirement (e.g., desired bit error ratio (BER)), which is introduced for the first time in this manuscript. The operation example is shown in Figure 8. Firstly, the channel SNR is estimated by using the preamble of the beacon or the T-Poll received from the hub or the relaying node. Next, the relayed node or the relaying node determines the coding rate according to the estimated channel SNR and transmits data to the relaying node or the hub. If a bit error is detected, elements of the encoded data (codeword) are transmitted to increase error correcting capability after receiving negative-acknowledgement (NACK). Then, if data are transmitted successfully, the channel SNR is estimated by using the returned acknowledgement (ACK) preamble, the coding rate is determined, and the next data are sent. Since Scheme 2 uses an existing preamble, extra overhead is not required.
Figure 8. Operation example of Scheme 2. ACK, NACK, and QoS are abbreviations of acknowledgement, negative-acknowledgement, and quality of service respectively.
Then, the channel SNR is estimated using the following equations []:
  Γ = | ρ | 2 1 | ρ | 2  
  ρ = x H r x H x r H r  
  0 ρ 1  
  x = s + η  
  r = c s  
Here, Γ is the estimated SNR, ρ is a correlation coefficient, x is a preamble signal with noise η , and r is a preamble signal that consists of a signal s and unknown constant c without noise or interference. Then, we explain why Equation (3) becomes the SNR. Let’s substitute Equation (4) into Equation (3):
  Γ = | x H r | 2 x H x r H r | x H r | 2   .  
Here, | x H r | 2 can be expanded as follows:
  | x H r | 2 = | s H r + η H r | 2 = ( s H r + η H r ) ( s H r + η H r ) * = ( s H r + η H r ) ( r H s + r H η ) = s H r r H s   .  
Here, η H r = r H η = 0 since noise and a preamble signal are uncorrelated. Then, x H x r H r can be expanded as follows:
x H x r H r = s H s r H r + η H η r H r .
For the same reason, η H s = s H η = 0 . Then, Equation (8) can be modified from Equations (9) and (10) as follows:
  Γ = s H r r H s s H s r H r + η H η r H r s H r r H s   .  
Additionally, s H s r H r = s H r r H s as follows:
s H r r H s =   s H ( c s ) ( c s H ) s =   s H s ( c s H ) ( c s ) = s H s r H r .
Finally, Equation (11) is summarized as follows, indicating that the SNR can be derived:
  Γ = s H s r H r η H η r H r = s H s η H η = P s P η  
where P s and P η are signal power and noise power, respectively.
In Scheme 2, the criteria to determine the coding rate are expressed as follows:
  Desired   BER = 1 ( 1 Disered   PER ) 1 L i n f o  
where L i n f o is length of information bits. Hence, the desired BER is calculated from the desired PER such as Table 1 and L i n f o . The coding rate is determined based on that and the estimated SNR from Figure 9. As the reason for using the desired PER and L i n f o , it is possible to accurately obtain the desired BER for determining the coding rate from the Equation (14) since the required QoS (desired PER) is used. For example, in a case where the desired PER is 10 2 and L i n f o is 400 bits, the desired BER is calculated as 2.5 × 10 5 . Here, if the estimated SNR is 5 dB, the coding rate is determined to be r c = 1/2 as shown in Figure 9.
Figure 9. Bit error probability in each coding rate.

