<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0120-6230</journal-id>
<journal-title><![CDATA[Revista Facultad de Ingeniería Universidad de Antioquia]]></journal-title>
<abbrev-journal-title><![CDATA[Rev.fac.ing.univ. Antioquia]]></abbrev-journal-title>
<issn>0120-6230</issn>
<publisher>
<publisher-name><![CDATA[Facultad de Ingeniería, Universidad de Antioquia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0120-62302016000200010</article-id>
<article-id pub-id-type="doi">10.17533/udea.redin.n79a10</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Cross-layer designs for energy efficient wireless body area networks: a review]]></article-title>
<article-title xml:lang="en"><![CDATA[Diseños de capa cruzada para redes inalámbricas de área corporal energéticamente eficientes: una revisión]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Correa-Chica]]></surname>
<given-names><![CDATA[Juan Camilo]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Botero-Vega]]></surname>
<given-names><![CDATA[Juan Felipe]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gaviria-Gómez]]></surname>
<given-names><![CDATA[Natalia]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad de Antioquia Facultad de Ingeniería ]]></institution>
<addr-line><![CDATA[Medellín ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Universidad de Antioquia Facultad de Ingeniería ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2016</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2016</year>
</pub-date>
<numero>79</numero>
<fpage>98</fpage>
<lpage>117</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0120-62302016000200010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0120-62302016000200010&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0120-62302016000200010&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Cross-layer design is considered a powerful alternative to solve the complexities of wireless communication in wireless body area networks (WBAN), where the classical communication model has been shown to be inaccurate. Regarding the energy consumption problem, we have prepared a current survey of the most relevant scientific publications on energy-efficient cross-layer design for WBAN. In this paper, we provide a comprehensive review of the advances in cross-layer approaches, protocols and optimizations aimed at increasing the network lifetime by saving energy in WBANs. Subsequently, we discuss the relevant aspects and shortcomings of these energy-efficient cross-layer techniques and point out the open research issues and challenges in WBAN cross-layer design. In this survey, we propose a taxonomy for cross-layer approaches to fit them into categories based on the protocols involved in the cross-layer scheme. A novel classification is included to clarify the theoretical concepts behind each cross-layer scheme; and to group similar approaches by establishing their differences from the other strategies reviewed. Our conclusion considers the aspects of mobility and channel modeling in WBAN scenarios as the directions of future cross-layer research for WBAN and telemedicine applications.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[El diseño de capa cruzada se considera una poderosa alternativa para dar solución a las complejidades introducidas por las comunicaciones inalámbricas en redes de área corporal (WBAN), donde el modelo clásico de comunicaciones no ha exhibido un desempeño adecuado. Respecto al problema puntual de consumo de energía, hemos preparado la presente revisión de las publicaciones más relevantes que tratan la eficiencia energética para WBAN usando diseño de capa cruzada. En este artículo se proporciona una revisión exhaustiva de los avances en aproximaciones, protocolos y optimizaciones de capa cruzada cuyo objetivo es incrementar el tiempo de vida de las redes WBAN mediante el ahorro de energía. Luego, se discute los aspectos relevantes y deficiencias de las técnicas de capa cruzada energéticamente eficientes. Además, se introducen aspectos de investigación abiertos y retos en el diseño de capa cruzada para WBAN. En esta revisión proponemos una taxonomía de las aproximaciones de capa cruzada, de modo que las técnicas revisadas se ajustan en categorías de acuerdo a los protocolos involucrados en el diseño. Una clasificación novedosa se incluye para hacer claridad en los conceptos teóricos involucrados en cada esquema de capa cruzada y para luego agrupar aproximaciones similares evidenciando las diferencias con otras técnicas entre sí. Nuestras conclusiones consideran los aspectos de movilidad y modelamiento del canal en escenarios de WBAN como las direcciones para futura investigación en WBAN y en aplicaciones de telemedicina.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cross-Layer]]></kwd>
<kwd lng="en"><![CDATA[energy efficiency]]></kwd>
<kwd lng="en"><![CDATA[network lifetime]]></kwd>
<kwd lng="en"><![CDATA[network protocols]]></kwd>
<kwd lng="en"><![CDATA[wireless body area networks]]></kwd>
<kwd lng="es"><![CDATA[Capa cruzada]]></kwd>
<kwd lng="es"><![CDATA[eficiencia energética]]></kwd>
<kwd lng="es"><![CDATA[tiempo de vida de la red]]></kwd>
<kwd lng="es"><![CDATA[protocolos de red]]></kwd>
<kwd lng="es"><![CDATA[redes inalámbricas de área corporal]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  <font face= "Verdana" size="2">     <p align="right"><b>ART&Iacute;CULO ORIGINAL</b></p>     <p align="right">DOI: <a href="http://dx.doi.org/10.17533/udea.redin.n79a10">10.17533/udea.redin.n79a10</a></p>     <p align="right">&nbsp;</p>     <p align="center"><font size="4"><b>Cross-layer   designs for energy efficient wireless body area networks: a review</b></font></p>     <p align="center">&nbsp;</p>     <p align="center"><font size="3"><b>Dise&ntilde;os de   capa cruzada para redes inal&aacute;mbricas de &aacute;rea corporal energ&eacute;ticamente   eficientes: una revisi&oacute;n</b></font></p>     <p align="center">&nbsp;</p>     <p align="center">&nbsp;</p>     <p><i><b>Juan   Camilo Correa-Chica*, Juan Felipe Botero-Vega, Natalia Gaviria-G&oacute;mez</b></i></p>     ]]></body>
<body><![CDATA[<p>Departamento de Ingenier&iacute;a Electr&oacute;nica e Ingenier&iacute;a   de Telecomunicaciones, Facultad de Ingenier&iacute;a, Universidad de Antioquia. Calle 67 # 53- 108. A. A. 1226. Medell&iacute;n, Colombia. </p>       <p>* Corresponding author: Juan Camilo Correa Chica, e-mail: <a href="mailto:: camilo.correa@udea.edu.co">camilo.correa@udea.edu.co</a></p>     <p>DOI: 10.17533/udea.redin.n79a10</p>     <p>&nbsp;</p>     <p align="center">(Received July 31, 2015; accepted April 27, 2016)</p>     <p align="center">&nbsp;</p>     <p align="center">&nbsp;</p> <hr noshade size="1">     <p><font size="3"><b>ABSTRACT</b></font></p>     <p>Cross-layer design is considered a powerful   alternative to solve the complexities of wireless communication in wireless   body area networks (WBAN), where the classical communication model has been   shown to be inaccurate. Regarding the energy consumption problem, we have   prepared a current survey of the most relevant scientific publications on   energy-efficient cross-layer design for WBAN. In this paper, we provide a   comprehensive review of the advances in cross-layer approaches, protocols and   optimizations aimed at increasing the network lifetime by saving energy in   WBANs. Subsequently, we discuss the relevant aspects and shortcomings of these   energy-efficient cross-layer techniques and point out the open research issues   and challenges in WBAN cross-layer design. In this survey, we propose a   taxonomy for cross-layer approaches to fit them into categories based on the   protocols involved in the cross-layer scheme. A novel classification is   included to clarify the theoretical concepts behind each cross-layer scheme;   and to group similar approaches by establishing their differences from the   other strategies reviewed. Our conclusion considers the aspects of mobility and   channel modeling in WBAN scenarios as the directions of future cross-layer   research for WBAN and telemedicine applications. </p>       <p><i>Keywords:</i><b> </b> Cross-Layer, energy efficiency, network lifetime,   network protocols, wireless body area networks</p> <hr noshade size="1">     ]]></body>
<body><![CDATA[<p><font size="3"><b>RESUMEN</b></font></p>     <p>El dise&ntilde;o de capa cruzada se considera una poderosa   alternativa para dar soluci&oacute;n a las complejidades introducidas por las   comunicaciones inal&aacute;mbricas en redes de &aacute;rea corporal (WBAN), donde el modelo   cl&aacute;sico de comunicaciones no ha exhibido un desempe&ntilde;o adecuado. Respecto al   problema puntual de consumo de energ&iacute;a, hemos preparado la presente revisi&oacute;n de   las publicaciones m&aacute;s relevantes que tratan la eficiencia energ&eacute;tica para WBAN   usando dise&ntilde;o de capa cruzada. En este art&iacute;culo se proporciona una revisi&oacute;n   exhaustiva de los avances en aproximaciones, protocolos y optimizaciones de   capa cruzada cuyo objetivo es incrementar el tiempo de vida de las redes WBAN   mediante el ahorro de energ&iacute;a. Luego, se discute los aspectos relevantes y   deficiencias de las t&eacute;cnicas de capa cruzada energ&eacute;ticamente eficientes.   Adem&aacute;s, se introducen aspectos de investigaci&oacute;n abiertos y retos en el dise&ntilde;o   de capa cruzada para WBAN. En esta revisi&oacute;n proponemos una taxonom&iacute;a de las   aproximaciones de capa cruzada, de modo que las t&eacute;cnicas revisadas se ajustan   en categor&iacute;as de acuerdo a los protocolos involucrados en el dise&ntilde;o. Una   clasificaci&oacute;n novedosa se incluye para hacer claridad en los conceptos te&oacute;ricos   involucrados en cada esquema de capa cruzada y para luego agrupar   aproximaciones similares evidenciando las diferencias con otras t&eacute;cnicas entre   s&iacute;. Nuestras conclusiones consideran los aspectos de movilidad y modelamiento   del canal en escenarios de WBAN como las direcciones para futura investigaci&oacute;n   en WBAN y en aplicaciones de telemedicina.</p>       <p><i>Palabras clave:</i> Capa   cruzada, eficiencia energ&eacute;tica, tiempo de vida de la red, protocolos de red,   redes inal&aacute;mbricas de &aacute;rea corporal</p> <hr noshade size="1">     <p><font size="3"><b>1.Introduction</b></font></p>     <p>Recent advances in wireless sensor networks (WSN) and   ubiquitous computing have revealed the wide field of application of these   techniques in medical environments, particularly related to remote medical   surveillance and disease treatment. The deployment of wireless sensors, in this   context, lies in the human body, fostering the emergence of a new notion in   this field: the WBAN that brings a myriad of possibilities for human health   remote monitoring for the enhancement of a patient's quality of life. Although   WBANs are in fact WSNs and share the same energy, processing and deployment   constraints, they have special limitations due to their implantation on or   inside the body. The main limitations are <i>energy   consumption </i>and <i>body channel effects</i>.   WBANs are supposed to last for long periods of time and, in the case of   implanted sensors, periodic battery replacement is not possible. Regarding this   issue, previous research has shown that the traditional open system   interconnection (OSI) layered stack does not fit all of the energy consumption   and QoS demands in WBANs, bringing about the emergence of new non-layered   approaches and techniques like cross-layer design.</p>     <p>There are several challenges related to WBAN development,   namely 1)the use of low power levels to avoid tissue heating and reduce levels   of electromagnetic absorption, 2)the need for high levels of quality of service   (QoS) for the management of critical information, such as the health condition   of a patient, 3)the size of sensor node devices to avoid discomfort in the   users, 4)the heterogeneity of the sensor nodes, 5)the mobility of the sensor   nodes in the WBAN introduced by postural changes and 6)the scarce energy   resources that depend on the battery life.</p>     <p>Energy consumption efficiency in WBANs is an open   research issue that has been approached from different angles. Power-efficient   protocols have been developed for individual layers of the OSI model, and novel   protocol implementations have been published that aim to introduce new design   paradigms. Particularly, at the MAC layer, there are plenty of proposals to   reduce energy consumption in WBANs like MedMAC [1], BodyMAC [2], BSN-MAC [3],   DQ- MAC [4], H-MAC [5], CA-MAC [6] and TaMAC [7]. All these protocols try to   reduce energy consumption in basic medium access schemes like CSMA/CA (Carrier   Sense Multiple Access Collision Avoidance) and TDMA (Time Division Multiple   Access) due to factors such as collisions, overhearing, overhead, idle   listening and lack of synchronization (cause of clock drifting). With regard to   the network layer, energy aware routing and data load balancing are the main   goals to extend the network lifetime. Some protocols devised for WBANs include   TARA [8], ALTR [9], LTRT [10] and LR [11]. Most of these protocols were   designed to avoid rise of temperature in the sensor nodes by relaying traffic   routing to specific nodes and fusing data to reduce the number of packet   transmissions. Regarding the transport layer, protocols have been designed to   avoid energy waste resulting from congestions and bottlenecks that could impact   the packet loss ratio (PLR) and the latency of communication [12]. In the   application layer, the energy aware protocols focus on the compression of data,   data fusion and data aggregation techniques to reduce the number of   transmissions [13, 14].</p>     <p>Some of the protocols mentioned above present   cross-layer schemes and save energy but are only focused on the energy   consumption of the medium access mechanism. The others work under the stack   layered model with independent layers that only communicate directly with upper   and lower layers. Hence, the layers that are not optimized still waste   resources and hence these approaches are inadequate for WBANs. To ameliorate   this situation, the cross-layer design suggests a new model of information   sharing between adjacent and non-adjacent layers, and research has shown that   this type of approach enhances the performance of the WSNs and WBANs in   scenarios where the traditional OSI model fails   [15]. </p>     <p>Many on-going studies focus on cross-layer designs for   WBANs, all of them aimed at addressing the particular complexities introduced   by WBANs. In this survey, our goal is to analyze some studies that propose to   solve the problem of energy-efficiency in WBANs. To achieve this goal, we   introduce a taxonomy that classifies the reviewed investigations by the   communication layers involved in the cross-layer design presented in each of   them. The remainder of the paper is organized as follows: in Section 2, we   illustrate the main concepts of WBANs, cross-layer design and energy   efficiency. In Section 3, we present the taxonomy for cross-layer approaches   solving the problem of energy efficiency in WBANs. In Section 4, we classify   the protocols reviewed by the cross-layer scheme used to develop the approach.   In Section 5, we discuss the results of these approaches and note open   challenges in this area and finally, in Section 6, we conclude this paper.</p>        <p><font size="3"><b>2. Energy constraints in WBAN and Cross-layer design </b></font></p>     ]]></body>
<body><![CDATA[<p>The notion of WBAN was introduced by T. G. Zimmerman   in 1996. A WBAN can be thought of as a set of wirelessly connected sensor nodes   that monitor vital signs and the process human body signals [16]. These nodes   are designed in such a way that they can be deployed on the body, worn, or   implanted inside the body. The WBAN basic architecture consists of nodes spread   along or inside the body and a central node known as a ''sink'' that plays the   role of an interface between the WBAN and external networks (Figure 1). WBANs   have emerged as an interesting field for researchers focused on telemedicine   and e-health applications such as remote ECG (electrocardiogram), remote EEG   (electroencephalogram), the treatment of several chronic diseases based on   glucose levels in the blood and any remote medical assistance application that   aims to enhance the patients' conditions and reduce the costs of medical   treatment and hospitalization.</p>     <p align="center"><a name="Figura1"></a><img src="img/revistas/rfiua/n79/n79a10i01.jpg"></p>     <p>The tasks performed by the nodes in a WBAN, and in   general, in any WSN, including <i>sensing</i>, <i>data processing </i>and <i>communications</i>, incur energy   consumption. The wireless communication process constitutes the major power   consuming task [17]. As nodes implanted on or deployed around the body have a   very small form factor in pursuit of user comfort, batteries to power these   devices are kept small, and hence energy storage capacity becomes a relevant   issue. Most applications of WBANs restrict nodes to not require replacement of   the battery over long periods of time; for example, a pacemaker or a glucose   monitor is supposed to last for at least 5 years. Thus, energy-aware strategies   have to be devised to keep nodes working properly over the required time   duration. The network lifetime is defined as the time between the moment the   entire WBAN is turned ON and the moment that the first node runs out of power,   so energy saving strategies should support uniform energy drain, focusing on   balancing power consumption among all the nodes comprising the network [18].</p>     <p>Another important issue is the constraint related to   RF power, namely the consequences of the body's reaction to electromagnetic   radiation and the localized specific absorption rate (SAR) in the body. To show   the magnitude of the situation, sensors in a WBAN are required to broadcast   data at low power due to heating of the radio chips that transfer heat to the   tissues that form the muscles and causes harm to the WBAN user (burning or even   malignant cell degeneration) [19].</p>     <p>Besides the aforementioned issues, several causes of   energy waste have been identified in WSNs, including <i>collision, overhearing, idle listening, over-emitting,</i> <i>control packet overhead and traffic   fluctuations</i>. Collisions occur when two or more nodes try to access the   communication channel simultaneously. Idle listening is when a node listens to   a channel that lacks traffic. Overhearing occurs when nodes receive packets   that are not intended for them. Control packet overhead happens when a node   adds too many control headers to the payload, and over-emitting means that many   retransmissions are required to make a packet reach its destination [20]. </p>     <p>The seven-layer OSI model was originally designed for   wired networks. Each separate layer has its own set of protocols, and   communication only occurs between adjacent layers in a stack fashion [21].   Though layered architectures like the OSI model have been used in wireless   networks, they are not the best choice for WSNs due to the constraints imposed   by the scarce battery and processing resources in this type of network [22].   Many proposals have emerged to ameliorate this issue in WSNs; one approach that   has been considered to optimize the management of the scarce resources by   exploiting the interdependence between the different layers is cross-layer   design [23].</p>     <p>Cross-layer design basically performs a violation of   the layered hierarchy by allowing protocols from different layers (adjacent and   non-adjacent) to exchange information and relevant parameters. The cross-layer   approach proposes various alternatives to the traditional layered model: <i>The creation of new interfaces </i>to manage   the connection and the flow of information between layers; <i>The merging of adjacent layers</i>, where a new ''super-layer'' is   created by merging services provided by two or more layers; <i>vertical calibration across layers</i>,   setting a priori information obtained from layers or updating it based on   parameters at runtime; <i>new abstraction</i>,   which defines a non-layered architecture to have functions similar to those of   the traditional protocol stack. Implementations of the cross-layer approaches   have also been proposed based on <i>direct   communication between layers</i>-(with exchanges of information between layers   performed at runtime)-, a <i>shared database   across layers</i>-(with a new layer-like scheme that performs the storage and   retrieval of layer-related information), and a <i>completely new abstraction </i>(innovative implementations aimed at   replacing the traditional stack like scheme) [15, 24] (see <a href="#f2">Figure 2</a>).</p>     <p align="center"><a name="Figura2"></a><img src="img/revistas/rfiua/n79/n79a10i02.jpg"></p>     <p>An efficient cross-layer approach should provide   schemes to avoid all the aforementioned sources of energy waste by promoting   novel trade-offs between layers to enhance the wireless communication process   and simultaneously extend the network lifetime.</p>        <p><font size="3"><b>3. Taxonomy: cross-layer approaches for WBANs </b></font></p>     ]]></body>
