Skip to main content

A cooperator-assisted wireless body area network for real-time vital data collection

Abstract

Wearable wireless body area network (WBAN) has attracted considerable attention as a means to collect vital data in sports training and urgent life-critical scenarios, which requires high reliability in links from sensor nodes to a central coordinator. Herein, cooperative relaying, which means retransmission not by sensor nodes themselves but through their cooperators, works effectively, since human postures do not suddenly change the states of the links in quite a short duration such as a retransmission interval.

In this paper, we propose a cooperator-assisted WBAN for real-time vital data collection. We show that the WBAN is realizable based on two kinds of medium access control (MAC) protocols such as a hybrid-time divison multiple access/carrier sense multiple access (TDMA/CSMA) and a TDMA, both of which are compliant with the IEEE 802.15.4.e standard, and evaluate the packet error rates and power consumptions for a hybrid-TDMA/CSMA-based WBAN and a TDMA-based WBAN. In the evaluation of packet error rates, we use the stored received signal strength indication (RSSI) data, which were obtained from experiments with three subjects in a realistic scenario composed of a series of different actions and postures in a mixed-indoor/outdoor environment.

1 Introduction

Wireless body area network (WBAN) is a short-range network for connecting nodes on a human body (wearable WBAN) or in a human body (implant WBAN). One key application includes vital data collection for patients and elderly people in medical and health care scenarios, where the energy consumption of sensor nodes is the most important factor for their long-term monitoring.

Another key application is vital data collection for workers such as firefighters, soldiers, and police officers in an urgent/life-critical scenario and for athletes in a sports-training scenario. For the former scenario, it is essential to monitor in real-time their physical and physiological states through collecting vital data from sensor nodes: body temperature meter, electro-cardio-graph (ECG), electro-myo-graph (EMG), tri-accelerometer, and SpO2 meter (for oxygen saturation) put on various positions of their bodies: left and right arms, left and right ankles, chest, finger and so on. On the other hand, for the latter scenario, it is also important to collect vital data in real-time, since trainers can train athletes with feedback information on their physical states. For the application, high reliability such as low packet error rate and low packet delay is the most important factor, in other words, because of their short operating times, the energy consumption of sensor nodes is not so critical. In this paper, we pay attention to how to guarantee high reliability in a WBAN.

Because of the short transmittable range, typically, less than 2 m, and the low transmission power, typically, less than 0.1 mW, a star topology has been mainly considered in WBANs, connecting a central WBAN coordinator (BANCO) to sensor nodes put on different positions of a human body [1]. For WBANs, candidates in unlicensed frequency bands are the 2.4 GHz industrial, scientific and medical (ISM) band and the 3.1–10.6 GHz ultra wide band (UWB) band, and their propagation channel characteristics have been well investigated [24]. In this paper, we assume the 2.4 GHz-ISM band, because in the frequency band, not only the IEEE 802.15.6 standard is now available but also a variety of inexpensive transceiver modules have been on the market, which are applicable for WBAN applications [5, 6].

Although the 2.4 GHz-ISM band has the advantages mentioned above, its major disadvantage is that it is not rich in diffraction. In a WBAN where there are BANCO and sensor nodes on different positions of a human body, in addition to the poorness of diffraction and the low transmission power, the directivity of antenna is much affected by the human body, so the direct link between them is easily and severely blocked, resulting in link disconnection.

In order to improve the reliability of wireless transmission, it is essential to use “the broadcast nature” inherent to wireless. In this sense, WBAN is advantageous, because there are many sensor nodes which cannot help receiving signals transmitted from other sensor nodes to a BANCO and can act as cooperators for them. It is well known that cooperative transmission, which means the use of cooperators or relays, improves the quality of wireless transmission by means of transmit diversity [7, 8]. In fact, for WBANs in the 2.4 GHz-ISM band, the performance of a cooperative transmission is discussed in an indoor walking scenario [9], an opportunistic relaying and a cooperative network coding are proposed [10, 11], and the effects of selection combining and maximum ratio combining with the help of relay are examined [12]. In addition, for WBANs assuming the IEEE 802.15.4 standard in the same frequency band [13], the advantage of relaying is suggested [14], and the performance is investigated [15, 16]. These works show the effectivity of cooperative transmission in WBANs, but their targets are all to improve the energy efficiency for prolonging the lifetime of the networks, which are common to those in general wireless sensor networks. Furthermore, for a sensor node in a WBAN, other sensor nodes can be candidates for its cooperator, so a BANCO needs to select the best one out of them, but these works use a pre-determined sensor node as a cooperator for each sensor node, without discussing how to select it out of them. There are some works addressing cooperator selection schemes, but a single human motion is assumed for a prediction-based relay selection in the 2.4 GHz-ISM band [17], and the UWB band is targeted [18], whose radio propagation characteristic is totally different from that of the 2.4 GHz-ISM band.

This paper proposes a cooperator-assisted WBAN for ensuring real-time vital data collection [19, 20]. In a WBAN, the radio channel characteristic around the wearer dynamically changes according to not only his/her action and posture but also the environment surrounding him/her such as indoors and outdoors. This implies that a cooperator suited for each sensor node also dynamically changes according to the physical situation around the wearer, so adaptive cooperator selection recognizing the temporal radio channel characteristic seems interesting and promising. It must be difficult, however, since the physical situations are infinite, so the proposed WBAN selects a single sensor node out of other sensor nodes for each sensor node, which can act as a moderately good cooperator commonly in different physical situations. Furthermore, the proposed cooperator selection is distributed, and in addition to it, the proposed WBAN selects an adequate sensor node as a BANCO. In the performance evaluation of the proposed WBAN, on the other hand, we use the stored received signal strength indication (RSSI) data obtained from experiments with three subjects in a realistic scenario composed of a series of different actions and postures in a mixed-indoor/outdoor environment.

