Next Article in Journal
Assessment of the Effect of Four Kneeling Chair Angle Combinations on Muscle Activity and Perceived Discomfort
Previous Article in Journal
Feasibility Domain Construction and Characterization Method for Intelligent Underground Mining Equipment Integrating ORB-SLAM3 and Depth Vision
Previous Article in Special Issue
Sign2Story: A Multimodal Framework for Near-Real-Time Hand Gestures via Smartphone Sensors to AI-Generated Audio-Comics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Nash Bargaining-Based Hybrid MAC Protocol for Wireless Body Area Networks

College of Computer Science, Beijing University of Technology, Beijing 100124, China
*
Author to whom correspondence should be addressed.
Sensors 2026, 26(3), 967; https://doi.org/10.3390/s26030967 (registering DOI)
Submission received: 10 December 2025 / Revised: 22 January 2026 / Accepted: 29 January 2026 / Published: 2 February 2026
(This article belongs to the Special Issue Body Area Networks: Intelligence, Sensing and Communication)

Abstract

Wireless Body Area Network (WBAN) is an emerging medical health monitoring technology. However, WBANs encounter critical challenges in balancing reliability, energy efficiency, and Quality of Service (QoS) requirements for life-critical medical data. The design of its Medium Access Control (MAC) protocol has challenges since dynamic body-shadowing effects and heterogeneous traffic patterns. In this paper, we propose the Nash Bargaining Rate-optimization MAC (NBR-MAC), a hybrid MAC protocol that integrates TDMA-based Guaranteed Time Slots (GTS) with CSMA/CA-based contention access. Unlike traditional schemes, we model the rate allocation as an Asymmetric Nash Bargaining Game, introducing a rigorous disagreement point to guarantee minimum service for critical nodes. The utility function is normalized to resolve dimensional inconsistencies, incorporating sensor priority, buffer status, and channel quality. The Nash Bargaining solution is derived after proving convexity and verifying the axioms. Superframe time slots are allocated based on sensor data priority. Simulation results demonstrate that the proposed protocol enhances transmission success ratio and throughput while reducing packet age and energy consumption under different load conditions.

1. Introduction

Global population aging and escalating chronic disease prevalence are placing unprecedented strain on traditional healthcare systems, as conventional monitoring approaches fall short of the urgent demand for real-time, continuous health surveillance. This gap underscores the critical need for innovative technologies that enable early disease warning and proactive health management. Wireless Body Area Networks (WBANs), integrating wearable and implantable sensors with smart terminals via short-range wireless communication, emerge as a pivotal enabler for intelligent, personalized healthcare monitoring beyond spatial and temporal constraints [1]. Besides healthcare, WBAN can also be applied in the fields of military, industry, emergency services, rehabilitation, special assistance, sports, entertainment, fitness, consumer electronics, and so on.
The general network architecture of an eHealth system based on WBANs is typically divided into four tiers, each responsible for different functions to ensure the efficiency and reliability of data transmission and management [2], as shown in Figure 1.
The first tier is WBAN, which comprises wearable or implantable sensors that continuously acquire physiological signals, such as heartbeats, body temperatures, EMG, EEG, and ECG. Motion sensors extract discriminative features to classify various postures and movements, including lying, sitting, walking, and running. Sensed data are transmitted to the WBAN coordinator or other personal center devices, such as a smartphone, PDA, laptops, or service robot. Commonly adopted short-distance wireless communication technologies encompass Wi-Fi, Bluetooth, and ZigBee.
The second tier is edge computing. WBANs send data through the Access Point (AP) or the gateway. MEC servers are deployed at the network edge in close proximity to end users. Unmanned Aerial Vehicles (UAVs) provide mobile and flexible computational services. This tier performs real-time preprocessing, feature extraction, and anomaly detection to ensure low-latency feedback while reducing transmission overhead.
The third tier is cloud computing. The remote cloud servers conduct scalable storage and computationally intensive analytics, including machine learning model training, statistical processing, longitudinal trend analysis, and multi-patient data fusion, provisioning backend services to upper layers.
The fourth tier is application. It delivers role-based end-user services through intuitive dashboards for clinicians and patients. It enables interactive data visualization, intelligent alert management, and AI-driven personalized health recommendations. Beyond routine monitoring, this layer facilitates remote expert consultation and collaborative decision-making via secure Internet channels. Critically, it integrates automated emergency response protocols: upon detecting life-threatening events (e.g., myocardial infarction), the system instantaneously triggers location-aware alerts to the nearest emergency medical services, ensuring rapid clinical intervention.
A number of communication standards are suitable for WBANs, including the IEEE 15.4 [3] and the IEEE 802.15.6 [4]. The IEEE 802.15.4 standard is a widely recognized specification for Low-Rate Wireless Personal Area Networks (LR-WPANs), designed to support low-complexity, low-power consumption, and low-cost devices. The IEEE 802.15.6 standard is designed for WBANs, providing low-power communication solutions for both medical and non-medical applications. The standard defines three physical layers (PHY): narrowband (NB), ultra-wideband (UWB), and human-body communication (HBC), each tailored to different application requirements.
The Medium Access Control (MAC) protocol plays a crucial role in ensuring efficient and reliable communication within WBANs. The primary function of the MAC protocol is to coordinate collision-free data transmission among multiple nodes within the same network. In WBANs, different sensor nodes undertake various sensing tasks, and thus, the transmission rate and delay requirements for each sensor to transmit collected data to the coordinator vary. The MAC protocol needs to assign appropriate access schemes to the nodes in the network and schedule the optimal transmission timing based on the QoS requirements of different sensors, thereby avoiding collisions when different nodes transmit control frames and data frames.
To address these issues, this paper proposes a Nash Bargaining Rate-optimization MAC (NBR-MAC) protocol for Wireless Body Area Networks, a hybrid MAC protocol that integrates TDMA-based Guaranteed Time Slots (GTS) with CSMA/CA-based contention access. We formulate the transmission rate optimization problem as a cooperative game. The utility function is normalized to resolve dimensional inconsistencies, incorporating sensor priority, buffer status, and channel quality. Then, we prove the convexity and verify the four axioms of the Nash Bargaining Solution (NBS). The NBS is derived by convex optimization problem. After that, the superframe structure is introduced. The time-slot sharing strategy is designed based on the data priority of the sensor nodes. Simulation results exhibit that the proposed protocol improves the network performance, including transmission success ratio, throughput, packet age, and energy consumption.
The remainder of this paper is organized as follows. In Section 2, we review the related studies. Section 3 presents the NBR-MAC protocol. In Section 4, we discuss the performance evaluation. Conclusions and future work are presented in Section 5.