<body><![CDATA[<p>In this section, the different studies are classified   by the communication layers involved in each cross-layer strategy. This survey   details how each approach works (as described by the authors in the original   paper), its main problems and shortcomings that represent open issues for   future research, and a critical analysis of the performance results as   originally presented by the authors.</p>     <p><b>3.1. PHY and link:</b></p>     <p>The aim behind a cross-layer strategy that involves   the layers at the very bottom of the stack is to enhance the protocol   performance by a synchronized management of the medium access strategies and   the configuration of the devices used in the transmission and reception of data   (transmission power levels, SNR, battery level, etc.). A priori knowledge   obtained from one such layer helps improving parameters or procedures in the   other layer. For example, in [25], the authors present an energy-efficient   cross-layer optimization for wireless personal area networks (WPAN) that can be   applied to WBANs. The authors propose that an SNR (signal to noise ratio) can   be set for maximizing the energy efficiency and that this optimum SNR value   depends on the ARQ (automatic repeat request) scheme on the MAC layer. This   approach mitigates interference by multiple access (MAI) using multi carrier   spread spectrum (MC-SS) modulation. On the MAC layer, nodes contend under a   CSMA/CA scheme to request transmission. The network coordinator allocates the   slots as a response to the requests, and every node is allowed to send data in   its corresponding slot in a TDMA fashion, so it is assumed that the nodes use   the ARQ scheme as an error recovery mechanism. The metric of energy efficiency   is defined as the ratio between the efficiency of the transmission goodput of   the ARQ scheme (calculated as the product of the efficiency of the throughput   of the ARQ scheme and the residual frame error rate (FER)) and the average   energy consumed in the transmission of a frame. This metric is used to   calculate an optimum value of SNR because a low value of SNR increases energy   consumption due to the number of retransmissions required, and a high value of   SNR increases energy consumption because more energy is needed to transmit a   single frame.</p>     <p>The authors executed an experiment to test the   performance of SNR-ARQ cross-layer by running a simulation using an MC-SS   link-level simulator employing the signal to noise ratio as the input   parameter. The experiment showed that throughput and goodput metrics improved   performance as the SNR increased for various ARQ schemes. As energy consumption   increases for both low and high SNR values, due to increased retransmissions   and higher transmission power for data frame respectively. The experiment   revealed an SNR value that permits to achieve efficient energy consumption   while improving throughput and goodput metrics for various ARQ schemes.</p>     <p><a href="#t1">Table 1</a>, shows the averaged performance of throughput,   goodput and energy efficiency metrics regarding various ARQ schemes for   different SNR values.</p>     <p align="center"><a name="Tabla1"></a><img src="img/revistas/rfiua/n79/n79a10t01.jpg"></p>     <p><b>3.2. PHY and network</b></p>     <p>Information gathered at the physical layer can help   make routing decisions.</p>     <p>It should be obvious, for instance, that in a   cross-layer approach aimed at saving network energy, the routes should not   involve nodes close to battery depletion, so the information of the battery   level should be available to a node to make its routing decisions; In [26], it   is proposed a novel protocol based on fuzzylogic. According to the authors,   taking the minimum number of hops as a rule to choose a node as the next hop is   not efficient because, as a consequence, the nodes on that route will quickly run   out of power if is repeatedly chosen and once that route is offline, the   process will be repeated in the same fashion with the remaining routes. The   proposed protocol runs an algorithm that uses two main components, a fuzzy   controller and a cross-layer module that gathers parameters from the physical   layer. The algorithm changes the router node dynamically using the fuzzy   controller, and the node is aware of energy changes in the neighbors. Three   parameters are collected by the cross-layer module: the neighbor's battery   level, the received signal strength (RSSI) and the transmission power of the   node. These parameters are fed as inputs to the fuzzy controller, and the   output is the probability of choosing a node as the next hop (see <a href="#f3">Figure 3</a>).</p>     <p align="center"><a name="Figura3"></a><img src="img/revistas/rfiua/n79/n79a10i03.jpg"></p>     ]]></body>
<body><![CDATA[<p>The algorithm consists of four steps. <i>Fuzzification </i>of the input variables   maps the variables to the appropriate fuzzy set and passes them through a   structure of fuzzy logic rules. </p>     <p><i>Triangular   membership functions </i>are used to obtain the magnitude of   the participation of the energy level of a node in a fuzzy set. <i>The fuzzy interface engine </i>adds rule   outputs and unifies them based on the rule weights and the max-min interference   method. In <i>defuzzification and fuzzy   control</i>, the output of the fuzzy controller is obtained and the nodes learn   adaptively by making their own decisions while they send and receive packets. </p>     <p>Although this protocol does not take mobility into   consideration, it achieves high rates of energy saving by consuming power   uniformly through the network and checking the energy levels of nodes to make   next hop decisions.</p>     <p>The fuzzy protocol was simulated using an AODV (ad hoc   on-demand distance vector) algorithm modified to implement the proposed   energy-efficient routing algorithm. Thus, a comparison was made between AODV   and the AODV modified with the proposed approach.</p>     <p>An experiment to test the performance of both   protocols was conducted to evaluate energy efficiency.   The experiment was a simulation of a network comprising 36 nodes, every node   with inital battery load of 300J and simulation run time of 1000s. Two metrics   were observed, the first one, the time of the first dying node; simulation   results show that the residual energy in the first-dying node lasted over 5   times more in the fuzzy AODV than in the original AODV. </p>     <p>And the second one was the overall network lifetime,   and the simulation shows that the network lifetime is prolonged when using   cross-layer fuzzy-based routing, <a href="#t2">Table 2</a> refers the experiment results for the   network using AODV routing protocol and the cross-layer fuzzy protocol. It is   clear that the cross-layer fuzzy protocol outperforms the AODV protocol   regarding energy consumption as it increases individual nodes lifetime and the   overall network lifetime. <a href="#t2">Table 2</a>:</p>     <p align="center"><a name="Tabla2"></a><img src="img/revistas/rfiua/n79/n79a10t02.jpg"></p>     <p><b>3.3. Link and network</b></p>     <p>Taking advantage of the characteristics and parameters   of a medium access strategy allows cross-layer protocol designers to implement   energy saving routing approaches. It is of great help to avoid contention-based   strategies by the inclusion of energy-efficient network procedures determined   by a fair assignment of transmission slots at the link layer. In this aspect,   the next two strategies based on TDMA and spanning tree topologies present   energy efficient crosslayer schemes between link and network layers. In [27],   the authors propose a cross-layer approach between the MAC and network layers,   named the wireless autonomous spanning tree protocol (WASP) that uses a   spanning tree (see <a href="#f4">Figure 4</a>) for medium access control and routing. Each node   in the tree tells its one-hop tree children the time slot they are allowed to   send data; this process is done by sharing a special message called a WASP   scheme. Each node sends a WASP scheme to its children to inform them when they   are allowed to transmit, and the children respond by sending their own schemes   in the corresponding time slots.</p>     <p>The entire process until when the farthest node sends   a data package to the sink is called a cycle. The cycle begins when the sink   node sends its scheme to its children in the first time slot. In the following   slot, the sink's children, called the level 1 children, send their data to the   sink and send their schemes to their children, the level 2 children. In the   next slots, the sink keeps silent while level 2 children send their data and   scheme and the level 1 children enter</p>     ]]></body>
<body><![CDATA[<p align="center"><a name="Figura4"></a><img src="img/revistas/rfiua/n79/n79a10i04.jpg"></p>     <p>A contention slot to allow new nodes to join the   network. In the next slot, the parent nodes forward their children's data   towards the sink, and the last slot is the contention slot of the sink. This   approach contributes to energy saving because nodes can sleep during their   silent slots, and nodes also save energy in routing as they only forward data   to the parent node. Overhearing and collisions are avoided due to the slotted   mechanism to access the medium. Three major shortcomings are identified for   this approach: 1) it lacks an optimum calculation of time slot length, which   can cause nodes to fall into idle listening and introduces delays in packet   forwarding; 2) nodes that are parents to several nodes are prone to sleep less   than other nodes and thus have a shorter lifetime; 3) the spanning tree does   not support mobility, which is a constraint in WBANs.</p>     <p>The performance of WASP was compared against the   results obtained using a combination of a CSMA scheme with a fixed routing   protocol in a scenario composed of a sink and 13 nodes in a spanning tree   topology (see <a href="#f4">Figure 4</a>).</p>     <p>The latter scheme showed a packet loss close to 30%,   and a few nodes could not succeed at transmitting any packet, while there was   no packet loss using WASP.</p>     <p>Concerning the delay, WASP exhibited a maximum delay   of 0.35 seconds, while in the other protocol there were nodes whose delay   exceeded a limit of 0.8 seconds. <a href="#t3">Table 3</a>, as shown in [27], presents a   comparison of the end to end delay in the transmission of different numbers of   packets for a node located at the lowest level in the tree hierarchy. The   comparison was made between WASP and the combination of a CSMA scheme with a   fixed routing strategy (CSMA-FE).</p>     <p align="center"><a name="Tabla3"></a><img src="img/revistas/rfiua/n79/n79a10t03.jpg"></p>     <p>A drawback of WASP is that there is no mechanism to   supply the coordinator absence in the case of coordinator energy depletion. In   WBANs, the architecture cannot be tied to a central node organization if there   is no way to replace the coordinator in a failure, so this approach should take   into consideration concepts derived from opportunistic and mobility-aware   schemes. WASP acceptably meets QoS requirements such as transmission   throughput, high packet delivery ratio, fixed end to end delay and low energy   consumption.</p>     <p>In [28], authors showed the design of a   cross-layer protocol called CICADA (Cascading Information retrieval by   Controlling Access with Distributed slot Assignment). This protocol arranges   nodes in a spanning tree and divides the time into slots to avoid collisions   and idle listening; the data are forwarded in cycles, and the time slots are   assigned in each cycle. Each cycle is divided in a control subcycle and a data   subcycle. In the control subcycle, parent nodes send the control and the data   schemes (the slots allocation), and the children are assigned their   transmission time slots. The control scheme directs the order in which the   children send their own control schemes to their children and the data scheme   points when the children can send their data in the data period of the data   subcycle; every ending slot in the data subcycle is used for the contention of   new nodes. </p>     <p>In the data period, the nodes receive data from their   children and send it (along with their own data) to their parents. When a node   sends a packet, it also sends additional information that consists of its own   data period and a waiting period. In case a node has no data to send, it sends   a HELLO packet with only the additional information. This HELLO packet helps   parent nodes to determine whether their children are alive; if a parent has not   received data or HELLO packets from a child node in two consecutive cycles, the   parent assumes this child to be offline. If a child node has not received any   schemes from its parent in two consecutive cycles, it begins to contend for   another parent in the contention slot by sending a join request packet with the   number of slots it needs to send data.</p>     <p>To evaluate the performance of CICADA, the authors set   up two simulation scenarios composed of a sink and 13 children nodes disposed   in a spanning tree topology (see Figure 4). In the first scenario, a node that   belongs to the first level of children below the sink is moved for 10 seconds   to join a new parent at the second level and moved to its original position   again. Hence, all its children are affected because there was one extra hop to   reach the sink; as a consequence, a delay of over 0.2 seconds is experienced by   the lowest children in the branch due to the process of joining a new parent   and joining the sink back again. In the second scenario, a node on the third   level of the tree is moved nearby the sink to simulate the movement of an arm,   and the consequence is the reduction of the delay in transmission for this   particular node as it joins the sink as its new parent.</p>     ]]></body>
<body><![CDATA[<p><a href="#t4">Table 4</a> shows the end to end delay performance for two   nodes, one node located at the chest, a direct sink child node and less   susceptible to disconnection due to mobility while the other one is located at   one arm, two hops away from the sink and directly affected by body mobility.</p>     <p align="center"><a name="Tabla4"></a><img src="img/revistas/rfiua/n79/n79a10t04.jpg"></p>     <p>CICADA constitutes an improvement over WASP,   exhibiting the same energy saving benefits by avoiding idle listening,   overhearing, and collisions and adding the possibility of a dynamic and mobile   network because nodes can join new parents. CICADA is prone to network   disconnection when a parent dies, as no method for a node to become a parent is   mentioned and orphan children would reduce the lifetime of the remaining   parents.</p>     <p>One major drawback identified in CICADA is due to the   node joining (mobility) mechanism because it lacks a security strategy to   prevent intruder nodes or nodes that belong to a coexistent CICADA network in a   hospital scenario from joining the network in an unauthorized way. Another   issue identified in CICADA is that the tree cannot have very deep branches   because a node on the upper level just below the sink will incur high duty   cycles, and the energy depletion of this node will happen sooner, while lower   level nodes will undergo longer sleep times and are prone to suffer from packet   loss, as CICADA does not implement any packet queuing mechanism; this can cause   the reliability of the medical network to be compromised.</p>     <p>CICADA considers that one packet is generated for a   single data cycle, so high load applications will make the nodes undergo long   duty cycles, as more slots are needed for transmissions, and as a consequence,   energy will be consumed faster.</p>     <p>Reliable medical data delivery from the sensor nodes   to the sink requires a network layer aware of the channel variations and the   state of the links binding the nodes in the network. A good example is the   approach presented in [29], which proposes a cross-layer strategy aware of   communication interferences and changes in network topology in a joint manner   to fulfill the data reliability requirements of the WBAN. The strategy is   conceived as an improvement of a previous one developed by the authors called   CBAS (centralized body area network access scheme) [30]. The aforementioned   improvement consists of the incorporation of a network layer strategy to   enhance the packet delivery ratio (PDR), exploiting information gathered at the   link layer about the quality of the links in the WBAN in such a way that the   most reliable links can be identified in a distributed manner, adding an   approach of an adaptive duty-cycle in the nodes to increase energy savings.</p>     <p>The use of CBAS as an underlying MAC layer alleviates   service interruptions due to the coexistence of several wireless sources in the   channel and thus reduces medium access latencies. The proposed network layer   approach takes information from the link layer to take into account channel and   link fluctuations, such that the trade-off between the PDR and delay is reduced   in transmission scheduling.</p>     <p>There are two fundamental premises for the design   development: 1) Although TDMA strategies are energy efficient, they are not   aware of limited periodic access to the channel under the presence of   coexistent wireless technologies (WiFi, Zigbee, Bluetooth, etc.) and 2) to face   unpredictable changes in the topology, an online scheduling mechanism based on   link quality is preferable.</p>     <p>Hence, to take advantage of TDMA energy saving   characteristics and to solve the problem of high latency in contention-based   WBAN access schemes, under high data rates and high transmission power, in   CBAS, the sink tests the spectrum to find free slots. Once a free slot is   found, a transmission orthogonal to the frequency and/or time begins. This   strategy allows the WBAN to operate reliably under environments characterized   by coexistent technologies and at the same time allows nodes to transmit in an   interference-free time slot.</p>     <p>The authors point out that several previous studies   indicated that WBANs can confidently benefit from free slots that occur along   the spectrum, even in areas where coexistence with wireless signals is   expected, because there are enough free slots and the transmission scheduling   is successful most of the time. When the sink detects any free slot it sends an   RTS (request to send) packet to inform other technologies' devices that a   transmission will take place at the WBAN. Then, the sink sends a command in the   control channel to inform that nodes in the WBAN are allowed to start a   transmission. When the nodes receive such a command, they wake up and start the   contention for the time slot; the contention winner is decided by a parameter   called ''weight'', which is calculated based on the quality of the link between   each node and the sink and by the number of transmissions that a node has made   previously to guarantee a fair distribution of the transmission opportunities   between all the nodes. The node with the highest ''weight'' is the one with the   best chance to get the slot.</p>     ]]></body>