It is better to realize a cooperator-assisted WBAN using a current wireless communication standard, and in this sense, one way is the use of a decode-and-forward transmission in which cooperators retransmit their once-stored packets after their parent sensor nodes transmit packets to a BANCO. Regarding medium access control (MAC) protocol, this is realizable in time division multiple access (TDMA) or carrier sense multiple access (CSMA). TDMA seems suitable for highly reliable cooperator-assisted WBAN, since it can avoid packet collisions. However, TDMA have some problems. One is the lack of frames, namely, selecting one coordinator per sensor node doubles the number of required frames. For instance, in the IEEE 802.15.4-2011 standard, the number of frames per superframe is limited up to 16 including a beacon frame, so this means that the maximum number of sensor nodes is limited up to 7 in a WBAN, which is too small. Another is the delay of retransmission. For successful reception of each frame in a superframe, a BANCO can broadcast its acknowledgement (ACK) packet only in the beacon frame of the next superframe. Therefore, if cooperators retransmit their packets after recognizing their ACKs, the retransmission is delayed by the time period of one superframe.

In this paper, we propose the use of low latency deterministic network (LLDN) in the IEEE 802.15.4e standard [21] for realizing a cooperator-assisted WBAN [22], where we show two superframe designs using a TDMA and a hybrid-TDMA/CSMA. Furthermore, these two designs introduce different power consumptions, so using the values of power consumptions for a typical transceiver module, we compare the power consumptions between them.

The remainder of this paper is organized as follows. Section 2 presents the system model and assumptions. Section 3 describes the superframe design criteria. Section 4 discusses the principle of the cooperator selection and explains the selection algorithms for cooperator and BANCO in detail. Section 5 outlines the experiment on the RSSI measurement, and Section 6 shows the performance of the proposed cooperator/BANCO selections using the measured RSSI data. Finally, Section 7 concludes the paper.

2 System Model and Assumptions

We assume a WBAN system model that consists of total N no d e nodes including vital sensor nodes and one BANCO on a human body. Putting different ID numbers of 1,2,,N no d e to the nodes, we define a set of node ID numbers as Vno d e . We also assume that any node can measure the RSSI for its received packet. Each node periodically senses vital signs and transmits its data packets to a BANCO, and then, the BANCO transmits collected data to an off-body node for monitoring his/her physical and physiological state. The purpose of this paper is to improve the reliability of the wireless network among the sensor nodes and the BANCO. Thus, the network between the BANCO and the off-body node is out of the scope of the paper. For example, we can use 3G/LTE as the network [23].

2.1 Cooperative transmission

Figure 1 shows the system model on a cooperator-assisted WBAN, where a source node (A) transmits packets to a BANCO (B) with a cooperator (C). According to the promiscuous mode operation in all nodes, C can receive and store packets transmitted from A to B. In the hybrid TDMA/CSMA, when A transmits a packet to B, if C can recognize the failure of the packet transmission, C transmits the stored packet instead of A, otherwise, C does not transmit it. In the TDMA, on the other hand, regardless of whether the packet transmission from A to B fails or not, C always transmits the stored packet to B. Hereafter, we define the indices for the source node, cooperator candidate and temporarily selected BANCO as i (i=1,2,,N no d e ), j (j=1,2,,N no d e , ji, jk), and k (k=1,2,,N no d e , ki), respectively.

Fig. 1
figure 1

System mode and cooperative transmission

2.2 Sensor node model

We assume that a node has N se n s o r kinds of sensors all operating with analog to digital (A/D) resolution of q bits/sample and sampling rate of F Hz, and it aggregates M s successively sensed data into a single data burst with additional information of d bits such as timestamp. Therefore, the payload size is given by

$$\begin{array}{*{20}l} L_{\mathrm payload} = (q \times N_{\mathrm sensor} + d) \times M_{\mathrm s} \ \text{bits}. \end{array} $$
((1))

Then, the node assembles a data packet by adding an overhead with length of L o bits to the payload. Defining the data transmission rate as R bits/s, the data packet duration becomes

$$\begin{array}{*{20}l} T_{\mathrm data}=(L_{\mathrm payload}+L_{\mathrm o})/R \ \text{sec}. \end{array} $$
((2))

2.3 Packet success rate model

The fading channel characteristic dynamically changes according to the actions of the BAN wearer, but because of the short duration of data packet, it is reasonable to assume that each data packet experiences “block fading,” which means that the fading channel characteristic is constant over the duration of the packet. In this case, the packet success rate for the nth packet (n=1,2,,N pa c k e t ) from the lth node to the mth node (l,m=1,2,,N no d e , lm) is given by

$$\begin{array}{*{20}l} {PSR}_{l,m} (n) = \left(1 - (1 - {BER}_{l,m}(n))^{L_{\mathrm packet}} \right) \end{array} $$
((3))

where L pa c k e t and B E R l,m (n) are the packet length in bits and the bit error rate in the nth packet from the lth node to the mth node, respectively. We refer to the IEEE 802.15.4 standard [13] as the bit error rate:

$$ {\fontsize{9.2}{12} \begin{aligned}{} {BER}_{l,m}(n) = \frac{8}{15} \times \frac{1}{16} \times\! \sum^{16}_{\lambda\, =\, 2} \!(-1)^{\lambda}\! \left(\!\!\begin{array}{c} 16 \\ \lambda \end{array}\!\!\right)\! e^{20 \ \times\ {SNR}_{l,m}(n) \ \times\ \left(\frac{1}{\lambda} - 1\right)} \end{aligned}} $$
((4))

where S N R l,m (n) is the signal to noise power ratio (SNR) for the nth packet from the lth node to the mth node:

$$\begin{array}{*{20}l} {SNR}_{l,m}(n) = {RSSI}_{l,m}(n)/P_{\mathrm noise}. \end{array} $$
((5))

In (5), R S S I l,m (n) is the measured RSSI for the nth packet from the lth node to the mth node, and P no i s e is the noise power given by

$$\begin{array}{*{20}l} P_{\mathrm noise} = NF + N_{\mathrm noise} + 10 \log_{10} B_{\mathrm ch} \ \text{dBm} \end{array} $$
((6))

where NF, N no i s e and B ch are the noise figure, thermal noise density, and channel bandwidth, respectively.