6. Results and Discussion

6.1. Performance Evaluation by Computer Simulation

In this section, the proposed and standard schemes with two-hop extension are evaluated based on communication distance by computer simulations. The computer simulator was built by us with MATLAB. The main simulation parameters are listed in Table 3 and refer to our previous work [,,]. Table 4 shows the preset parameters of Weldon’s ARQ protocol at the i th transmission for Scheme 1 [,,]. The computer simulation assumes that there is no error in SHR and PHR. That is, only the characteristics of PSDU are evaluated. In computer simulations of the compared schemes, Data A was transmitted using the default mode with (63, 51) BCH code in IEEE Std. 802.15.6 and the error control scheme utilizing the (63, 55) Reed-Solomon code in IEEE Std. 802.15.4a with ordinary ARQ, whereas Data B was transmitted using the high QoS mode with (126, 63) shortened BCH code and type-II hybrid ARQ, and then the error control scheme utilizing the concatenated code consisting of the (63, 55) Reed–Solomon code and the convolutional code whose constraint length is three and coding rate is 1/2 in IEEE Std. 802.15.4a with ordinary ARQ [,]. In these computer simulations, the IEEE model CM 3 is applied as a channel model, which is targeted for wearable WBAN and includes multi-path fading []. Then, a hospital room case in the IEEE model CM3 is utilized as a path loss model []. The path loss is expressed as follows:
  P L ( d ) = a × l o g 10 d + b + N  
Table 3. Main simulation parameters.
Table 4. Preset number of data copies in Weldon’s ARQ n i .
Here, a and b are linear fitting coefficients, d is the communication distance (millimeter, mm) between a transmitter and a receiver, and N is a normally distributed variable with zero mean and standard deviation σ N . Details about these parameters can be found in the literature []. Using P L ( d ) , the signal to noise ratio (SNR) at a receiver can be expressed as follows:
  ( SNR ) d B = P r P n  
  P r = P t P L ( d )  
  P n = N t h e r m a l + ( N F ) d B + I d B  
where P t is transmission power and N t h e r m a l is thermal noise. The average path loss is shown in Figure 10. It is assumed that the channel condition does not change until the two-hop relay is completed or the two-hop relay fails beyond the maximum number of retransmissions.
Figure 10. Average path loss in IEEE model CM3.
In addition, each case of the proposed scheme in each hop is summarized in Table 5.
Table 5. Cases for the proposed scheme of each hop.
Then, energy efficiency η is derived from our previous work [] as follows:
  η P s u c c L i n f o E l i n k , N 1 N 2 + E l i n k , N 2 H  
  E l i n k ,     A B = ( T T O T + N t x T A C K ) ( P t x , R F + P t x , c i r c + P r x ) + N t x ( ε e n c + ε d e c )  
  T T O T = T S H R + T P H R + i = 1 t r A B L P S D U , i R  
Here, E l i n k ,   A B is the energy consumption of the communication link at each hop and P s u c c is the transmission success ratio, T T O T is the total duration of packet transmission, T A C K is the duration of ACK, L P S D U , i is the length of PSDU, N t x is the number of transmission, P t x , R F is the transmitter RF power consumption, P t x , c i r c is the transmitter circuitry power consumption, P r x is the receiver power consumption, and ε e n c and ε d e c are the encoding and decoding energies, respectively [,,,].
Figure 11, Figure 12 and Figure 13 show the performance results when the distance of the first hop d 1 s t is changed from 10 centimeters (cm) to 3 m and the distance of the second hop d 2 n d is constant ( d 2 n d = 40 cm). In this scenario, it can be said that the performance in the range in which the WBAN mainly operates (10 cm~1.5 m) and certain limitations of the WBAN system (1.5 m~2.3 m) are evaluated. PDFR means the ratio at which the two-hop relay failed beyond the maximum number of retransmissions. As can be seen, the proposed scheme satisfies the QoS requirements for data A and B as shown in Table 1, while IEEE Std. 802.15.6 and 15.4a do not. Hence, the proposed method can improve PER of Data A more, while it can improve the energy efficiency and the number of transmissions of Data B more. Conversely, Data B has better performances with respect to both standard schemes. The reason is that those standard schemes are not basically designed so that any QoSs can be satisfied. Hence, it can be considered that the performances of each mode of IEEE Std. 802.15.6 and error control schemes of IEEE Std. 802.15.4a were simply expressed. Also, that is one of problems of these standard schemes. Cases 2 and 3 show better energy efficiency and average number of transmissions than Case 1, because the coding rate of Case 2 and Case 3 is set appropriately for the channel SNR and the number of retransmissions is reduced by utilizing Scheme 2, while Case 1 uses only Scheme 1 and it requires a larger number of retransmissions. However, there is not a large difference between Cases 2 and 3 because d 2 n d is short and the error correcting capability of coding rate r c = 8/9 at the first transmission can reduce bit errors sufficiently. That is, there is no large difference between Schemes 1 and 2 with respect to the second hop.
Figure 11. Packet delivery failure ratio with constant d 2 n d .
Figure 12. Energy efficiency with constant d 2 n d .
Figure 13. Average number of transmissions with constant d 2 n d .
Figure 14, Figure 15 and Figure 16 show the performance results for fixed communication distance in two hops d 2 h o p s = d 1 s t + d 2 n d (1.5 m) and varying the d 1 s t and d 2 n d values. For d 1 s t = 1.5 m, data are transmitted using only a single hop. Thus, the proposed scheme satisfies the QoS requirements for Data A and B, while both standard schemes approach do not, like in the first scenario. Also, when comparing the standard schemes and the proposed scheme, the performances of both standards are worse than the proposed one. For example, Data A of the proposed scheme satisfies PDFR <   10 2 , while that of both standards do not satisfy PDFR <   10 1 . This is because the correcting capability of error correcting codes used in those standards is lower than that of the proposed scheme. In other words, the standard schemes do not have sufficient correcting capability in a hop with poor channel conditions. Comparing Case 1 and Case 2, it is understood that Case 2 has better characteristics. The reason is that Case 2 can select a coding rate suitable for the channel condition by using Scheme 2 at the second hop. On the other hand, regarding Case 1, since Scheme 1 is used at both hops, it is considered that a hop having a bad channel condition is greatly affected. Then, Case 3 shows the best performance because Scheme 2 is used at both hops. In addition, all systems except Case 2 of the proposed scheme show the best performance when the communication distance of the first hop equals that of the second hop because d 1 s t or d 2 n d becomes long (unlike the previous condition) and the long-distance communication influences performance in other cases.
Figure 14. Packet delivery failure ratio with constant d 2 h o p s .
Figure 15. Energy efficiency with constant d 2 h o p s .
Figure 16. Average number of transmissions with constant d 2 h o p s .