<body><![CDATA[<p>When a node wins the contention, it sends a   ''win-packet'' to the sink informing it that it is ready to transmit, and then,   to reduce the probability of collisions, the sink sends a high power packet to   prevent transmissions from other nodes.</p>     <p>The design is not restricted to unicast transmissions,   given that some nodes are located in far positions, such as the heel, so that   the quality of the link with the sink is low, and hence other nodes have to   forward the transmissions between such nodes and the sink. When a node sends a   data packet, its neighbors save a copy of the packet and remain active until an   ACK (Acknowledge) signal comes from the sink. In case of no ACK, a neighbor   node forwards the copy, and once the ACK is received, all neighbors go into   sleep mode.</p>     <p>It is of note that this cross-layer design provides a   mechanism for adaptive duty-cycles through the application of policies or   conditions for the management of the preferences of a node that control the   amount of time a node should be in active mode.</p>     <p>For the cross-layer scheme in [31], the MAC proposal   of CBAS [30], is modified to achieve a dynamic scheduling scheme in order to   improve the Packet Delivery Ratio (PDR) observed in statically scheduled WBANs.   The exploitation of flat fading and symmetric   characteristics of the channel permits to derive the power needed to perform a   successful transmission to the sink node. In this scheme, the sink broadcasts a   command packet to indicate that the channel is available for the WBAN, using   that command the nodes infer the minimum power needed to deal with the   attenuation of the link towards the sink. If the link quality is very poor,   nodes abandon the transmission. In the second stage, nodes review the history   of their participation in transmissions, in order to calculate a backoff window   for the dynamic scheduling and fair allocation. For this purpose, nodes   calculate a weight metric that depends on the number of times that a node has   responded to commands of the sink node and participated in transmissions, nodes   with higher weights have shorter backoff windows. </p>     <p>When the node with the highest weight completes its   backoff window, then it sends a ''win packet'' to inform that is ready to start a   transmission, then the sink sends a high power packet to prevent other nodes in   the network from starting transmissions. This scheme is extendable to multi-hop   routing, when other nodes receive the ''win packet'' they keep listening to save   a copy of the data packet and make a retransmission in case of no ACK from the   sink. The scheme shows a significant improvement in the PDR, especially in   multi-hop mode, with respect to statical scheduling mechanisms.</p>     <p>The IEEE 802.15.6 WBAN standard [32] suggests one-hop   star and 2-hop extended star topologies for health monitoring applications and   defines seven category levels for packet priorities. In [33], a cross-layer   based data dissemination algorithm adopts a reverse tree routing mechanism that   aims to reduce the number of hello beacons exchanged for establishment and   maintenance of the network topology in 2-hop extended WBAN. The reverse tree   has two build phases, a discovery phase for network coordinator ID broadcasting   to all the nodes in a beacon message and a reverse tree route computation phase   for next hop designation in the network.</p>     <p>In the discovery phase, the coordinator broadcasts its   ID, and one-hop neighbors forward this ID to the 2-hop neighbors, which know   not to forward the message any further by checking a hop counter in the   message. To compute the reverse tree at the next phase, one-hop nodes choose   the coordinator as their next hop while 2-hop nodes select as their next hop,   the forwarder node whose beacon retransmission was the first received, that is,   the hop with the least delay.</p>     <p>To support the IEEE 802.15.6 traffic differentiation,   3 levels of priority are defined (in order of priority) Emergency Mandatory   (EM), Delay-Sensitive (DS) and General Monitoring (GM). The channel access   schemes are CSMA/CA and Slotted Aloha. EM and DS packets are forwarded in the   EAP1 (exclusive access period) and EAP2 periods of the super frame, while GM   packets can be forwarded in the RAP1 (random access period), RAP2 and CAP   (contention access period) periods. Although the reverse tree scheme proposes   an efficient approach for route computation, it is not clear how the topology   reacts in terms of energy efficiency in the case that a forwarder node performs   as the next hop for multiple 2-hop nodes, and in the case of energy depletion   of a forwarder node, there is no mechanism for a 2-hop node to detect whether   it is still connected to the network or not. As a result, the packet loss rate   could dramatically increase in such a situation.</p>     <p>An opportunistic multi-hop routing strategy, presented   in [34], involving MAC and Network layers, exploits the remaining energy in the   batteries and the proximity of relay nodes to the sink in order to improve the   reliability of WBANs, represented in the Packet Delivery Ratio metric. The   scheme considers the use of relay nodes for packet forwarding towards the sink   node. This protocol is focused on making the right selection of the relay node   with better energy resources and closer to the sink node, to guarantee a   reliable data delivery and a fair distribution of data load among all nodes in   the network.</p>     <p>Based on a traditional opportunistic mechanism, a   source node broadcasts an RTS (Request to Send) packet and waits for a CTS   (Clear to Send) response from a potential relay node. The idea is to choose the   relay node whose CTS packet arrived first. Potential candidates for data   forwarding calculate a time metric that defines the delay after which the relay   node can access the channel for broadcasting its CTS packet. This time metric   depends on available residual energy in the battery and the proximity to the   sink node that is deduced from the RSSI value of the last beacon packet   received from the sink. Relay nodes have to make sure that they are indeed   closer to the sink than the source node itself, then a relay compares the RSSI   of the beacon received from the sink and the RSSI of the RTS packet received   from the source node.</p>     ]]></body>
<body><![CDATA[<p>When a relay node broadcasts a CTS packet, all other   nodes go to sleep mode and the source node sends the data packet and waits for   the ACK. The protocol performance regarding Packet Delivery Ratio was tested   against a Simple Opportunistic Routing strategy in scenarios with varying   payload lengths (10 to 90 bytes range) and varying number of nodes in the   network (4 to 12 nodes). The results showed that the opportunistic cross-layer   protocol was more reliable in all the cases. Table 5 shows the results for   average network lifetime, end to end delay, packet delivery ratio and energy   consumed per bit, obtained by making the simulation and comparison between a   simple opportunistic routing strategy and the opportunistic cross-layer scheme.</p>     <p align="center"><a name="Tabla5"></a><img src="img/revistas/rfiua/n79/n79a10t05.jpg"></p>     <p><b>3.4. PHY, link and network</b></p>     <p>A cross-layer approach between the network, medium   access and physical layers aims for energy saving at the nodes by managing   energy-efficient routing schemes that try to balance the traffic load in the   whole network and reduce the number of retransmissions, while being aware of   the power levels to reach the hops in the routes. The strategy devised in [35]   proposes to balance the traffic in the WSN and to limit the retransmissions   over each wireless link. The traffic balance is achieved by determining a set   of routes for the node to send the traffic through multiple paths instead of   sending data over a recurring path. At the MAC layer, a retransmission control   mechanism is proposed to determine a retry limit of each link so the   probability of packet delivery exceeds a specified threshold called the ''target   per-hop success probability''.</p>     <p>After obtaining the average energy consumed by each   node per unit of time, an algorithm is run to obtain the set of optimal routes   and the vector of retry limits that minimize the energy wasted by the greediest   node in the network when this node sends a packet to the sink. Compared to   basic routing schemes, energy savings of up to 15% were achieved by balancing   routing and savings of up to 5% were achieved by the allocation of the retry limit   for each link.</p>     <p>This approach does not consider the unreliability of   routing paths due to wireless channel complexities, so the balance proposed   with the retrials vector will be inconsequential. Because the mobility is not   taken into consideration, a real network deployment running this approach will   fail, as fixed sets of routing paths will change frequently due to new   positions of nodes and ever-changing link quality.</p>     <p><b>3.5. PHY, link and application</b></p>     <p>Regarding these three layers, a cross-layer framework   presented in [36] considers that the main sources of energy consumption in   WBANs are the data transmission process on the PHY layer, the optimal bandwidth   allocation on the MAC layer and the encoding phase on the application layer.   The Energy-Rate-Distortion (E-R-D) problem is formulated as an optimization   problem. The objective function is the minimization of the total energy   consumed in the data transmission and data encoding phases, computed based on   channel parameters such as the fading magnitude, the pathloss coefficient, and   the energy dissipated at the modules for discrete wavelet transform and   quantization.</p>     <p>The optimization model considers the following   constraints: 1) The maximum delay allowed in the transmissions cannot be larger   than the delay threshold; 2) the maximum distortion rate at the encoder and 3)   the available bandwidth that can be allocated to the nodes in the network. The   bandwidth allocation scheme proposes an adaptive-variable approach where   timeslots are optimally assigned according to the requirements of the PHY and application layers. </p>     <p>The optimization aims for an optimal allocation of   resources and to provide the best parameters to satisfy the data rate and   distortion constraints and jointly minimize the energy consumption.</p>     ]]></body>
<body><![CDATA[<p>The E-R-D model proposed by the authors offers a delay   and distortion constrained optimization framework that obtains the most   accurate parameters on the involved layers to minimize the energy consumption,   namely, the wavelet filter length, the optimal transmission rate, the   compression ratio, the timeslot length and the bandwidth allocation.</p>     <p>Though the authors apply the model to a common   scenario in WBANs as the transmission of an EEG (Electro Encephalon Graph)   node, they lack accurate body channel characterization, adjusting the channel   between the EEG node and the PDA (sink) to a flat channel model with free space   loss, and do not take into account fading or shadowing due to human mobility.   Hence, the obtained results could not accurately fit a real WBAN wireless   channel behavior.</p>     <p>The capability of batteries to recover charge when   they remain idle for a certain period depending on the state of the   electrochemical components of the battery and the duration of the idle period   is used by the authors of [37] to devise a battery-dynamic driven TDMA protocol   for WBANs deployed in healthcare applications. This TDMA scheme takes into   consideration the battery recovery dynamics, the state of the wireless channel   and the QoS constraints regarding packet delay and packet loss.</p>     <p>To extend the lifetime of the batteries, the scheme is   to maximize the idle periods, keeping a tradeoff between the packet delay and   the packet loss introduced by the queuing mechanism of packets utilized to   reduce the number of timeslots required in data transmission. On the MAC layer,   the nodes decide to start a transmission only when the channel state, estimated   using the signal strength of the beacon messages sent by the coordinator, is   good enough and when the packet buffer size is large enough as well.</p>     <p>Although this approach prolongs the battery life span   of the nodes, and the packets are reliably delivered in a timely fashion in the   guaranteed time slots of the super frame, some drawbacks are identified as   well. In cases where the nodes increment their idle state length to recover   battery power, they are also prone to an increased packet drop rate and average   delivery delay because some packets are held in the buffers for long periods.   As seen in the results for the ECG sensor, the delay limits reached by this   protocol are very close to the QoS edges for medical applications, so the   protocol is more prone to failure in fulfilling such end to end delay   requirements. The channel model used does not fit a real WBAN scenario, as the   Nakagami distribution cannot reflect the loss and fading characteristics of the   human body. Besides, network mobility is not taken into consideration.</p>     <p>In [38], the authors propose a cross-layer approach   between the PHY, MAC and application layers. In the strategy presented in this   approach, they set an energy consumption model that depends on the number of   retransmissions and the length (in time) of the packet transmission process   (transmission and reception). It is considered that the number of   retransmissions depends on two probabilities, one a success probability on the   PHY layer that differs for coded and uncoded packets because of their different   lengths. The other success probability of channel access depends directly on   the number of nodes forming the network and the probability of a node to access   the channel that depends on the priority of the node in the network.</p>     <p>On the other hand, the packet transmission length   comprises the time used in the transmission and reception frames. Then, the   energy consumption is computed as a function of SNR and packet length that   contains terms that consider the consumption in the RF modules and circuitry,   the encoder and retransmissions.</p>     <p>The approach considers a star topology network as   defined by the standard and does not take into consideration two-hop extension.   The PHY layer is set in the IR-UWB band using a single pulse or burst of pulses   waveform with OOK (on off keying) modulation and BCH (Bose Chaudhuri   Hocquenghem) coding. The channel is modelled as AWGN (additive white Gaussian   noise), and the reception scheme is a non-coherent energy detector that makes   decisions based on the energy level of the signals in the symbol time. For the   MAC layer, a beacon mode with superframes is used along with an S-Aloha access   phase mechanism that allocates time slots according to node priority.</p>     <p>To verify the performance of the approach, an energy   efficiency metric is set as the ratio between the payload length (information   bits) and the energy used for successful payload transmission (information bits   that reach the receiver). This metric allows observing the trade-off between   the payload length and transmission SNR to achieve energy efficiency in both   coded and uncoded frames. The results show that for uncoded frames, the maximum   value of energy efficiency is reached when using a maximum value of both SNR   and payload length, while in the coded case, the energy efficiency value   increases as the payload length increases and the SNR value decreases.</p>     <p><a href="#t6">Table 6</a>, shows the average SNR needed to achieve the   maximum energy efficiency in coded and uncoded cases for payloads in the range   of 5 to 255 octets, it can be seen that although the uncoded case reaches 100%   of energy efficiency the nodes have to transmit at higher transmission power   which can cause thermal and heating issues in the transceiver device.</p>     ]]></body>