2. Related Work

Since MAC protocol is the essential for WBANs, numerous MAC protocols have been proposed [5].
Dam et al. [6] propose the T-MAC, a contention-based MAC protocol, with an adaptive duty cycle by dynamically ending the active part of it to reduce energy consumption. Touijer et al. [7] propose a backoff counter selection mechanism and a contention window adjustment strategy, validating their effectiveness using the UPPAAL-SMC model checking tool. Experimental results showed that this method reduced collisions, improved data transmission success ratio and energy efficiency, and optimized the communication performance of WBANs. Liang et al. [8] propose a Priority Ladder Resource Scheduling (PLRS) scheme, which optimizes resource scheduling. This is achieved through multi-level priority division, ladder slot allocation, and interval-based task ordering. It divides data priorities into four levels and adopts a round-by-round slot allocation method to ensure timely data transmission for high-priority nodes while improving network fairness. Shunmugapriya et al. [9] propose a three-layer hybrid architecture combining TDMA and CDMA to reduce signal interference. It uses TDMA for slot allocation to reduce interference between in-body sensors and combines CDMA coding transmission to avoid signal conflicts between different WBAN devices.
Olatinwo et al. [10] propose the SDC-HYMAC protocol, which introduces a priority-based slot allocation strategy to reduce energy consumption. It dynamically selects superframe order based on traffic information and biomedical device priority. Sakib et al. [11] introduce the EQPD protocol, designed to ensure end-to-end quality of service (QoS) by integrating the application, network, and MAC layers. It is particularly effective in heterogeneous data IoTs. Mkongwa et al. [12] propose an enhanced CSMA/CA protocol, which reconstructs the traditional fixed backoff window into four progressive intervals. It also adopts a single-phase CCA rule to improve transmission efficiency of real-time sensitive data. Saneetha et al. [13] propose a MVDR approach, which features an adaptive resource allocation system. This system includes a real-time priority module to track data stream characteristics and a predictive module that employs the Resnick formula to analyze historical data. The coordinator dynamically expands CFP length based on real-time load.
Azdad et al. [14] proposed FOTA-MAC with two versions: V1 uses a historical load-based dynamic CAP adjustment algorithm, which is suitable for scenarios with large load fluctuations such as sudden medical data. V2 adopts a traffic-isolated CAP mechanism, dividing the superframe into CAP1 for light traffic and CAP2 for heavy traffic. The coordinator adjusts the CAP partition ratio via node buffer status parsed from data frame reserved fields. Olatrinwo et al. [15] propose MDP-HYMAC based on Markov Decision Process. It models the system with a 5-tuple, solves the optimal strategy via value iteration, and uses a five-state machine model for sensors.
Ferreira et al. [16] propose CAG, which converts gait characteristics into MAC scheduling parameters by analyzing IEEE 802.15.6 beacon RSSI, and switches to default TDA mode for non-periodic movement to complement PBDT’s adaptation. Zia et al. [17] propose G-MAC, classifying buffered traffic into three priorities. Its core innovation is a dynamic resource allocation algorithm based on BSF frames (Buffer Status Frames). This algorithm operates independently of the superframe cycle, ensuring real-time resource allocation and avoiding protocol overhead interference. Al Masud et al. [18] propose Delay-tolerant MAC, reconstructing medical WBAN QoS via six-dimensional severity levels. Das et al. [19] propose CRITIC scheme, which divides the beacon cycle into dynamic EAP, fixed RAP, and dynamic MAP. Its priority scoring integrates five parameters: user priority, buffer occupancy status, packet size, data transmission rate, and packet generation rate.
Siddik et al. [20] propose E-MAC, which compresses the eight original UP levels into four and simplifies the superframe to RAP/MAP/CAP. Su et al. [21] propose MDP-MAC, which employs a reinforcement learning framework that integrates Q-learning with FDMA. The process is divided into two phases: a learning phase and an application phase. Hu et al. [22] propose PASA, which divides the sensor cycle into six coordinated phases: reservation period, activation period, energy harvesting period, upload period, and saving period. This joint optimization enables continuous operation under 0.5 W/m2 RF field strength. Gao et al. [23] propose BT-MAC with three superframe models. Type A for regular data using simplified B-MAP1, with nodes sleeping in inactive periods for 0.5 mW low power. Type B separating alarm frames and emergency data in EP phase (EAP + RAP). Type C adding MAP2 for unresolved collisions and using TDMA for zero-collision emergency transmission.
Wan Hassan et al. [24] proposed HB-MAC, which divides the 32-slot superframe into RAP for bursty data and MAP for deterministic ECG transmission. Rana et al. [25] propose MMH-MAC, an intelligent adaptive MAC protocol using deep learning. It employs Q-learning to adjust superframe structures, thus optimizing time-slot resources. It improves real-time performance and reliability in high-load scenarios, suitable for low-latency medical IoT. Wan Hassan et al. [26] propose Poll-based MAC. This protocol divides the superframe into three phases: Beacon, RAP, and scheduling cycle. The key innovation is dynamic polling. When nodes detect emergency data, they set the MoreData flag. The coordinator then dynamically allocates additional resources in subsequent cycles through Poll-embedded ACK frames. The i-MAC [27] devises a superframe structure that distinctly separates access for emergency and regular events. The access is scheduled based on node priority.
In [28], the authors propose EE-DCAA, a channel allocation approach which is compatible with the IEEE 802.15.6 standard. It employs both polling and contention access methods. In [29], the authors propose MG-HYMAC, a hybrid MAC protocol, in which the duty cycle operations and transmission scheduling scheme are joined to reduce the power consumption. In [30], the authors propose DeepBAN, which uses temporal convolution network (TCN)-based deep learning to predict the channel condition. The algorithm integrally considers power control, time-slot allocation, and relay node selection.
In [31], a bargaining-based optimal slot sharing (BOSS) mechanism was put forward by the authors to tackle the optimization issue related to time-slot allocation for sensor nodes. Similarly, the LTA framework [32] utilizes a multi-agent reinforcement learning (MARL) approach where each node acts as an agent, finding an optimal slot in a TDMA schedule. The decision-making is guided by a composite reward function that balances transmission delay and node temperature, making it particularly suitable for implantable devices.
To clarify the contributions of NBR-MAC, Table 1 compares it with relevant protocols.
Unlike BOSS [31], which relies on standard bargaining for slot sharing, NBR-MAC incorporates a contention period for overflow traffic and uses an asymmetric bargaining solution to explicitly favor high-urgency medical data during emergency bursts.
Existing MAC protocols for WBANs have several limitations. These protocols often struggle with energy efficiency due to issues such as idle listening, collisions, and the need for frequent synchronization. They may also fail to effectively handle the dynamic and heterogeneous traffic patterns inherent to WBANs, leading to poor spectral efficiency and increased latency. Additionally, many existing protocols lack mechanisms to prioritize emergency traffic, which is crucial for medical applications.

