RFID-enabled MAC Protocol for WBAN

被引:0
|
作者
Ullah, Sana [1 ]
机构
[1] King Saud Univ, Dept Informat Syst, Chair Pervas & Mobile Comp, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
MAC; WBAN; Wakeup Radio; Power; Delay;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
One of key attributes of WBAN is to extend the network lifetime, which can be achieved by adjusting the wakeup and sleep modes of the sensor nodes. Traditional low-power methods such as channel polling and periodic duty cycling are unable to satisfy WBANs requirements due to idle listening, collision, and control packet overhead problems. In this paper, we propose an RFID-enabled MAC protocol (RMAC) for WBAN that dynamically adjusts the wakeup and sleep modes of the nodes according to the traffic, thus solving the idle listening and overhearing problems. The protocol accommodates normal and emergency traffic using pre-scheduled and RFID wakeup methods. Analytical expressions are derived to analyze the power consumption and delay of the proposed protocol for normal and emergency traffic. The analytical expressions are further validated by extensive simulations using Network Simulator 2(NS2).
引用
收藏
页码:6030 / +
页数:2
相关论文
共 50 条
  • [1] An Intelligent RFID-Enabled Authentication Protocol in VANET
    Shabani, Fateme
    Gharaee, Hossein
    Ghaffari, Fariba
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 587 - 591
  • [2] Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare
    Ghosh, Haradhan
    Maurya, Pramod Kumar
    Bagchi, Satya
    [J]. Wireless Personal Communications, 2024, 138 (04) : 2613 - 2635
  • [3] RFID-enabled protocol based on eigenvalues and eigenvectors of a matrix
    Ghosh, Haradhan
    Maurya, Pramod Kumar
    Bagchi, Satya
    [J]. International Journal of Ad Hoc and Ubiquitous Computing, 2024, 47 (02) : 59 - 70
  • [4] COLLECTOR: A Secure RFID-Enabled Batch Recall Protocol
    Qi, Saiyu
    Zheng, Yuanqing
    Li, Mo
    Lu, Li
    Liu, Yunhao
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1510 - 1518
  • [5] A Privacy Protection Protocol For RFID-enabled Supply Chain System
    Xia, XianYao
    Han, ShuiHua
    [J]. 2009 6TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, 2009, : 161 - +
  • [6] Lightweight Authentication Protocol for RFID-enabled Systems based on ECC
    Kaur, Kuljeet
    Kumar, Neeraj
    Singh, Mukesh
    Obaidat, Mohammad S.
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [7] RFID-Enabled Sensors and Technologies
    Georgiadis, Apostolos
    [J]. IEEE MICROWAVE MAGAZINE, 2013, 14 (05) : 24 - 25
  • [8] RFID-enabled flexible warehousing
    Zhou, Wei
    Piramuthu, Selwyn
    Chu, Feng
    Chu, Chengbin
    [J]. DECISION SUPPORT SYSTEMS, 2017, 98 : 99 - 112
  • [9] New mutual agreement protocol to secure mobile RFID-enabled devices
    Lo, N.W.
    Yeh, Kuo-Hui
    Yeun, Chan Yeob
    [J]. Information Security Technical Report, 2008, 13 (03): : 151 - 157
  • [10] An Improved WBAN MAC Protocol
    Bhoir, Smita
    Vidhate, Amarsinh
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,