Next Article in Journal
Estimation of Heart Rate Recovery after Stair Climbing Using a Wrist-Worn Device
Previous Article in Journal
Preparation of Selective and Reproducible SERS Sensors of Hg2+ Ions via a Sunlight-Induced Thiol–Yne Reaction on Gold Gratings
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fuzzy-Based Dynamic Time Slot Allocation for Wireless Body Area Networks

by
Sangeetha Pushpan
* and
Bhanumathi Velusamy
Department of Electronics and Communication Engineering, Anna University Regional Campus, Coimbatore 600 025, India
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(9), 2112; https://doi.org/10.3390/s19092112
Submission received: 25 March 2019 / Revised: 4 May 2019 / Accepted: 5 May 2019 / Published: 7 May 2019
(This article belongs to the Section Sensor Networks)

Abstract

:
With the advancement in networking, information and communication technologies, wireless body area networks (WBANs) are becoming more popular in the field of medical and non-medical applications. Real-time patient monitoring applications generate periodic data in a short time period. In the case of life-critical applications, the data may be bursty. Hence the system needs a reliable energy efficient communication technique which has a limited delay. In such cases the fixed time slot assignment in medium access control standards results in low system performance. This paper deals with a dynamic time slot allocation scheme in a fog-assisted network for a real-time remote patient monitoring system. Fog computing is an extended version of the cloud computing paradigm, which is suitable for reliable, delay-sensitive life-critical applications. In addition, to enhance the performance of the network, an energy-efficient minimum cost parent selection algorithm has been proposed for routing data packets. The dynamic time slot allocation uses fuzzy logic with input variables as energy ratio, buffer ratio, and packet arrival rate. Dynamic slot allocation eliminates the time slot wastage, excess delay in the network and attributes a high level of reliability to the network with maximum channel utilization. The efficacy of the proposed scheme is proved in terms of packet delivery ratio, average end to end delay, and average energy consumption when compared with the conventional IEEE 802.15.4 standard and the tele-medicine protocol.

1. Introduction

Wireless body area networks (WBANs) is growing rapidly due to the recent advancements in the fields of electronics, intelligent sensors, and wireless communication technologies [1]. WBAN is a type of wireless sensor network [2] that requires a number of nodes to be worn on the body or implanted within the human body to collect the health vital signs. It can also be considered as a subclass of wireless sensor networks (WSNs) [3,4] with certain specific characteristics that make the research challenges more exigent [5]. The sensors collect data periodically or aperiodically and route them through different body controller nodes using various routing protocols. A geographic delay tolerant network (DTN) routing protocol is presented in [6], with the primary objective to improve the routing efficiency and reduce the chance of selecting inappropriate nodes for routing. Greedy forwarding, perimeter forwarding, and DTN forwarding modes are used for efficient routing towards the destination. The paper [7] explained the need for programming frameworks and middlewares for collaborative body sensor networks (CBSNs) due to the complex system requirements of CBSNs, unlike star topology-based body sensor networks (BSNs). The paper presented a novel collaborative-signal processing in node environment (C-SPINE) framework for CBSNs. It was developed as an extension of Signal Processing In Node Environment (SPINE) middleware that was discussed in [8]. SPINE was designed to meet the high-level software abstraction and hardware constraints in single BSNs.
The medical applications of WBAN include daily monitoring of human health vital signs and detection of chronic diseases such that the treatment benefits the patient at an early stage. The challenging tasks in patient monitoring systems are high throughput, limited delay, and less energy consumption. However, the existing protocols are less efficient to meet these challenges. It means the body sensors must be low power devices with guaranteed reliability since battery replacement or recharging is difficult. Hence, this necessitates energy efficient and reliable MAC protocol. The IEEE 802.15.4 MAC is a low power standard with minimum delay requirements that is widely used in WBANs. However, it is less efficient in terms of delay, throughput, and energy consumption for periodic patient monitoring applications. In case of an unexpected event or life-critical applications, the channel and bandwidth utilization are poor for this standard. The two major channel access methods used in WBANs are carrier sense multiple access with collision avoidance (CSMA/CA) and time division multiple access (TDMA). In CSMA/CA, the nodes compete for the channel before the data transmission. In TDMA, each node can transmit during its assigned time slot. The total time is divided into equal time slots which are organized as superframes. In a superframe, a node can transmit data within a time slot.
In the IEEE 802.15.4 standard, the aontention access period (CAP) uses CSMA/CA and contention free period (CFP) uses guaranteed time slot (GTS) allocation based on TDMA [9]. There are some shortcomings in the case of life-critical WBAN applications with equal time slots. The first one is the bandwidth under-utilization, where nodes use only a small portion of the assigned slot. This leads to slot wastage which represents an empty slot in the CFP. The second is the limited GTS slots. This affects the medical scenarios where a number of life-critical events occur simultaneously. In this standard, only seven GTS slots are available which cannot accommodate the multiple emergency events in time. Another limitation is the fixed time slots in the superframe which fails during urgent situations.
With the introduction of the internet of things (IoT) and cloud computing [10,11] paradigms to the field of medical services, a number of healthcare systems have been developed in order to provide fast and reliable treatment to patients. It also includes the sharing of medical information among the medical institutions, family members and the related personnel [12]. IoT-based health applications are not sufficient for pervasive monitoring, which requires additional analysis and decision-making capabilities. In order to overcome this shortcoming, IoT enabled cloud-assisted monitoring services came up. However, these also suffered due to discontinuities in the network connectivity [13]. Hence, an extended version of cloud computing, called fog computing [14] or fogging, is used now, in which computations can be done in any node, called fog node or nodes at the edge of personal area network (PAN).
In a similar manner to cloud computing, fog nodes are also prone to failures. However, the impact of failure is less and easier to handle for fogging in comparison with the cloud [15]. Cloud failure affects the entire hospital, whereas fog failure is restrained to a smaller area such as a hospital ward or a block. In short, fog computing can overcome the limitations of cloud computing, including high bandwidth constraints, dependency on network infrastructure, unpredictable time of response from the cloud for emergency cases, and so on. The fogging has a shorter response time, as the data processing is carried out at the edge of the network and close to the source along with securing the data within the network.
Figure 1 shows an example of an in-hospital block-wise health monitoring setup that utilizes the fog computing concept [16]. Each block has a number of patients and a central coordinator. In this method, the central coordinator (battery-operated node) acts as an edge computing device or a fog node. The central coordinator classifies the sensor signal into urgency, semi-urgency, and normal data by using simple mathematical models and a threshold value, and makes the decision accordingly (i.e., whether to immediately send the data to the base station or not). Then, the central coordinator directly sends the data to the base station (BS). The health monitoring system usually consists of a number of sensor nodes worn on the patient’s body, such as an electrocardiogram (ECG) sensor, electroencephalogram (EEG) sensor, temperature sensor, pressure sensor, glucose sensor, and a body controller. These sensor devices collect data from the body and send them to the body controller, which is placed at any appropriate position on the body. The body controller aggregates the collected information and sends it towards a central coordinator through the tree-based routes.
The advantage of fog computing is that the central coordinator or the fog node sends only the valid information and drops unnecessary sensor information, thereby simplifying the complexity of data storage and computation. It also makes the decision quickly. For example, in speech analysis for Parkinson’s disease, the audio recordings are not merely forwarded. Instead, the analysis of the recordings is done locally, and only the necessary metrics are transmitted [15]. Hence, the fog-architecture minimizes the delay which makes it suitable for various medical applications.
In this paper, a fog-based architecture and dynamic slot allocation are considered to address the discussed challenges of WBANs. The performance of an in-hospital patient monitoring system is enhanced by using a QoS efficient next hop selection algorithm and a fuzzy-based dynamic slot allocation scheme. The proposed methods are designed without modifying the superframe structure of the IEEE 802.15.4 MAC standard. The main contributions of the paper are:
  • A fog-based WBAN for a real-time patient monitoring system which consists of a sensor layer, body controller layer, and a central coordinator layer.
  • Minimum cost parent selection (MCPS) algorithm for best parent selection and a link cost function for efficient routing. The best parent node for the tree formation is selected by comparing the link cost function, number of hops, and the distance between the nodes.
  • Dynamic time slot (DTS) allocation technique based on fuzzy logic that can enhance the packet delivery and reduce the end-to-end delay. The time slot to each node is allocated dynamically based on the parameters such as available energy in a node, buffer availability and the packet arrival rate.
The remaining paper is structured as follows: Section 2 summarizes some of the existing medium access control (MAC) layer protocols. Section 3 explains the system model for in-hospital health management application. Section 4 illustrates the tree formation and the cost function evaluation for energy efficient routing. Section 5 includes the design of an energy efficient dynamic time-slot allocation for each sensor node. Section 6 presents the performance results and analysis of the MCPS and DTS algorithm. Finally, Section 7 concludes the paper.