3. Nash Bargaining Rate-Optimization MAC Protocol for WBANs

We propose a Nash Bargaining Rate-optimization MAC (NBR-MAC) protocol for Wireless Body Area Networks. In this scheme, we model the transmission rate optimization problem as a cooperative game. The utility function is defined based on four sensor state factors, including transmission success ratio, buffer occupancy, buffer age, and data urgency. After proof of convexity and verification of Nash Bargaining axioms, the Nash Bargaining Solution (NBS) is calculated. The superframe is divided into four periods. The time slots within the superframe are shared based on the priority of the sensor data. The Guaranteed Time Slots (GTS) in the Contention-Free Period (CFP) are allocated to the sensor nodes with higher priority. The remining nodes transmit data in the Contention Access Period (CAP) under the CSMA/CA mechanism.

3.1. Network Model

In this subsection, we present the modeling of a single-hop star topology WBAN, which is a prevalent network configuration due to its simplicity and efficiency for short-range communication. In a single-hop star topology WBAN, the network architecture consists of a central coordinator and multiple sensor nodes that communicate directly with this coordinator. The sensor nodes are strategically placed to monitor various physiological parameters. The coordinator serves as the central hub, responsible for collecting data from all sensor nodes and forwarding it to a remote server or a healthcare provider. This direct communication minimizes latency and reduces the complexity of multi-hop routing, which is beneficial for real-time health monitoring applications.
Let SN be the set of sensor nodes in a single-hop star topology WBAN, and C be the coordinator. The network can be represented as {SN, C}, where each node iSN communicates directly with C. Figure 2 depicts the WBAN architecture with star topology. When node i transmits data to the coordinator, interference from other sensor nodes may cause collisions.

3.2. Cooperative Game Model

Game theory is a branch of applied mathematics that studies strategic interactions among rational decision-makers. It examines how participants make choices to maximize their own payoffs, given the strategies chosen by others. Based on whether the participants can reach a binding agreement, games can be divided into two major categories: cooperative games and non-cooperative games. If participants, starting from their own interests, reach agreements or form coalitions with other participants, it is considered a cooperative game.
Wireless Body Area Networks (WBANs) exhibit application heterogeneity, resulting in markedly diverse traffic patterns and data rate requirements. Moreover, WBAN traffic demonstrates inherent burstiness, characterized by transient intervals of significantly elevated transmission rates. Additionally, there are other QoS requirements such as latency and reliability.
In this work, we apply the cooperative game model. Potential game modeling of WBAN system is carried out from three elements of the game, which are players, strategy space, and utility function. The data transmission rate optimization game can be defined as G = <P, S, U>. P, S, U are players, strategy space, and utility function, respectively. Specific descriptions are as follows.

3.2.1. Player

Each sensor node is regarded as a player in the game. P = SN = {1, 2, …, N} represents the set of sensor nodes of the WBAN. We assume sensor nodes can cooperate with each other.

3.2.2. Strategy Space

The strategy space (S) is defined as the set of transmission rates (R) of sensor nodes. S = R = {R1, R2, …, Ri, …, RN}. Ri,t is the transmission rate of sensor node i at time t.

3.2.3. Priority-Based Utility Formulation

To capture the heterogeneity of WBAN traffic, we formulate the utility function based on the Asymmetric Nash Bargaining Framework. Unlike traditional approaches that treat all nodes equally, we introduce a Dynamic Priority Weight ( α i , t ) for each sensor node, which serves as the exponent in the Nash Product. This weight dictates the “bargaining power” of a node and is synthesized from four key sensor states:
1.
Reliability Factor ( ψ r e l ):
To ensure fairness, nodes with historically poor channel conditions (low transmission success ratio, ρ i , t ) should be compensated, but not to the extent of wasting bandwidth. We define the normalized reliability factor as
ψ r e l = e x p ρ i , t ρ t a r g e t
where ρ t a r g e t is the expected reliability threshold.
2.
Buffer Occupancy Factor ( ψ b u f )
A higher buffer occupancy indicates a risk of packet drop. Let B i , t be the current buffer length and B i m a x be the buffer capacity. The buffer occupancy factor is modeled as
ψ b u f = B i , t B i m a x
3.
Data Freshness Factor ( ψ a g e )
For medical monitoring, data staleness can be critical. We define the age factor based on the average waiting time A i , t of the head-of-line packet:
ψ a g e = A i , t A m a x
where A m a x is the maximum tolerance delay.
4.
Data Urgency ( ψ u r g )
D i , t 1 , , K represents the discrete urgency level of the physiological data (e.g., normal vs. cardiac arrest).
ψ u r g = D i , t K
5.
Synthesis of Priority Weight
The composite priority weight α i , t is a weighted sum of these normalized factors:
α i , t = w 1 ψ r e l + w 2 ψ b u f + w 3 ψ a g e + w 4 ψ u r g
where w k = 1 are tuning coefficients determined by the specific medical application scenario.
6.
Utility Function Definition
Based on the derived weight α i , t , the utility function of node i represents the transmission rate gain above the minimum requirement R i m i n (the disagreement point). It is defined as
U i ( R i , t ) = R i , t R i m i n
By maximizing the Asymmetric Nash Product U i α i , t , the protocol ensures that nodes with higher α i , t (i.e., higher urgency or congestion) are allocated a larger proportion of the residual channel capacity, effectively mapping the complex sensor states to the optimal rate allocation.

3.3. Asymmetric Nash Bargaining Formulation

Traditional Nash Bargaining Solutions assume symmetry, implying all players have equal bargaining power. However, WBAN nodes have heterogeneous QoS requirements. To strictly enforce the priorities defined in Section 3.2.3, we formulate the rate allocation problem using the Asymmetric Nash Bargaining Solution (ANBS). The goal is to maximize the weighted product of the players’ utility gains:
max R i = 1 N R i , t R i m i n a i , t
Subject to the following feasibility constraints:
R i , t R i m i n i S N
i = 1 N R i , t C
Here, R i , t is the transmission rate allocated to node i , and C is the total available capacity of the superframe. The exponent α i , t is the dynamic priority weight derived in Equation (5). This formulation ensures that nodes with higher urgency ( α i , t ) require a larger marginal increase in rate to satisfy the maximization condition, effectively prioritizing emergency traffic.