6.2. Theoretical Analysis of Constant d 2 h o p s

Here, we present a theoretical analysis when d 2 h o p s is fixed because this scenario appears to show the optimal point in Figure 14, Figure 15 and Figure 16. The reason for the optimized performances, except for Case 2, when d 1 s t = d 2 n d = d 2 h o p / 2 is described in this section.
The probability of transmission failure in the two-hop case P f a i l , 2 h o p is expressed using the probability of transmission failure at each hop P f a i l , 1 s t , P f a i l , 2 n d as follows:
  P f a i l , 2 h o p = P f a i l , 1 s t +   ( 1 P f a i l , 1 s t ) P f a i l , 2 n d  
  P f a i l , 1 s t ( d 1 s t ) = i = 1 t r N 1 N 2 ¯ 0.5 P f a i l , i ( d 1 s t )  
  P f a i l , 2 n d ( d 1 s t ) = i = 1 t r N 2 H ¯ 0.5 P f a i l , i ( d 2 h o p d 1 s t )  
  0 < P f a i l , 1 s t ( d 1 s t ) ,   P f a i l , 2 n d ( d 1 s t ) < 1  
  0 < P f a i l , 1 s t ( d 1 s t )  
  P f a i l , 2 n d ( d 1 s t ) < 0  
Here, P f a i l , 1 s t ( d 1 s t ) = d P f a i l , 1 s t ( d 1 s t ) d ( d 1 s t ) and P f a i l , 2 n d ( d 1 s t ) = d P f a i l , 2 n d ( d 1 s t ) d ( d 1 s t ) . The communication distance in two hops d 2 h o p s is defined as follows:
d 2 h o p s = d 1 s t + d 2 n d  
  0 < d 1 s t ,   d 2 n d < d 2 h o p  
P f a i l , 2 h o p is differentiated by d 1 s t as follows:
  P f a i l , 2 h o p = P f a i l , 1 s t + P f a i l , 1 s t P f a i l , 2 n d + ( 1 P f a i l , 1 s t ) P f a i l , 2 n d = ( 1 P f a i l , 2 n d ) P f a i l , 1 s t + ( 1 P f a i l , 1 s t ) P f a i l , 2 n d .
Here, the case that (30) = 0 is considered. Equation (30) is modified by the following equation:
  1 1 P f a i l , 1 s t P f a i l , 1 s t = 1 1 P f a i l , 2 n d P f a i l , 2 n d  
Both sides of (31) are integrated by d 1 s t as follows:
  ln ( 1 P f a i l , 1 s t ) = 1 1 P f a i l , 2 n d ( d P f a i l , 2 n d d d 2 n d d d 2 n d d d 1 s t ) = ln ( 1 P f a i l , 2 n d ) + C .
Here, d c where P f a i l , 1 s t ( d c ) = P f a i l , 2 n d ( d c ) is considered. Under this condition, C = 0 . Thus, (32) is rewritten as follows:
  P f a i l , 1 s t P f a i l , 2 n d = 0   i = 1 t r N 1 N 2 ¯ 0.5 P f a i l , i ( d 1 s t ) i = 1 t r N 2 H ¯ 0.5 P f a i l , i ( d 2 h o p d 1 s t ) = 0  
d 1 s t ,   t r N 1 N 2 ¯ , and t r N 2 H ¯ that satisfies (33) are considered. Here, it is assumed that d 1 s t = d 2 n d = d 2 h o p 2 . Under this condition, (33) is satisfied when t r N 1 N 2 ¯ = t r N 2 H ¯ in the computer simulations (except for Case 2) because, when t r N 1 N 2 ¯ t r N 2 H ¯ , (27) is modified as follows:
  i = 1 t r N 2 H ¯ 0.5 P f a i l , i ( d 2 h o p 2 ) { 1 i = t r N 2 H ¯ 0.5 + 1 t r N 1 N 2 ¯ 0.5 P f a i l , i ( d 2 h o p 2 ) } = 0  
When (26) is satisfied,
  i = 1 t r N 2 H ¯ 0.5 P f a i l , i ( d 2 h o p 2 ) = 0  
or
  i = t r N 2 H ¯ 0.5 + 1 t r N 1 N 2 ¯ 0.5 P f a i l , i ( d 2 h o p 2 ) = 1  
However, due to (27)–(29), (35) and (36) are not satisfied. Thus, it can be said that t r N 1 N 2 ¯ = t r N 2 H ¯ . On the other hand, for Case 2, (33) is not satisfied when t r N 1 N 2 ¯ = t r N 2 H ¯ because P f a i l , 1 s t , i ( d 2 h o p 2 ) P f a i l , 2 n d , i ( d 2 h o p 2 ) . From Figure 14, Figure 15 and Figure 16, it can be observed that all cases (except Case 2) achieve optimal performance under the above conditions; thus, d 1 s t = d 2 n d = d 2 h o p 2 .