2. Related Works

The commonly utilized mechanisms in the MAC layer are time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA). Both of these mechanisms have their own advantages and disadvantages [17] in terms of power consumption, bandwidth utilization, network dynamics, synchronization, etc. A number of MAC layer protocols have been proposed, which combine the advantages of CSMA/CA and TDMA techniques in order to meet different demands such as reduction in the collisions, energy consumption and enhancement of the network reliability. In [18], MAC protocols with a quality of service (QoS) control scheme has been developed; however, they are not optimized for handling emergency data in medical applications. For an energy-efficient network, the MAC protocols in WBAN use duty-cycling mechanisms, which serves as an effective solution for over-hearing and idle listening problems. The beacon mode in IEEE 802.15.4 provides a better duty-cycling mechanism for using the available energy resources efficiently [19]. At the same time, this standard also faces several challenges such as unfair channel access, extended back off periods, and lack of dynamic adaptive capabilities. Hence, these issues result in inferior performance of WBAN in cases where the application demands less delay, accurate throughput, energy utilization and reliability at a specific time.
A new MAC protocol has been proposed in [20], which reduces the energy consumption of the guard band and extends the lifetime of the WBAN system. It uses a self-adaptive guard band in each time slot in order to reduce the energy consumption of the network. An enhanced packet scheduling algorithm (EPSA) is proposed in [21] to minimize the slot wastage and to allocate a greater number of waiting nodes in the available time slots. Initially, the vacant time slots are identified and divided into equal time slots based on the number of waiting nodes. Hence, they can transmit the data with a minimum delay in the given time frame. This scheme is based on the availability of the vacant time slots. The iQueue-MAC is a hybrid protocol [22] of CSMA/TDMA specifically designed for variable or bursty traffic. During low traffic it uses CSMA and when traffic increases it changes to TDMA mechanism. It uses a piggybacked indicator with a request for time slots. It allocates slots when a queue is detected. An energy preserving MAC protocol was derived in [23], called as Q-learning medium access control (QL-MAC) protocol with its aim to converge to a low energy state. It eliminated the need of a predetermined system model to solve the minimization problem in WSNs. It is also designed as a self-adaptive protocol against topological and other external changes.
In [24], a time slot allocation is modeled and proposed a time slot allocation scheme based on a utility function. The function is designed based on sensor priority, sampling rate and available energy of the node. The main objective is to maximize the data transmission of each node in the network. A priority-based adaptive MAC(PA-MAC) protocol [25] is derived for WBANs which dynamically allocates time slots to the nodes based on the traffic priority. There are separate channels for a beacon and data. A priority-guaranteed CSMA/CA is used to prioritize the data. Based on the traffic priority, the PA-MAC dynamically allocates the time slots. In [26] a Traffic Class Prioritization based CSMA/CA (TCP-CSMA/CA) is proposed for prioritized channel access in intra-WBAN. The aim is to reduce delay, minimize packet loss, and enhance network lifetime and throughput. The traffic is categorized into different classes and assigned backoff period range to each class.
To overcome the first-come-first-served (FCFS) guaranteed time slot (GTS) policy of IEEE 802.1.5.4 based network, an adaptive and real-time GTS allocation scheme (ART-GAS) is proposed in [27]. Here, the bandwidth utilization of IEEE 802.15.4 MAC for time-critical applications was improved. It used a two-stage approach, where the first stage dynamically assigned the priorities of all devices. In the second stage, the GTS was allocated to the nodes according to the assigned priorities. An analysis of the GTS allocation mechanism was done in [28] for time-critical applications based on the IEEE 802.15.4 standard. A Markov chain was considered to model the GTS allocation for designing various efficient GTS allocation schemes. In [29], real-time applications with periodic data are guaranteed with a reduced the packet drop rate. This algorithm can be used for only GTS allocation and it does not have any effect on the data packets in the contention access period (CAP).
The tele-medicine protocol (TMP) defined in [30] is a MAC protocol suitable for patient monitoring applications which need limited delay and reasonable reliability. The duty cycle is varied with respect to three parameters like delay-reliability factor, traffic load, and superframe duration. The protocol is designed based on three computation methods like network traffic estimation, channel access, and collision probabilities and delay-reliability factor. It shows the efficacy in terms of delay, reliability and efficient energy consumption.
A number of routing protocols are proposed and studied for routing the packets from source node to the sink node based on the tree structure. In [31], a routing protocol for low-power and lossy (RPL) Network is introduced where two routers along with interconnecting devices are restrained. It is based on IPv6 protocol which supports multipoint-to-point and point-to-point traffic within the lossy networks. It discusses the topologies like destination-oriented directed acyclic graphs (DODAGs), their upward and downward routes, security mechanisms, and fault management. A velocity energy-efficient and link-aware cluster-tree (VELCT) is proposed in [32] which provides reliable data collection scheme in sensor networks. Cluster head location is utilized to construct the data collection tree (DCT). It minimizes the energy consumption of the cluster head with less frequent cluster formation. It is well suitable for mobility based sensor networks. In [33], a cluster based routing protocol is introduced to extend the network lifetime of sensor networks. The energy of all nodes is balanced to prolong the lifetime of the network. It utilized a spanning tree to send heterogeneous data to the base station. A tree-based routing protocol (TBRP) is discussed in [34] for mobile sensor networks. It enhanced the node’s lifetime by considering different energy levels in the tree. Here, the lowest energy level consumes high energy and highest level consumes less energy. Whenever a node attained a critical level of energy, it saves the energy by moving into the next energy level.
The tree formation and routing of packets are influenced by the link reliability and the co-existence issues in the network. For context-aware WBAN, it has to coexist with a number of wireless networks. The paper [35] discussed the characteristics of the physical layer in a smart environment. The experiment characterized on-body and off-body channels. The author had come up with some concerns for physical layer protocol design. In [36], the co-channel interference in WBAN is addressed where it has to co-exist within smart environments operating in the same frequency band. It also discussed the fading characteristics of mobile WBAN. The measurements for inter-body interference between two WBANs are also explained. The reliability, fault-tolerant, and interference mitigation schemes are presented in [37]. The term reliability is expressed in terms of quality of the link and the efficiency of the communication. A detailed explanation about different types of interference and coexistence is also included. A decentralized time-synchronized channel swapping (DT-SCS) protocol is presented in [38] to overcome the shortcomings of time-synchronized channel hopping (TSCH) in ad hoc networks. These protocols were designed for collision-free and interference avoiding communications. The TSCH and its variants need centralized coordination technique for time-frequency slotting in networks. It resulted in slow convergence to the steady state during mobility. Hence, Dt-SCS was introduced with a decentralized concept based on the coupling of distributed synchronization and desynchronization mechanisms.
All the existing aforementioned approaches mainly concentrated on any one of the QoS aspects at a time, whereas a combined set of QoS parameter optimization is necessary for WBAN medical applications. Additionally, most of the MAC protocols based on the IEEE 802.15.4 standard concentrated on any one of the MAC aspects for the protocol design. Most of the schemes used data traffic and traffic priority for the analysis. Also, the developed protocols attained their objectives by adjusting the CAP/CFP in the superframe structure, which has its own limitations in terms of bandwidth and number of devices used. The comparative survey of different routing protocols for WBAN medical applications is summarized in [39].