3.3.1. Proof of Convexity

To ensure the proposed solution is globally optimal and computationally tractable, we verify the convexity of the optimization problem. Since the logarithmic function is monotonically increasing, maximizing the product is equivalent to maximizing the sum of logarithms:
F R = ln i = 1 N R i , t R i m i n α i , t = i = 1 N α i , t ln R i , t R i m i n
We examine the second-order derivative (Hessian) of the objective function F R with respect to the decision variable R i , t :
F R i , t = α i , t R i , t R i m i n
2 F R i , t 2 = α i , t R i , t R i m i n 2
Since priority weights α i , t > 0 and the square term is always positive, the second derivative is strictly negative ( 2 F R 2 < 0 ). This confirms that the objective function is strictly concave.
Furthermore, the feasible region is defined by linear inequality constraints ( R i , t R i m i n and i = 1 N R i , t C ), which form a convex polyhedron (simplex). Maximizing a strictly concave function over a convex set guarantees the existence of a unique global optimal solution. This mathematically validates the stability of the NBR-MAC protocol.

3.3.2. Verification of Nash Bargaining Axioms

The Nash Bargaining solution requires the utility function to satisfy four axioms: Pareto optimality, Symmetry, Independence of Irrelevant Alternatives (IIA), and Scale invariance.
1.
Pareto optimality
Pareto optimality holds if, and only if, no utility improvement for any node is possible without reducing that of at least one other node. In this model, the transmission rate optimization of sensor nodes is constrained by the channel capacity C, described by Equation (9). Increasing R i , t for one node necessarily results in a decrease in R j , t for other nodes. Therefore, the utility function satisfies Pareto optimality.
2.
Independence of irrelevant alternatives (IIA)
The requirement of independence of irrelevant alternatives states that if certain infeasible rate allocation schemes are removed from the set of options, and the optimal solution remains feasible within the remaining set, then the optimal solution should not change. Let the original optimal solution be
R i * = argmax i = 1 N U i R i , t d i
Assuming that a non-optimal scheme is removed from the feasible set, since the NBS depends only on the optimal point and constraints, it is not affected by irrelevant schemes. Therefore, the utility function satisfies the independence of irrelevant alternatives.
3.
Symmetry
From the utility function defined in Equation (6), it can be seen that if two sensor nodes i and j have the same parameters, their utility functions satisfy
U i R i , t = U j R j , t
During the optimization process, since all nodes use the same objective function and constraints, under identical conditions, the two nodes should receive symmetric resource, thereby ensuring that the utility function satisfies the symmetry axiom.
4.
Scale invariance
Scale invariance requires that a linear transformation of the utility function does not affect the optimal solution. Let the linear transformation of the utility function be
U i R i , t = a U i R i , t + b
where a > 0 . The optimization objective then becomes
max V i , t i = 1 N a U i R i , t + b d i
Since a > 0 , taking the logarithm yields
m a x V i , t i = 1 N ln a U i R i , t + b d i
Using the properties of logarithms, we obtain
m a x V i , t i = 1 N ln a + ln U i R i , t + b d i a
The constant term ln a does not affect the optimization variable. Since a > 0 and b is a constant, the structure of the optimization objective remains unchanged. Given that the NBS relies solely on the differences in relative utilities, it is evident that this linear transformation does not influence the selection of the optimal solution. The utility function satisfies scale invariance.

3.3.3. Solution of the Bargaining Problem

L R ,   λ = i = 1 N α i , t   ln R i , t R i m i n λ i = 1 N R i , t C
where λ >   0 is the Lagrange multiplier associated with the capacity constraint. According to the Karush–Kuhn–Tucker (KKT) conditions, the optimal solution must satisfy the stationarity condition, where the partial derivative with respect to each transmission rate R i , t is zero:
L R i , t = α i , t R i , t R i m i n λ = 0
Rearranging this equation gives the expression for the transmission rate of node i in terms of λ :
R i , t = R i m i n + α i , t λ
To determine the value of λ , we sum Equation (21) over all N sensor nodes and apply the channel capacity constraint ( i = 1 N R i , t = C ):
i = 1 N R i , t R i m i n = i = 1 N α i , t λ = 1 λ i = 1 N α i , t
and
C i = 1 N R i m i n = 1 λ i = 1 N α i , t
Solving for the Lagrange multiplier λ :
λ = i = 1 N α i , t C j = 1 N R j m i n
Finally, by substituting λ back into Equation (21), we obtain the optimal transmission rate allocation for each sensor node i :
R i , t * = R i m i n + α i , t k = 1 N α k , t C j = 1 N R j m i n
Equation (25) demonstrates that the NBR-MAC protocol allocates resources in two stages:
Every node first receives its minimum required rate R i m i n ensure basic connectivity and avoid starvation.
Priority-based Surplus Sharing: The residual channel capacity ( C r e s = C R j m i n is distributed among nodes proportional to their dynamic priority weights α i , t .
This mechanism ensures that nodes with a high data urgency or buffer congestion (large α i , t ) receive a significantly larger share of the available bandwidth, strictly adhering to the Asymmetric Nash Bargaining axioms.
Complexity Analysis: The proposed NBR-MAC solution (Equation (25)) provides a closed-form expression, which avoids iterative computations typical in gradient-based methods. The computational complexity for calculating the rates of N nodes is O N , which is linear and highly efficient for resource-constrained WBAN coordinators. The signaling overhead is minimal, as state variables (buffer, age) are piggybacked on data frames or short beacon requests.

3.4. Priority-Based Time Resource Scheduling

This subsection describes the design of the priority-based time-resource scheduling of NBR-MAC protocol, including node priority classification, superframe structure, and the time-slot share. After the optimal transmission rates are determined via the asymmetric Nash Bargaining solution, the superframe structure, node priority classification, and time-slot sharing strategy are designed to translate the optimized rates into concrete MAC-layer scheduling decisions. This hybrid scheduling mechanism integrates guaranteed time-slot allocation with contention-based access, thereby satisfying the stringent latency requirements of high-priority medical data while maintaining fairness among lower-priority traffic.