3 Superframe design criteria

The IEEE 802.15.4e standard defines the LLDN that is described as follows: a superframe is divided into a beacon slot and timeslots of equal length which are assigned to specific nodes. A coordinator periodically transmits beacons for synchronization with the superframe structure. Each timeslot is able to be assigned to exactly one node, called a slot owner, which has access privilege in the timeslot, namely, it transmits without using CSMA. Provided that more than one node wishes to transmit in a timeslot, which is referred to as a shared group timeslot, any nodes except a coordinator transmit using CSMA. In a shared group time slot, a coordinator broadcasts a clear to send (CTS) shared group frame to indicate that the timeslot is not used by the slot owner. Then, a node sends a request to send (RTS) frame and waits for a CTS frame from the coordinator in a response to it. After data transmission of other nodes, the coordinator can fully or partly occupy a timeslot for data transmission as well.

In the following two subsections, we show how to apply the LLDN to the cooperator-assisted BAN system.

3.1 LLDN-based hybrid TDMA/CSMA

As shown in Fig. 2 a, a superframe is divided into N no d e − 1 shared group timeslots. The slot owner of the ith timeslot is exactly the ith node, and it selects its cooperator as a member of its shared group. In the ith timeslot, the ith node is able to send its packet to a BANCO without packet collision, namely, in a TDMA manner. Only if the BANCO does not successfully receive the packet, it transmits a CTS shared group frame back to the ith node, so the ith cooperator attempts to transmit its stored packet. Here, the key is that the CTS shared group frame acts as a negative acknowledgement (NACK) packet for the ith node as well as its cooperator.

Fig. 2
figure 2

Superframe structures of the hybrid-TDMA/CSMA (a) and TDMA (b)

Defining the durations of beacon, clear channel assessment (CCA), short interframe space (SIFS), timeout time, long interframe space (LIFS), backoff time, CTS shared group frame, CTS frame and RTS frame as T be a c o n , T CC A , T SI F S , T to , T LI F S , T bo , T CT S S G , T CT S , and T RT S , respectively, in order to accommodate (N no d e −1) timeslots within a single superframe with duration of T SF , the time slot duration T ts needs to satisfy the following two criteria:

$$\begin{array}{*{20}l}{} T_{\mathrm SF} & = M_{\mathrm s} /F \geq T_{\mathrm ts} \times (N_{\mathrm node} - 1) + T_{\mathrm beacon} + T_{\mathrm SIFS} \end{array} $$
((7))
$$\begin{array}{*{20}l} T_{\mathrm ts} & \geq T_{\mathrm to} + T_{\mathrm CTSSG} + T_{\mathrm bo} + T_{\mathrm CCA} + T_{\mathrm RTS} \\ & +\ 2 \times T_{\mathrm SIFS} + T_{\mathrm CTS} + T_{\mathrm data} + T_{\mathrm LIFS}. \end{array} $$
((8))

3.2 LLDN-based TDMA

Figure 2 b shows the other way to apply the LLDN to the cooperator-assisted WBAN. A superframe is divided into 2(N no d e −1) timeslots, where the (2i−1)th and 2ith timeslots are assigned by the BANCO to the ith node and its cooperator, respectively. Whenever a cooperator successfully receives the packet of its parent node, it attempts to transmit its stored packet. Unlike the hybrid TDMA/CSMA, cooperative transmissions are always conducted whether the direct transmission fails or not.

In this case, the time slot duration T ts needs to satisfy the following two criteria:

$$\begin{array}{*{20}l}{} T_{\mathrm SF} & = M_{\mathrm s}/F \geq T_{\mathrm ts} \times (N_{\mathrm node} - 1) + T_{\mathrm beacon} + T_{\mathrm SIFS} \end{array} $$
((9))
$$\begin{array}{*{20}l} T_{\mathrm ts} & \geq 2 \times (T_{\mathrm data} + T_{\mathrm LIFS}). \end{array} $$
((10))

4 Cooperator and BANCO selections

We assume that the kth node has been selected as a temporal BANCO.

4.1 Optimal cooperator selection

For every packet from the ith source node, a node giving the highest packet success rate should be selected as its cooperator. Therefore, the optimal cooperator selection algorithm is summarized as Algorithm 1, where the metric in the maximization problem is the packet success rate for the two-hop link from the ith source node to the BANCO via the jth cooperator candidate, which is given by

$$\begin{array}{*{20}l} M_{i,j,k;n}^{opt}= {PSR}_{i,j,k}(n) = {PSR}_{i,j}(n) \times {PSR}_{j,k}(n). \end{array} $$
((11))

In Algorithm 1, for each source node, its cooperator can be selected independently packet by packet. The calculation of packet success rate may be the most computationally intensive, but focusing only on the cost of solving the maximization problem, the computational complexity of Algorithm 1 becomes \(O(N_{\mathrm node}^{2} N_{\mathrm packet})\) (see the Appendix 1). Note that the optimal cooperator selection is unrealistic in the sense that the BANCO needs to measure the packet success rates for the ith source node via all the jth nodes (jVno d e ,jk, ji) simultaneously packet by packet.

4.2 Proposed cooperator selection

In the proposed cooperator selection, the packet transmission is composed of two processes: a flooding process and a data transmission process. During the flooding process, the WBAN wearer takes different actions and postures, and the RSSIs of all links are measured at the same time by repeating a process where all nodes broadcast and re-broadcast their packets. After the flooding process, an adequate cooperator for each source node and a BANCO are selected based on the collected RSSIs information. Selected cooperators are considered to be moderately effective for the different actions and postures.