3. System Model

3.1. Network Model

An in-hospital real-time healthcare patient monitoring network is assumed to evaluate the performance of the proposed methods. A patient monitoring block with 15 patients is considered. Each patient is assumed to be a WBAN with five sensor nodes and a body controller. The sensor nodes collect the body vital signs such as blood glucose, blood pressure, body temperature, ECG and EEG. The measured data are given to the body controller which is deployed on the human body. The patient monitoring system consists of 15 body controllers which form the tree structure for the proposed model. The body controller transfers the data to the fog node (central coordinator) using the proposed algorithms. The fog node assigns priority to the data and sends the prioritized data to the physician through the cloud server to meet the emergency situations. The data processing and computation are done within the fog node and only the consolidated report is sent to the physician through the cloud server. The local server in the proposed network is called here as the cloud server. The cloud server assigned here is mainly to connect to the external network. The fog node avoids congestion in the network, reduces the computation time by performing all operations in the fog node itself. It also minimizes the storage size and redundant data package (only important data is sent to the server), and decreases the time delay between the source and the destination.
The designed MCPS algorithm is used to transfer data towards the central coordinator. The developed fuzzy based dynamic time slot allocation is utilized to improve the reliability and network lifetime.

3.2. Block Diagram of a Fog-Based WBAN

The functional block diagram of the proposed fog-assisted architecture for the real-time health monitoring system is shown in Figure 2. The three layers in the monitoring framework are as follows:
  • Sensor layer
  • Body controller layer
  • Central coordinator layer
The sensor layer collects the body vitals and processes the signals that must be transmitted to the next layer. The body controller layer stores and transmits the data about the fog layer or central coordinator layer. Here, simple mathematical modeling has been used to make a decision regarding the priority of the data. From this layer, the prioritized data are transmitted to the physician through the cloud server. The role of a fog node in the proposed model are:
  • Collecting the human vital signs from sensor nodes
  • Computing and analyzing the sensed data using simple modeling techniques
  • Sending the consolidated report to the cloud server
  • Assigning the priority of the sensed data
  • Coordinating operations of the body sensor nodes
The patient vitals is transmitted to the base station through the body controllers, using a trusted tree formed with n number of body controllers within each block. The fog nodes determine the priority of the data with the help of the prioritization scheme and send the data towards the destination through a cloud server. The back-end part of the system is the cloud server, whose function includes storing, processing, and transmission of data along with back-end services for real-time data interpretation and visualization. The tree formation between the body controllers and the next hop node selection and dynamic time slot assignment is explained in the following sections.

4. Tree Formation and Cost Function Evaluation

4.1. Tree Formation

The first step in the initialization phase is the tree formation with the available set of sensor nodes and the central coordinator (CC) or the root node. Initially, the root node broadcasts the CC announcement to all the neighboring nodes. The CC announcement includes a sequence number, number of the visited devices, available energy, queue length, and all the necessary parameters to select the parent node. CC announcement is broadcast based on a sink timer. Initially, the one-hop neighboring nodes will receive the announcement from the root node. Based on the received sequence number and hop count, the tree is formed with selected parents and children. The detailed psedocode for the tree formation is given as follows:
  • The root node broadcasts a CC announcement using a sink timer
  • One-hop connected devices receive the message
  • If the received sequence number is new add the previous hop forwarder in the tentative parent list
  • If the received sequence number is not new but if its hop count is less than the previous one, then add it to the tentative parent list
  • Execute MCPS algorithm (Algorithm 1) to select the best parent node

4.2. Link Cost Function for Next-Hop Selection

The objective of the link cost function is to select a node with minimum link cost as the best parent node. It [40] is based on the parameters such as: residual energy, queue size, link reliability, the distance between the nodes and the available bandwidth. Consider the variable x, where x is given as:
x = w 1 × e r e i + w 2 × q a q i + w 3 × R i , j ( n ) + w 4 × d c + w 5 × b r b a ,
where, e r , e i , q i and q a are residual energy, initial energy, initial queue size, and current available queue size of node j respectively. R i j (n) is the current round link reliability between the nodes i and j, which is estimated from Equation (3). The metrics d, c, b a , and b r represent the distance between the two nodes, the coverage of a node, the required bandwidth, and the residual bandwidth respectively. w 1 , w 2 , w 3 , w 4 , and w 5 are the weighted coefficients, where
i = 1 5 W i = 1
The link reliability between any two sensor nodes ( R i j ) is estimated from the exponentially weighted moving average, which is given as follows:
R i , j ( n ) = ( 1 γ ) × R i , j ( n 1 ) + γ × N t τ t r ,
where N t is the total number of successful packet transmission attempts through the link between the nodes i and j, n is the index number of the round, τ t r is the total number of successful transmission and re-transmission attempts of all data packets, and γ is the average weighting factor.
The distance between the two nodes can be calculated using Equation (4):
d 2 = ( x 1 x 2 ) 2 + ( y 1 y 2 ) 2 ,
where x and y are the coordinates.
The expression for the link cost function is expressed as:
L C i , j = e x ,
where, x is expressed in Equation (1). The range of link cost function is (0.367,1). The mentioned link cost considered five factors in order to enhance the QoS performance of the network. The energy metric aims to stabilize the energy between the nodes, queue size metric attempts to reduce the queuing delay, the link reliability improves the reliability of the network, node coverage and the distance between the nodes are used to decrease the number of re-transmission attempts, and the residual bandwidth increases the packet delivery ratio of the network by utilizing the available bandwidth resource of the network.