3.4.1. Node Priority

Sensor nodes in WBANs collect and transmit various types of data during medical monitoring. Sensor nodes can be classified according to the data’s priority. Different types of data have different requirements for delay, reliability, and energy consumption. Considering the importance and real-time requirements of data in actual medical applications, the data transmitted in WBANs are classified into the following three categories:
1.
Emergency data (P1)
This includes randomly generated abnormal alarm information or data from medical emergencies, such as arrhythmia alerts and postoperative monitoring data. Once generated, these data often have extremely high requirements for transmission delay and reliability.
2.
Periodic data (P2)
This mainly refers to vital sign parameters (such as heart rate, blood pressure, and body temperature) that are periodically collected and reported by sensor nodes. The collection frequency is relatively constant, and they have certain requirements for delay and bandwidth, but not as urgent as emergency data.
3.
General data (P3)
This refers to daily health monitoring or auxiliary information with lower sensitivity to delay, such as activity tracking and sleep quality records. These data do not require an immediate response and have a higher tolerance.

3.4.2. Superframe Structure

In WBANs, the superframe is typically divided into four phases: beacon, Contention-Free Period (CFP), Contention Access Period (CAP), and inactive period, as shown in Figure 3.
1.
Beacon
The coordinator periodically broadcasts a beacon frame to the entire network, synchronizing the clocks of all nodes and providing network management information, such as network status, available channel information, and node join or leave.
2.
Contention-Free Period (CFP)
To meet the transmission needs of high-priority or delay-sensitive services, the superframe includes a Contention-Free Period (CFP). Composed of Guaranteed Time Slots (GTS) allocated to specific nodes, the CFP provides exclusive channel access without CSMA/CA contention. This contention-free mechanism ensures high-reliability and low-delay, making it particularly suitable for emergency medical data or data streams with stringent timeliness requirements.
3.
Contention Access Period (CAP)
Nodes in this period use a contention mechanism (e.g., CSMA/CA) to compete for channel access rights, suitable for transmitting general or low-priority data. If some nodes are idle or have no data to send, they can choose to sleep during this phase to save energy. Compared with CFP, although contention access may incur collisions, it can fully utilize idle time slots and improve the overall network throughput.
4.
Inactive Period
In this phase, nodes can enter a deep sleep state to maximize energy savings, especially suitable for sensor nodes with strict energy constraints. Nodes stop sending or receiving operations during this period and wait for the next superframe to start. The setting of the inactive phase not only extends the network’s lifespan but also reduces unnecessary air interface signal interference.

3.4.3. Time-Slot Sharing

The NBR-MAC protocol dynamically adjusts transmission rates and allocates time slots to sensor nodes to transmit data to the coordinator. According to the status of sensor nodes, including the transmission success ratio, buffer occupancy, buffer age, and data urgency, the transmission rates are calculated using the Nash Bargaining solution in Equation (25).
To translate the optimized transmission rate into practical MAC resources, we define the mapping mechanism between the calculated rate R i , t * and the number of Guaranteed Time Slots (GTS). Let T S F be the superframe duration and L s l o t denote the effective data carrying capacity of a single time-slot in bits. The number of allocated GTSs N i , t G T S for sensor node i is determined by
N i , t G T S = R i , t * × T S F L s l o t
where denotes the ceiling function. This rounding ensures that the allocated bandwidth meets or slightly exceeds the target rate to satisfy strict reliability requirements. Based on this mapping, nodes with higher urgency (resulting in a higher R i , t * ) are assigned more time slots in the Contention-Free Period (CFP), effectively prioritizing emergency and periodic traffic over general data.
NBR-MAC employs a priority-aware time-slot sharing strategy that simultaneously ensures timeliness, transmission fairness, and energy efficiency, while providing enhanced transmission guarantees for critical data. The time slots in CFP are allocated to the emergency data (P1) and periodic data (P2) as GTS, in order of priority, with P1 taking precedence. In the case of GTS shortage, the evicted sensor nodes compete in the CAP. For general data (P3) nodes, they only compete for the time slots in the CAP phase through the CSMA/CA mechanism for random access. P3 employs exponential backoff after unsuccessful transmission. Contention window parameters are differentiated by priority level, enabling prioritized channel access. This mechanism ensures that emergency data have higher priority during contention access and experience shorter backoff intervals. Contention window ranges by priority level are listed in Table 2.
The complete resource allocation and scheduling procedure executed at the coordinator is summarized in Algorithm 1.
Algorithm 1: NBR-MAC Resource Allocation at Coordinator
Input:
    SN = {1, 2,…, N}           // Set of sensor nodes
    C            // Total channel capacity per superframe
    R_i^min           // Minimum required rate of node i
    T_sf            // Superframe duration
    S_slot           // Effective payload per time slot
 
Output:
    R_i            // Allocated transmission rate for node i
    GTS_i            // Number of GTSs allocated to node i
 
1:  Initialization:
2:   For each node i ∈ SN do
3:    Initialize buffer length B_i, packet age A_i, urgency level U_i
4:    Initialize transmission success ratio TSR_i
5:   End for
 
6:  /* State Collection Phase */
7:  At the end of each superframe:
8:   Coordinator collects from each node i:
9:    - Buffer occupancy B_i
10:     - Head-of-line packet age A_i
11:     - Urgency indicator U_i
12:     - Packet reception ratio TSR_i of previous superframe
 
13: /* Priority Weight Calculation */
14: For each node i ∈ SN do
15:    Compute reliability factor:
16:     f_i^rel = min(1, TSR_th/TSR_i)
17:    Compute buffer congestion factor:
18:     f_i^buf = B_i/B_i^max
19:    Compute data freshness factor:
20:     f_i^age = A_i/A_max
21:    Compute medical urgency factor:
22:     f_i^urg = U_i
23:    Synthesize priority weight:
24:     w_i = α·f_i^rel + β·f_i^buf + γ·f_i^age + δ·f_i^urg
25: End for
 
26: /* Asymmetric Nash Bargaining Rate Allocation */
27: Compute total residual capacity:
28:    C_res = C − ∑_(i∈SN) R_i^min
29: Compute sum of priority weights:
30:    W = ∑_(i∈SN) w_i
31: For each node i ∈ SN do
32:    Allocate transmission rate:
33:     R_i = R_i^min + (w_i/W) · C_res
34: End for
 
35: /* GTS Mapping and Scheduling */
36: For each node i ∈ SN do
37:    Map rate to number of GTSs:
38:     GTS_i = ceil( (R_i · T_sf)/S_slot )
39: End for
 
40: Sort nodes in descending order of priority (Emergency → Periodic → General)
 
41: Allocate GTSs in CFP:
42:    Assign GTSs to Emergency (P1) and Periodic (P2) nodes first
43:    If CFP slots are insufficient:
44:     Evicted nodes are scheduled to CAP
 
45: /* CAP Contention Access */
46: Nodes without GTS transmit in CAP using CSMA/CA:
47:    Apply priority-dependent contention window parameters
 
48: /* Inactive Period */
49: Nodes without pending data enter sleep mode to save energy
 
50: End Algorithm

4. Performance Evaluation

This section describes the computer simulation and performance analysis of the proposed NBR-MAC protocol for WBANs introduced in the previous section. The Castalia simulation tool within the OMNeT++ platform is used. The proposed algorithm is compared with the IEEE 802.15.6, IEEE 802.15.4, T-MAC, and BOSS. The network performance metrics are the transmission success ratio, packet age, throughput, and energy consumption.