<body><![CDATA[<p align="center"><a name="Tabla6"></a><img src="img/revistas/rfiua/n79/n79a10t06.jpg"></p>     <p>It can be concluded that in the coded case, the error   correction coding strongly helps reduce the energy needed for error-free   transmission of long payloads, and hence the power needed for efficient   transmission is less and the nodes save energy and avoid heating and thermal   issues. The QoS requirements are satisfactorily fulfilled because the the   IEEE802.15.6 provides the S-Aloha with various access phases for different node   priorities, helping optimize the end-to-end delay, packet delivery ratio and   reliability of the transmission.</p>     <p><b>3.6. PHY, network and application</b></p>     <p>In this particular cross-layer scheme, the physical   layer configuration and routing strategies are strongly influenced by   parameters and information that reside on the application layer and are defined   by the characteristics of the data (amount, priority, utility, etc.). In [39],   the authors propose a solution to the problem of efficient routing and present   the allocation of bandwidth as a problem of linear optimization. They define a   metric called network utility, with the goal of making a trade-off between the   remaining energy in the nodes and the network throughput. This approach   suggests forcing the packets to move across high energy nodes in a routing   tree. The main problem is to increase the amount of nodes with a high   probability of being accepted to join the routing tree, aiming at balancing the   energy consumption and extending the network lifetime. The nodes are accepted   into the routing tree by measuring their relative importance in the network context.   The importance or utility of a node depends on the number of packets received   or forwarded by that node and its level of available energy; once those   measurements fall below a threshold, the node is put offline.</p>     <p>The protocol exhibits four phases: <i>Topology Discovery</i>, when nodes exchange   HELLO messages to detect neighbor nodes and record them in a neighbors table; <i>Energy aware routing</i>, when a node   selects a parent among nodes accepted for routing; this decision is based on   the energy levels of the parent candidates and the energy of the entire routing   path; <i>Bandwidth allocation</i>, in which   the bandwidth is allocated in an efficient manner in the routing tree leaves,   proportional to the priority of the data streams being routed through those   leaves, the priority of a stream is defined by the variable a node is sensing;   and at the <i>Load</i> <i>Balancing Routing </i>phase, in which nodes currently accepted in the   tree switch their state to <i>topology   discovery </i>and begin to save energy while allowing other nodes to perform   routing duties in the tree.</p>     <p>This approach achieves energy savings and extends the   network lifetime as a consequence of nodes switching periodically between   routing duties and the offline state. Quality of service (QoS) is also   achieved, as data streams are prioritized depending on the variable sensed. It   is important to mention that the protocol was simulated under ideal channel   conditions. It was shown that network performance has a strong dependence on   the sink location in the body.</p>     <p>The authors compared the performance of the protocol   with the results obtained by solving the formulation of an integer linear   program (ILP) with the objective function of increasing the number of high   priority nodes in the routing tree at the highest possible data rates while   balancing energy consumption to extend the network lifetime. The evaluation was   done under the following premises: i) 15 nodes network; ii) two test cases, one   with 5 high priority nodes in the routing tree and the other one with 8; iii)   two test cases for sink location, one with sink at the waist and the other one   with the sink at the ankle; iv) a run simulation of 2000 seconds; v) initial   battery load of 2 Joules.</p>     <p>The performance evaluation showed that the utility   increases with the increase of high priority nodes, and, as a direct   consequence, more nodes are accepted as traffic sources with the best data   rate. In both evaluations (5 or 8 nodes, sink at waist or ankle), the gap   between the ILP solution and the solution provided by the protocol is small and   tends to remain constant as the number of high priority nodes increases.   Regarding energy consumption, the protocol outperforms the ILP solution when   the sink is located at the waist.</p>     <p><a href="#t7">Table 7</a> shows the average remaining energy (percentage   of initial load) in the nodes when the routing tree is composed of 5 or 8 nodes   and the sink is located at the waist. The average result of the protocol is   compared with the integer linear program solution obtained using mathematical   optimization software after running the simulation for 2000 seconds.</p>     <p align="center"><a name="Tabla7"></a><img src="img/revistas/rfiua/n79/n79a10t07.jpg"></p>     ]]></body>
<body><![CDATA[<p><b>3.7. All layers involved</b></p>     <p>A new concept different from the notion of a stack is   introduced in this cross-layer approach, where all the layers in the   communications model are supposed to share information and for instance, all   routing decisions are endorsed by the parameters and information gathered on   the other layers. Having that in mind, innovative mechanisms have to be   designed to cope with this data sharing among layers, namely, shared data   bases, shared memories and participation in the communication process oriented   by parameters obtained on all layers simultaneously. In [40], the authors   designed a protocol stack to solve problems caused by mobility, low reliability   and time varying links in WBANs. The stack is based on multihop transmissions   and avoids dependence on a network topology for routing duties. The protocol   stack uses a MAC layer based on TDMA and a routing strategy called ''gossiping''.   Both medium access and network strategies join to broadcast data in a reliable,   robust and fast manner with little overhead.</p>     <p>The protocol assumes that all nodes have enough space   in the cache to store a data item from every node in the network, so in each   sending round, a node stores the last data item received from the other nodes.   The sensor nodes send a packet that consists of data items, and a node sends at   least its own data item and another from a neighboring node. Based on the fixed   number of data items per transmission, the number of nodes in the network, the   node's ID and the order number of the current sending round, a node divides its   cache to choose the amount of data to be sent in the round. This choice is   designed in such a way that different nodes avoid sending the same data items   at the same time and a node avoids sending the same information in consecutive   rounds.</p>     <p>Although the MAC layer is based on TDMA, there are no   synchronization problems given the small size of the network and the presence   of a sink node with better power and energy capabilities to broadcast packets   along the entire network that allow the nodes to correct clock drifts. The   protocol provides a transmit power adaptation mechanism based on two metrics,   an outlink quality metric and a network connectivity metric. This mechanism   aims at obtaining a quick reaction by increasing the transmission power when a   postural change is perceived or a network disconnection occurs. Both metrics   are calculated based on the history of the links and their state in the   transmission of the last frame.</p>     <p>This protocol ensures efficiency in energy consumption   as it prevents retransmissions. Data routing does not depend on topology   because the nodes broadcast information without concern for the relative   position of the intended receiver, and simultaneously, the latency is reduced   because all nodes can reach the sink using the power adaptation mechanism. The   protocol stack needs to optimize listening on active time slots to reduce the   consumption caused by idle listening.</p>     <p>We observe the following issues regarding this   strategy: Nodes with few neighbors or that are almost isolated from the entire   network (say, a node in the ankle) are likely to suffer synchronization   problems, as they are prone to lose connection with the sink node, and the   power adaptation mechanism could help with high energy consumption by   increasing the power level in this type of situation. This protocol lacks a   traffic prioritization scheme, as all data items are treated equally, and such   an assumption does not fit into the WBAN context.</p>     <p>This stack was tested against the performance results   of WASP [27]. The authors mention that a major aspect that makes the protocol   stack robust is the power adaptation mechanism that prevents network   disconnections and reduces the variation in latency derived from postural   changes, while in protocols like WASP, the WBAN is unreliable because of the   time the network takes in the reconstruction process of the tree after a   disconnection.</p>     <p><a href="#t8">Table 8</a> shows the average delay and transmission power   in network nodes for different amounts of data items. The protocol efficiency   is confirmed in the table, as latency is reduced as the number of data items   increases.</p>     <p align="center"><a name="Tabla8"></a><img src="img/revistas/rfiua/n79/n79a10t08.jpg"></p>      <p><font size="3"><b>4. Classification </b></font></p>     ]]></body>
<body><![CDATA[<p>In this section, we summarize the investigations   reviewed above by making a comprehensive classification based on the   cross-layer schemes illustrated in Figure 2 (merging layers, new interfaces,   new abstractions, etc.) that correspond to each approach.</p> <b>4.1. Creation of new interfaces</b>     <p>This category can be subdivided in two subcategories,   upward information flow and downward information flow. The upward flow occurs   when a higher layer protocol needs run-time information from a lower layer, so   the new interface layer is set from the lower to the higher layer. The opposite   happens in downward flow and the new interface deploys a data stream from the   higher to the lower one [15].</p>     <p>In [25], it is noticeable that the optimum value of   the signal power needed at PHY to reach an SNR value capable of establishing a   tradeoff between energy consumption and a reduction in retransmissions depends   on the parameters provided by the ARQ error recovery scheme in the MAC sublayer   of the Link layer.</p>     <p>In [26], the fuzzy controller works as a new interface   between the PHY and network layers. The fuzzy logic is fed by parameters   obtained on PHY, and the routing decisions at the network layer are taken based   on the outputs of the fuzzy controller. Something similar is presented in [33],   where the set-up of the tree for network routing is bound to the reverse   process of beacon broadcasting in the medium access layer.</p>     <p>Almost every cross-layer MAC protocol is set on the   basis of a new interface in the stack. A good example is the battery-aware MAC   in [37], in which two processes on the MAC sublayer depend on the battery   dynamics principle, the inactive period setting and the mechanism for queuing   packets.</p> <b>4.2. Vertical calibration across layers</b>     <p>This cross-layer scheme refers to a multi-parameter   adjustment across layers having foundations at particular layer parameters. It   is considered that from a joint parameters setting at several layers, more   benefits can be obtained in the overall protocol performance than by just   updating one single layer's parameters and leaving the remaining layer   protocols untouched [15].</p>     <p>In this survey, we have included two   examples of this cross-layer technique. It can be seen in [35] that by using   the calculations of average energy consumed in the transmissions, the routes   are arranged at the network layer and a vector of retrials is set on the MAC   layer adjusting the power consumed in the transmissions to benefit the   energy-aware performance on the PHY layer.</p>     <p>In [32], the amount of data (payload length), priority   of sensed data and signal to noise ratio parameters are considered jointly to   control the number of retransmissions and the duration of packet transmission   to achieve the maximum energy consumption efficiency. The entire energy   consumption model computations depend on how these parameters are adjusted in   run-time.</p> <b>4.3. Merged layers</b>     <p>This technique is only seen between adjacent layers,   and it is considered that a new ''super-layer'' supplies the services of the   fused layers, adding benefits to the energy consumption and the   QoS requirements of both at the same time [15]. Three designs of this category   presented on this survey have a mix between MAC and Network layers in [27-29].   It is a fact that the routing strategies are strongly supported by the medium   access mechanism provided for timeslot allocation, and it can even be said that   the routing scheme is somehow absent and the data forwarding duties are   entirely conferred to the medium access scheme. </p>     <p>In [31, 34], besides the mix between MAC and Network   layers, the PHY layer is involved as well because in the former the   transmission power is adapted aiming to exceed the minimum boundary imposed by   the attenuation of the channel. And in the later the RSSI is used to obtain the   delay to send the CTS packet by the relay nodes.</p> <b>4.4. Shared database</b>     ]]></body>
<body><![CDATA[<p>In general, a new layer to which all other layers have   access and that can make queries and store information related to other layers   to improve the performance of specific protocols or the entire stack   performance is called a shared database [15]. The most common example of such a   technique in cross-layer design is an optimization program. In both approaches   presented in [36, 39] different parameters such as available bandwidth, battery   energy, target data rate, allowable distortion rate, data amount and data   priority are fed as variables (and depending on the situation, as constants)   for objective functions and constraints in optimization programs that consider   tradeoffs between energy efficiency and the fulfillment of QoS requirements.</p> <b>4.5. New abstractions</b>     <p>The term ''new abstractions'' in the cross-layer context   refers to new schemes in the communication process away from the traditional   stack model and the concept of independent layers with independent protocols   and the boxing and un-boxing mechanism that the protocols in the stack fashion   provide for passing information across layers [15]. We consider that the   protocol stack [40] surveyed in this article fits into this category, as it   presents a novel strategy such as ''gossiping routing with transmit power   adaption'' that provides a new look at the protocol design and poses a good   example of the violation of hierarchy between layers that is a major concept of   cross-layer design.</p>     <p><a href="#t9">Table 9</a><b> </b>summarizes   the main characteristics of the cross-layer designs reviewed in this survey.   All designs are classified by the layers involved in the cross-layer approach,   the cross-layer design deployed and whether they support quality of service   (QoS) and nodes mobility.</p>     <p align="center"><a name="Tabla9"></a><img src="img/revistas/rfiua/n79/n79a10t09.jpg"></p>      <p><font size="3"><b>5. Open issues and future research </b></font></p> <b>5.1. Mobility</b>     <p>Postural changes of the human body induce alterations   in wireless links, path loss increases as the distance between two connected   nodes changes due to body movements. Generally, in wireless networks it is   supposed that power gain is decreased by a factor <i>d</i><i><sup>&#951;</sup></i>,   where <i>d </i>represents the distance   between transmitter and receiver, and <i>&#951;</i><i> </i>is the path   loss coefficient of the medium used for waves propagation, in the air (free   space) <i>&#951;</i><i> </i>is considered to be <i>&#951;</i><i> </i>= 2, but   regarding WBANs this is far from being true since in this kind of networks the   transmission scheme is randomly inserted between LOS (Line of Sight) and NLOS   (Non-Line of Sight) modes which introduces significant variations to the   pathloss coefficient as waves not only propagate across free-space, waves have   to spread across human tissues as well. </p>     <p>Electromagnetic waves get significantly   attenuated when they propagate through human tissues given that these are   mostly formed by water, and human flesh is not an adequate medium for waves   spreading as well. Hence, NLOS transmissions in the human body are, in general,   not possible given that waves do not traverse muscles and tissues but diffract   in the body. Then, LOS and multi-hop transmissions are suggested for WBANs,   taking on count that isolated nodes are prone to experience higher loss.</p>     <p>Another negative effect due to body movements is   the rotation of nodes, specifically the antennas, which causes changes in the   direction and polarization of the radiation pattern. Little space between the   antenna and the body surface disarranges the impedance of the antenna and the   radiation pattern.</p>     <p>One major issue regarding mobility of nodes in   WBANs is the Non-stationarity of the channel, imposed by the movements of the   human body, in [41] a design of experiments (hypothesis test) is conducted to   corroborate that body channels are in fact non-stationary. A WBAN topology   comprising 4 nodes, a transmitter located at the left hip and 3 receivers, in   the right ankle, the chest and the right wrist were used to sample different body   channels in a variety of body postures which are common in office, home and car   environments. The channel gain is partitioned in equal length intervals and two   consecutive intervals are compared to test the average probability of   stationarity in a single time window.</p>     <p>Kolmogorov-Smirnov, ANOVA and Levene tests confirm   that the average probability of stationarity decays quickly for all of the body   channels in the different environments, it is even pointed that channels can   only be considered stationary within the first 500ms of the time window. Even   postures like sitting in the office exhibit non-stationary body channels. The   most important conclusion derived from the experiment's results is that small   scale and large scale fading statistics are not practical in WBAN channel   modeling given the nonstationarity of the channel that ensures that the   probability density function in different and consecutive intervals of the time   window is different, then the behavior of the channel cannot be partitioned to   be modeled by fixed fading and shadowing statistical distributions.</p>     ]]></body>