7. Conclusions

In this paper, the performance of our proposed QoS control scheme in the case of two-hop extension was evaluated. The PDFR, number of transmissions, and energy efficiency of our previously proposed system, IEEE Std. 802.15.6, and 15.4a were evaluated for this case. Also, two schemes (Schemes 1 and 2) were compared for the proposed method. The numerical results show that the proposed scheme outperforms the standard scheme in terms of the PDFR, number of transmissions, and energy efficiency. In addition, Case 3 (i.e., the coding rates change depending on the channel’s condition) showed better performance than the other cases at both hops. When d 2 h o p s was fixed, it was shown that performance became optimal when d 1 s t = d 2 n d (except Case 2) from computer simulations and theoretical analysis. This result is expected to greatly contribute to the optimization of how nodes and hubs are arranged when designing a WBAN.
In the future, an effective error control scheme for multi-hop WBANs should be considered. In addition, PHY evaluation indexes were mainly considered. Hence, evaluating the system delay and throughput in the network layer should be considered for multi-hop cases. As an extension of IEEE Std. 802.15.6, cases with greater than three hops should also be evaluated and analyzed theoretically.

Author Contributions

K.T. and H.T. conceived and designed the study. K.T. performed the computer simulations. K.T. provided the theoretical analysis of the proposed method. K.T. wrote the manuscript. H.T., C.S., K.S. and R.K. reviewed and edited the manuscript. All authors read and approved the manuscript

Funding

The APC was funded by Japan Society for the Promotion of Science under Grant-in-Aid for Scientific Research (C) (KAKENHI No. 16K06363) and Wesco Scientific Promotion Foundation