Hereby, we explain the flooding process in detail. Assume that each node broadcasts hello packets N he l l o times (n=1,,N he l l o ). When a node directly receives a hello packet from another node, the node measures the RSSI of the packet and re-broadcasts only once the packet adding the measured RSSI in it. When a node receives a re-broadcast hello packet, the node no longer re-broadcasts it. In this case, defining two sets of the indices of the hello packets which are transmitted from the ith source node and received at the BANCO directly and via the jth cooperator candidate as \({\mathrm Z}_{\textit {ik}}^{1}\) and \({\mathrm Z}_{\textit {ijk}}^{2}\) with their elements \(n_{\textit {ik}}^{1}\, \big (n_{\textit {ik}}^{1} \in {\mathrm Z}_{\textit {ik}}^{1}\big)\) and \(n_{\textit {ijk}}^{2}\, \big (n_{\textit {ijk}}^{2} \in {\mathrm Z}_{\textit {ijk}}^{2}\big)\), respectively, the kth node can know the RSSI of the first link as \({RSSI}_{\textit {ij}}\big (n_{\textit {ijk}}^{2}\big)\) and that of the second link as \({RSSI}_{\textit {jk}}\big (n_{\textit {ijk}}^{2}\big)\).

Practically, a node should not cooperate too many source nodes, because it shortens the lifetime of WBAN. For instance, when a node acts as cooperators for three source nodes, the lifetime of the WBAN becomes 25 % of the lifetime of a WBAN without cooperator assistance. Therefore, the number of nodes which a node can cooperate should be limited, and hereafter, we define μ(j) and N cm a x as the multiplicity of the jth cooperator candidate and its allowable largest value, respectively. The proposed strict cooperator selection algorithm is summarized as Algorithm 2, where the metric in the maximization problem is modified as

$$\begin{array}{*{20}l} M_{i,j,k}^{str} = \sum_{n_{ijk}^{2} \in {\mathrm Z}_{ijk}^{2}} {PSR}_{ijk}\left(n_{ijk}^{2}\right). \end{array} $$
((12))

Algorithm 2 is mathematically not tractable, since there are too many candidates to be evaluated for finding the optimal solution for each j and furthermore selectable cooperator candidates for one source node is affected by those for other source nodes. In fact, the computational complexity of the algorithm is lower-bounded as O((N no d e −1)!) (see the Appendix 2). Therefore, we need to simplify Algorithm 2.

4.2.1 Without multiplicity constraint

For the case of N cm a x =N no d e −2, we can select a cooperator independently for each source node, in other words, we can simply remove the constraint from Algorithm 2. Here, we introduce one more simplifications, that is, replacement of the packet success rate calculation by an RSSI calculation, taking into consideration the fact that the packet success rate is a monotonous increasing function on the RSSI and the packet success rate through a two-hop link is more affected by the one in a worse link:

$$\begin{array}{*{20}l} M_{i,j,k}^{smp} & = \sum_{n_{ijk}^{2} \in {\mathrm Z}_{ijk}^{2}} {RSSI}_{ijk}\left(n_{ijk}^{2}\right) \end{array} $$
((13))
$$\begin{array}{*{20}l} {RSSI}_{ijk}\left(n_{ijk}^{2}\right) & = \min \left\{RSSI_{ij}\left(n_{ijk}^{2}\right), {RSSI}_{jk}\left(n_{ijk}^{2}\right) \right\}. \end{array} $$
((14))

In this case, the simplified cooperator selection algorithm without multiplicity constraint is summarized as Algorithm 3. Its computational complexity is \(O\left (N_{\mathrm node}^{2}\right)\) (see the Appendix 3).

4.2.2 With multiplicity constraint

Now, in terms of source nodes, let us define a set of the indices of cooperator candidates for the ith source node as

$$ \begin{aligned} {\mathrm C}_{ik} = \Big\{ c_{ikq};~c_{ikq}=j(i,k)&=\arg~\mathop{q{\mathrm th}\max}_{\stackrel{\scriptstyle j \in {\mathrm V}_{\mathrm node}} {j\ \ne\ i, j\ \ne\ k}} \Big\{M_{i,j,k}^{smp}\Big\},\\[-5pt] q&=1, 2, \cdots, N_{\mathrm node}-2 \Big\} \end{aligned} $$
((15))

where \(~\mathop {q{\mathrm th}\max }\{(\cdot) \}\) denotes the function picking up the qth maximum out of (·). In (15), c ikq is the qth element of C ik which has the essentiality metric as

$$\begin{array}{*{20}l}{} \varepsilon_{ikq}=\mathop{q{\mathrm th}\max} _{\stackrel{\scriptstyle j \in {\mathrm V}_{\mathrm node}} {j\ \ne\ i, j\ \ne\ k}} \left\{M_{i,j,k}^{smp}\right\}- \mathop{(q+1){\mathrm th}\max} _{\stackrel{\scriptstyle j \in {\mathrm V}_{\mathrm node}} {j \ \ne\ i, j\ \ne\ k}} \left\{M_{i,j,k}^{smp}\right\} \end{array} $$
((16))

and the cooperator candidate c ikq with larger ε ikq is more essential for the ith source node. In addition, let us define the number of packets lost in the direct link from the ith source node to the BANCO as the unreliability metric:

$$\begin{array}{*{20}l} \upsilon_{ik}=N_{\mathrm hello}-{\mathrm Z}_{ik}^{1} \end{array} $$
((17))

where the direct link of the ith source node with larger υ ik is less reliable.

On the other hand, in terms of cooperator candidates, let us define a set of the indices of (parent) source nodes for the jth cooperator candidate as

$$\begin{array}{*{20}l} {\mathrm S}_{jk} = \left\{ s_{jku};~s_{jku}=i(j,k)= \arg~\mathop{u{\mathrm th}\min} _{\!\!\!\!\!\!\!\!\stackrel{\scriptstyle i \in {\mathrm V}_{\mathrm node}} {i\ \ne\ j, i\ \ne\ k, c_{ik1}\ =\ j}}\!\! \{\varepsilon_{ik1}\}\right \} \end{array} $$
((18))

where \(~\mathop {u{\mathrm th}\min }\{(\cdot) \}\) denotes the function picking up the uth minimum out of (·), and the source node s jku with smaller u is more removable from S jk .

In this algorithm, we first apply the cooperator selection without multiplicity constraint given by Algorithm 3 and then we remove parent source nodes for cooperator candidates whose multiplicities are more than the allowable largest value. Let us assume that the j the cooperator candidate has \(N^{\prime }_{\mathrm cmax}>N_{\mathrm cmax}\) parent source nodes:

$$\begin{array}{*{20}l} {\mathrm S}_{j'k} = \left\{ s_{j'k1}, s_{j'k2}, \cdots, s_{j'ku}, \cdots, s_{j'kN'_{\mathrm cmax}}\right\}. \end{array} $$
((19))

The element \(s_{j'ku}\phantom {\dot {i}\!}\) with smaller u has the smaller essentiality metric on j the cooperator candidate, so in this sense, it is quite natural to examine the removability from \(s_{j'k1}\phantom {\dot {i}\!}\). However, when comparing the unreliability metrics of \(s_{j'k1}\phantom {\dot {i}\!}\) and \(s_{j'k2}\phantom {\dot {i}\!}\), namely, \(\upsilon _{s_{j'k1}k}\) and \(\upsilon _{s_{j'k2}k}\), if \(\upsilon _{s_{j'k1}k} > \upsilon _{s_{j'k2}k}\), then it may be better not to remove \(s_{j'k1}\phantom {\dot {i}\!}\), because it implies that \(s_{j'k1}\phantom {\dot {i}\!}\) requires more help from a cooperator. Therefore, in the proposed algorithm, every examination the elements of S jk , either of s j k1 or s j k2 is always removed from S jk , which satisfies a certain condition. The simplified cooperator selection algorithm with multiplicity constraint is summarized as Algorithm 4, where the “remove” operation contains renumbering the remaining elements after the removal, and ρ is a scaling factor for the unreliability comparison. Its computational complexity is \(O\big (N_{\mathrm node}^{3}\big)\) (see the Appendix 4).

4.2.3 Proposed BANCO selection

After an adequate cooperator has been selected for each source node when temporally selecting the kth node as a BANCO (k=1,2,,N no d e ), the BANCO is finally selected. Here, it is reasonable that the adequate BANCO should receive as many packets with larger RSSIs as possible from all other nodes directly or indirectly. Therefore, based on the minmax criterion which can ensure that all nodes’ packet error rates are not extremely high, the metric of the BANCO selection can be given by

$$\begin{array}{*{20}l} M_{k}^{BANCO} &= \min_{\stackrel{\scriptstyle i \in {\mathrm V}_{\mathrm node}} {i\ \ne\ j}} \left\{M_{k,i}^{BANCO} \right\} \end{array} $$
((20))
$$\begin{array}{*{20}l} M_{k,i}^{BANCO} & = \sum_{n_{ik}^{1} \in Z_{ik}^{1}} {RSSI}_{ik} \left(n_{ik}^{1}\right)\\& + \sum_{n_{i j(i,k) k}^{2} \in Z_{i j(i,k) k}^{2}} {RSSI}_{i j(i,k) k} \left(n_{i j(i,k) k}^{2}\right). \end{array} $$
((21))

The BANCO selection algorithm is summarized as Algorithm 5. For each temporally selected BANCO (k=1,2,,N no d e ), the BANCO selection metric is calculated, so its computational complexity is \(O\left (N_{\mathrm node}^{2}\right)\) (see the Appendix 5).

5 Experiment on RSSI measurement

We conducted an experiment for obtaining RSSI data in our university campus, where we used a wireless signal based on the IEEE 802.15.4 standard with bandwidth of 2 MHz and transmission power of 0 dBm in the 2.4 GHz-ISM band. As shown in Fig. 3, we attached ten chip antennas to a subject, where their locations were as follows; right arm, left arm, right ankle, left ankle, chest, left finger, right front pocket, left front pocket, right hip pocket, and left hip pocket. Table 1 and Fig. 4 show the specification and radiation pattern of the chip antenna, respectively.

Fig. 3
figure 3

Positions of ten chip antennas: front view (a), side view (b), rear view (c), and chip antenna (d)

Fig. 4
figure 4

Radiation pattern of the chip antenna: horizontal plane (a) and vertical plane (b)

Table 1 Specifications of the chip antenna

In each session of the experiment, a packet was broadcast from each antenna every 0.1 s for 150 s in order to measure RSSIs at its other nine antennas. Figure 5 shows the route in one session of the experiment, and as shown in the figure, we conducted the experiment in a mixed indoor/outdoor environment. The subject took different postures and actions, such as sitting (20 s), standing up, standing still (20 s), turning round (20 s) in a room, walking (30 s in a corridor and 40 s outdoors), sitting down, and sitting still (20 s) outdoors. The same experiment was performed on three subjects.

Fig. 5
figure 5

Route of the experiment

Figure 6 shows the temporal RSSI variation for the right-ankle to left-finger link for subject A. As can be seen in the figure, the RSSI dynamically changes depending on the postures and actions. The other links had similar tendencies to this link. From Fig. 4, the radiation pattern of the chip antenna has no deep notch in both the horizontal and vertical planes, so we can see that the RSSI variation in Fig. 6 is mainly due to blocking of the link by parts of the body of subject A.

Fig. 6
figure 6

RSSI variation for the right-ankle to left-finger link (subject A)

6 Performance evaluation and discussions

First of all, Table 2 summarizes the system parameters required for MAC design and performance evaluation of the proposed WBAN.

Table 2 System parameters

6.1 Superframe design

We designed superframe parameters satisfying the criteria given by (7) and (8) for the hybrid-TDMA/CAMA whereas given by (9) and (10) for the TDMA. Table 3 summarizes the designed superframe parameters. In summary, according to the IEEE 802.15.4e LLDN, the hybrid-TDMA/CSMA and TDMA can accommodate ten nodes in a BAN each of which sense vital signs 100 times per second and transmits the data 10 times per second.

Table 3 Designed superframe parameters

6.2 Computer simulation and results on the packet error rate

We conducted computer simulations to evaluate the packet error rate of the cooperator-assisted WBAN with the designed superframe parameters using the stored RSSI data obtained in the experiment. One simulation session is repeated until each node broadcasts 3000 hello packets in the flooding process and transmits 10,000 data packets in the data transmission process for each case of all BANCO’s positions. We confirmed that there was little difference in the packet error rate between the hybrid-TDMA/CSMA and TDMA, so in the following figures, the packet error rate is common to the two MACs.

Figure 7 shows the average packet error rate for the cooperator-assisted BAN without cooperator multiplicity constraint. For comparison purpose, besides the optimal and proposed cooperator selections, this figure contains the performance for a single-hop (without packet retransmission), a self-retransmission (without cooperator assistance), and a random cooperator selection (a cooperator is randomly selected for each node, and it is changed periodically every 30 s). Each result is averaged over the three subjects. It can be seen from the figure that the self-retransmission gets little improvement. The most obvious reason is that the link quality cannot be improved in such a short duration. It can be also seen that the random cooperator selection does not greatly improve the performance. It is because, when a cooperator happens to be selected which gives a higher blocking correlation between the direct and indirect paths between its parent node and the BANCO, the cooperator assistance does not work well at all. When the transmission power is –10 dBm which is considered to be a typical transmission power of a WBAN, the average packet error rate of the single-hop transmission scheme without re-transmission is about 5.22 %, on the other hand, that of the proposed cooperator/BANCO selection is about 0.103 %, and there is no packet loss with the optimal cooperator selection. Considering the optimal cooperator selection is unrealizably changing the best cooperator packet by packet whereas the proposed cooperator selection is practical keeping the same cooperator for the whole data transmission process, we believe that the proposed cooperator selection significantly improves the performance.

Fig. 7
figure 7

Average packet error rate without cooperator multiplicity constraint

Figures 8 ac show the packet error rates against the position of the BANCO for subjects A, B, and C, respectively. Here, the transmission power is −10 dBm, and no cooperator multiplicity constraint is imposed. In each of the figures, the position selected by the proposed BANCO selection is also shown. It can be seen from the figures that the packet error rate largely depends on the position of the BANCO; if an inappropriate BANCO position is selected, the obtained packet error rate is terribly high, and furthermore, the optimal BANCO position changes when the subject changes. The proposed cooperator/BANCO selection can reduce the packet error rate of the single-hop transmission by around 1/250. However, as a cooperator for each source node, it can almost always select the node giving lower packet error rate but cannot always select the node giving the lowest packet error rate. To select a BANCO, the proposed algorithm uses the sum of RSSIs through the direct and indirect links to each source node, in other words, only the average (first moment) of the RSSI temporal variation (see (21)). In reality, the packet error rate depends on not simply the average but complicatedly the distribution of the RSSI, so to improve the BANCO selection performance, we need to take into consideration its higher-order moments in the algorithm. On the other hand, in some applications, it is required to select the BANCO position in advance. The results indicate that “left waist” is an adequate position as the BANCO for all subjects.

Fig. 8
figure 8

Packet error rate without cooperator multiplicity constraint (transmission power =−10 dBm), a: subject A, b: subject B and c: subject C

Figure 9 shows the average packet error rate for the duration of RSSI data used in the flooding process. It is clear that, even though the flooding duration is short, if the WBAN wearer can take different actions and postures in it, the proposed cooperator/BANCO selection improves the packet error rate.

Fig. 9
figure 9

Flooding duration versus the packet error rate without cooperator multiplicity constraint (transmission power =−10 dBm)

Figure 10 shows the dependency of the packet error rate on the scaling factor (ρ) for the unreliability comparison in the cooperator selection with multiplicity constraint (see line 18 in Algorithm 4). From the result, we set ρ = 1.5 in the following, but there is no large dependency on ρ observed in the figure, so we may simply compare \(\upsilon _{s_{jk1}k}\) with \(\upsilon _{s_{jk2}k}\) just setting ρ = 1.0.

Fig. 10
figure 10

Scaling factor for the unreliability comparison versus the packet error rate with cooperator multiplicity constraint (−10 dBm, N cm a x =2)

Figure 11 shows the results where N cm a x =1,2,4, and ρ=1.5 for the cooperator selection with multiplicity constraint. The packet error rate with N cm a x =1 is likely to be worse than the packet error rates with N cm a x =2 and 4 for almost all BANCO positions, but between with N cm a x =2, 4, and without multiplicity constraint, there is no large difference in the packet error rates. This implies that, in the WBAN with ten nodes on different positions of a human body, any node has multiple better cooperator candidates. From the result, we can see that N cm a x =2 must be fair in terms of both the packet error rate and energy saving for cooperators.

Fig. 11
figure 11

Packet error rate with cooperator multiplicity constraint (transmission power =−10 dBm), a: subject A, b: subject B and c: subject C

Finally, we compare the power consumption between the hybrid-TDMA/CDMA and TDMA. Table 4 summarizes the consumption current values for a typical transceiver module [24], and Table 5 shows the result, where the power consumption of the TDMA/CSMA is normalized by that of the TDMA. Since the current consumption for reception is as high as that for transmission, the power consumption for the TDMA/CSMA is not much lower than that for the TDMA although cooperators transmit their stored packets only when the packet transmissions by their parents’ nodes fail in the TDMA/CSMA.

Table 4 Consumption current values for a typical RF module
Table 5 Power consumption comparison

7 Conclusion

In this paper, we have shown that, to enable a cooperator-assisted WBAN, a hybrid-TDMA/CSMA is realizable by making effective use of CTS shared group frame, and a TDMA is also realizable in the IEEE 802.15.4e LLDN. In addition, we have evaluated the packet error rate of a cooperator/BANCO selection based on both the hybrid-TDMA/CSMA and TDMA by computer simulations, where we have used the stored RSSI data obtained from a mixed indoor/outdoor environment with three subjects.

The proposed cooperator/BANCO selection works well in the realistic environment with typical transmission power of −10 dBm, and the proposed cooperator selection is superior to the random selection by about 8 dB. It is also shown by our computer simulations that it is important to select adequate cooperators for each subject. The TDMA was slightly disadvantageous over hybrid-TDMA/CSMA in terms of power consumption. However, the TDMA is simple; it requires no CCA, CTS frame and RTS frame, so it can shorten the timeslot duration thus accommodate more nodes for the same data packet duration. This must be the advantage of the TDMA.

The proposed BANCO selection was not able to always select the best node as the BANCO for the three subjects. To investigate a more efficient BANCO selection using higher-order moments of RSSI variation at the sacrifice of computational complexity must be one of our future works.

8 Appendix 1

For each i (i=1,2,,N no d e , ik), and each n (n=1,2,,N pa c k e t ), we need to find the maximum out of a set of \(M_{i,j,k;n}^{opt}\) with the number of elements =N no d e −2. Since finding the maximum out of a set of N values requires N comparisons, the computational complexity of Algorithm is given by

$$\begin{array}{*{20}l} {CC}_{1} =O((N_{\mathrm node}-2) &\times (N_{\mathrm node}-1) \\ &\times N_{\mathrm packet}) \propto O\left(N_{\mathrm node}^{2} N_{\mathrm packet}\right). \end{array} $$
((22))

9 Appendix 2

When N cm a x =1, the computational complexity of Algorithm 2 is minimized, since the number of combinations of cooperator candidates is minimized. Although each source node cannot select itself as its cooperator, but its number is approximated as (N no d e −2)!. Therefore, the computational complexity of Algorithm is lower-bounded as

$${} \begin{aligned} {CC}_{2} =O((N_{\mathrm node}-2)! \ \times\ (N_{\mathrm node}-1)) = O((N_{\mathrm node}-1)!). \end{aligned} $$
((23))

10 Appendix 3

For each i (i=1,2,,N no d e ,ik), we need to find the minimum out of a set of \(M_{i,j,k}^{smp}\) with the number of elements = N no d e −2, so the computational complexity of Algorithm 3 is given by

$$\begin{array}{*{20}l} {CC}_{3} =O\left(N_{\mathrm node}^{2}\right). \end{array} $$
((24))

11 Appendix 4

In Algorithm 4, the computation complexities of performing Algorithm 3 (line 1) is given by

$$\begin{array}{*{20}l} {CC}_{4}^{algo 3} = O\left(N_{\mathrm node}^{2}\right). \end{array} $$
((25))

In addition, taking into consideration that the computational complexity of sorting a set of N values is given by O(N 2) for the worst case [25], the computational complexities of constructing C ik for i=1,2,,N no d e ,ik (line 2–8) and S jk for j=1,2,,N no d e ,jk (line 9–26) are respectively given by

$$\begin{array}{*{20}l} {} C{C_{4}^{C}} &= O((N_{\mathrm node}-2)^{2} \times (N_{\mathrm node}-1)) \propto O\left(\left(N_{\mathrm node}^{3}\right)\right. \end{array} $$
((26))
$$\begin{array}{*{20}l} {} C{C_{4}^{S}} &\propto O\left(\left(N_{\mathrm node}^{3}\right)\right.. \end{array} $$
((27))

The repeat-until loops furthermore contains comparison of unreliability metrics (line 18), so we need to count the number of the comparisons. Let us consider the worst case where the number of comparisons becomes the largest. In the first round of parent node removal, it happens when the best cooperator candidates of all source nodes (N no d e − 2) are the same. In this case, the cooperator candidate needs to compare the unreliability metrics of its parent source nodes N no d e −2−N cm a x times. Then, in the second round of parent node removal, it happens when the best cooperator candidates of remaining source nodes (N no d e −2−N cm a x ) are the same. In this case, the cooperator candidate needs to compare the unreliability metrics of its parent source nodes N no d e −2−2N cm a x times. In this way, the worst case happens when comparisons decreases from N no d e −2−N cm a x at the rate of N cm a x a round until it becomes less than N cm a x . Therefore, its computational complexity is calculated as

$${} {\fontsize{9}{12} \begin{aligned} &{CC}_{4}^{cmp} \\ &= O \left((N_{\mathrm node}-2) \left(\left\lceil \frac{N_{\mathrm node}-2}{N_{\mathrm cmax}}-1 \right\rceil \right) \right.\\ &\left. \quad-\ (N_{\mathrm node}-2) \left(\left\lceil \frac{N_{\mathrm node}-2}{N_{\mathrm cmax}} \right\rceil -1 \right) \left\lceil \frac{N_{\mathrm node}-2}{N_{\mathrm cmax}} \right\rceil N_{\mathrm cmax}/2 \right)\\ &\propto O \left(\left\lceil \frac{N_{\mathrm node}}{N_{\mathrm cmax}} \right\rceil N_{\mathrm node}^{2} \right) \end{aligned}} $$
((28))

where (·) is ceiling of (·), namely, the smallest integer not less than (·). Note this cost is still less than \(O\left (N_{\mathrm node}^{3}\right)\).

Consequently, the total computational complexity of Algorithm is given by the sum of these costs, and it is dominated by the largest complexity as

$$\begin{array}{*{20}l} {CC}_{4} = {CC}_{4}^{algo 3} + C{C_{4}^{C}} + C{C_{4}^{S}} + {CC}_{4}^{cmp} \propto O\left(N_{\mathrm node}^{3}\right). \end{array} $$
((29))

12 Appendix 5

For each k (k=1,2,,N no d e ), we need to find the minimum out of a set of \(M_{k,i}^{BANCO}\) with the number of elements = N no d e −1, so the computational complexity of the proposed BANCO selection is given by

$$\begin{array}{*{20}l} {CC}_{BANCO} =O((N_{\mathrm node}-1) \times N_{\mathrm node}) \propto O\left(N_{\mathrm node}^{2}\right). \end{array} $$
((30))

References

  1. IEEE Std.802.15.6-2012: IEEE standard for local and metropolitan area networks–Part 15.6: wireless body area networks.