4.3. Minimum Cost Parent Selection Algorithm

To find the best parent node, the proposed minimum cost parent selection (MCPS) algorithm is used whenever a node receives an announcement from the neighboring nodes. According to this algorithm, the best parent node will be the one with a minimum hop, minimum cost, and the shortest distance from the child node. Since it utilizes the minimum link cost, minimum hop, and the shortest distance between nodes, it satisfies the required QoS for WBANs. The selection of best parent nodes from the tentative parent list is depicted in Algorithm 1.
Algorithm 1 Best parent node selection algorithm.
Initialization:
L C i j —link cost function between sensor nodes i and j
C m —maximum link cost = 1
N i d = −1
h n —highest number of hops nid—node Identifier of node j
C n i d —link cost of node j
NNi s1, s2, ….., sm—set of neighboring nodes of node i, 1 i N , 1 m N
BNHi—best parent node of N N i
N m d —node with minimum distance from child node
 1: for each node in the list N N i do
 2: compute link cost: L C i j using Equation (9)
 3: end for
 4: for each node, j, in the list NNi do
 5: nid = node Id of j
 6: if h n > h n i d then
 7:   C m = C n i d
 8:   h n = h n i d
 9:   N i d = n i d
10: else
11:  if h n = = h n i d then
12:   if C m > C n i d then
13:     C m = C n i d
14:     N i d = n i d
15:   else
16:    if C m = C n i d then
17:      N i d = N m d
18:    end if
19:   end if
20:  end if
21: end if
22:  B N H i = N i d
23: end for

5. Fuzzy-Based Dynamic Time Slot Allocation

Once the traffic is generated, the initial equal slot assignment may fail due to the dynamic conditions in the networks such as traffic flow, buffer availability, energy consumption by each node, and so on. Therefore, each of these parameters in the network is highly unpredictable. The solution proposed to this situation is the dynamic time slot allocation technique (DTS), where the slots are allocated to nodes depending on the packet interval, buffer availability, and the remaining energy of each node. In order to improve the reliability and efficiency of packet transmission, fuzzy-based dynamic slot allocation has been proposed. Fuzzy logic [41] can give an appropriate solution or can integrate many factors to solve an evaluation problem. In this method, it is used to find a dynamic time slot to each node based on the mentioned factors.

5.1. Fuzzification

In the first step of fuzzification, the crisp inputs are converted into their corresponding linguistic values, which are represented through the use of fuzzy sets [42]. Each fuzzy set is related to a membership function that describes the way in which each crisp input is associated with the fuzzy set. The fuzzy model is shown in Figure 3. For the slot allocation to each node, the three input variables of fuzzy are energy ratio (ER), packet arrival rate (PAR), and buffer memory ratio. The fuzzy model uses three linguistic terms (low, medium, and high) in order to partition the input variable. To define each term, different membership functions such as Gaussian, S, and Z functions are used.

5.1.1. Energy Ratio

The energy ratio (ER) variable indicates the ratio of available energy ( E r ) to the initial energy ( E i ) at each node and is given as follows:
E R = E r E i .
Equations (7)–(9) explain the partitioning of the variable energy ratio. Fuzzy rules for available energy and slot allocation are the following:
  • If ER is high, then slot allocated value is high.
  • If ER is medium, then slot allocated value is medium.
  • If ER is low, then slot allocated value is low.
u l ( x ) = 1 x ( 0 , 0.3 ) 1 2 ( x 0.3 0.2 ) 2 x ( 0.3 , 0.4 ) 2 ( x 0.5 0.2 ) 2 x ( 0.4 , 0.5 ) 0 x > 0.5
u m ( x ) = e ( ( x c ) 2 2 σ 2 ) x ( 0.2 , 0.8 ) 0 otherwise
u h ( x ) = 1 x < 0.5 2 ( x 0.5 0.2 ) 2 x ( 0.5 , 0.6 ) 1 2 ( x 0.7 0.2 ) 2 x ( 0.6 , 0.7 ) 1 x > 0.7 .

5.1.2. Buffer Memory Ratio

The second input variable is the Buffer Memory Ratio (BMR), which can be calculated according to Equation (10),
B M R = m a m m a x
where m a is the available memory in a node and m m a x is the maximum memory allotted to that node. Equations (11)–(13) explain the partitioning of the variable BMR. Fuzzy rules for BMR and slot allocation are the following:
  • If BMR is high, then slot allocated value is high.
  • If BMR is medium, then slot allocated value is medium.
  • If BMR is low, then slot allocated value is low.
u l ( x ) = 1 x ( 0 , 0.15 ) 1 2 ( x 0.15 0.35 ) 2 x ( 0.15 , 0.325 ) 2 ( x 0.5 0.3 ) 2 x ( 0.325 , 0.5 ) 0 x > 0.5
u m ( x ) = e ( ( x c ) 2 2 σ 2 ) x ( 0 , 1 ) 0 otherwise
u h ( x ) = 1 x < 0.5 2 ( x 0.5 0.3 ) 2 x ( 0.5 , 0.65 ) 1 2 ( x 0.8 0.3 ) 2 x ( 0.65 , 0.8 ) 1 x ( 0.81 )