Acknowledgments

The first author would like to thank members of Kohno laboratory, Yokohama National University, Japan for their great inspiration and kindness.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, M.; Gonzalez, S.; Vasilakos, A.V.; Cao, H. VCM Leung, Body Area Networks: A Survey. Mob. Netw. Appl. 2010, 16, 171–193. [Google Scholar] [CrossRef]
  2. Acampora, G.; Cook, D.J.; Rashidi, P.; Vasilakos, A.V. A Survey on Ambient Intelligence in Healthcare. Proc. IEEE 2013, 101, 2470–2494. [Google Scholar] [CrossRef] [PubMed]
  3. Hayajneh, T.; Almashaqbeh, G.; Ullah, S.; Vasilakos, A.V. A survey of wireless technologies coexistence in WBAN: Analysis and open research issues. Wirel. Netw. 2014, 20, 2165–2199. [Google Scholar] [CrossRef]
  4. Fortino, G.; Fatta, G.D.; Pathan, M.; Vasilakos, A.V. Cloud-assisted body area networks: State-of-the-art and future challenges. Wirel. Netw. 2014, 20, 1925–1938. [Google Scholar] [CrossRef]
  5. Zhou, J.; Cao, Z.; Dong, X.; Lin, X.; Vasilakos, A.V. Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wirel. Commun. 2013, 20, 12–21. [Google Scholar] [CrossRef]
  6. Zhou, J.; Cao, Z.; Dong, X.; Xiong, N.; Vasilakos, A.V. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 2014, 314, 255–276. [Google Scholar] [CrossRef]
  7. Cao, H.; Leung, V.; Chow, C.; Chan, H. Enabling technologies for wireless body area networks: A survey and outlook. IEEE Commun. Mag. 2009, 47, 84–93. [Google Scholar] [CrossRef]
  8. Viswanathan, H.; Chen, B.; Pompili, D. Research challenges in computation, communication, and context awareness for ubiquitous healthcare. IEEE Commun. Mag. 2012, 50, 92–99. [Google Scholar] [CrossRef]
  9. Bachmann, C.; Ashouei, M.; Pop, V.; Vidojkovic, M.; Groot, H.D.; Gyselinckx, B. Low-power wireless sensor nodes for ubiquitous long-term biomedical signal monitoring. IEEE Commun. Mag. 2012, 50, 20–27. [Google Scholar] [CrossRef]
  10. Caldeira, J.M.L.P.; Rodrigues, J.J.P.C.; Lorenz, P. Toward ubiquitous mobility solutions for body sensor networks on healthcare. IEEE Commun. Mag. 2012, 50, 108–115. [Google Scholar] [CrossRef]
  11. Boulis, A.; Smith, D.; Miniutti, D.; Libman, L.; Tselishchev, Y. Challenges in body area networks for healthcare: The MAC. IEEE Commun. Mag. 2012, 50, 100–106. [Google Scholar] [CrossRef]
  12. Suzuki, T.; Tanaka, H.; Minami, S.; Yamada, H.; Miyata, T. Wearable Wireless Vital Monitoring Technology for Smart Health Care. In Proceedings of the 7th International Symposium on Medical Information and Communication Technology (ISMICT), Tokyo, Japan, 6–8 March 2013. [Google Scholar]
  13. Cavallari, R.; Martelli, F.; Rosini, R.; Buratti, C.; Verdone, R. A Survey on Wireless Body Area Networks: Technologies and Design Challenges. IEEE Commun. Surv. Tutor. 2014, 16, 1635–1657. [Google Scholar] [CrossRef]
  14. Movassaghi, S.; Abolhasan, M.; Lipman, J.; Smith, D.; Jamalipour, A. Wireless Body Area Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1658–1686. [Google Scholar] [CrossRef]
  15. Patel, M.; Wang, J. Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel. Commun. 2010, 17, 80–88. [Google Scholar] [CrossRef]
  16. Rodrigues, J.J.P.C. Digital Advances in Medicine, E-Health, and Communication Technologies; IGI Global: Hershey, PA, USA, 2013; ISBN 978-1-466-62794-9. [Google Scholar]
  17. IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements: Part 15.6: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs) Used in or 12 around a Body. IEEE, 2012. Available online: https://ieeexplore.ieee.org/document/6161600 (accessed on 28 September 2018).
  18. Smart Body Area Network (SmartBAN); Low Complexity Medium Access Control (MAC) for SmartBAN, ETSI TC Smart BAN TS 103 325 V1.1.1. 2015. Available online: http://www.etsi.org/deliver/etsi_ts/103300_103399/103325/01.01.01_60/ts_103325v010101p.pdf (accessed on 28 September 2018).
  19. IEEE Std 802.15.4-2011 (Revision of IEEE Std 802.15.4-2006)-IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs). IEEE, 2011. Available online: https://ieeexplore.ieee.org/document/6012487 (accessed on 28 September 2018).