<body><![CDATA[<p>Almost every protocol reviewed in this survey lacks   support for mobility, which is fundamental in WBAN deployment. Several mobility   models for wireless and ad-hoc networks can be found in literature, just to   name a few: Reference Point Group Mobility Model (RPGM) [42], Random Waypoint   Mobility Model (RWPM) [43], Random Walk Mobility Model (RWMM) [44], Random   Gauss Markov Model (RGMM), Random Direction Mobility Model (RDMM) [45], and   most of them can be adapted to describe WBAN situations.</p>     <p>Good examples of such adaptations are shown in [46],   where they model mobility scheme is from traces of real postural changes in   humans, two phases are derived: a posture selection phase from postural change   probabilities and a nodes movement phase based on the posture selected.   Meanwhile in [47] the model is built upon RPGMM and RGMM models, and by   observing some correlations present in human movement.</p>     <p>MoBAN (A configurable mobility model for wireless body   area networks) [48], which is a mobility model for WBANs developed in OMNeT++   network simulator [49] and used in the implementation of the cross-layer   protocol in [40], this mobility model for WBAN is based on a description of the   body movement as two stages, one related to local movement of the nodes which   is characterized using RWMM mobility model; and group mobility stage led by the   sink node and devised using RPGM mobility model.</p>     <p>It is clear that an efficient cross-layer protocol   provides a better experience for a WBAN user by extending the lifetime of the   sensors, but this benefit can be negated if the user cannot move because it   would result in network disconnection. Mobility implies that nodes can leave   and join different parent nodes without affecting the inner functions of the   WBAN and avoiding additional energetic resources consumption. Then, new   cross-layer approaches should focus on developing MAC and routing mobility   aware schemes.</p>     <p>CICADA [28], for example is a mobility aware scheme   but not as robust as WBAN requires, in the case where several sensors   disconnect from their parents, the protocol does not seem to nimbly attend to   all reconnections, keeping the network in such a state that the whole WBAN   could be considered useless. In [50, 51], was presented the first algorithm to   support WBAN mobility while remaining energy efficient, the LIMB (Loose   association Implicit reservation for Mobile Body Sensor Networks) protocol.   They propose distributing the nodes in two sets, one set comprises the nodes   prone to mobility, which run the LIMB protocol to support mobility, and the   other set comprises nodes prone to keep static, which run the LIMB protocol and   another backbone cross-layer protocol.</p> <b>5.2. IEEE 802.15.6</b>     <p>Although up to date applications and developments for   WBAN have been implemented on existing low data rate and low power existing   standards such as IEEE 802.15.4 and Bluetooth, there exists a new standard   devised exclusively for WBANs, IEEE 802.15.6, then new developments and   releases should focus on leverage the benefits that the new standard brings.   Current WPAN technologies do not meet medical regulations for WBANs, and do not   give support to typical WBANs tradeoffs regarding low power consumption, ultra   low power adaptivity, reliability, QoS, security, data rate, efficient   bandwidth utilization and co-existence with other WBANs.</p>     <p>As WBANs operate in the vicinity, on/or inside the   human body special restrictions have to be taken on consideration regarding   Specific Absorption Rate (SAR) and radiation power (less than 1mW or 0dBm) to   avoid problems like body tissues damage and cell degeneration while maintaining   transmissions in the short range. Besides, given the channel variations in the   human body, WBANs would experience different phenomena like multipath, fading   and shadowing, then a strong physical layer is mandatory. Different traffics   are present in WBANs, emergency traffic, on-demand traffic and normal data   traffic only for mentioning the most common types, then WBANs should have a strong   structure to support traffic differentiation and prioritization while providing   a guarantee and reliable service with the lowest latency close to real-time   operation (125ms in medical applications and 250ms in non-medical   applications).</p>     <p>IEEE 802.15.6 is a draft standard that defines the   physical (PHY) and medium access layers (MAC) for WBAN communications. The   standard provides three PHY layers, Ultra Wide Band (UWB), Narrow Band (NB) and   Human Body Communications (HBC), whose selection depends on the type of   application performed by the WBAN. UWB operates in two frequency bands of   499.2Mhz, one with 3 channels and centered at 3996.3Mhz, and the other one with   8 channels and centered at 7987.2Mhz. NB operates in MICS (Medical Implants   Communication Service), WMTS (Wireless Medical Telemetry Services) and ISM   (Industrial Scientific and Medical) bands. And HBC operates in two frequency   bands centered at 16Mhz and 27Mhz with a bandwidth of 4Mhz. The standard   supports three modulations schemes: Gaussian Minimum Shift Keying (GMSK),   Differential Binary Phase Shift Keying (DBPSK) and Differential Quadrature   Phase Shift Keying (DQPSK). The standard suggests WBANs to be deployed in   one-hop or two-hops star topologies using a central node performing as hub for   the sensor nodes.</p>     <p>In IEEE 8012.15.6 the central node or hub divides the   channel in superframe structures for the medium access and allocation of   transmission slots. Each superframe is bounded by beacon slots and is divided   in Exclusive Access Phase 1 and 2 (EAP), Random Access Phase 1 and 2 (RAP),   Type I/II access phases and a Contention Access Phase (CAP) (see <a href="#f5">Figure 5</a>).   EAP1 and EAP2 access phases are used for emergency traffic, only packets with   the highest priority are sent in this phases. RAP1, RAP2 and CAP phases are   used for normal or regular traffic. Contention schemes like CSMA/CA and Slotted   Aloha are used for medium access in the aforementioned phases. Type I/II phases   are used for uplink, downlink and bilink allocation intervals. Type I access is   conveyed in terms of frame time duration while Type II is conveyed in terms of   frames count. Access mechanism used in TypeI/II phases are polled, unscheduled   and improvised.</p>     <p align="center"><a name="Figura5"></a><img src="img/revistas/rfiua/n79/n79a10i05.jpg"></p>     ]]></body>
<body><![CDATA[<p><b>5.3. Access   modes in IEEE 802.15.6</b></p>     <p>Beacon mode with beacon period superframe boundaries:   In this access scheme the superframe is divided into EAP1, RAP1, TypeI/II, EAP2,   RAP2, TypeI/II, Beacon 2 and CAP phases. The access in EAP, RAP and CAP phases   is done using contention mechanism while in TypeI/II phases access is   unscheduled, polled or improvised. The length of each division is managed by   the central node depending on the application.</p>     <p>Non-beacon mode with superframe boundaries: Only   TypeI/II phases are present in the superframe, the start of the superframe is   indicated by a T-Poll timed frame.</p>     <p>Non-beacon   mode without superframe boundaries: The access is provided by the central node   in unscheduled TypeII polling [52-56].</p>     <p>In [57] an energy efficient scheme is   based on two-hops transmissions using IEEE 802.15.6 standard. The main idea   behind the strategy is to reduce the duty cycle of relay nodes and then help to   reduce energy consumption. Relay nodes consume more energy as they have to   transmit their data and other nodes data as well. They have to retransmit the   downlink from the central node and the uplink from sensor nodes towards central   node as well. To reduce the relay nodes duty cycle the central node is allowed   to reach directly every node in the network so the downlink does not have to be   relayed by intermediate nodes resulting in the reduction of energy consumption   by retransmissions, over-hearing and over-heading at relay nodes. The downlink   branch central node-relay node-sensor node is reduced to central node-sensor   node while the uplink is kept in its original form. Network lifetime is   extended as the relay nodes that were prone to an early exhaustion improve   energy consumption by not taking part on the downlink as the standard   originally proposes.</p>     <p>Basic cross-layer schemes built upon IEEE 802.15.6   were cited in the taxonomy and classification sections, in [33], an scheme with two phases, a discovery phase   for central node broadcasting and a reverse tree calculation phase for nodes to   establish the next hop as the node with the least delay for transmissions   towards the central node. Three traffic levels are used for traffic   differentiation, the highest levels of priority are allowed to access the   medium in EAP1 and EAP2 phases, while packets tagged with the lowest level of   priority are forwarded in RAP1, RAP2 and CAP phases. </p>     <p>In [38] another IEEE 802.15.6 strategy proposed a   cross-layer between SNR at PHY layer and payload length at Application layer,   and leveraging the benefits of IEEE 802.15.6 MAC for traffic prioritization   purposes. This work showed that a compromise between SNR and payload length   achieves energy saving in both coded and uncoded transmissions.</p>     <p>The aforementioned works show that IEEE 802.15.6   offers a wide field for cross-layer proposals. Although the standard   specification only refers to PHY and MAC layers there is a myriad of   possibilities of energy efficient designs starting out from the different PHY   layers and access schemes described in the standard.</p> <b>5.4. PHY and MAC   layers in WBAN</b>     <p>The design of new protocols and communication schemes   for WBAN has to take into consideration issues regarding the physical and   medium access layers in both medical and non-medical applications. The majority   of cross-layer schemes reviewed in this paper lack of a clear understanding of   the limitations and constraints inherent to these layers in WBAN, mainly   induced by mobility, channel variations and medical regulations for   communications near the human body.</p>     <p>In [58, 59], the investigators recommend to attend the   following issues for adequate PHY and MAC protocols design for WBAN:</p>     ]]></body>
<body><![CDATA[<p>Interference: On-body interference within WBAN due to   body movements; Off-body interference between nodes from co-existent WBANs and   Interference with surrounding wireless technologies.</p>     <p>Tradeoff between data rate and low power: Current   cross-layer designs for WBAN are built upon layers that belong to existing   wireless technologies such as Bluetooth and Zigbee, these technologies achieve   the data rates for WBAN (1Kbit/s to 10Mbit/s) but do not limit the power as the   IEEE 802.15.6 suggests, at most 1mW.</p>     <p>Antenna design: Body composition and characteristics   affect the impedance of the antennas. The human body experiences an   electromagnetic interaction with the antenna. Regarding the antenna design,   designers have to consider body shape, electrical characteristics,   non-corrosive materials, radiation patterns and whether the antenna is   implanted or not.</p>     <p>Aiming to achieve the best performance regarding   the tradeoff between energy efficiency and reliability, the designers of MAC   protocols for WBAN should take into consideration the mechanisms described in   the draft of the IEEE 802.15.6 standard and besides exploit the knowledge of   the behavior of the channel. Exploring two parameters, namely, the probability   of the channel to stay in good state and the frequency of channel transitions   between good state and outage, the designers can devise strategies that can   improve the performance without incurring in additional energy consumption. For   example, more efficient mechanisms for dynamic allocation of slots instead of   statical or random allocations; adaptive scheduling of retransmissions; effective   use of relay nodes in transmissions and schemes for an adaptive control of the   transmission power.</p> <b>5.5. Adaptive duty cycles</b>     <p>The scheduling of active and inactive   periods in the medium access control still introduces a significant waste of   energy by idle listening and overhearing. Hence a future cross-layer approach   should devise a scheme capable of predicting the appropriate length for the   wake up and sleep times. Most designs deploy a fixed duty cycle for the sleep   frames, and a bad duty cycle choice can result in higher end-to-end latency   which could increase dramatically with retransmission which can also result in   higher energy consumption to transmit the packets.</p> <b>5.6. Context aware cross-layer</b>     <p>An open research issue in WBANs is the introduction of   context aware protocols at MAC and application layers. The context refers to   the environment and the patient conditions where the WBAN is deployed   (humidity, environment temperature, luminosity, emotions, mental state, stress   levels, age and any other extra-information that could help to better   characterize the patients situation). In [60], the authors proposed that   context-aware strategies should be implemented over energy-efficient   cross-layer approaches between MAC and application layers; they claim that   cross-layer in context aware scenarios is needed to address limitations like   energy consumption, transmission errors and QoS constraints by an efficient   communication of parameters between the MAC layer and the application layer.   They also mention that little research has been done regarding this matter.</p> <b>5.7. QoS</b>     <p>Unlike regular WSN, WBAN exhibit specific QoS   requirements at every single layer: data reliability, traffic segmentation   (regular data or emergency data), data resolution, bandwidth, path latency,   routing maintenance, congestion management, path cost, connectivity robustness,   communication range, throughput and transmission reliability [61]. To fulfill   all QoS requirements mentioned above, a regular stack-layered WBAN should   increase processing at all layers, and in some cases, increase the transmit   power, thus increasing energy consumption. Thus, a cross-layer scheme could   help balance the trade-off between QoS and energy consumption. In almost all of   the approaches reviewed, QoS is limited to data-reliability, and in some cases,   ignoring that WBAN can manage to provide vital information about a patient's   condition. Only in [26], where the bandwidth is proportionally assigned   depending on the variable a sensor is monitoring, so an energy-efficient   cross-layer approach should offer the possibility to communicate QoS   requirements from one layer to another, especially in medical applications   (i.e., the application layer should have the possibility to communicate its QoS   needs due to, for example, an abrupt change in blood pressure measurements to   the MAC layer to report this event immediately to the medical staff).</p> <b>5.8. Security</b>     <p>The transmission of vital signs and private data of a   patient require the use of mechanisms for data protection and data   confidentiality, thus forcing the use of encryption or coding schemes that   require extra data processing and hence more energy consumption, so an   efficient cross-layer approach for WBAN should fulfill all security   requirements and guarantee that the network lifetime will not be affected as   well. It is of note mention that none of the papers reviewed in this survey   addresses security issues in cross-layer design or in WBAN data management. In   [62], the authors propose a security-aware cross-layer protocol with low impact   on power consumption called CICADA-S based on CICADA [28]. The authors propose   the management of encrypted keys and authentication codes to prevent security   issues like packet sniffing or intrusive nodes joining the network, all of this   without affecting the power consumption and throughput of the WBAN.</p> <b>5.9. Channel modeling</b>     <p>Almost every approach in this survey   has been devised under the assumption of an ideal body channel without fading   or shadowing effects and the nonstationarity of the channel [41], and as seen   in [63-66], on-body channels are hard to characterize, and the best-fit   statistical models do not cover all the propagation effects due to diffraction,   reflection, fading and absorption of waves in the body channel. We only found a   cross-layer scheme taking into account a statistical characterization of body   channel: in [67], an energy-efficient topology aware cross-layer is devised   using a close approximation to realistic on-body channel but even this approach   only considers LOS transmissions.</p>     <p>In [68], an stringent analysis of   body channels propagation and channel characterization gives insight of various   ''myths'' and misconceptions about proper channel modeling, for example, the use   of distance based path loss models with fixed path loss exponents for channel   characterization. The use of bad shaped distributions to fit both large scale   and small scale statistics from data sets gathered in measuring campaigns of   body channels and the typecasting of certain body channels as LOS or NLOS not   taking into consideration that in most of the situations the body channels are   fluctuating between both propagation modes due to body movements.</p>        ]]></body>