4.1. Simulation Scenarios

The simulation employs a star topology, which is typical for WBANs in medical monitoring environments. The network consists of one coordinator and ten sensor nodes. Simulation parameters are listed in Table 3.
To evaluate the adaptability and robustness of the proposed NBR-MAC protocol under different network pressures, three network load levels are set based on two dimensions: data generation rate and the proportion of high-priority traffic. The traffic load types are demonstrated in Table 4.
These three load conditions emulate distinct medical scenarios, where an increasing node load amplifies both data volume and slot competition, comprehensively evaluating the protocol.
To explicitly simulate the dynamic environment of WBANs, we incorporated a Log-distance path loss model combined with lognormal shadowing (standard deviation σ = 4.0 dB) to reflect body-shadowing effects. The channel quality ρ i , t in the utility function is updated periodically based on the Packet Reception Ratio (PRR) of the previous superframe.
Furthermore, to ensure statistical validity, all simulation results are averaged over 50 independent runs with different random seeds. The results presented in the following sections represent the mean values, and the variance was observed to be within a 5% margin, ensuring the reliability of the performance comparison.
All simulation results represent the average of 50 independent runs to ensure statistical validity, with 95% confidence intervals calculated to verify that the margin of error remains within ±2% of the mean values.

4.2. Simulation Results and Analysis

4.2.1. Transmission Success Ratio

Transmission Success Ratio (TSR) is a reliability metric for the communication link, defined as the ratio of successfully transmitted data to the total amount of data attempted for transmission. It is influenced by channel state, interference level, network load, and transmission mechanisms.
Figure 4 depicts the TSR comparation of the proposed MAC with other four schemes under three traffic load types. Notice that the TSR of all protocols is greater than 95% under low-load conditions, indicating that when network resources are relatively abundant, all protocols can provide moderately reliable data transmission services. However, as network load increases, the performance differences among the protocols gradually become apparent. The NBR-MAC protocol achieves approximately 97.6% and 93% transmission success ratio under middle and high loads, respectively, significantly outperforming protocols such as IEEE 802.15.4, T-MAC, and BOSS. This is due to the dynamic scheduling strategy of the NBR-MAC protocol, which can respond in real-time to changes in network conditions and prioritize the transmission needs of emergency and periodic data, thereby effectively reducing the probability of data collisions and packet loss. In contrast, IEEE 802.15.4 and T-MAC protocols lack dynamic adjustment mechanisms and cannot timely alleviate network congestion under high-load conditions, leading to a significant decrease in the transmission success ratio.

4.2.2. Packet Age

We define the Packet Age (PA) as the time interval from data packet generation to successful reception. The calculation formula is as follows:
P A i t = t μ i
where t is the arrival time of data packet i, and μ i is the generation timestamp of packet i. The average packet age represents overall data timeliness.
Figure 5 demonstrates the simulation results of the average packet age under three traffic load types. As shown in the figure, with the increase in network load, the PA of all protocols shows varying degrees of upward trends. Among them, the PA of IEEE 802.15.4 increases sharply under middle- and high loads, reaching significantly high values, indicating that its data transmission is severely delayed and cannot meet the needs of real-time monitoring. In contrast, NBR-MAC maintains a relatively low PA under all load conditions. This is mainly due to its dynamic adjustment of data transmission rates and exclusive time-slot allocation mechanism for high-priority data, which effectively reduces data waiting time and enhances the timeliness and reliability of critical data.

4.2.3. Throughput

Throughput refers to the number of bits successfully received per unit time. The calculation formula is as follows:
T h r o u g h p u t = t o t a l   s u c c e s s f u l l y   d e l i v e r e d   b i t s   i n   Δ t Δ t
Figure 6 shows the simulation results of throughput under three traffic load types. At the low load type, throughput is comparable across protocols. However, as traffic increases, performance gaps widen and NBR-MAC establishes a clear advantage, particularly under high-load conditions. The throughput of NBR-MAC and BOSS is relatively close. This is because BOSS employs a slot allocation mechanism based on a cooperative game, enabling nodes to utilize channel resources more efficiently. However, BOSS lacks a contention phase, resulting in poorer flexibility and fairness. In contrast, NBR-MAC, through its dynamic rate adjustment mechanism, can more flexibly adapt to different load conditions. Moreover, by combining guaranteed time slots (GTS) with contention access (CAP), NBR-MAC not only ensures the needs of high-priority nodes but also takes into account the requirements of low-priority nodes.

4.2.4. Energy Consumption

We measure the energy consumption and then compare the average energy consumed for successfully transmitting per bit, which is calculated as follows:
E a v g = i = 1 N E i i = 1 N D i
where E i is the total energy consumed by node i, and D i is the amount of data successfully transmitted by node i. In WBANs, energy consumption directly affects the lifecycle of nodes, especially for energy-constrained medical sensor devices. The simulation results of energy consumption per bit under three traffic load types are demonstrated in Figure 7.
Under the low load type, energy consumption remains low across protocols. However, it rises markedly with load due to increased transmission and contention costs. NBR-MAC achieves the lowest energy consumption across all loads, attributed to its Nash Bargaining model that jointly optimizes transmission rates, GTS allocation, and CAP contention. IEEE 802.15.4 exhibits a steep energy-consumption increase under middle and high loads due to its limited energy control, which accelerates node depletion and shortens network lifespan. T-MAC and BOSS exhibit intermediate energy consumption, higher than NBR-MAC but lower than IEEE 802.15.4.
The proposed protocol increases the computational complexity and signaling overhead.

5. Conclusions

This paper proposes NBR-MAC, a hybrid MAC protocol for WBAN transmission optimization in complex environments based on a cooperative game. The transmission rate is adjusted to match network load dynamics, while node prioritization and strategic time-slot sharing reduce collisions, guarantee emergency data timeliness, and enhance stability. OMNeT++ simulations validate that NBR-MAC improves network performance, including transmission success ratio, packet age, throughput and energy consumption across load conditions, and significantly enhances WBAN reliability and timeliness. Future work will address NBR-MAC’s computational overhead from Nash Bargaining and validate its scalability on real WBAN testbeds under realistic mobility patterns.