  20. Takabayashi, K.; Tanaka, H.; Sugimoto, C.; Kohno, R. Multiplexing and Error Control Scheme for Body Area Network employing IEEE 802.15.6. IEICE Trans. Commun. 2014, 97, 564–570. [Google Scholar] [CrossRef]
  21. Takabayashi, K.; Tanaka, H.; Sugimoto, C.; Kohno, R. Performance Analysis of Multiplexing and Error Control Scheme for Body Area Networks. EURASIP J. Wirel. Commun. Netw. 2016, 2016, 1–16. [Google Scholar] [CrossRef]
  22. Takabayashi, K.; Karvonen, H.; Paso, T.; Tanaka, H.; Sugimoto, C.; Kohno, R. Performance Evaluation of a QoS-aware Error Control Scheme for Multiple-WBAN Environment. IEEJ Trans. Electr. Electron. Eng. TEEE C 2017, 12, S146–S157. [Google Scholar] [CrossRef]
  23. Latre, B.; Braem, B.; Moerman, I.; Blondia, C.; Reusens, E.; Joseph, W.; Demeester, P. A Low-delay Protocol for Multihop Wireless Body Area Networks. In Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous), Philadelphia, PA, USA, 6–10 August 2007. [Google Scholar]
  24. Ivanov, S.; Botvich, D.; Balasubramaniam, S. Cooperative wireless sensor environments supporting body area networks. IEEE Trans. Consum. Electron. 2012, 58, 284–292. [Google Scholar] [CrossRef]
  25. Torabi, N.; Leung, V.C.M. Cross-Layer Design for Prompt and Reliable Transmissions over Body Area Networks. IEEE J. Biomed. Health Inf. 2014, 18, 1303–1316. [Google Scholar] [CrossRef] [PubMed]
  26. Moosavi, H.; Bui, F.M. Optimal Relay Selection and Power Control with Quality-of-Service Provisioning in Wireless Body Area Networks. IEEE Trans. Wirel. Commun. 2016, 15, 5497–5510. [Google Scholar] [CrossRef]
  27. Liang, L.; Ge, Y.; Feng, G.; Ni, W.; Wai, A.A.P. Experimental study on adaptive power control based routing in multi-hop Wireless Body Area Networks. In Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012. [Google Scholar]
  28. Reusens, E.; Joseph, W.; Latré, B.; Braem, B.; Vermeeren, G.; Tanghe, E.; Martens, L.; Moerman, I.; Blondia, C. Characterization of On-Body Communication Channel and Energy Efficient Topology Design for Wireless Body Area Networks. IEEE Trans. Inf. Technol. Biomed. 2009, 13, 933–945. [Google Scholar] [CrossRef] [PubMed]
  29. Moosavi, H.; Bui, F.M. Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1928–1939. [Google Scholar] [CrossRef]
  30. Shi, L.; Yuan, J.; Yu, S.; Li, M. MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks. IEEE Int. Things J. 2015, 2, 52–62. [Google Scholar] [CrossRef]
  31. Waheed, M.; Ahmad, R.; Ahmed, W.; Drieberg, M.; Alam, M.M. Towards Efficient Wireless Body Area Network Using Two-Way Relay Cooperation. Sensors 2018, 18, 565. [Google Scholar] [CrossRef] [PubMed]
  32. Kamiya, Y. Digital Wireless Communication Technologies with MATLAB, 1st ed.; Corona Publishing Co., Ltd.: Tokyo, Japan, 2008; pp. 168–169. ISBN 978-4-339-00800-5. (In Japanese) [Google Scholar]
  33. Yazdandoost, K.Y.; Sayrafian-Pour, K. Channel Model for Body Area Network (BAN). IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs), IEEE P802.15-08-0780-10-0006. 2009. Available online: https://mentor.ieee.org/802.15/file/08/15-08-0780-10-0006-tg6-channel-model.pdf (accessed on 28 September 2018).
  34. Karvonen, H.; Iinatti, J.; Hämäläinen, M. A cross-layer energy efficiency optimization model for WBAN using IR-UWB transceivers. Telecommun. Syst. 2015, 58, 165–177. [Google Scholar] [CrossRef]
  35. Abughalieh, N.; Steenhaut, K.; Nowé, A.; Anpalagan, A. Turbo codes for multihop wireless sensor networks with decode-and-forward mechanism. EURASIP J. Wirel. Commun. Netw. 2014, 204, 1–13. [Google Scholar]
  36. Ryckaert, J.; Desset, C.; Fort, A.; Badaroglu, M.; De Heyn, V.; Wambacq, P.; Van der Plas, G.; Donnay, S.; Van Poucke, B.; Gyselinckx, B. Ultra-wide-band transmitter for low-power wireless body area networks: Design and evaluation. IEEE Trans. Circuits Syst. I Regul. Pap. 2005, 52, 2515–2525. [Google Scholar] [CrossRef]
  37. Zou, Z.; Mendoza, D.S.; Wang, P.; Zhou, Q.; Mao, J.; Jonsson, F.; Tenhunen, H.; Zheng, L.R. A Low-Power and Flexible Energy Detection IR-UWB Receiver for RFID and Wireless Sensor Networks. IEEE Trans. Circuits Syst. I Regul. Pap. 2011, 58, 1470–1482. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.