<body><![CDATA[<p><font size="3"><b>6. Conclusion </b></font></p>     <p>The goal of this paper is to present   a comprehensive survey of the current research (works published in the last   decade) in cross-layer design for energy efficiency in the specific context of   wireless body area networks. We focus on recording the most relevant studies   that try to solve power consumption issues and the extension of the lifetime of   WBAN by the development of novel cross-layer approaches. From our point of   view, most of the works focus on providing new protocols and abstractions to   overcome the performance of the classical communication techniques and models.   We observe that in nearly almost all the investigations, the authors are not   taking mobility into account, and perhaps most of the results obtained in their   simulations and implementations could dramatically change when testing their   algorithms and protocols in a mobile scenario; we consider this topic to be   widely open for future research and to work on it more thoroughly. We notice   that novel cross-layer abstractions aim to replace the traditional stacked   model at an early stage because most of the models are based on layer mixtures   between adjacent layers or information sharing between pairs of adjacent or   non-adjacent layers but still preserving stacked basis. We want to mention that   though the existing research on enhancing power consumption in WSN is   extensive, most of these approaches were not developed for any specific field   (e.g. body applications like WBAN). Hence, there is still an open research   issue in adapt results obtained in WSN cross-layer research into WBAN related   research. We pretend to show the benefits of cross-layer design in the   extension of the WBAN lifetime. Although we do not discuss the methods   thoroughly, we present them in a very clear and simple way to inspire future   research and novel developments. A major issue faced in the review process of   cross-layer approaches is that research in this field lacks a ''benchmark'' for a   thorough comparison and evaluation of the benefits and shortcomings of such   approaches. Thus the evaluation results are not as objective as they should be.   The difficulty in establishing a benchmark lies in the fact that most   cross-layer approaches are built and tested under a specific scenario, which in   turn, is defined based on the application of interest.</p>        <p><font size="3"><b>7. Acknowledgements</b></font></p>     <p>This work has been partially supported by the CODI sustainability   strategy 2014-2015 of the University of Antioquia (Colombia) and the project ''Plataforma   tecnol&oacute;gica para los servicios de teleasistencia, emergencias m&eacute;dicas,   seguimiento y monitoreo permanente a los pacientes y apoyo a los programas de   promoci&oacute;n y prevenci&oacute;n'' of the ''Centro de Excelencia ARTICA (Alianza Regional   En TICs Aplicadas)'' created by ''Colciencias and Ministerio de las Tecnolog&iacute;as   de la Informaci&oacute;n y las Comunicaciones'' supported by ''Sistema Nacional de   Regal&iacute;as (Colombia)''.</p>        <p><font size="3"><b>8. References</b></font></p>     <!-- ref --><p> 1.      O. Omeni, A. Wai, A. Burdett and C.   Toumazou, ''Energy efficient medium access protocol for wireless medical body   area sensor networks'', <i>IEEE Trans.   Biomed. Circuits and Systems</i>, vol. 2, no. 4, pp. 251-259, 2008.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139039&pid=S0120-6230201600020001000001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 2.      S. Marinkovic, C.   Spagnol and E. Popovici, ''Energy-efficient tdma-based mac protocol for wireless   body area networks'', in 3<i><sup>rd</sup></i> <i>International Conference on</i> <i>Sensor Technologies and Applications </i>(SENSORCOMM),   Athens, Greece, 2009, pp. 604-609.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139041&pid=S0120-6230201600020001000002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 3.      H. Li and J. Tan,   ''An ultra-low-power medium access control protocol for body sensor network'', in <i>27<sup>th </sup>Annual Conference </i><i>IEEE Engineering in Medicine and Biology</i>, Shanghai, China, 2005, pp. 2451-2454.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139043&pid=S0120-6230201600020001000003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 4.      B. Otal, L. Alonso   and C. Verikoukis, ''Design and analysis of an energy-saving distributed MAC   mechanism for wireless body sensor networks'', <i>EURASIP J. Wireless Comm. and Networking</i>, vol. 2010.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139045&pid=S0120-6230201600020001000004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 5.      H. Li and J. Tan, ''Heartbeat-driven   medium-access control for body sensor networks'', <i>IEEE Transactions on Information Technology in Biomedicine, </i>vol.   14, no. 1, pp. 44-51, 2010.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139047&pid=S0120-6230201600020001000005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 6.      B. Liu, Z. Yan and   C. Wen, ''Ca-mac: A hybrid context-aware mac protocol for wireless body area   networks'', in <i>13<sup>th</sup> IEEE   International Conference on</i> <i>e-Health   Networking Applications and Services </i>(Healthcom)<i>, </i>Columbia, USA, 2011, pp. 213-216.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139049&pid=S0120-6230201600020001000006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 7.      K. Kwak and S.   Ullah, ''A traffic-adaptive mac protocol for wban'', in <i>IEEE Globecom Workshops</i>, Miami, USA, 2010, pp. 1286-1289.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139051&pid=S0120-6230201600020001000007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 8.      Q. Tang, N. Tummala,   S. Gupta and L. Schwiebert, ''TARA: thermal-aware routing algorithm for   implanted sensor networks'', in <i>1<sup>st</sup> IEEE International Conference on Distributed Computing in Sensor Systems</i> (DCOSS), Marina del Rey, USA, 2005, pp. 206-217.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139053&pid=S0120-6230201600020001000008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 9.      A. Bag and M.   Bassiouni, ''Energy efficient thermal aware routing algorithms for embedded   biomedical sensor networks'', in <i>IEEE International Conference on Mobile Ad Hoc and Sensor   Systems</i>, Vancouver, Canada,   2006, pp. 604-609.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139055&pid=S0120-6230201600020001000009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 10.      D. Takahashi, Y. Xiao and F. Hu, ''LTRT: least   total-route temperature routing for embedded biomedical sensor networks'', in <i>IEEE Global Telecommunications Conference </i>(GLOBECOM),   Washington D.C., USA, 2007, pp. 641-645.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139057&pid=S0120-6230201600020001000010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 11.      R. Kamal, M. Obaidur and C. Hong, ''A lightweight   temperature scheduling routing algorithm for an implanted sensor network'', in <i>International Conference on ICT Convergence </i>(ICTC),   Seoul, South Korea, 2011, pp. 396-400.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139059&pid=S0120-6230201600020001000011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 12.      M. Kathuria and S. Gambhir, ''Quality of service   provisioning transport layer protocol for wban system'', in <i>International Conference on</i> <i>Optimization,   Reliabilty, and Information Technology </i>(ICROIT),<i> </i>Faridabad, India, 2014, pp. 222-228.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139061&pid=S0120-6230201600020001000012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 13.      S. Rashid, ''Qos taxonomy towards   wireless body area network solutions'', <i>International   Journal of Application or Innovation in Engineering &amp; Management, </i>vol.   2, no. 4, pp. 221-234, 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139063&pid=S0120-6230201600020001000013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 14.      Y. Wang, X. Liu and   J. Yin, ''Requirements of quality of service in wireless sensor network'', in <i>5<sup>th</sup></i> <i>International Conference on Networking, International Conference on   Systems and International Conference on Mobile Communications and Learning   Technologies</i> (ICNICONSMCL), Morne, Mauritius, 2006, pp. 116-121.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139065&pid=S0120-6230201600020001000014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 15.      V. Srivastava and M. Motani,   ''Cross-layer design: a survey and the road ahead'', <i>IEEE Communications Magazine</i>, vol. 43, no. 12, pp. 112-119, 2005.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139067&pid=S0120-6230201600020001000015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 16.      G. Crosby, T. Ghosh, R. Murimi and C.   Chin, ''Wireless body area networks for healthcare: a survey'', <i>IJASUC</i>, vol. 3, no. 3, pp. 1-26, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139069&pid=S0120-6230201600020001000016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 17.  S. Ullah <i>et al</i>., ''A comprehensive survey of wireless body area networks - on   phy, mac, and network layers solutions'', <i>J.   Medical Systems</i>, vol. 36, no. 3, pp. 1065-1094, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139071&pid=S0120-6230201600020001000017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 18.      B.   Latr&eacute;, B. Braem, I. Moerman, C. Blondia and P. Demeester, ''A survey on wireless   body area networks'', <i>Wireless Networks</i>,   vol. 17, no. 1, pp. 1-18, 2011.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139073&pid=S0120-6230201600020001000018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 19.      D. Arumugam, A. Gautham, G. Narayanaswamy and D.   Engels, ''Impacts of RF radiation on the human body in a passive wireless   healthcare environment'', in <i>2<sup>nd</sup> </i><i>International Conference on Pervasive Computing   Technologies for Healthcare</i>, Tampere, Finland, 2008, pp. 181-182.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139075&pid=S0120-6230201600020001000019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 20.      S. Gopalan and J. Park, ''Energy-efficient mac   protocols for wireless body area networks: Survey'', in <i>International Congress on Ultra Modern Telecommunications and Control   Systems and Workshops </i>(ICUMT), Moscow, Russia, 2010, pp. 739-744.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139077&pid=S0120-6230201600020001000020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 21.  D. Bertsekas, R.   Gallager and P. Humblet, <i>Data networks</i>,   2<i><sup>nd</sup></i> ed. New Jersey, USA:   Prentice-Hall, 1992.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139079&pid=S0120-6230201600020001000021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 22.      L. van Hoesel, T. Nieberg, J. Wu and   P. Havinga,   ''Prolonging the lifetime of wireless sensor networks by cross-layer   interaction'', <i>IEEE Wireless   Communications</i>, vol. 11, no. 6, pp. 78-86, 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139081&pid=S0120-6230201600020001000022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 23.      L.   Hughes, X. Wang and T. Chen, ''A review of protocol implementations and energy   efficient cross-layer design for wireless body area networks'', <i>Sensors</i>, vol. 12, no. 11, pp.   14730-14773, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139083&pid=S0120-6230201600020001000023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 24.      S. Raghuwanshi, ''An energy efficient cross layer   design scheme for wireless sensor networks'', Ph.D. dissertation, Virginia   Polytechnic Institute and State University, Virginia, USA, 2003.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139085&pid=S0120-6230201600020001000024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 25.      M. De Sanctis, E. Cianca, M. Ruggieri and R. Prasad,   ''Energy efficient cross layer optimization for WPAN'', in <i>The European Conference on Wireless Technology</i>, Paris, France,   2005, pp. 561-564.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139087&pid=S0120-6230201600020001000025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 26.      T. Jaradat, D. Benhaddou, M. Balakrishnan and A.   Fuqaha, ''Energy efficient cross-layer routing protocol in wireless sensor   networks based on fuzzy logic'', in <i>9<sup>th</sup> International Wireless Communications and Mobile Computing Conference </i>(IWCMC),   Sardinia, Italy, 2013, pp. 177-182.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139089&pid=S0120-6230201600020001000026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 27.      B. Braem, B. Latre,   I. Moerman, C. Blondia and P. Demeester, ''The wireless autonomous spanning tree   protocol for multihop wireless body area networks'', in <i>3<sup>rd</sup> Annual International Conference on Mobile and Ubiquitous   Systems - Workshops</i>,<i> </i>San Jose,   USA, 2006, pp. 1-8.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139091&pid=S0120-6230201600020001000027&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 28.      B. Latr&eacute; <i>et al</i>., ''A low-delay protocol for multihop wireless body area   networks'', in <i>4<sup>th</sup> Annual International Conference on Mobile and   Ubiquitous Systems: Networking &amp; Services, MobiQuitous</i>, Philadelphia,   USA, 2007, pp. 1-8.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139093&pid=S0120-6230201600020001000028&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 29.      N. Torabi and V. Leung, ''Cross-layer   design for prompt and reliable transmissions over body area networks'', <i>IEEE J. Biomedical and Health Informatics</i>,   vol. 18, no. 4, pp. 1303-1316, 2014.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139095&pid=S0120-6230201600020001000029&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 30.      N.   Torabi and V. Leung, ''Realization of public m-health service in license-free   spectrum'', <i>IEEE J. Biomedical and Health   Informatics</i>, vol. 17, no. 1, pp. 19-29, 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139097&pid=S0120-6230201600020001000030&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 31.      N. Torabi, C. Kaur and V. Leung, ''Distributed dynamic   scheduling for body area networks'', in <i>IEEE   Wireless Communications and Networking Conference </i>(WCNC), Shanghai, China,   2012, pp. 3177-3182.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139099&pid=S0120-6230201600020001000031&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 32.  Institute of Electrical and Electronics Engineers   (IEEE), <i>IEEE standard for local and   metropolitan area networks part 15.6: Wireless body area networks</i>, IEEE   Standard 802.15.6, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139101&pid=S0120-6230201600020001000032&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 33.      H. Elhadj, S. Boudjit and L. Chaari, ''A cross-layer   based data dissemination algorithm for ieee 802.15.6 wbans'', in <i>International Conference on</i> <i>Smart Communications in Network Technologies </i>(SaCoNeT), Paris, France, 2013, pp. 1-6.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139103&pid=S0120-6230201600020001000033&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 34.      U. Abassi, A. Awang and N. Hamid, ''A cross-layer   opportunistic mac/routing protocol to improve reliability in wban'', in<i> 20<sup>th</sup> Asia-Pacific Conference on Communication </i>(APCC)<i>,</i> Pattaya, Thailand, 2014, pp. 36-41.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139105&pid=S0120-6230201600020001000034&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 35.      F. Bouabdallah, N. Bouabdallah and R. Boutaba,   ''Cross-layer design for energy conservation in wireless sensor networks'', in <i>IEEE International Conference on Communications</i>, Dresden, Germany, 2009, pp. 1-6.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139107&pid=S0120-6230201600020001000035&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 36.      A. Awad, A. Mohamed   and A. Sherif, ''Energy efficient cross-layer design for wireless body area   monitoring networks in healthcare applications'', in <i>IEEE 24<sup>th</sup> Annual International Symposium on Personal,   Indoor, and Mobile Radio Communications </i>(PIMRC), London, UK, 2013, pp.   1484-1489.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139109&pid=S0120-6230201600020001000036&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 37.      H. Su and X. Zhang, ''Battery-dynamics   driven TDMA MAC protocols for wireless body-area monitoring networks in   healthcare applications'', <i>IEEE Journal on   Selected Areas in Communications</i>, vol. 27, no. 4, pp. 424-434, 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139111&pid=S0120-6230201600020001000037&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 38.      H. Karvonen, J.   Iinatti and M. H&auml;m&auml;l&auml;inen, ''Energy efficiency optimization for IR-UWB WBAN   based on the IEEE 802.15.6 standard'', in <i>8<sup>th</sup> International Conference on Body Area Networks</i>, Boston, USA, 2013, pp.   575-580.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139113&pid=S0120-6230201600020001000038&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 39.      N. Ababneh, N. Timmons and J. Morrison, ''Cross-layer   optimization protocol for guaranteed data streaming over wireless body area   networks'', in <i>8<sup>th</sup> International Wireless Communications and Mobile Computing Conference </i>(IWCMC),   Limassol, Cyprus, 2012, pp. 118-123.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139115&pid=S0120-6230201600020001000039&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 40.      M. Nabi, T. Basten,   M. Geilen, M. Blagojevic and T. Hendriks, ''A robust protocol stack for   multi-hop wireless body area networks with transmit power adaptation'', in <i>5<sup>th</sup> International Conference on   Body Area Networks</i>, Corfu Island, Greece, 2010, pp. 77-83.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139117&pid=S0120-6230201600020001000040&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 41.      V.   Chaganti, L. Hanlen and D. Smith, ''Are narrowband wireless on-body networks   wide-sense stationary?'', <i>IEEE   Transactions on Wireless Communications</i>, vol. 13, no. 5, pp. 2432-2442,   2014.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139119&pid=S0120-6230201600020001000041&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 42.      X. Hong, M.   Gerla, G. Pei and C. Chiang, ''A group mobility model for ad hoc wireless   networks'', in <i>2<sup>nd</sup> ACM   International Workshop on Modeling, Analysis and Simulation of Wireless and   Mobile Systems</i>, Seattle, USA, 1999, pp. 53-60.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139121&pid=S0120-6230201600020001000042&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 43.      E. Hyyti&auml; and J.   Virtamo, ''Random waypoint mobility model in cellular networks'', <i>Wireless Networks</i>, vol. 13, no. 2, pp.   177-188, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139123&pid=S0120-6230201600020001000043&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 44.      M. Zonoozi and P. Dassanayake, ''User   mobility modeling and characterization of mobility patterns'', <i>IEEE Journal on Selected Areas in   Communications</i>, vol. 15, no. 7, pp. 1239-1252, 1997.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139125&pid=S0120-6230201600020001000044&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 45.      T.   Camp, J. Boleng and V. Davies, ''A survey of mobility models for ad hoc network   research'', <i>Wireless Communications and   Mobile</i> <i>Computing</i>, vol. 2, no. 5,   pp. 483-502, 2002.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139127&pid=S0120-6230201600020001000045&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 46.  M. Sandhu <i>et al</i>.,   ''Mobility model for WBANs'', in <i>9<sup>th</sup> International Conference on Broadband and Wireless Computing, Communication and   Applications </i>(BWCCA),<i> </i>Guangdong,   China, 2014, pp. 155-160.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139129&pid=S0120-6230201600020001000046&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 47.      H. Ren and M. Meng, ''Understanding the mobility model   of wireless sensor networks'', in <i>IEEE   International Conference on Information Acquisition</i>, Weihai, China, 2006,   pp. 306-310.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139131&pid=S0120-6230201600020001000047&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 48.      M. Nabi, M. Geilen and T. Basten, ''MoBAN: A   configurable mobility model for wireless body area networks'', in <i>4<sup>th </sup>International ICST Conference   on Simulation Tools and Techniques</i>, Barcelona, Spain, 2011, pp. 168-177.