Author Contributions

Conceptualization, H.S. and J.H.; methodology, H.S. and J.Y.; software, J.Y. and R.L.; validation, J.Y.; formal analysis, J.H.; investigation, H.S. and J.Y.; resources, J.H.; data curation, R.L.; writing—original draft preparation, H.S.; writing—review and editing, R.L. and J.H.; visualization, R.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Beijing Natural Science Foundation, grant number L222048.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
WBANWireless Body Area Network
LR-WPANLow-Rate Wireless Personal Area Network
IoTInternet of Things
MACMedium Access Control
QoSQuality of Service
UAVUnmanned Aerial Vehicle
NBR-MACNash Bargaining Rate-optimization MAC
CFPContention-Free Period
CAPContention Access Period
GTSGuaranteed Time Slot

References

  1. Taleb, H.; Nasser, A.; Andrieux, G.; Charara, N.; Cruz, E.M. Wireless technologies, medical applications and future challenges in WBAN: A survey. Wirel. Netw. 2021, 27, 5271–5295. [Google Scholar] [CrossRef]
  2. Yaghoubi, M.; Ahmed, K.; Miao, Y. Wireless body area network (WBAN): A survey on architecture, technologies, energy consumption, and security challenges. J. Sens. Actuator Netw. 2022, 11, 67. [Google Scholar] [CrossRef]
  3. IEEE 802.15.4-2011; IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) (Revision of IEEE Std 802.15.4-2006). IEEE SA: Piscataway, NJ, USA, 2011; pp. 1–314.
  4. IEEE 802.15.6-2012; IEEE Standard for Local and Metropolitan Area Networks—Part 15.6: Wireless Body Area Networks. IEEE SA: Piscataway, NJ, USA, 2012; pp. 1–271.
  5. Akbar, M.S.; Hussain, Z.; Sheng, M.; Shankaran, R. Wireless body area sensor networks: Survey of MAC and routing protocols for patient monitoring under IEEE 802.15.4 and IEEE 802.15.6. Sensors 2022, 22, 8279. [Google Scholar] [CrossRef]
  6. Dam, T.V.; Langendoen, K. An adaptive energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, 5–7 November 2003; pp. 171–180. [Google Scholar]
  7. Touijer, B.; Maissa, Y.B.; Mouline, S. IEEE 802.15.6 CSMA/CA access method for WBANs: Performance evaluation and new backoff counter selection procedure. Comput. Netw. 2021, 188, 107759. [Google Scholar] [CrossRef]
  8. Liang, B.; Obaidat, M.S.; Liu, X.; Zhou, H.; Dong, M. Resource scheduling based on priority ladders for multiple performance requirements in wireless body area networks. IEEE Trans. Veh. Technol. 2021, 70, 7027–7036. [Google Scholar] [CrossRef]
  9. Shunmugapriya, B.; Paramasivan, B. Design of three tier hybrid architecture combing TDMA-CDMA techniques to mitigate interference in WBAN. Wirel. Pers. Commun. 2022, 125, 1585–1614. [Google Scholar] [CrossRef]
  10. Olatinwo, D.D.; Abu-Mahfouz, A.M.; Hancke, G.P.; Myburgh, H.C. Energy efficient priority-based hybrid MAC protocol for IoT-enabled WBAN systems. IEEE Sens. J. 2023, 23, 13524–13538. [Google Scholar] [CrossRef]
  11. Sakib, A.N.; Drieberg, M.; Sarang, S.; Aziz, A.A.; Hang, N.T.T.; Stojanović, G.M. Energy-aware QoS MAC protocol based on prioritized-data and multi-hop routing for wireless sensor networks. Sensors 2022, 22, 2598. [Google Scholar] [CrossRef]
  12. Mkongwa, K.G.; Zhang, C.; Liu, Q. A reliable data transmission mechanism in coexisting IEEE 802.15.4-beacon enabled wireless body area networks. Wirel. Pers. Commun. 2022, 128, 1019–1040. [Google Scholar] [CrossRef]
  13. Sangeetha, R.; Gandhi, U.D. Correction: Priority based energy efficient MAC protocol by varying data rate for wireless body area network. Comput. Syst. Sci. Eng. 2024, 48, 859. [Google Scholar] [CrossRef]
  14. Azdad, N.; Elboukhari, M. A new highly efficient MAC protocol for WBAN: Exceptional performance in the face of selfish behaviors. Indones. J. Electr. Eng. Comput. Sci. 2024, 35, 1082–1090. [Google Scholar] [CrossRef]
  15. Olatinwo, D.D.; Abu-Mahfouz, A.M.; Hancke, G.P.; Myburgh, H.C. Markov-decision process-based energy-aware MAC protocol for IoT WBAN systems. IEEE Sens. J. 2024, 24, 27981–27997. [Google Scholar] [CrossRef]
  16. Ferreira, V.C.; Albuquerque, C.; Muchaluat-Saade, D.C. Channel-aware gait-cycle-based transmission in wireless body area networks. IEEE Sens. J. 2022, 22, 10009–10017. [Google Scholar] [CrossRef]
  17. Zia, Y.; Bashir, F.; Qureshi, K.N. Dynamic superframe adaptation using group-based media access control for handling traffic heterogeneity in wireless body area networks. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720949140. [Google Scholar] [CrossRef]
  18. Al Masud, S.M.R.; Saha, A.K. A delay-tolerant MAC protocol for emergency care in WBAN considering preemptive and non-preemptive methods. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 463–473. [Google Scholar] [CrossRef]
  19. Das, K.; Moulik, S.; Chang, C.Y. Priority-based dedicated slot allocation with dynamic superframe structure in IEEE 802.15.6-based wireless body area networks. IEEE Internet Things J. 2022, 9, 4497–4506. [Google Scholar] [CrossRef]
  20. Siddik, A.; Hasi, M.A.A.; Nitu, J.A.; Sarker, S.; Sultana, N. A modified IEEE 802.15.6 MAC scheme to enhance performance of wireless body area networks in E-Health applications. Int. J. Wirel. Mob. Netw. 2022, 14, 63–85. [Google Scholar] [CrossRef]
  21. Su, H.; Pan, M.-S.; Chen, H.; Liu, X. MDP-based MAC protocol for WBANs in edge-enabled eHealth systems. Electronics 2023, 12, 947. [Google Scholar] [CrossRef]