5.1.3. Packet Arrival Rate

The packet arrival rate (PAR) in the network is estimated with the help of the exponentially weighted moving average (EWMA) method. It is defined as follows:
P A R = α 1 × p r a v g + ( 1 α 1 ) × p r c u r ,
where α 1 is the weighting factor that takes the value within the range from 0.1 to 0.9. p r a v g is the average of the previously arrived packet rate, p r c u r is the current packet arrival rate. Equations (15)–(17) explain the partitioning of the input variable PAR. Fuzzy rules for PAR and slot allocation are as follows:
  • If PAR is high, then the slot allocated value is high.
  • If PAR is medium, then the slot allocated value is medium.
  • If PAR is low, then the slot allocated value is low.
u l ( x ) = 1 x ( 0 , 0.15 ) 1 2 ( x 0.15 0.35 ) 2 x ( 0.15 , 0.325 ) 2 ( x 0.5 0.3 ) 2 x ( 0.325 , 0.5 ) 0 x > 0.5
u m ( x ) = e ( ( x c ) 2 2 σ 2 ) x ( 0 , 1 ) 0 otherwise
u h ( x ) = 1 x < 0.5 2 ( x 0.5 0.3 ) 2 x ( 0.5 , 0.65 ) 1 2 ( x 0.8 0.3 ) 2 x ( 0.65 , 0.8 ) 1 x ( 0.81 ) .
The membership function for the output allocated slot value can be explained using Equations (19)–(23).
u r l ( x ) = 1 x ( 0 , 0.1 ) 1 2 ( x 0.1 0.2 ) 2 x ( 0.1 , 0.2 ) 2 ( x 0.3 0.2 ) 2 x ( 0.2 , 0.3 ) 0 x > 0.3
u l ( x ) = 0 x < 0.1 e ( ( x c ) 2 2 σ 2 ) x ( 0.1 , 0.5 ) 0 x > 0.5
u m ( x ) = 0 x < 0.3 e ( ( x c ) 2 2 σ 2 ) x ( 0.3 , 0.7 ) 0 x > 0.7
u h ( x ) = 0 x < 0.5 e ( ( x c ) 2 2 σ 2 ) x ( 0.5 , 0.9 ) 0 x > 0.9
u r h ( x ) = 1 x < 0.7 2 ( x 0.7 0.2 ) 2 x ( 0.7 , 0.8 ) 1 2 ( x 0.9 0.2 ) 2 x ( 0.8 , 0.9 ) 1 x > 0.9 .
Table 1 defines the fuzzy inference rules for the selection of the optimal slot value for each node. The fuzzy rules consist of a series of conditional statements of “if–then” type. The rating is given as “low”, “rather low”, “medium”, “rather high”, and “high”. If the normalized input variables for ER, BMR, and PAR is all low, then the chance value for the required number of slots for the particular node is expected to be low. Similarly, if the normalized input variables are all high, then the chance value for the required number of slots for a certain node is expected to be low. The remaining chances occur between these two extremes. The inference system used to find the chance value fuzzy variable is the Mamdani fuzzy inference system. The results of all fuzzy rules are in fuzzy values and are converted into crisp values based on the centroid of area U C o A :
U C O A = x = 1 n r u x Z ( u x ) x = 1 n r Z ( u x ) ,
where Z ( u x ) is the membership function of all aggregated outputs, u x is the centroid of the area, and n r is the number of fuzzy rules.

5.2. Comparison of Time Slot Allocation

Consider the tree structure shown in Figure 4. The tree structure has 15 nodes and a root node. The number of nodes are selected in random manner. The root node has three direct children node 1, 2, and 3. The whole tree can be divided into three branches. The branch I include nodes 1, 4, 9, and 10. Branch II has nodes 2, 5, 6, and 11. Nodes 3, 7, 8, 12, 15, 13, and 14 constitute branch III. Any node in the tree can be a child node, a relay node, or a leaf node (which does not have any child). For example, node 3 has direct children 7 and 8; the leaf nodes are 7, 13, 14, and 15; the relay nodes are 3, 8, and 12. Assume that the total transmission time for all nodes is 1 s. With a total of 15 nodes, the equal slot duration for each node is 0.0666 s (1/15). Hence, the total slot duration for nodes 1, 2, and 3 are 0.266 s, 0.266 s, and 0.466 s respectively. This equal slot allocation is used for the conventional sensor networks. The proposed DTS method uses dynamic slot allocation to enhance network performance. The slot allocation to each node depends on the relay nodes, child nodes, and the leaf nodes. In the conventional method of equal slot allocation, each parent node must be active during the entire time duration of its child and leaf nodes. This leads to higher energy consumption. Hence, the dynamic slot allocation method is adopted in the DTS scheme such that the parent needs to be active only during its own and direct child slot duration. This is represented in Figure 5 and Figure 6. It shows the comparison between the two methods with respect to the duration of an active state for parent nodes for the branch III. The branch has nodes 3, 7, 8, 12, 13, 14, and 15. According to the conventional method, the node 3 has to be active for a duration of 0.4662 s and node 8 must remain active for a duration of 0.333 s. The DTS method reduces the active duration of nodes 3 and 8 to 0.1998 s which also results in reduced energy consumption.

6. Performance Analysis and Comparison

6.1. Simulation Setup

The performance was evaluated using the network simulator version 2 (NS-2) simulating tool. NS-2 is an object-oriented discrete event simulator for research in wired and wireless networks that can simulate newly designed network protocols. It has a number of wireless networking supported platforms and protocols for detailed study of simulated results. A random WBAN network was considered with 15 sensor nodes. The network used IEEE 802.15.4 as the MAC protocol. The simulation time was selected as 200 s, and the packet interval was varied from 0.1 s to 3 s in steps of 0.5. Table 2 summarizes the simulation parameters used.