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139133&pid=S0120-6230201600020001000048&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 49.      A. Varga, ''The OMNeT++ discrete event simulation   system'', in <i>European Simulation   Multiconference</i> (ESM), Prague, Czech Republic, 2001, pp. 65-71.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139135&pid=S0120-6230201600020001000049&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 50.      B. Braem, P. Cleyn and C. Blondia, ''Supporting   mobility in body sensor networks'', in <i>International   Conference on Body Sensor Networks</i>, Singapore, Singapore, 2010, pp. 52-55.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139137&pid=S0120-6230201600020001000050&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 51.      B. Braem and C. Blondia, ''Supporting mobility in   wireless body area networks: An analysis'', in <i>18<sup>th</sup> IEEE Symposium on Communications and Vehicular   Technology in the Benelux </i>(SCVT),<i> </i>Ghent,   Belgium, 2011, pp. 1-6.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139139&pid=S0120-6230201600020001000051&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 52.      K. Kwak, S. Ullah and N. Ullah, ''An overview of IEEE   802.15. 6 standard'', in <i>3<sup>rd</sup> International Symposium on Applied Sciences in Biomedical and Communication   Technologies </i>(ISABEL), Rome, Italia, 2010, pp. 1-6.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139141&pid=S0120-6230201600020001000052&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 53.      H. Bang, K. Takizawa and R. Kohno, ''Trends and   standardization of body area network (BAN) for medical healthcare'', in <i>European Conference on Wireless Technology </i>(EuWiT),   Amsterdam, Netherlands, 2008, pp. 1-4.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139143&pid=S0120-6230201600020001000053&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 54.      N. Bradai, S.   Belhaj, L. Chaari and L. Kamoun, ''Study of medium access mechanisms under IEEE   802.15.6 standard'', in <i>4<sup>th</sup> Joint IFIP</i> <i>Wireless and Mobile   Networking Conference </i>(WMNC),<i> </i>Toulouse,   France, 2011, pp. 1-6.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139145&pid=S0120-6230201600020001000054&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 55.      N. Timmons and W. Scanlon, ''Improving   the ultra-low-power performance of ieee 802.15. 6 by adaptive synchronization'', <i>IET Wireless Sensor Systems</i>, vol. 1,   no. 3, pp. 161-170, 2011.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139147&pid=S0120-6230201600020001000055&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 56.      K. Hur, W. Sohn, J. Kim and Y. Lee,   ''Ieee 802.15.6 wban beaconing for wireless usb protocol adaptation'', <i>International Journal of Software   Engineering and Its Applications, </i>vol. 7, no. 4, pp. 1-14, 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139149&pid=S0120-6230201600020001000056&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 57.      C. Lin and P. Chuang, ''Energy-efficient two-hop   extension protocol for wireless body area networks'', <i>IET Wireless Sensor Systems</i>, vol. 3, no. 1, pp. 37-56, 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139151&pid=S0120-6230201600020001000057&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 58.      S. Movassaghi, M.   Abolhasan, J. Lipman, D. Smith and A. Jamalipour, ''Wireless body area networks:   a survey'', <i>IEEE Communications Surveys   and Tutorials</i>, vol. 16, no. 3, pp. 1658-1686, 2014.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139153&pid=S0120-6230201600020001000058&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 59.      A. Boulis, D. Smith, D. Miniutti, L.   Libman and Y. Tselishchev, ''Challenges in body area networks for healthcare:   the mac'', <i>IEEE Communications Magazine</i>,   vol. 50, no. 5, pp. 100-106, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139155&pid=S0120-6230201600020001000059&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 60.      D. Tob&oacute;n, T. Falk and M. Maier, ''Context   awareness in wbans: a survey on medical and non-medical applications'', <i>IEEE Wireless Communications</i>, vol. 20,   no. 4, pp. 30-37,2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139157&pid=S0120-6230201600020001000060&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 61.      D. Barakah and M.   Ammad, ''A survey of challenges and applications of wireless body area network   (wban) and role of a virtual doctor server in existing architecture'', in <i>3<sup>rd </sup>International Conference on   Intelligent Systems, Modelling and Simulation</i>, Kota Kinabalu, Malaysia,   2012, pp. 214-219.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139159&pid=S0120-6230201600020001000061&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 62.      D. Singel&eacute;e <i>et al</i>., ''A secure low-delay protocol for wireless body area   networks'', <i>Ad Hoc &amp; Sensor Wireless   Networks</i>, vol. 9, pp. 53-72, 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139161&pid=S0120-6230201600020001000062&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 63.      A. Fort, C. Desset, P. Doncker, P.   Wambacq and L. Van, ''An ultra-wideband body area propagation channel model-from   statistics to implementation'', <i>IEEE   Transactions on Microwave Theory and Techniques</i>, vol. 54, no. 4, pp.   1820-1826, 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139163&pid=S0120-6230201600020001000063&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 64.      Q. Wang, T. Tayamachi, I. Kimura and   J. Wang, ''An on-body channel model for uwb body area communications for various   postures'', <i>IEEE Transactions on Antennas   and Propagation</i>, vol. 57, no. 4, pp. 991-998, 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139165&pid=S0120-6230201600020001000064&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 65.      Z. Hu, Y. Nechayev, P. Hall, C.   Constantinou and Y. Hao, ''Measurements and statistical analysis of on-body   channel fading at 2.45 ghz'', <i>IEEE Antennas   and Wireless Propagation Letters</i>, vol. 6, pp. 612-615, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139167&pid=S0120-6230201600020001000065&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 66.      M. S&auml;rest&ouml;niemi, T. Tuovinen, M.   H&auml;m&auml;l&auml;inen, K. Yazdandoost and J. Iinatti, ''Channel modeling for UWB WBAN on-off body communication link with   finite integration technique'', in <i>7<sup>th </sup>International Conference on Body Area Networks</i>, Oslo, Norway, 2012, pp.   235-241.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139169&pid=S0120-6230201600020001000066&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 67.  E. Reusens <i>et al</i>., ''Characterization of on-body communication channel and   energy efficient topology design for wireless body area networks'', <i>IEEE Transactions on Information Technology   in Biomedicine</i>, vol. 13, no. 6, pp. 933-945, 2009.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139171&pid=S0120-6230201600020001000067&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p>     <!-- ref --><p> 68.      D. Smith, D. Miniutti, T. Lamahewa   and L. Hanlen, ''Propagation models for body-area networks: A survey and new   outlook'', <i>IEEE Antennas and Propagation   Magazine</i>, vol. 55, no. 5, pp. 97-117, 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=3139173&pid=S0120-6230201600020001000068&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> </p> </font>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Omeni]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Wai]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Burdett]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Toumazou]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Energy efficient medium access protocol for wireless medical body area sensor networks]]></article-title>
<source><![CDATA[IEEE Trans. Biomed. Circuits and Systems]]></source>
<year>2008</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>251-259</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marinkovic]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Spagnol]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Popovici]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Energy-efficient tdma-based mac protocol for wireless body area networks]]></source>
<year>2009</year>
<conf-name><![CDATA[3rd International Conference on Sensor Technologies and Applications]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Athens ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Tan]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[An ultra-low-power medium access control protocol for body sensor network]]></source>
<year>2005</year>
<conf-name><![CDATA[27th Annual Conference IEEE Engineering in Medicine and Biology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>2451-2454</page-range><publisher-loc><![CDATA[Shanghai ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Otal]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Alonso]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Verikoukis]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Design and analysis of an energy-saving distributed MAC mechanism for wireless body sensor networks]]></article-title>
<source><![CDATA[EURASIP J. Wireless Comm. and Networking]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Tan]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Heartbeat-driven medium-access control for body sensor networks]]></article-title>
<source><![CDATA[IEEE Transactions on Information Technology in Biomedicine]]></source>
<year>2010</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>44-51</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
<name>
<surname><![CDATA[Wen]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Ca-mac: A hybrid context-aware mac protocol for wireless body area networks]]></source>
<year>2011</year>
<conf-name><![CDATA[13th IEEE International Conference on e-Health Networking Applications and Services]]></conf-name>
<conf-loc> </conf-loc>
<page-range>213-216</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kwak]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Ullah]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[A traffic-adaptive mac protocol for wban]]></source>
<year>2010</year>
<conf-name><![CDATA[ IEEE Globecom Workshops]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Miami ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tang]]></surname>
<given-names><![CDATA[Q]]></given-names>
</name>
<name>
<surname><![CDATA[Tummala]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Schwiebert]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[TARA: thermal-aware routing algorithm for implanted sensor networks]]></source>
<year>2005</year>
<conf-name><![CDATA[1st IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Marina del Rey ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bag]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Bassiouni]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Energy efficient thermal aware routing algorithms for embedded biomedical sensor networks]]></source>
<year>2006</year>
<conf-name><![CDATA[ IEEE International Conference on Mobile Ad Hoc and Sensor Systems]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Vancouver ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Takahashi]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[LTRT: least total-route temperature routing for embedded biomedical sensor networks]]></source>
<year>2007</year>
<conf-name><![CDATA[ IEEE Global Telecommunications Conference]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Washington D.C ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamal]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Obaidur]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[A lightweight temperature scheduling routing algorithm for an implanted sensor network]]></source>
<year>2011</year>
<conf-name><![CDATA[ International Conference on ICT Convergence (ICTC)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Seoul ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kathuria]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Gambhir]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Quality of service provisioning transport layer protocol for wban system]]></source>
<year>2014</year>
<conf-name><![CDATA[ International Conference on Optimization, Reliabilty, and Information Technology (ICROIT)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Faridabad ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rashid]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Qos taxonomy towards wireless body area network solutions]]></article-title>
<source><![CDATA[International Journal of Application or Innovation in Engineering & Management]]></source>
<year>2013</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>221-234</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Requirements of quality of service in wireless sensor network]]></source>
<year>2006</year>
<conf-name><![CDATA[5th International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Morne ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Srivastava]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Motani]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cross-layer design: a survey and the road ahead]]></article-title>
<source><![CDATA[IEEE Communications Magazine]]></source>
<year>2005</year>
<volume>43</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>112-119</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crosby]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Ghosh]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Murimi]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Chin]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Wireless body area networks for healthcare: a survey]]></article-title>
<source><![CDATA[IJASUC]]></source>
<year>2012</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-26</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ullah et al.]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A comprehensive survey of wireless body area networks - on phy, mac, and network layers solutions]]></article-title>
<source><![CDATA[J. Medical Systems]]></source>
<year>2012</year>
<volume>36</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1065-1094</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Latré]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Braem]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Moerman]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Blondia]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Demeester]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A survey on wireless body area networks]]></article-title>
<source><![CDATA[Wireless Networks]]></source>
<year>2011</year>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arumugam]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Gautham]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Narayanaswamy]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Engels]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Impacts of RF radiation on the human body in a passive wireless healthcare environment]]></source>
<year>2008</year>
<conf-name><![CDATA[2nd International Conference on Pervasive Computing Technologies for Healthcare]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Tampere ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gopalan]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Energy-efficient mac protocols for wireless body area networks: Survey]]></source>
<year>2010</year>
<conf-name><![CDATA[ International Congress on Ultra Modern Telecommunications and Control Systems and Workshops]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Moscow ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bertsekas]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Gallager]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Humblet]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Data networks]]></source>
<year>1992</year>
<publisher-loc><![CDATA[New Jersey ]]></publisher-loc>
<publisher-name><![CDATA[Prentice-Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[van Hoesel]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Nieberg]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Havinga]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Prolonging the lifetime of wireless sensor networks by cross-layer interaction]]></article-title>
<source><![CDATA[IEEE Wireless Communications]]></source>
<year>2004</year>
<volume>11</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>78-86</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hughes]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A review of protocol implementations and energy efficient cross-layer design for wireless body area networks]]></article-title>
<source><![CDATA[Sensors]]></source>
<year>2012</year>
<volume>12</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>14730-14773</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raghuwanshi]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[An energy efficient cross layer design scheme for wireless sensor networks]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Virginia ]]></publisher-loc>
<publisher-name><![CDATA[Virginia Polytechnic Institute and State University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Sanctis]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Cianca]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Ruggieri]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Prasad]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Energy efficient cross layer optimization for WPAN]]></source>
<year>2005</year>
<conf-name><![CDATA[ The European Conference on Wireless Technology]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Paris ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jaradat]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Benhaddou]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Balakrishnan]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Fuqaha]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Energy efficient cross-layer routing protocol in wireless sensor networks based on fuzzy logic]]></source>
<year>2013</year>
<conf-name><![CDATA[9th International Wireless Communications and Mobile Computing Conference (IWCMC)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Sardinia ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Braem]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Latre]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Moerman]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Blondia]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Demeester]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[The wireless autonomous spanning tree protocol for multihop wireless body area networks]]></source>
<year>2006</year>
<conf-name><![CDATA[3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[San Jose ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Latré]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[A low-delay protocol for multihop wireless body area networks]]></source>
<year>2007</year>
<conf-name><![CDATA[4th Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Philadelphia ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torabi]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cross-layer design for prompt and reliable transmissions over body area networks]]></article-title>
<source><![CDATA[IEEE J. Biomedical and Health Informatics]]></source>
<year>2014</year>
<volume>18</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1303-1316</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torabi]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Realization of public m-health service in license-free spectrum]]></article-title>
<source><![CDATA[IEEE J. Biomedical and Health Informatics]]></source>
<year>2013</year>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>19-29</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torabi]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Kaur]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Distributed dynamic scheduling for body area networks]]></article-title>
<source><![CDATA[]]></source>
<year>2012</year>
<conf-name><![CDATA[ IEEE Wireless Communications and Networking Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>3177-3182</page-range><publisher-loc><![CDATA[Shanghai ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="">
<collab>Institute of Electrical and Electronics Engineers (IEEE)</collab>
<source><![CDATA[IEEE standard for local and metropolitan area networks part 15.6: Wireless body area networks]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elhadj]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Boudjit]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Chaari]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[A cross-layer based data dissemination algorithm for ieee 802.15.6 wbans]]></source>
<year>2013</year>
<conf-name><![CDATA[ International Conference on Smart Communications in Network Technologies]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Paris ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abassi]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
<name>
<surname><![CDATA[Awang]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hamid]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[A cross-layer opportunistic mac/routing protocol to improve reliability in wban]]></source>
<year>2014</year>
<conf-name><![CDATA[ 20th Asia-Pacific Conference on Communication (APCC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>36-41</page-range><publisher-loc><![CDATA[Pattaya ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bouabdallah]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Bouabdallah]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Boutaba]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Cross-layer design for energy conservation in wireless sensor networks]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Awad]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Mohamed]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Sherif]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Energy efficient cross-layer design for wireless body area monitoring networks in healthcare applications]]></source>
<year>2013</year>
<conf-name><![CDATA[ IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[London ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Battery-dynamics driven TDMA MAC protocols for wireless body-area monitoring networks in healthcare applications]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>2009</year>
<volume>27</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>424-434</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karvonen]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Iinatti]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Hämäläinen]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Energy efficiency optimization for IR-UWB WBAN based on the IEEE 802.15.6 standard]]></source>
<year>2013</year>
<conf-name><![CDATA[8th International Conference on Body Area Networks]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Boston ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ababneh]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Timmons]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Morrison]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Cross-layer optimization protocol for guaranteed data streaming over wireless body area networks]]></source>
<year>2012</year>
<conf-name><![CDATA[8th International Wireless Communications and Mobile Computing Conference (IWCMC)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Limassol ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nabi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Basten]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Geilen]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Blagojevic]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Hendriks]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[A robust protocol stack for multi-hop wireless body area networks with transmit power adaptation]]></source>
<year>2010</year>
<conf-name><![CDATA[5t International Conference on Body Area Networks]]></conf-name>
<conf-loc> </conf-loc>
<page-range>77-83</page-range><publisher-loc><![CDATA[Corfu Island ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chaganti]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Hanlen]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Are narrowband wireless on-body networks wide-sense stationary?]]></article-title>
<source><![CDATA[IEEE Transactions on Wireless Communications]]></source>
<year>2014</year>
<volume>13</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>2432-2442</page-range></nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Gerla]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Pei]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Chiang]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[A group mobility model for ad hoc wireless networks]]></source>
<year>1999</year>
<conf-name><![CDATA[2nd ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems]]></conf-name>
<conf-loc> </conf-loc>
<page-range>53-60</page-range><publisher-loc><![CDATA[Seattle ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B43">
<label>43</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hyytiä]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Virtamo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Random waypoint mobility model in cellular networks]]></article-title>
<source><![CDATA[Wireless Networks]]></source>
<year>2007</year>
<volume>13</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>177-188</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>44</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zonoozi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Dassanayake]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[User mobility modeling and characterization of mobility patterns]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>1997</year>
<volume>15</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1239-1252</page-range></nlm-citation>
</ref>
<ref id="B45">
<label>45</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Camp]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Boleng]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Davies]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A survey of mobility models for ad hoc network research]]></article-title>
<source><![CDATA[Wireless Communications and Mobile Computing]]></source>
<year>2002</year>
<volume>2</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>483-502</page-range></nlm-citation>
</ref>
<ref id="B46">
<label>46</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sandhu]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Mobility model for WBANs]]></source>
<year>2014</year>
<conf-name><![CDATA[9th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Guangdong ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B47">
<label>47</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Meng]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding the mobility model of wireless sensor networks]]></source>
<year>2006</year>
<conf-name><![CDATA[ IEEE International Conference on Information Acquisition]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Weihai ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B48">
<label>48</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nabi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Geilen]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Basten]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[MoBAN: A configurable mobility model for wireless body area networks]]></source>
<year>2011</year>
<conf-name><![CDATA[4th International ICST Conference on Simulation Tools and Techniques]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B49">
<label>49</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Varga]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[The OMNeT++ discrete event simulation system]]></source>
<year>2001</year>
<conf-name><![CDATA[ European Simulation Multiconference (ESM)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Prague ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B50">
<label>50</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Braem]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Cleyn]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Blondia]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Supporting mobility in body sensor networks]]></source>
<year>2010</year>
<conf-name><![CDATA[ International Conference on Body Sensor Networks]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Singapore ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B51">
<label>51</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Braem]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Blondia]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Supporting mobility in wireless body area networks: An analysis]]></source>
<year>2011</year>
<conf-name><![CDATA[18th IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Belgium ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B52">
<label>52</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kwak]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Ullah]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Ullah]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[An overview of IEEE 802.15. 6 standard]]></source>
<year>2010</year>
<conf-name><![CDATA[3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Rome ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B53">
<label>53</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bang]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Takizawa]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Kohno]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Trends and standardization of body area network (BAN) for medical healthcare]]></source>
<year>2008</year>
<conf-name><![CDATA[ European Conference on Wireless Technology (EuWiT)]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Amsterdam ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B54">
<label>54</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bradai]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Belhaj]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Chaari]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Kamoun]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B55">
<label>55</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Timmons]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Scanlon]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Improving the ultra-low-power performance of ieee 802.15. 6 by adaptive synchronization]]></article-title>
<source><![CDATA[IET Wireless Sensor Systems]]></source>
<year>2011</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>161-170</page-range></nlm-citation>
</ref>
<ref id="B56">
<label>56</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hur]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Sohn]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Ieee 802.15.6 wban beaconing for wireless usb protocol adaptation]]></article-title>
<source><![CDATA[International Journal of Software Engineering and Its Applications]]></source>
<year>2013</year>
<volume>7</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B57">
<label>57</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Chuang]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Energy-efficient two-hop extension protocol for wireless body area networks]]></article-title>
<source><![CDATA[IET Wireless Sensor Systems]]></source>
<year>2013</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>37-56</page-range></nlm-citation>
</ref>
<ref id="B58">
<label>58</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Movassaghi]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Abolhasan]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Lipman]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Jamalipour]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Wireless body area networks: a survey]]></article-title>
<source><![CDATA[IEEE Communications Surveys and Tutorials]]></source>
<year>2014</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1658-1686</page-range></nlm-citation>
</ref>
<ref id="B59">
<label>59</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boulis]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Miniutti]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Libman]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Tselishchev]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Challenges in body area networks for healthcare: the mac]]></article-title>
<source><![CDATA[IEEE Communications Magazine]]></source>
<year>2012</year>
<volume>50</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>100-106</page-range></nlm-citation>
</ref>
<ref id="B60">
<label>60</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tobón]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Falk]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Maier]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Context awareness in wbans: a survey on medical and non-medical applications]]></article-title>
<source><![CDATA[IEEE Wireless Communications]]></source>
<year>2013</year>
<volume>20</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>30-37</page-range></nlm-citation>
</ref>
<ref id="B61">
<label>61</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barakah]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Ammad]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[A survey of challenges and applications of wireless body area network (wban) and role of a virtual doctor server in existing architecture]]></source>
<year>2012</year>
<conf-name><![CDATA[3rd International Conference on Intelligent Systems, Modelling and Simulation]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Kota Kinabalu ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B62">
<label>62</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singelée et al.]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A secure low-delay protocol for wireless body area networks]]></article-title>
<source><![CDATA[Ad Hoc & Sensor Wireless Networks]]></source>
<year>2009</year>
<volume>9</volume>
<page-range>53-72</page-range></nlm-citation>
</ref>
<ref id="B63">
<label>63</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fort]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Desset]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Doncker]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Wambacq]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Van]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An ultra-wideband body area propagation channel model-from statistics to implementation]]></article-title>
<source><![CDATA[IEEE Transactions on Microwave Theory and Techniques]]></source>
<year>2006</year>
<volume>54</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1820-1826</page-range></nlm-citation>
</ref>
<ref id="B64">
<label>64</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Q]]></given-names>
</name>
<name>
<surname><![CDATA[Tayamachi]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Kimura]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An on-body channel model for uwb body area communications for various postures]]></article-title>
<source><![CDATA[IEEE Transactions on Antennas and Propagation]]></source>
<year>2009</year>
<volume>57</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>991-998</page-range></nlm-citation>
</ref>
<ref id="B65">
<label>65</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
<name>
<surname><![CDATA[Nechayev]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Hall]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Constantinou]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Hao]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Measurements and statistical analysis of on-body channel fading at 2.45 ghz]]></article-title>
<source><![CDATA[IEEE Antennas and Wireless Propagation Letters]]></source>
<year>2007</year>
<volume>6</volume>
<page-range>612-615</page-range></nlm-citation>
</ref>
<ref id="B66">
<label>66</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Särestöniemi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Tuovinen]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Hämäläinen]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Yazdandoost]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Iinatti]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Channel modeling for UWB WBAN on-off body communication link with finite integration technique]]></source>
<year>2012</year>
<conf-name><![CDATA[7th International Conference on Body Area Networks]]></conf-name>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Oslo ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B67">
<label>67</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reusens et al.]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Characterization of on-body communication channel and energy efficient topology design for wireless body area networks]]></article-title>
<source><![CDATA[IEEE Transactions on Information Technology in Biomedicine]]></source>
<year>2009</year>
<volume>13</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>933-945</page-range></nlm-citation>
</ref>
<ref id="B68">
<label>68</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Miniutti]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Lamahewa]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Hanlen]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Propagation models for body-area networks: A survey and new outlook]]></article-title>
<source><![CDATA[IEEE Antennas and Propagation Magazine]]></source>
<year>2013</year>
<volume>55</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>97-117</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