  2. DB Smith, D Miniutti, TA Lamahewa, “Propagation models for body-area networks: a survey and new outlook”. IEEE Antennas Propagat. Mag.55(5), 97—117 (2013).

    Article  Google Scholar 

  3. E Reusens, W Joseph, B Latre, B Braem, E Tanghe, L Martens, I Moerman, C Blondia, “Characterization of on-body communication channel and energy efficient topology design for wireless body area networks”. IEEE Trans.Inform. Technol. Biomed.13(3), 933—945 (2009).

    Google Scholar 

  4. A Fort, C Desset, P Wambacq, L Van Biesen, “An ultra-wideband body area propagation channel model-from statistics to implementation”. IEEE Trans.Microwave Theory Tech.54(4), 1820—1826 (2006).

    Article  Google Scholar 

  5. Specification of the Bluetooth system covered core package version: 4.0(2010).

  6. Zigbee health care profile specification. Revision 15, Version 1.0(2010).

  7. A Sendonaris, E Erkip, B Aazhang, “User cooperation diversity.part i. system description”. IEEE Trans. Commun.51(11), 1927—1938 (2003).

    Google Scholar 

  8. JN Laneman, DNC Tse, GW Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior”. IEEE Trans.Inform. Theory.50(12), 3062—3080 (2004).

    Article  MathSciNet  Google Scholar 

  9. R D’Errico, R Rosini, M Maman, in Proc 2011 IEEE Int’l Conf. Commun. “A performance evaluation of cooperative schemes for on-body area networks based on measured time-variant channels”, pp. 1–5.

  10. J Dong, D Smith, in Proc 2013 IEEE Int’l Conf. Commun. “Opportunistic relaying in wireless body area networks: coexistence performance”, pp. 5613–5618.

  11. S Movassaghi, M Shirvanimoghaddam, M Abolhasan, in Proc 2013 Int’l Wireless Commun. Mobile Comput. Conf. A cooperative network coding approach to reliable wireless body area networks with demodulate-and-forward, pp. 394–399.

  12. DB Smith, D Miniutti, in Proc 2012 IEEE Wireless Commun. Networking Conf. “Cooperative body-area-communications: first and second-order statistics with decode-and-forward”, pp. 689–693.

  13. IEEE Std.802.15.4-2011: IEEE standard for local and metropolitan area networks–Part 15.4: low-rate wireless personal area networks (LR-WPANs)

  14. M Maman, F Dehmas, R D’Errico, L Ouvry, in Proc 2009 IEEE Int’l Symp. Personal Indoor Mobile Commun. “Evaluating a tdma mac for body area networks using a space-time dependent channel model”, pp. 2101–2105.

  15. P Abouzar, K Shafiee, DG Michelson, VCM Leung, in Proc. 2012–Spring IEEE Veh. Technol. Conf. “Effects of relaying on network lifetime in 2.4 GHz IEEE802.15.4 based body area networks.”, pp. 1–5.

  16. J Elias, A Mehaoua, in Proc 2012 IEEE Int’l Conf. Commun. “Energy-aware topology design for wireless body area networks,” pp. 3409–3413.

  17. H Feng, B Liu, Z Yan, C Zhang, CW Chen, in Proc 2013 IEEE Int’l Symp. Personal Indoor Mobile Commun. “Prediction-based dynamic relay transmission scheme for wireless body area networks”, pp. 2539–2544.

  18. J Ding, E Dutkiewicz, X Huang, G Fang, in Proc 2013 IEEE Int’l Conf. Ultra Wideband. “Energy-efficient cooperative relay selection for UWB based body area networks”, pp. 97–102.

  19. S Hara, D Anzai, K Yanagihara, K Takizawa, K Hamaguchi, in Proc 2011 IEEE Int’l Symp. Personal Indoor Mobile Commun. “A cooperative transmission scheme for real-time data gathering in a wireless body area network”, pp. 2254–2258.

  20. M Momoda, S Hara, in Proc 2013 Int’l Symp. Med. Inform. Commun. Technol. “A cooperative relaying scheme for real-time vital data gathering in a wearable wireless body area network”, pp. 38–41.

  21. IEEE Std.802.15.4e-2012: IEEE standard for local and metropolitan area networks–Part 15.4: low-rate wireless personal area networks (LR-WPANs) amendment 1: MAC sublayer.

  22. M Momoda, S Hara, in Proc 2014 Int’l Symp. Med. Inform. Commun. Technol. “Use of IEEE 802.15.4e for a cooperator-assisted wireless body area network”, pp. 1–5.

  23. E Rebeiz, G Caire, AF Molisch, “Energy-delay tradeoff and dynamic sleep switching for bluetooth-like body-area sensor networks”. IEEE Trans Commun. 60(9), 2733–2746 (2012).

    Article  Google Scholar 

  24. A Powerful System-On-Chip for 2.4-GHz IEEE 802.15.4, 6LoWPAN and ZigBee Applications, Texas Instruments.

  25. SG Akl, Parallel Sorting Algorithms (Academic Press, Orlando, Florida, 1985).

    MATH  Google Scholar 

Download references

Acknowledgements

This work was also supported in part by the Research Grant of Support Center for Advanced Telecommunications Technology Research (SCAT) of Japan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miyu Momoda.

Additional information

Competing interests

The authors declare that they have no competing interests.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Momoda, M., Hara, S. A cooperator-assisted wireless body area network for real-time vital data collection. J Wireless Com Network 2015, 238 (2015). https://doi.org/10.1186/s13638-015-0459-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-015-0459-2

Keywords