6.2. Performance Metrics and Results

The performance of the proposed technique was validated with the help of key factors such as packet delivery ratio (PDR), average end to end delay, and average energy consumption. The experiments were conducted for two sets, based on the selected simulation time and the packet interval time. The proposed DTS mechanism was compared with the basic IEEE 802.15.4 standard and the TMP protocol [24].
In the first set of experiment, the simulation time was varied as 50, 75, 100, 125, 150, 175, and 200 s. Figure 7, Figure 8 and Figure 9 show the comparative results of PDR, average end to end delay, and average energy consumption of IEEE 802.15.4, TMP and the proposed DTS protocols.
Figure 7 depicts the PDR from a source node to the root node. It was measured as the percentage of the total number of successfully received packets at the root node to the number of packets transmitted from the source node. The figure shows that PDR was highest for DTS method. This is due to the link reliability function used in the best next hop selection algorithm. It ensured the best path between the source node and the root node by reducing the packet loss. On the other hand, the TMP protocol mainly concentrated on the time slot allocation to minimize the slot wastage. In IEEE 802.15.4 standard the data transmission was based on the CAP and CFP transmission. In comparison, DTS outperformed the TMP and IEEE 802.15.4 standard by 12% and 15% respectively.
In Figure 8, the average end-to-end delay is shown with varied simulation time. It is the average time taken by the packet to reach the root node from the source node. DTS scheme dynamically allocated the time slot based on the available energy, buffer memory, and packet arrival rate. It allocated the slot dynamically. Hence the slot wastage gets reduced where unnecessary waiting time is minimized for those nodes in the queue. In TMP, computational methods were utilized for MAC parameter tuning and duty cycle adjustment which contributes lesser than the DTS method. There was a 47% and 59% reduction in average end-to-end delay when compared to TMP and IEEE 802.15.4 MAC Standard.
The average energy consumption is depicted in Figure 9, where the DTS scheme has the lowest energy consumption. The MCPS algorithm proposed for next hop selection is based on the available energy in each node. The dynamic time slot allocation based on fuzzy rules used the energy ratio to utilize the available energy resources effectively. In TMP, the energy ratio consideration is less when compared to DTS. The percentage of reduction in average energy consumption of DTS is 22% and 31% respectively.
The second set of experiments was based on different packet interval time such as 2–7 s. Figure 10, Figure 11 and Figure 12 show the comparative results of PDR, average end to end delay, and average energy consumption of IEEE 802.15.4, TMP and the proposed DTS protocols. Figure 10 shows the PDR for different packet interval. As packet interval decreases the traffic load increases hence there is a decrease in PDR. This is due to the less number of packets generated during low traffic conditions. As traffic load increased, more packets were injected into the networks and there was an increase in the PDR. As packet interval increased there was a decrease in the PDR. This is due to the congestion and collisions in low traffic load. The data packets could reach the root node easily at high packet intervals. The DTS performed better than the TMP and IEEE 802.15.4 standard in terms of PDR by 5% and 17% respectively.
It is obvious from the figure that as packet interval increases the average end-to-end delay decreases. The traffic will be less at longer packet interval and at the shorter interval the traffic will be heavy. More packets were injected into the network during high traffic resulting in network congestion and reduced buffer size. Therefore, packets cannot reach the root node easily resulting in increased end-to-end delay. During high packet interval, the traffic load decreased and the packets can reach the root node easily. Hence, the average end-to-end delay decreased. DTS allocated the time slot by considering the available buffer memory in each node. Therefore, the dynamic time slot selection reduced the average end-to-end delay in the network. The percentage of reduction when compared with TMP and IEEE 802.15.4 was 41% and 43% respectively.
Figure 12 shows that as the packet interval increased the energy consumption also increases. This is due to the decrease in the traffic load with an increase in the packet interval. An increase in the packet interval increased the idle listening time and the time required to transmit control overheads. This resulted in an increase in energy consumption. If the packet interval was at minimum, the listening time and the control overhead transmission time is also minimum. Hence, the energy consumption was minimum. In addition to this, ER in fuzzy rules and the remaining energy in the link cost function helped control the rise in energy consumption when compared to the other protocols. Figure 11 shows that the DTS scheme had the lowest energy consumption than the existing protocols. The percentage of decrease was 25% and 39% when compared with TMP and IEEE802.15.4 standard.
From the two sets of simulation results, it is obvious that there is a considerable improvement in packet delivery ratio with respect to the compared protocols. Hence, the dropping ratio was high, thereby resulting in a better packet delivery ratio. Similarly, the average delay and the energy consumption was also reduced considerably due to the energy efficient link cost function used in the routing layer and the energy ratio considered in the time slot allocation method.

7. Conclusions

The major challenges identified in real-time patient monitoring WBANs are the higher response time, lower reliability, and higher energy consumption. These shortcomings can be addressed in MAC layer using dynamic time slot allocation instead of fixed slot allocations. In this paper, a fog-assisted network is utilized for a real-time patient monitoring setup. The fog layer (central coordinator) is deployed at the edge of the network to reduce the response time and transmission errors. This makes it suitable for emergency medical applications which carries bursty data. An energy-efficient, cost-based objective function and an MCPS algorithm is designed for routing the data packets to the coordinator node. A new dynamic time slot allocation method called DTS has been proposed for allocating dynamic slots to the sensor nodes. It minimizes the unnecessary slot wastage and waiting time of packets in the queue. The slot allocation is designed based on the fuzzy logic with input variables as energy ratio, buffer memory ratio, and packet arrival rate. The chance value for the number of slots allocated is determined with the help of fuzzy inference rules. The results reveal that the DTS is capable of achieving a relevant enhancement in packet delivery ratio (12% and 15%), a significant reduction in average end to end delay (47% and 59%) and average energy consumption (22% and 31%) in comparison with TMP and IEEE 802.15.4 respectively. Future work will include the enhanced version of the proposed model for a specific disease prediction which is based on different data rate patient vitals. Also, the fog-assisted network can be made more secure by implementing new data encryption and authentication methods.

Author Contributions

Conceptualization, B.V. and S.P.; methodology, B.V.; software, S.P.; validation, B.V. and S.P.; formal analysis, B.V.; investigation, S.P.; resources, B.V. and S.P.; data curation, B.V.; writing—original draft preparation, S.P.; writing—review and editing, B.V.; visualization, B.V. and S.P.; supervision, B.V.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
WBANwireless body area network
DTNdelay tolerant network
CBSNscollaborative body sensor networks
BSNsbody sensor networks
C-SPINEcollaborative-signal processing in node environment
SPINEsignal processing in node environment
DTNdelay tolerant network
FCFSfirst-come-first-served
GTSguaranteed time slot
ART-GASadaptive and real-time GTS allocation scheme
RPLrouting protocol for low-power and lossy
DODAGsdestination-oriented directed acyclic graphs
VELCTvelocity energy-efficient and link-aware cluster-tree
CAPcontention access period
CFPcontention free period
DCTdata collection tree
TBRPtree-based routing protocol
QL-MACQ-learning medium access control
DT-SCSdecentralized time-synchronized channel swapping
TSCHtime-synchronized channel hopping
IoTinternet of things
IEEEInstitute of Electrical and Electronics Engineers
PANpersonal area network
WSNwireless sensor network
BSbase station
CCcentral coordinator
EEGelectroencephalogram
ECGelectrocardiogram
MCPSminimum cost parent selection
DTSdynamic time slot
MACmedium access control
TDMAtime division multiple access
CSMA/CAcarrier sense multiple access with collision avoidance
QoSquality of service
PHYphysical
TMPtele-medicine protocol
ERenergy ratio
BMRbuffer memory ratio
PARpacket arrival rate
CoAcentroid of area
NS-2network simulator-2
GTSguaranteed time slot
PDRpacket delivery ratio