  22. Hu, J.; Xu, G.; Hu, L.; Li, S.; Xing, Y. An adaptive energy efficient MAC protocol for RF energy harvesting WBANs. IEEE Trans. Commun. 2023, 71, 473–484. [Google Scholar] [CrossRef]
  23. Gao, J.S.; Guo, K.Q. Research on high energy-efficient WBAN-MAC protocol for burst emergency traffic transmission. Comput. Digit. Eng. 2023, 51, 1343–1347. [Google Scholar]
  24. Hassan, W.H.W.; Ali, D.M.; Sultan, J.M.; Kassim, M. Hybrid medium access control protocol based on IEEE 802.15.6 for wireless body area network. Prz. Elektrotechniczny 2024, 7, 267–270. [Google Scholar] [CrossRef]
  25. Rana, S.U.; Hossain, M.; Kazary, S.; Rahman, O. Multi-Class Multi-Load Handling MAC Protocol for WBAN Based on IEEE 802.15.6 Standard Using Reinforcement Learning. In Proceedings of the 2024 IEEE International Conference on Computing, Applications and Systems (COMPAS), Cox’s Bazar, Bangladesh, 25–26 September 2024. [Google Scholar]
  26. Wan, H.W.H.; Ali, D.M.; Sultan, J.M. Emergency traffic handling in WBAN using polling-based access mechanism MAC protocol. In Proceedings of the 2024 IEEE 22nd Student Conference on Research and Development (SCOReD), Selangor, Malaysia, 19–20 December 2024; pp. 256–260. [Google Scholar]
  27. Misra, S.; Bishoyi, P.K.; Sarkar, S. i-MAC: In-body sensor MAC in wireless body area networks for healthcare IoT. IEEE Syst. J. 2021, 15, 4413–4420. [Google Scholar] [CrossRef]
  28. Ashraf, M.; Hassan, S.; Rubab, S.; Khan, M.A.; Tariq, U.; Kadry, S. Energy-efficient dynamic channel allocation algorithm in wireless body area network. Environ. Dev. Sustain. 2025, 27, 24135–24151. [Google Scholar] [CrossRef]
  29. Olatinwo, D.D.; Abu-Mahfouz, A.M.; Hancke, G.P. Energy-aware hybrid MAC protocol for IoT enabled WBAN systems. IEEE Sens. J. 2022, 22, 2685–2699. [Google Scholar] [CrossRef]
  30. Liu, K.; Ke, F.; Huang, X.; Yu, R.; Lin, F.; Wu, Y.; Ng, D.W.K. DeepBAN: A Temporal Convolution-Based Communication Framework for Dynamic WBANs. IEEE Trans. Commun. 2021, 69, 6675–6690. [Google Scholar] [CrossRef]
  31. Das, K.; Moulik, S. BOSS: Bargaining-based optimal slot sharing in IEEE 802.15. 6-based wireless body area networks. IEEE Internet Things J. 2021, 10, 2945–2953. [Google Scholar] [CrossRef]
  32. Mystica, K.J.; Manickam, J.M.L. Learning to allocate: A delay and temperature-aware slot allocation framework for WBAN with TDMA-MAC. Wirel. Netw. 2025, 31, 165–183. [Google Scholar] [CrossRef]
Figure 1. System architecture of general eHealth system based on WBANs.
Figure 1. System architecture of general eHealth system based on WBANs.
Sensors 26 00967 g001
Figure 2. WBAN architecture with star topology.
Figure 2. WBAN architecture with star topology.
Sensors 26 00967 g002
Figure 3. Superframe.
Figure 3. Superframe.
Sensors 26 00967 g003
Figure 4. Transmission success ratio under three traffic load types.
Figure 4. Transmission success ratio under three traffic load types.
Sensors 26 00967 g004
Figure 5. Average packet age under three traffic load types.
Figure 5. Average packet age under three traffic load types.
Sensors 26 00967 g005
Figure 6. Throughput under three traffic load types.
Figure 6. Throughput under three traffic load types.
Sensors 26 00967 g006
Figure 7. Energy consumption under three traffic load types.
Figure 7. Energy consumption under three traffic load types.
Sensors 26 00967 g007
Table 1. Comparison of MAC Protocols in WBAN.
Table 1. Comparison of MAC Protocols in WBAN.
ProtocolAccess MechanismOptimization GoalPriority SupportMathematical Model
IEEE 802.15.6Hybrid (CSMA + Polling)Reliability/PowerStatic (UP levels)None
T-MACContention-basedEnergy/Duty-cycleLowAdaptive Duty Cycle
BOSSTDMASlot AllocationMiddleStandard Nash Bargaining
NBR-MACHybrid (GTS + CSMA)Rate & LatencyDynamic (Urgency)Asymmetric Nash Bargaining
Table 2. Contention window ranges by priority level.
Table 2. Contention window ranges by priority level.
PriorityData CategoryCWminCWmax
P1Emergency Data14
P2Periodic Data28
P3General Data48
Table 3. Simulation parameters.
Table 3. Simulation parameters.
ParameterValue
Simulation Time100 s
Simulation Area10 m × 10 m
Number of Nodes11
Channel Fading ModelLog-distance Path Loss Model
Data Generation Rate3–12 pkt/s
Packet Size128–512 B
Frequency Band2400–2483.5 MHz
Superframe Order5
Slot Duration1.024 ms
Queue Size32 packets
Transmission Energy36.5 mW
Reception Energy41.4 mW
Sleep Energy42 μW
High-Priority Traffic Ratio10–30%
Table 4. Traffic load types.
Table 4. Traffic load types.
PriorityData Generation RateProportion of High-Priority Traffic
Low Load3–5 pkt/s10%
Middle Load5–8 pkt/s20%
High Load8–12 pkt/s30%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Su, H.; Yang, J.; Li, R.; He, J. Nash Bargaining-Based Hybrid MAC Protocol for Wireless Body Area Networks. Sensors 2026, 26, 967. https://doi.org/10.3390/s26030967

AMA Style

Su H, Yang J, Li R, He J. Nash Bargaining-Based Hybrid MAC Protocol for Wireless Body Area Networks. Sensors. 2026; 26(3):967. https://doi.org/10.3390/s26030967

Chicago/Turabian Style

Su, Haoru, Jiale Yang, Rong Li, and Jian He. 2026. "Nash Bargaining-Based Hybrid MAC Protocol for Wireless Body Area Networks" Sensors 26, no. 3: 967. https://doi.org/10.3390/s26030967

APA Style

Su, H., Yang, J., Li, R., & He, J. (2026). Nash Bargaining-Based Hybrid MAC Protocol for Wireless Body Area Networks. Sensors, 26(3), 967. https://doi.org/10.3390/s26030967

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop