2020
DOI: 10.1177/1550147720949140
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic superframe adaptation using group-based media access control for handling traffic heterogeneity in wireless body area networks

Abstract: Wireless body area network is a promising technology that brings healthcare to a new level of personalization. The applications of wireless body area network are not limited to healthcare monitoring applications but vastly used in entertainment applications. The applications are emerging at a fast pace and attract the attention of researchers. IEEE 802.15.6 provides a communication standard which specifies the physical layer and media access control layer operations for wireless body area networks. A fixed sup… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 30 publications
(50 reference statements)
0
0
0
Order By: Relevance
“…In 2012, the IEEE working group developed IEEE 802.15.6, a standard for modeling communication between sensor devices connected to WBAN. [10]. The hub must function in one of the three access modes described in the standard.…”
Section: ) Non-beacon Mode With Beacon Periodsmentioning
confidence: 99%
“…In 2012, the IEEE working group developed IEEE 802.15.6, a standard for modeling communication between sensor devices connected to WBAN. [10]. The hub must function in one of the three access modes described in the standard.…”
Section: ) Non-beacon Mode With Beacon Periodsmentioning
confidence: 99%
“…But these models are not applicable for WBANs due to the inability to offer client anonymity and developed for client-server platform. In order to convince the security needs in WBANs, (Zia et al, 2020) deployed 2 ID based authentication techniques with the application of certificate-less signature module. Therefore, (Liu et al, 2012) noticed that Liu et al's framework could not support the stolen verifier-table attack.…”
Section: Introductionmentioning
confidence: 99%