References

  1. Negra, R.; Jemilia, I.; Belghith, A. Wireless body area networks: applications and technologies. Procedia Comput. Sci. 2016, 83, 1274–1281. [Google Scholar] [CrossRef]
  2. Movassaghi, S.; Abolhasan, M.; Lipman, J.; Smith, D.; Jamalipour, A. Wireless body area networks: A survey. IEEE Commun. Surv. Tuts. 2014, 16, 1658–1686. [Google Scholar] [CrossRef]
  3. Kalaivanan, K.; Bhanumathi, V. Reliable Location Aware and Cluster-Tap Root based Data Collection Protocol for Large Scale Wireless Sensor Networks. J. Netw. Comput. Appl. 2018, 118, 83–101. [Google Scholar] [CrossRef]
  4. Barkunan, S.R.; Bhanumathi, V. An efficient deployment of sensor nodes in wireless sensor networks for agricultural field. J. Inf. Sci. Eng. 2018, 34, 903–918. [Google Scholar]
  5. Maitra, T.; Roy, S. Research Challenges in BAN Due to the Mixed WSN Features: Some Perspectives and Future Directions. IEEE Sens. J. 2017, 17, 5759–5766. [Google Scholar] [CrossRef]
  6. Rahimi, S.; Jamali, M.A.J. A hybrid geographic-DTN routing protocol based on fuzzy logic in vehicular ad hoc networks. Peer-to-Peer Netw. Appl. 2018, 12, 1–14. [Google Scholar] [CrossRef]
  7. Fortino, G.; Galzarano, S.; Gravina, R.; Li, W. A framework for collaborative computing and multi-sensor data fusion in body sensor networks. Inf. Fusion 2015, 22, 50–70. [Google Scholar] [CrossRef]
  8. Fortino, G.; Giannantonio, R.; Gravina, R.; Kuryloski, P.; Jafari, R. Enabling effective programming and flexible management of efficient body sensor network applications. IEEE Trans. Hum.-Mach. Syst. 2013, 43, 115–133. [Google Scholar] [CrossRef]
  9. Moravejosharieh, A.; Lloret, J. Performance evaluation of co-located IEEE 802.15. 4-based wireless body sensor networks. Ann. Telecommun. 2016, 71, 425–440. [Google Scholar] [CrossRef]
  10. Zhang, Y.; Qiu, M.; Tsai, C.W.; Hassan, M.M.; Alamri, A. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 2017, 11, 88–95. [Google Scholar] [CrossRef]
  11. Li, P. Design and implementation of medical cloud database service system based on parallel and mobile computing. Int. J. Biomed. Eng. Technol. 2017, 23, 213–231. [Google Scholar] [CrossRef]
  12. Chi, X.; Xinyu, Z.; Guofeng, C.; Jiaquan, W.; Fei, Y.; Kun, M. A novel intelligent healthcare system and the sensor network deployment strategy based on multimodal fused information. Int. J. Biomed. Eng. Technol. 2017, 23, 345–362. [Google Scholar] [CrossRef]
  13. Azimi, I.; Anzanpour, A.; Rahmani, A.M.; Pahikkala, T.; Levorato, M.; Liljeberg, P.; Dutt, N. HiCH: Hierarchical fog-assisted computing architecture for healthcare IoT. ACM Trans. Embedded Comput. Syst. 2017, 16, 174. [Google Scholar] [CrossRef]
  14. Mahmud, R.; Kotagiri, R.; Buyya, R. Fog computing: A taxonomy, survey and future directions. In Internet of Everything; Di Martino, B., Li, K.C., Yang, L., Esposito, A., Eds.; Springer: Singapore, 2018; pp. 103–130. [Google Scholar]
  15. Kraemer, F.A.; Braten, A.E.; Tamkittikhun, N.; Palma, D. Fog computing in healthcare—A review and discussion. IEEE Access 2017, 5, 9206–9222. [Google Scholar] [CrossRef]
  16. Hu, J.; Wu, K.; Liang, W. An IPv6-based framework for fog-assisted healthcare monitoring. Adv. Mech. Eng. 2019, 11. [Google Scholar] [CrossRef]
  17. Marinkovic, S.J.; Popovici, E.M.; Spagnol, C.; Faul, S.; Marnane, W.P. Energy-efficient low duty cycle MAC protocol for wireless body area networks. IEEE Trans. Inf. Technol. Biomed. 2009, 13, 915–925. [Google Scholar] [CrossRef]
  18. Ibarra, E.; Antonopoulos, A.; Kartsakli, E.; Verikoukis, C. HEH-BMAC: Hybrid polling MAC protocol for WBANs operated by human energy harvesting. Telecommun. Syst. 2015, 58, 111–124. [Google Scholar] [CrossRef]
  19. Afonso, J.A.; Silva, H.D.; Macedo, P.; Rocha, L.A. An enhanced reservation-based MAC protocol for IEEE 802.15.4 networks. Sensors 2011, 11, 3852–3873. [Google Scholar] [CrossRef]
  20. Bai, T.; Lin, J.; Li, G.; Wang, H.; Ran, P.; Li, Z.; Pang, Y.; Wu, W.; Jeon, G. An optimized protocol for QoS and energy efficiency on wireless body area networks. Peer-to-Peer Netw. Appl. 2019, 12, 326–336. [Google Scholar] [CrossRef]
  21. Ambigavathi, M.; Sridharan, D. An Effective Dynamic Slot Allocation Scheme for Wireless Body Area Network. In Wireless Communication Networks and Internet of Things; Zungeru, A., Subashini, S., Vetrivelan, P., Eds.; Springer: Singapore, 2019; pp. 123–130. [Google Scholar]
  22. Zhuo, S.; Wang, Z.; Song, Y.Q.; Wang, Z.; Almeida, L. A traffic adaptive multi-channel MAC protocol with dynamic slot allocation for WSNs. IEEE Trans. Mob. Comput. 2016, 15, 1600–1613. [Google Scholar] [CrossRef]
  23. Savaglio, C.; Pace, P.; Aloi, G.; Liotta, A.; Fortino, G. Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks. IEEE Access 2019, 7, 29355–29364. [Google Scholar] [CrossRef]
  24. Sun, G.; Wang, K.; Yu, H.; Du, X.; Guizani, M. Priority-Based Medium Access Control for Wireless Body Area Networks with High-Performance Design. IEEE Internet Things J. 2019. [Google Scholar] [CrossRef]
  25. Bhandari, S.; Moh, S. A priority-based adaptive MAC protocol for wireless body area networks. Sensors 2016, 16, 401. [Google Scholar] [CrossRef]
  26. Masud, F.; Abdullah, A.H.; Altameem, A.; Abdul-Salaam, G.; Muchtar, F. Traffic Class Prioritization-Based Slotted-CSMA/CA for IEEE 802.15. 4 MAC in Intra-WBANs. Sensors 2019, 19, 466. [Google Scholar] [CrossRef]
  27. Xia, F.; Hao, R.; Li, J.; Xiong, N.; Yang, L.T.; Zhang, Y. Adaptive GTS allocation in IEEE 802.15. 4 for real-time wireless sensor networks. J. Syst. Architect. 2013, 59, 1231–1242. [Google Scholar] [CrossRef]
  28. Park, P.; Fischione, C.; Johansson, K.H. Performance analysis of GTS allocation in beacon enabled IEEE 802.15. 4. In Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, Italy, 22–26 June 2009; pp. 1–9. [Google Scholar]
  29. Song, J.; Ryoo, J.D.; Kim, S.; Kim, J.; Kim, H.; Mah, P. A dynamic GTS allocation algorithm in IEEE 802.15. 4 for QoS guaranteed real-time applications. In Proceedings of the IEEE International Symposium on Consumer Electronics, Irving, TX, USA, 20–23 June 2007; pp. 1–6. [Google Scholar]
  30. Akbar, M.S.; Yu, H.; Yu, H.; Cang, S. TMP: Tele-medicine protocol for slotted 802.15. 4 with duty-cycle optimization in wireless body area sensor networks. IEEE Sens. J. 2017, 17, 1925–1936. [Google Scholar] [CrossRef]
  31. Winter, T.; Thubert, P.; Brandt, A.; Hui, J.; Kelsey, R.; Levis, P.; Pister, K.; Struik, R.; Vasseur, J.P.; Alexander, R. RPL: IPv6 Routing Protocol For Low-Power And Lossy Networks; No. RFC 6550; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2012. [Google Scholar]
  32. Velmani, R.; Kaarthick, B. An efficient cluster-tree based data collection scheme for large mobile wireless sensor networks. IEEE Sens. J. 2015, 15, 2377–2390. [Google Scholar] [CrossRef]
  33. Zarei, B.; Zeynali, M.; Nezhad, V.M. Novel cluster based routing protocol in wireless sensor networks. Int. J. Comput. Sci. Issues 2010, 7, 32. [Google Scholar]
  34. Singh, M.; Sethi, M.; Lal, N.; Poonia, S. A tree based routing protocol for mobile sensor networks (MSNs). Int. J. Comput. Sci. Eng. 2010, 2, 55–60. [Google Scholar]
  35. Heaney, S.F.; Scanlon, W.G.; Garcia-Palacios, E.; Cotton, S.L. Fading characterization for Context Aware Body Area Networks (CABAN) in interactive smart environments. In Proceedings of the Loughborough Antennas & Propagation Conference, Loughborough, UK, 8–9 November 2007; pp. 501–504. [Google Scholar]
  36. Heaney, S.F.; Scanlon, W.G.; Garcia-Palacios, E.; Cotton, S.L.; McKernan, A. Characterization of inter-body interference in context aware body area networking (CABAN). In Proceedings of the IEEE GLOBECOM Workshops (GC Wkshps), Houston, TX, USA, 5–9 December 2011; pp. 586–590. [Google Scholar]
  37. Salayma, M.; Al-Dubai, A.; Romdhani, I.; Nasser, Y. Wireless body area network (WBAN): A survey on reliability, fault tolerance, and technologies coexistence. Comput. Surv. 2017, 50, 3. [Google Scholar] [CrossRef]
  38. Smart, G.; Deligiannis, N.; Surace, R.; Loscri, V.; Fortino, G.; Andreopoulos, Y. Decentralized time-synchronized channel swapping for ad hoc wireless networks. IEEE Trans. Veh. Technol. 2016, 65, 8538–8553. [Google Scholar] [CrossRef]
  39. Bhanumathi, V.; Sangeetha, C.P. A guide for the selection of routing protocols in WBAN for healthcare applications. Hum. Cent. Comput. Inf. Sci. 2017, 7, 1–19. [Google Scholar] [CrossRef]
  40. Ayatollahitafti, V.; Ngadi, M.A.; Bin Mohamad Sharif, J.; Abdullahi, M. An efficient next hop selection algorithm for multi-hop body area networks. PLoS ONE 2017, 11, e0146464. [Google Scholar] [CrossRef] [PubMed]
  41. Rezaee, A.A.; Pasandideh, F. A fuzzy congestion control protocol based on active queue management in wireless sensor networks with medical applications. Wirel. Pers. Commun. 2018, 98, 815–842. [Google Scholar] [CrossRef]
  42. Yazdanbakhsh, O.; Dick, S. A systematic review of complex fuzzy sets and logic. Fuzzy Sets Syst. 2018, 338, 1–22. [Google Scholar] [CrossRef]
Figure 1. Fog-assisted architecture for in-hospital health management.
Figure 1. Fog-assisted architecture for in-hospital health management.
Sensors 19 02112 g001
Figure 2. Block diagram of a fog-based WBAN.
Figure 2. Block diagram of a fog-based WBAN.
Sensors 19 02112 g002
Figure 3. Block diagram of fuzzy model.
Figure 3. Block diagram of fuzzy model.
Sensors 19 02112 g003
Figure 4. Example of a tree network.
Figure 4. Example of a tree network.
Sensors 19 02112 g004
Figure 5. Slot allocation and parent node active state duration in conventional method.
Figure 5. Slot allocation and parent node active state duration in conventional method.
Sensors 19 02112 g005
Figure 6. Slot allocation and parent node active state duration in DTS method.
Figure 6. Slot allocation and parent node active state duration in DTS method.
Sensors 19 02112 g006
Figure 7. Packet delivery ratio under different simulation times.
Figure 7. Packet delivery ratio under different simulation times.
Sensors 19 02112 g007
Figure 8. Average End-to-End Delay under different Simulation Time.
Figure 8. Average End-to-End Delay under different Simulation Time.
Sensors 19 02112 g008
Figure 9. Average energy consumption under different simulation time.
Figure 9. Average energy consumption under different simulation time.
Sensors 19 02112 g009
Figure 10. Packet delivery ratio under different packet intervals.
Figure 10. Packet delivery ratio under different packet intervals.
Sensors 19 02112 g010
Figure 11. Average end-to-end delay under different packet intervals.
Figure 11. Average end-to-end delay under different packet intervals.
Sensors 19 02112 g011
Figure 12. Average energy consumption under different packet intervals.
Figure 12. Average energy consumption under different packet intervals.
Sensors 19 02112 g012
Table 1. Fuzzy inference rules.
Table 1. Fuzzy inference rules.
ERBMRPARRequired Time Slots
LowHighLowRather low
LowHighMediumMedium
LowHighHighRather high
LowMediumLowLow
LowMediumMediumRather low
LowMediumHighMedium
LowLowLowLow
LowLowMediumLow
LowLowHighRather low
MediumHighLowMedium
MediumHighMediumRather high
MediumHighHighHigh
MediumMediumLowRather low
MediumMediumMediumMedium
MediumMediumHighRather high
MediumLowLowLow
MediumLowMediumRather low
MediumLowHighMedium
HighHighLowRather high
HighHighMediumHigh
HighHighHighHigh
HighMediumLowMedium
HighMediumMediumRather high
HighMediumHighHigh
HighLowLowRather low
HighLowMediumMedium
HighLowHighRather high
Table 2. Simulation parameters.
Table 2. Simulation parameters.
Simulation ParametersValues
Number of WBANs15
Number of sensors per WBAN5
Frequency2.4 GHz
Data rate20–250 kbps
Simulation time200 s
Data packet size50–150 bytes
Control packet size15 bytes
Superframe length100 ms
Initial energy of sensor nodes100 J
Energy consumption: Transmission 16.7 nJ
Energy consumption: Reception 36.1 nJ
Energy consumption: Amplifier 1.97 nJ

Share and Cite

MDPI and ACS Style

Pushpan, S.; Velusamy, B. Fuzzy-Based Dynamic Time Slot Allocation for Wireless Body Area Networks. Sensors 2019, 19, 2112. https://doi.org/10.3390/s19092112

AMA Style

Pushpan S, Velusamy B. Fuzzy-Based Dynamic Time Slot Allocation for Wireless Body Area Networks. Sensors. 2019; 19(9):2112. https://doi.org/10.3390/s19092112

Chicago/Turabian Style

Pushpan, Sangeetha, and Bhanumathi Velusamy. 2019. "Fuzzy-Based Dynamic Time Slot Allocation for Wireless Body Area Networks" Sensors 19, no. 9: 2112. https://doi.org/10.3390/s19092112

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop