Wireless Body Area Network (WBAN) A Survey On Reliability
Wireless Body Area Network (WBAN) A Survey On Reliability
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology
enables new applications under the umbrella of different domains, including the medical field, the entertain-
ment and ambient intelligence areas. This survey paper places substantial emphasis on the concept and key 3
features of the WBAN technology. First, the WBAN concept is introduced and a review of key applications fa-
cilitated by this networking technology is provided. The study then explores a wide variety of communication
standards and methods deployed in this technology. Due to the sensitivity and criticality of the data carried
and handled by WBAN, fault tolerance is a critical issue and widely discussed in this paper. Hence, this
survey investigates thoroughly the reliability and fault tolerance paradigms suggested for WBANs. Open
research and challenging issues pertaining to fault tolerance, coexistence and interference management and
power consumption are also discussed along with some suggested trends in these aspects.
CCS Concepts: rComputer systems organization → Sensor networks; Reliability; Fault-tolerant
network topologies; Sensors and actuators; r
Hardware → Wireless devices; Wireless integrated
network sensors; Fault tolerance; Sensors and actuators; Sensor devices and platforms; Analysis and
design of emerging devices and systems
Additional Key Words and Phrases: Wireless body area networks, QoS, medical, channel access, fading,
WBAN standards
ACM Reference Format:
Marwa Salayma, Ahmed Al-Dubai, Imed Romdhani, and Youssef Nasser. 2017. Wireless body area network
(WBAN): A survey on reliability, fault tolerance, and technologies coexistence. ACM Comput. Surv. 50, 1,
Article 3 (March 2017), 38 pages.
DOI: http://dx.doi.org/10.1145/3041956
1. INTRODUCTION
The first decades of the last century heralded a revolution in wired communication: they
brought about an almost magical technological evolution especially sensing data and
communications. It did not take long for people to realise however that this technology
was inefficient, especially when it comes to wiring costs, mobility and independent
connections. Such inefficiencies have been the key driving forces towards the evolution
Authors’ addresses: M. Salayma, School of Computing, Edinburgh Napier University, 10 Colinton Road,
Edinburgh, EH10 5DT, UK; email: [email protected]; A. Al-Dubai, School of Computing, Edin-
burgh Napier University, 10 Colinton Road, Edinburgh, EH10 5DT, UK; email: [email protected];
I. Romdhani, School of Computing, Edinburgh Napier University, 10 Colinton Road, Edinburgh, EH10 5DT,
UK; email: [email protected]; Y. Nasser, ECE Department, American University of Beirut, Beirut,
Lebanon; email: [email protected].
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted
without fee provided that copies are not made or distributed for profit or commercial advantage and that
copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for
components of this work owned by others than ACM must be honored. Abstracting with credit is permitted.
To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this
work in other works requires prior specific permission and/or a fee. Permissions may be requested from
Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212)
869-0481, or [email protected].
c 2017 ACM 0360-0300/2017/03-ART3 $15.00
DOI: http://dx.doi.org/10.1145/3041956
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:2 M. Salayma et al.
—Unlike existing surveys, this survey emphasizes on two major issues lightly ad-
dressed before, namely, fault-tolerance- and reliability-related issues.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:3
Fig. 1. Statistics of population aging in developed countries [Rutherford and Socio 2012].
—It provides an overview of some of the key challenges presented in the recent litera-
ture regarding reliablity and provides a summary of related research work. Moreover,
we explore both the hardware and software faults.
—It presents the need for better reliable solutions and integration among different
layers. It presents the interferences management and illustrate how the different
mobility models can affect the network reliability and possible solutions to mitigate
interferences.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:4 M. Salayma et al.
load to health care systems with limited financial resources. This calls for more afford-
able and scalable systems that are able to move current health care in the direction
of early disease diagnosis and proactive wellness management. Wireless technologies,
including WSN and Wireless Personal Area Networks (WPAN), nanotechnologies, and
the Internet provide the means through which economical solutions could be found
for health care systems. Such technologies suggest the idea of using tiny, smart, low-
power, microsensors and actuators to sample physiological data and then forward it to
a remote server through wireless communication. While WPAN devices operate within
very small range area (less than 10m), the communication range of WBAN devices
would be narrower than that of WPAN as they are limited to the human body area
where they could be worn or implanted [Latr’e et al. 2011]. Actually, WBAN is consid-
ered to be the next generation of WPAN. A typical WBAN is shown in Figure 2. Though
WBAN comprises the typical characteristics of both WSN and WPAN, it also has its
own characteristics and thus its own requirements. WBAN saves lives by allowing
early detection of abnormal situations through wearable and implanted monitoring
devices. It allows continuous and real-time monitoring with no human or mechanical
intervention, which improves the quality of the achieved results. Moreover, WBAN of-
fers patients the ability to carry out their normal activities without interruption while
their vital signals are monitored, as they are no longer required to stay in hospital
or stick to a medical service [Movassaghi et al. 2014]. The adoption of WBAN should
reduce the cost of healthcare, by minimizing the need for expensive in-hospital care
monitoring. Such benefits have motivated practitioners in other fields, such as sports,
the military and the entertainment field to adopt it in their systems [Patel and Wang
2010].
A classification of the various applications that can be facilitated by WBAN is pre-
sented next, followed by the four popular standards proposed for WBAN, the main
WBAN devices and finally the most important WBAN challenges featured in the liter-
ature to its special nature.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:5
2.1.1. Healthcare. This is one of the most promising fields for using WBAN. Implanted
and wearable sensors are used to collect biomedical signals remotely and continu-
ally [Malik and Singh 2013; Cavallari et al. 2014]. This continual monitoring allows a
proactive fatal and anomalies detection which is vital for diagnosing heart and brain ac-
tivities. Actuators help in automatic drug delivery. Some applications such as cochlear
implants, hearing aids, and artificial retinas help enhance the life style of human
beings [Barakah and Ammad-Uddin 2012; Malik and Singh 2013]. Additionally, given
that medical accidents can and do happen, WBAN applications help to reduce them and
increase public safety by using profiles of previous medical accidents to alert medical
personnel before similar accidents occur. Consequently, WBAN is expected to improve
the management of illnesses and reaction to crisis which will increase the efficiency
of health care systems. WBAN health care applications can be further classified as
follows.
2.1.1.1. Medical Applications. WBAN medical applications enable the continual mon-
itoring of physiological parameters such as the heartbeat, the body temperature, and
blood pressure [Movassaghi et al. 2014]. The data collected can be sent through a cell
phone, which acts as a gateway, to a remote location such as an emergency centre so
that the relevant action can be taken [Barakah and Ammad-Uddin 2012; Malik and
Singh 2013; Movassaghi et al. 2014]. WBAN is considered key to the early detection and
treatment of patients with serious cases such as diabetes and hypertension. Medical
applications of WBAN can be further divided according to the position of the medical
sensors as follows:
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:6 M. Salayma et al.
—Implant Applications. These applications comprise nodes implanted either under the
skin or in the stream of the blood such as in diabetes control systems, cardiovascular
diseases and cancer detection.
2.1.1.2. Non-Medical Applications. These applications are considered to fall within
the wearable sensor class of applications and include two applications which are
Movassaghi et al. [2014]:
—Motion Detection. This application is used to detect, capture, recognise and identify
body gestures and motions and send alerts to the owner of the application. For
example, fear increases heartbeat, which leads to sweating and other symptoms.
Thus, emotional status can be measured and monitored [Movassaghi et al. 2014].
—Secure Authentication. This is a very promising WBAN application as it is the core of
both multi-modal biometrics and electroencephalography. This application harnesses
physiological and behavioural human body biometrics such as fingerprints and facial
patterns.
2.1.2. Sports. Sport activities and fitness can be improved by keeping a log of vital
physiological data such as temperature, heart beat and blood pressure. The data can
be used to avoid sport accidents and injuries and to plan for future training [Barakah
and Ammad-Uddin 2012; Malik and Singh 2013; Cavallari et al. 2014]. According to
Movassaghi et al. [2014], WBAN sport applications are considered to be medical wear-
able applications. Such applications enhance professional and amateur sport training
especially for athletes. For example, they provide the necessary information to enable
training schedules of professional athletes to be adapted to make them more effective.
2.1.3. Entertainment. Entertainment is also a very promising field for WBAN. The film
industry, for example, benefits from motion capturing and post production mechanisms
to produce movies in which actors perform the objects roles [Cavallari et al. 2014]. Using
the on-body accelerometers and gyroscopes for capturing motions facilitates the possi-
bility of tracking the different positions of body parts [Cavallari et al. 2014]. According
to Movassaghi et al. [2014], WBAN entertainment applications are considered to be
wearable non-medical applications. WBAN can be used in three types of entertainment
applications, presented below.
—Real-Time Streaming. This includes video streaming, as well as audio streaming
such as voice communication for headsets that are used for listening to explanations,
illustrations, and multicasting (for example, conference calls).
—Consumer Electronics. These applications include appliances/devices such as mi-
crophones, MP3-players, cameras and other advanced interfaces such as neural
interfaces.
—Gaming, virtual reality, ambient intelligence areas, personal item tracking and social
networking [Malik and Singh 2013].
2.1.4. Military and Defense. WBAN provides new capabilities to improve performance
of individual and teams of soldiers in military situations. To avoid threats at the
individual tier, a group of sensors sample important information on the surrounding
emerging actions and environment. At the team level, the taken information enables
the commander to coordinate team tasks efficiently. Inter-WBAN communications
and security play a key role in preventing critical data from being hacked by enemies
[Cavallari et al. 2014]. WBAN applications can be considered as either medical
wearable or non-medical wearable as follows:
2.1.4.1. Medical Military WBAN Applications. These types of applications are
used to assess soldier fatigue and battle readiness and for safeguarding uniformed
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:7
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:8 M. Salayma et al.
Table II. A Comparison between the Aforementioned Technologies Discussed in this Section
Standard/
Criteria IEEE802.15.4 IEEE802.15.4a IEEE802.15.4j IEEE802.15.4.6
Network type WPAN UWB WBAN MBAN WBAN: NB, UWB and
HBC
MAC modes Beacon/Non- Superframe Superframe Superframe with
Beacon mode Beacon mode Beacon mode beacon mode
with/without enabled enabled Superframes with
superframe non-beacon mode
Non-beacon mode
without only
Access Random access Random access Random access Contention-based
mechanisms (with Contention: (Contention- (with contention random access:
CAP) Scheduled based: CAP) CAP) Scheduled EAP1,RAP1,EAP2,
access (without Scheduled access RAP2,CAP)
Contention: CFP) access (Contention free: TypeI/II)
(Contention CFP) Connection oriented
free: CFP) contention-free:
TypeI/II)
Contention Slotted and Slotted or Slotted CSMA/CA/a slotted
access un-slotted unslotted Aloha CSMA/CA Aloha
resource CSMA/CA in (CSMA is (in CAP) (in EAP1,RAP1,EAP2,
allocation beacon mode and optional) RAP2,CAP)
procedure in non-beacon (in CAP)
mode (in CAP)
Contention Schedule access by Schedule access A multi-periodic Two access modes:
free access allocating static by allocating scheduled access 1-Schedules the
resource GTS Allocation static GTS by allocating allocation of slots: one/
allocation persists in the Allocation static GTS multiple upcoming
procedure upcoming persists in the (m-periodic) superframes
superframes. upcoming (in CFP) single-periodic or
(1-periodic) (in superframes. m-periodic)
CFP) (1-periodic) (in allocations.
CFP) 2-In unscheduled
access: unscheduled
polling/posting
Specific No No No Yes exclusive access
Access for (EAP1,EAP2).
prioritised
(emergency)
traffic
More detail about this classification is provided in TG6 [2012]. The IEEE TG6 proposes
only one shared MAC to manage the channel access above the three physical layers. It
combines both contention and contention-less access techniques to support the variety
of data flaws that might occur in WBAN, such as burst, continuous and periodic traffic.
The coordinator splits the time or the channel into a successive number of Superframes
[TG6 2012; Cavallari et al. 2014; Movassaghi et al. 2014]. To access the channel, the
coordinator chooses one of three access modes, these are illustrated in the following:
(1) Beacon Mode with Beacon Superframe Periods. Here, the coordinator sends suc-
cessive beacon frames to specify the beginning and the end of the Superframe,
which is referred to as the beacon period. The Superframe structure of this mode
is presented in Figure 3. Table II provides more details about the MAC eaccss
mechanisms that are offered by this access mode.
(2) Non-Beacon Mode with Superframes. No beacon frame is used in this access mode,
and the superframe may only comprise either Type I phase or Type II phase as
expained in Movassaghi et al. [2014].
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:9
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:10 M. Salayma et al.
level in the human blood, which coincides with the cardiac cycle. The ECG sensor
that investigates the heart function by sampling the heart muscle propagation electric
waveform with respect to time. The EEG sensor that detects brain electrical activity
and the motion detection sensors that combine both accelerometer and a gyroscope to
monitor and analyse a person’s movements [Khan and Yuce 2010; Crosby et al. 2012].
2.3.1.2. Implantable Sensors. These devices are injected under the skin or in the
blood stream [Crosby et al. 2012]. In Parkinson’s disease, for example, these sensors
are used to send electrical impulses to the brain through neural simulators. Other
applications for implantable sensors can be found in Garg et al. [2004] and Maloney
and Santini Jr [2004].
2.3.2. Actuators. Actuators are used to administer medicine to a patient. The required
drug is administered directly in a predefined manner when a sensor detects an abnor-
mality or when it is triggered by an external source, according to the doctor’s decision.
Similar to a sensor node, an actuator consists of a transceiver, battery, memory, and the
actuator hardware that holds and manages the drug. The drugs could be used to control
blood pressure, the body’s temperature and to treat many other illnesses. The actuator
is activated upon receiving data from the sensors [Barakah and Ammad-Uddin 2012;
Movassaghi et al. 2014].
2.3.3. Wireless Personal Device (PD). It is responsible for establishing communication
between sensors, actuators and a cellular phone in a wireless fashion. Its main com-
ponents are: a transceiver, a rich power source, a large processor and a large memory
[Barakah and Ammad-Uddin 2012; Movassaghi et al. 2014].
3. CHALLENGES OF WBAN
As WBAN is a special type of WSN, it inherits many of its challenges. However, a
number of new challenges characterise WBAN and a number of problems require
better solutions. A survey of the differences between WBAN and WSN is given in
Latr’e et al. [2011]. Practical adoption of WBAN could not be achieved without tackling
the various technical, ethical and social challenges this type of networks faces. The
main objective is to achieve a reliable, fault-tolerant network with minimum delay and
maximum throughput while considering power consumption by reducing unnecessary
communication. User requirements such as privacy, safety, ease of use, security and
compatibility are also of great importance. The most challenging issues concerning
WBAN are detailed in this section. This survey considers a wide range of challenges
in WBANs. However, it is worth indicating that this survey will put a great deal of
emphasis on the reliability challenges.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:11
active mode [Movassaghi et al. 2014]. Wireless technologies focus on minimising the
average current drawn from the battery by different means and techniques. Further
improvements are necessary to reduce the drawn peak current in sensing technologies,
radio hardware and integrated circuits. The issue of minimising interference and in-
creasing WBAN lifetime by adopting transmit power control requires further attention.
Some studies reviewed in the literature focus on scavenging energy from body heat or
motion. Power consumption challenge is deeply discussed in Cavallari et al. [2014] and
Movassaghi et al. [2014].
3.2. Heterogeneity of Devices
Since sensors in WBAN capture different kinds of data, reliability is a key issue. For
instance, sensors vary in their sensed traffic rate as this depends on the application
type and data to be sent. Bit rate values vary between less than 1kbps to 10Mbps
[Cavallari et al. 2014]. Inherently, some sensors sense more critical data than others.
Moreover, the same sensor might be in different states that vary in their criticality.
Hence, the reliability grade may change dynamically at runtime [Wu et al. 2010].
For example, human temperature might be normal and requires a normal level of
reliability, but when the temperature suddenly goes over or under the natural limit, the
reliability requirement becomes much more rigorous. As a consequence, WBAN needs
to dynamically guarantee reliability for the sensor nodes. Assuring a dynamic level of
reliability for different sensors is a challenge of great importance. These factors, as well
as sensor limitations, breakdowns and interference change the network operational
conditions, which consequently leads to incomplete and erroneous sensor data [Ullah
et al. 2012].
3.3. Reliability
A WBAN demands a high degree of reliability as it directly affects the quality of patient
monitoring. Undetected life-threatening situations can lead to fatality. A main require-
ment is that the health care professionals receive the monitored data correctly. Thus,
reliability is a crucial issue in WBAN. Reliability can be measured by the quality of
the link or by the efficiency of end-to-end communication. In order to meet user expec-
tations and achieve a reliable network, there are three basic characteristics that any
network technology, programmed service and protocol needs to address: fault tolerance,
QoS and security [C.N.A.P Staff 2013]. Designing protocols for unforeseen problems is
an essential element of WBAN design because it is necessary that the WBAN operates
continuously for users who rely on it. This requires that the architecture of a WBAN
and its design techniques should be fault tolerant. A fault-tolerant network is the one
that limits the effect of a failure, so that the fewest number of network components are
affected [Kshirsagar and Jirapure 2011; Mishra et al. 2012; C.N.A.P. Staff 2013]. It is
also built in a way that enables quick recovery when such a failure occurs. However,
WBAN medical applications create higher expectations for the quality of the deliv-
ered services as for such applications any constant breaks, pauses, delays or packet
loss could be fatal especially in emergency situations [Khan and Yuce 2010; C.N.A.P.
Staff 2013]. Hence, QoS becomes an ever-increasing requirement of WBAN. Reliable
QoS could be acquired by proposing well-designed protocols that can prioritise network
traffic. Reliable QoS also means that that all packets arrive on time and in their correct
order. This requires mechanisms that avoid or could manage traffic congestion. Net-
work bandwidth measures the capacity of the medium to carry data that is the amount
of transmitted information through the channel during a specific time.
When there are simultaneous multiple attempts in using the medium, the demand
for the bandwidth outstrips its availability as the medium has to carry more than
what the bandwidth can deliver. This leads to channel congestion. In most cases, when
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:12 M. Salayma et al.
the volume of packets is greater than what can be carried across the medium, data
can be queued or saved in temporary memory until the resources become available.
However, if the memory or queues become full, packets will be dropped causing packet
loss. Packet loss could occur due to collisions in simultaneous packet transmission. For
a WBAN, packet loss might lead to erroneous output and a life-threatening failure. It
is understood that achieving the required fault tolerance and QoS by managing faults,
the delay and the packet loss parameters on a WBAN becomes the secret to providing
a successful solution for end-to-end application quality [Khan and Yuce 2010; C.N.A P.
Staff 2013]. It can be concluded that, for WBAN, fault tolerance and QoS are correlated,
and that in order to provide a successful and reliable solution for WBAN end-to-end
applications, both fault tolerance and QoS should be considered side by side. The third
requirement that should be addressed to achieve a reliable WBAN is security. Security
in WBAN is fully addressed in Barakah and Ammad-uddin [2012], Chin et al. [2012],
and Movassaghi et al. [2014].
3.3.1. Threats: Faults, Error, Failure. A threat is a violation of one or more of the system
requirements. Some threats could be noticed without affecting the functionality of the
system. Others could be noticed but negatively affect the system functionality as they
violate the needs of the system. To understand the concept of fault tolerance, three
types of threats should be differentiated, that is fault, error and failure. Any threat
starts out as fault, it could be a physical hardware defect or a software defect. It could
occur intentionally or accidentally [Mishra et al. 2012; Raghunath and Rengarajan
2013; Alrajei and Fu 2014].
If the fault is noticed, then it is called an active fault. One example of an active fault is
the dead battery of a sensor [Alrajei and Fu 2014]. If the fault cannot easily be noticed,
then it is called a passive fault, such as a bug in the code [Alrajei and Fu 2014]. If a
fault occurs and remains unconsidered, it is possible that it extends and affects other
system components and consequently becomes an error. The error is a noticed threat,
which, once it occurs drives the system into the state of behaving wrongly [Bellalouna
and Ghabri 2013; Raghunath and Rengarajan 2013; Alrajei and Fu 2014]. In other
words, an error is an active fault. If errors propagate, they can cause system failure.
In this case, the system does not achieve the correct service it is supposed to offer. A
service is a number of coherent system’s external states. Suppose that one external
state, at least, of the system deviates from the correct service state, a service failure is
generated and the deviation is the error. For example, when a node depletes its energy
due to a dead battery fault, a loss of connection with other nodes error occurs [Alrajei
and Fu 2014]. The dead node is now not able to operate in the network and other nodes
are not able to receive data from it. This means that an error is propagated within the
network, leading to an abnormality in the network behaviour, which causes network
failure. However, not all errors lead to an overall system failure as they are not able
to affect the external state of the system, leading to other forms of failure that cause
various modes of service failure.
Though the occurrence of faults does not necessary lead to system failure, it is es-
sential to control faults from propagation to avoid system failure especially if system
recovery, maintenance and repair are complex or impossible. When the system fails to
offer a functional requirement, then it fails to offer one or more of its non-functional
requirements [Alrajei and Fu 2014]. Thus, it is essential that the system continue work-
ing according to its non-functional requirement despite the occurrences of functional
faults. This is the definition of fault tolerance.
To get a complete understanding of the concept of fault tolerance in WBAN, this
section focus on the fault tolerance. It discusses and differentiates between different
terms used in this field, namely faults, errors and failures. It presents a taxonomy of
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:13
different types of faults and failures that could occur in wireless communication. The
management of the fault tolerance lifecycle is also illustrated in detail.
3.3.2. Classification of Faults. Like other wireless networks, a WBAN consists of nodes
and communication links. Nodes are built from hardware components and software
components. Limited resources and a harsh environment are just two examples of
factors that can make sensor nodes prone to failure [Wu et al. 2010]. For a better
understanding of the types of faults that might occur in a WBAN, faults are categorised
into two general classes according to where they might occur: the node level and the
channel level.
3.3.2.1. Node-Level Faults. The node is the basic network entity that is comprised of
hardware components such as the transceiver, memory and microcontroller as well as
the software components, such as the actual application programme installed in the
microcontroller, MAC protocols, routing algorithms and so on [Mahapatro and Khilar
2011; Alrajei and Fu 2014]. Faults associated with nodes in wireless networks include
data faults, hardware faults and software faults [Yu et al. 2007; Mishra et al. 2012;
Bellalouna and Ghabri 2013; Raghunath and Rengarajan 2013; Alrajei and Fu 2014].
Each one of those faults is depicted in Figure 4.
(A) Data Faults. This fault is related to an abnormality in sensor readings [Galzarano
et al. 2012; Mishra et al. 2012; Raghunath and Rengarajan 2013]. Various reasons
might cause data faults, for instance:
—Short Fault. This fault has a minor impact on the system and is noticed in the
presence of a spike. It is called short because it is just a short-lived oscillation on
the sensor reading signal [Mishra et al. 2012; Raghunath and Rengarajan 2013;
Alrajei and Fu 2014].
—Constant Fault. This is an invariant repetition of random values, which are
noticed as constant flat signals of sensor readings.
—Noise. This kind of fault makes sensors lose their data input and thus reduces
the signal to noise ratio.
—Drift. When reading signals deviate from the original specification and persist,
the error is considered as a drift error, which distorts the sensor data.
Data faults can be reduced by applying signal processing mechanisms that
provide services to validate sensor readings [Galzarano et al. 2012].
(B) Hardware Faults. Hardware faults can be categorised in various ways, for example
according to their duration. They can be classified into permanent, intermittent,
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:14 M. Salayma et al.
transient and potential faults [Mahapatro and Khilar 2011; Mishra et al. 2012;
Bellalouna and Ghabri 2013; Raghunath and Rengarajan 2013; Alrajei and Fu
2014]. These faults are described below:
—Permanent Faults. Permanent faults are continuously present and their effect
remains stable until the source of the fault is removed, fixed or replaced. Manu-
facturing defects on sensor hardware components is an example of such faults.
—Intermittent Faults: These faults do not persist continuously, they occur and
vanish frequently. Such faults cause a repeated faulty state of the network and,
thus, diagnosing them is not a trivial process. They normally occur due to non-
environmental conditions, for example, when a sensor loses link communication
with others due to an aging sensor component.
—Transient Faults also known as “soft faults”. These faults occur due to environ-
mental reasons such as temperature, humidity, pressure and so on. They occur
less frequently than the intermittent faults as they present themselves one time
and then vanish after which the system behaves normally. For instance, a sent
packet might not be received by the sink due to some environmental reason, but
it is very likely to be received successfully if it is retransmitted.
—Potential Faults. These faults occur when any of the node hardware resources
diminish. They disable the functionality of the system as a whole. The system
will not work again unless the deleted resource is substituted. An example of a
potential fault is when a node dies when its battery is depleted and is considered
useless unless its battery is recharged or replaced [Raghunath and Rengarajan
2013].
(C) Software Faults. The hardware of a sensor device works through software compo-
nents. Analysing software faults is necessary as any bug in software functionality
may disallow the sensor from completing the desired purpose [Raghunath and
Rengarajan 2013]. However, such faults are rarely considered in the literature. In
general, software faults are classified into six types of faults:
—Software Assignment Fault. This happens when the initialisation phase is han-
dled incorrectly.
—Software Build/Package/Merge Fault. One example of this fault is the fault that
occurs in system libraries.
—Software Functional Fault. Such faults happen due to errors in the design process
of the system that allows it to misbehave, failing to offer the required functions.
—Software Interface Fault. This is a communication error between transmitter
and receiver.
—Software Programming Fault. This is the deadlock which occurs in simultaneous
operations.
—Software Checking Fault. This occurs due to wrong data code validation or bugs
in software math.
3.3.2.2. Channel-Level Faults. Different factors can affect the communication chan-
nel between sensor devices. This includes interference, obstacles, weather conditions
and signal strength [Wu et al. 2010]. The human body absorbs RF electromagnetic rays,
this energy absorption leads to channel fading which adversely affects propagation
paths [Ullah et al. 2012]. Transmission paths are also affected by reflection, diffrac-
tion, shadowing that occurs due to rapid body movement, body structure and posture.
Body motion causes frequent changes in the network topology [Ren and Meng 2006;
Ullah et al. 2012]. All of these factors lead to communication link errors which cause
channel impairment. Channel impairment might lead to insufficient use of channel.
This effect increases in an emergency because physiological information is normally
correlated and in an emergency situation a group of sensors might be involved in
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:15
transmission. Even if every component of the WBAN is working properly when the
emergency occurs, simultaneous transmission leads to collision and consequently to
packet loss and maybe to a fatality [Liu et al. 2011; Rezvani and Ghorashi 2013]. As
a conclusion, faults associated with channel in WBAN can be classified according to
their causes into two boarder classes: channel faults due to human body nature and
channel faults due to interference.
Human Body Nature. The human body can absorb RF electromagnetic waves that
heat the surrounding tissues [Ullah et al. 2012; Movassaghi et al. 2014]. The body
usually absorbs RF at a certain rate, namely the Specific Absorption Rate (SAR) that
should be recognized under the umbrella of the regulations of the Federal Communica-
tions Commission (FCC) [Ntouni et al. 2014]. Besides tissue heating, energy absorption
causes fading, which adversely affects propagation paths. Transmission paths are also
affected by reflection, diffraction, shadowing due to rapid body movement, body size
and posture [Ren and Meng 2006; Ullah et al. 2012; Movassaghi et al. 2014]. Body
movement causes frequent change in network topology, which is a very complicated is-
sue, as nodes might move with regard to each other due to the correlation between some
moving parts of body. Fading effects lead to channel impairments. This affects sensor
channel allocation strategies and even the common coding mechanisms mentioned in
the literature to mitigate interference might not be sufficient. Channel impairments
increase Bit Error Rate (BER) and cause unreliable data transmission as critical data
might not be sent as expected and the doctor might mistakenly diagnose the patient
which could be fatal [Movassaghi et al. 2014]. Moreover, the packet loss increases data
retransmission which increases power consumption. In order to avoid this eventuality,
the transmitting power must be as low as possible. Another important challenge is the
antenna design in terms of height, size and material shape.
(A) Interference and Coexistence. Interference is one of the drawbacks of WBAN that
crucially needs to be addressed. The requirement to support per body up to 256
devices in the WBAN, and the coexistence of up to 10 WBANs in 6×6×6 meters
(TG6) [2012] lead to critical interference scenarios in WBANs due to the presence of
diifrent sensors the belong to different bodies within the same range [Alam and Ben
Hamida 2015]. Another interference issue in WBANs rises from the coexistence of
other signals related to, for instance, Wi-Fi, Zigbee, and Bluetooth etc. This can
take place in a small volume and within the same frequency band used by WBANs,
e.g., ISM band [Lo Bello and Toscano 2009]. Therefore, limited number of channels
has to be shared between these different technologies and this will lead to severe
inter-network interference that may affect the neteork reliability and deteriorate
the performance of the network when used in E-Health related applications [Dakun
et al. 2015]. Hence, the life of a patient whose health status is being monitored
may be in danger in emergency scenarios where a triggered alarm should be sent
from the sensors connected to the body of the patient to a monitoring application at
a remote location. This issue motivates the need to fully understand the network
coexistence problem and the impact of Interference on WBANs in different bands
of frequency used by the IEEE 802.15.6 standard in order to provide efficient and
effective interference mitigation and coexistence schemes [Wang and Cai 2011].
Erroneous outputs due to channel faults might result in life-threatening situations.
These conditions adversely affect WBAN reliability and performance.
3.3.3. Classification of Failures. As explained in Section 3.3.1, failures are a normal con-
sequence of faults that might occur at node and channel levels [Mishra et al. 2012;
Bellalouna and Ghabri 2013; Raghunath and Rengarajan 2013; Alrajei and Fu 2014].
The overall system might stop working due to one of the following failures:
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:16 M. Salayma et al.
—Crash Failure. When there is no response to a certain request, it is likely that the
network has suffered a crash failure. This might occur due to messages loss or due
to physical damage, which disjoins the sensors from the network. When this type of
failure occurs, there is no further output as the process remains halted.
—Omission Failure. This occurs as a result of transmission faults when the system
fails to respond to incoming queries due to a limited buffer size. Incoming and out-
going messages fail to be processed. Receive and send omissions are called channel
omissions.
—Hardware Failure. This is a consequence of hardware faults that occur in hardware
components mostly due to environmental reasons as mentioned previously. Hardware
failure might lead to node software failure.
—Time Failure. This is a periodic operational behaviour of the network. In this case,
the nodes successfully respond with a message but the message is received too late
or too early according to the specified message time interval. Thus, the synchronous
real-time system responds outside the range of the required time interval.
—Response Failure. This failure occurs when nodes send messages successfully and in
time but the message contains incorrect reading information. This might happen due
to malicious attacks, noise, software malfunction and many other reasons as specified
previously. Consequently, the accumulated results would be inaccurate which will
reduce application reliability. There are two types of response failure. If the system
responds with faulty replies, then this is a value failure. If the system responds with
unintended action at wrong time to handle a collapsed control flow, then this is called
a state transition failure. It generates irrelevant information as a response.
—Byzantine Failure. If the system generates random values at random times, then it is
considered as byzantine failure. Managing such failures is messy, as during process-
ing, this failure neglects the required processing measures and follows unintended
processing. This consequently produces corrupted messages or concurrent channel
usage due to multiple message transmission. Types of failures are summarised in
Figure 5.
3.3.4. Fault-Tolerance Life Cycle. Eliminating the occurrences of threats in the system
could not be achieved without predicting the occurrences of faults that could potentially
happen in the system [Alrajei and Fu 2014]. Eliminating faults will prevent system
failure. Fault tolerance requires fault prediction. First, the possibility of a fault occur-
ring needs to be predicted and an attempt made to prevent it [Yu et al. 2007; Mishra
et al. 2012; Raghunath and Rengarajan 2013; Alrajei and Fu 2014]. If it cannot be pre-
vented, then at least a guarantee should be built into the system to allow it to operate
in the presence of that fault. This is the second level and requires the system to be
aware of how to react in the presence of faults so as to avoid the failure of the overall
system services. This level comprises fault detection, isolation, fault identification and
fault recovery [Yu et al. 2007; Mishra et al. 2012; Raghunath and Rengarajan 2013;
Alrajei and Fu 2014].
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:17
Fault tolerance aims to eliminate threats of the system by finding ways to allow the
system to survive and to continue operating in the presence of errors according to its
design goals without deteriorating the performance of the services it is supposed to
offer. Fault tolerance could be achieved through two methods. The first method is fault
masking, that is to hide faults and prevent them from extending to errors [Alrajei and
Fu 2014]. The second method is fault isolation that is to remove the fault or the source
of fault from the system either manually or automatically. Each step in the lifecycle of
fault tolerance as well as in choosing the method is considered to be a research topic
on its own and depends on the application and the criticality of faults. This subsection
illustrates each step in the fault tolerance life cycle. The steps of fault tolerance life
cycle in wireless communication are depicted in Figure 6.
3.3.4.1. Fault Prevention. This avoids the occurrences of faults and takes place in
three stages of the WBAN application, as follows [Mishra et al. 2012; Raghunath and
Rengarajan 2013]:
—Specification Phase. This phase must ensure that incomplete and equivocal specifi-
cations are avoided.
—Design and Deployment Phase. The design of the network topology, connectivity
and link coverage must be insured during this phase. This phase also includes the
necessity of choosing RF and hardware components with a suitable wireless standard
in terms of quality, reliability and flow.
—Monitoring Phase. To constantly watch out for the status of the network for functional
degradation and incorrect usage of resources by monitoring node status, link quality
and the level of congestion and take reactive action when necessary.
3.3.4.2. Fault Detection. Due to the dynamic nature of wireless communication, fault
prevention does not guarantee 100% prevention of faults [Yu et al. 2007; Mishra et al.
2012; Raghunath and Rengarajan 2013; Alrajei and Fu 2014]. Therefore, a detection
phase is required to identify the unexpected fault in the network. Basically, fault
detection can be categorized as online and offline detection.
—Offline Detection. This is often applied in wired networks using special programmes
during the idle time of the network.
—Online Detection. Online detection is real-time detection and is adopted in wireless
networks. It is classified into explicit and implicit detection.
(A) Explicit Detection. This is an application-specific fault-detection technique. It is
performed by sending an alarm when the event/action is detected. For exam-
ple, in WSN, there is a predefined threshold used to detect the misbehaviour
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:18 M. Salayma et al.
of sensing applications [Yu et al. 2007]. These conventional threshold tests are
unsuitable for WBAN fault detection, since WBAN is characterised by the com-
plexity of a heterogeneous sensing environment [Mahapatro and Khilar 2011].
The hybrid resource capabilities of nodes in terms of their resource capabili-
ties, installed software, and data rates limits the adoption of a fixed threshold
to check their status in WBAN. For example, ECG and SpO2 sensors sample
different readings and detection of the faulty nodes by comparing energy levels
might deliver inaccurate results. Moreover, medical sensors might be introduced
under various situations, such as normal situations and emergency situations.
For example, temperature readings might be higher or lower than the aver-
age normal temperature, which could be life, threatening. Consequently, WBAN
has two levels of variation in the reliability requirements of its sensors: amongst
heterogeneous sensors and within the same sensor, as it might run in different
situations. In addition, high threshold values lead to several missed detections,
while values that are too low result in false positives. Thus, adopting a constant
or fixed threshold value for overall WBAN components may not function well if
the properties of the sensors vary, or if the scene and the environment change,
because it generates faulty observations, which produce unsatisfactory results.
For WBAN, explicit detection can be classified in to two types which are:
—Anomaly Detection of Abnormality due to Malfunction of Sensor Node. Detec-
tion can be done by measuring the average receiving rate of the previous data
and comparing the result to a predefined dynamic threshold. It is necessary
to classify the level of critically of the malfunction sensor because action is
taken according to its level [Jeong et al. 2014].
—Anomaly Detection due to Human Body Abnormality. This kind of detection
reflects that there is a problem in the human body that could be life threaten-
ing. This requires a detailed set up since each medical situation has its own
parameters and requires a different response. This kind of detection can be
further classified into: detection of an accidental change in the body medical
data and the detection that medical data reached a threshold or a reference
value [Jeong et al. 2014].
(B) Implicit Detection. This type of detection requires overall network management
because it targets faults that happen due to abnormal phenomena such as
vulnerable environment conditions [Yu et al. 2007]. There are two ways to adopt
implicit detection: active and passive detection which are discussed below:
—Active Model (Proactive). In this model, nodes send continuous messages to a
central controller to indicate that they are still alive. If a certain specified time
period has elapsed without receiving a message from a node, the controller
can tell that the node is dead [Yu et al. 2007; Mishra et al. 2012; Alrajei and
Fu 2014].
—Passive Model (Reactive). In this model, a node sends the alarm to the con-
troller only when a fault or network corruption is detected. In this case, nodes
save energy as they are requested to send keep alive messages constantly to
the controller, thus they stay inactive most of the time.
3.3.4.3. Fault Isolation. After the fault is detected, it is necessary to analyse the
nature of that fault in terms of its type, behaviour, and characteristics. A procedure
should be followed to isolate that fault [Yu et al. 2007; Mishra et al. 2012; Raghunath
and Rengarajan 2013].
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:19
3.3.4.4. Fault Diagnosis. Fault diagnosis is essential to properly identify the isolated
faults in terms of their characteristics and behavioural nature. Faulty nodes should
also be distinguished from suspicious nodes and from other irrelevant triggers. This
could be achieved by applying historic data and sharing knowledge. The state-of-art
fault solution models either manage faults at the component level of the node or at link
communication level between nodes. However, although there are several accurate
fault detection techniques, there is no comprehensive model to comprise accurate fault
diagnosis and fault recovery approaches [Yu et al. 2007; Abedi et al. 2011; Mishra et al.
2012; Raghunath and Rengarajan 2013].
3.3.4.5. Fault Recovery. In this phase, the network is restructured and reconfigured
to minimise or stop the detected faults from generating further impact on the network.
Fault recovery techniques are classified into two broad areas according to the type of
fault: the recovery of faults that might occurred at sensor node level and the recovery of
faults that might occur at channel level [Yu et al. 2007; Mishra et al. 2012, Raghunath
and Rengarajan 2013; Alrajei and Fu 2014].
(A) Node-level recovery: In this case, the first approach is to directly isolate the failed
node from the network, such as isolating it from routing communication [Yu et al.
2007; Raghunath and Rengarajan 2013; Alrajei and Fu 2014]. In clustered net-
works, if the failure occurs in the cluster head (CH), then its nodes members join
the neighbour clusters. Conventional WSN fault tolerance techniques follow sensor
replication by deploying redundant sensors through following appropriate redun-
dancy mechanisms. For example, WSN was commonly used to sense a region and
emit the sensed data to the sink. If a node fails to provide the correct data, the
sink receives the correct data from the redundant deployed nodes [Liu et al. 2009].
However, unlike WSN, WBAN is considered a sparse communication network be-
cause of the short area communication space and the limitations on the number
of nodes, thus, there is no way to establish packet redundancy. Moreover, adding
extra sensors increases the interference among sensors and might be stressful
[Mahapatro and Khilar 2011]. Nevertheless, it is worth indicating that our types
of redundancies that are commonly followed in WSN, are as follows:
—Hardware Redundancy. This is achieved by adding extra physical components,
such as additional sensors, additional batteries and so on [Raghunath and
Rengarajan 2013; Alrajei and Fu 2014].
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:20 M. Salayma et al.
—Software Frequency. This is done by replicating software code. For example, soft-
ware components can be allowed to reconfigure the management of the software.
Another technique is using mobile code technology.
—Time Redundancy. This is done by repeating the required processes multiple times.
—Information Redundancy. Two ways to achieve information redundancy are:
—Active Replication. This technique allows all replicas to process all requests. A
failed node is recovered by duplicating its information by distributing redundant
sensed data to other nodes. Thus, each node requires extra memory space to buffer
its own data and even the data and the replicas for other nodes. Redundant copies
are used to recover the failed sensor data. Beside the extra memory hard require-
ment, this approach is prone to high message communication overhead in sending
the update messages [Mishra et al. 2012; Raghunath and Rengarajan 2013].
—Passive Replication: This allows only a single replica to process a single request, and
other replicas are allowed to process the request only when the current replica fails to.
(B) Channel-Level Recovery. A fault-tolerant system should be able to tolerate channel
impairments. Finding ways to coordinate channel usage among nodes according to
their criticality is one solution. Distinguishing nodes’ criticality means assigning
them different priority levels [Wu et al. 2010]. Sensors that are used in WBAN are
usually classified into two parts: medical sensors that are used to sense physio-
logical information and non-medical sensors that are used to sense environmental
information [Liu et al. 2011; Rezvani and Ghorashi 2013]. It is always the case
that, while some medical sensors work in their normal situations, other medical
sensors might suddenly require high QoS and exclusive resources when emergent
situations occur. In this case, it does not make sense to provide all sensors in WBAN
identical conditions and resources because less important data might be achieved
before the critical one resulting in unreliable and an untrustworthy, erroneous
WBAN. To avoid this, nodes in emergency situations must transmit their data as
fast as possible and should be assigned enough bandwidth to allow the complete
information achieved in a real time, even if this would be at the expense of other
less important information sensed by those nodes which work in normal situations
or which sense environmental information. What makes the problem worse is that,
despite the heterogeneity of WBAN sensor nodes, their sensed data is correlated.
For example, both the ECG and hemodynamic signals, such as blood pressure,
have information mutually correlated due to the physiological inter-relation of
the mechanical and electrical functions of the heart [Mahapatro and Khilar 2011].
Moreover, physiological information also has a direct correlation with environmen-
tal information. It is mentioned early in this section that due to this correlation
nodes might produce erroneous results in emergency situations as nodes will try
to transmit simultaneously. This all-at-once data transmission leads to collisions,
which consequently increases packet loss and produces erroneous results. This
could lead to fatal situations. This emphasises the necessity of prioritising nodes
according to their situation, and according to the type and the criticality of the
data they sense [Wu et al. 2010]. Various approaches can be adopted to assign
priorities for heterogeneous nodes in different situations. The commonly used one
is to check the nodes’ situation according to a specified threshold [Mahapatro and
Khilar 2011]. To overcome the channel interference problem, other adaptive chan-
nel allocation approaches are required to enable successful coexistence between
the various communication technologies that might coexist in the area [Zhou et al.
2011; Wu et al. 2010]. Dynamic channel switching can be followed according to
the standards adopted. Adaptive channel allocation to solve coexistence problem
is beyond the remit of this research.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:21
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:22 M. Salayma et al.
adopting a specialised layer [Zhou et al. 2011; Mahapatro and Khilar 2011, Galzarano
et al. 2012], following clustering techniques [Abarna and Venkatachalapathy 2014]
and developing context awareness [Liu et al. 2011; Rezvani and Ghorashi 2013]. Yet,
there are also a distributed middleware and context aware techniques that are clas-
sified under the category of the distributed approaches. A new trend that is neither
centralised nor distributed, which is based on the cloud is also considered in this survey
as one of the fault tolerance techniques proposed to cover node-level faults.
Due to the limited communication space of WBAN, it is inappropriate to adopt sensor
replication as a recovery technique, thus, the majority of those techniques consider
isolating and replacing faulty nodes as a recovery method [Mahapatro and Khilar 2011;
Galzarano et al. 2012; Abarna and Venkatachalapathy 2014; Jeong et al. 2014]. This
review emphasises that achieving both fault tolerant and high QoS is a key concern
in WBAN. It also suggests some trends to adopt in order to achieve more accurate,
feasible, real time and efficient fault tolerance framework for WBAN.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:23
were neglected in this work. Changes in the internal and external states of the body
can be analysed according to triggering events [Korel and Koo 2007]. Moreover, as a
centralised technique, this technique is prone to a single point of failure, as the error
detection is performed by a centralised PDA, and no discussion was made of what
would happen if the PDA crashes or produces faulty results. There can be several
fusion sensors, the number of which depends on the requirements of the area, in
terms of the communication range between nodes and the region of the application
of interest. Although the physiological information extracted is used to decide the
occurrences of faulty nodes, it could be argued that the information extracted could
be used for temporary recovery, such as by substituting one piece of information for
another, allowing a temporary flow of information. This temporary recovery continues
until permanent action can be taken such as node isolation and replacement.
Although centralisation is considered an accurate and efficient approach, its major
drawback is the failure of a single central node to manage everything. This is because
the central node is prone to data traffic concentrations, which leads to rapid energy
depletion in the controller [Yu et al. 2007; Kshirsagar and Jirapure 2011]. Moreover, in
multi-hop communication, nodes close to the central node will forward more commu-
nication messages to the central node, which will also cause early energy depletion in
those nodes leading to what is called the hot spot problem. The single point of failure
problem requires adoption of a distributed fault detection model.
4.1.2. Distributed Node Fault Detection. To relax the pressure of duties, the central con-
troller is responsible for avoiding the problem of single point of failure, level of fault
detection is shifted to local nodes by allowing them to report the awareness of their sta-
tus, thereby enabling them to take decisions [Yu et al. 2007; Kshirsagar and Jirapure
2011]. Obviously, this minimizes the number of messages the nodes are required to
transmit to the central node, which reduces the energy consumption and network con-
gestion. Generally, distributed techniques can be fully adopted selflessly at each node,
by allowing the node to diagnose malfunctions in its physical hardware components.
Distributed fault detection can be adopted by following clustering techniques. A com-
mon distributed detection approach in WSN, is the coordination between neighbours.
However, such a technique has yet to be considered in WBAN. The three distributed
fault tolerance techniques in the literature are given in the following discussions.
4.1.2.1. Node Self-Detection. Nodes are allowed to self-detect faults, taking decisions
about their own status without the need to consult the coordinator [Yu et al. 2007;
Kshirsagar and Jirapure 2011]. One approach presented in literature for distributed
self-detection in WBAN is by adopting a middleware layer in each node to be respon-
sible for detecting and possibly recovering faulty status, without the need to rely on a
certain node to perform complex computations. A middleware is a layer that acts as a
bridge between the conventional network stack layers, to perform some functionality
and provide some services that are not provided by the current stack layers, without
violating the traditional layers’ tasks [Wikipedia The Free Encyclopedia 2015]. In this
technique, a set of software modules are used in each sensor node to perform tasks
beyond those the legacy stack layers perform.
One work that uses a separated layer for node fault detections is presented in
Galzarano et al. [2012]. Galzarano et al. [2012] concentrated on data faults in WBAN,
by analysing the level of decreased accuracy after applying four types of data faults to
readings acquired by sensors in a human activity recognition application. Galzarano
et al. [2012] studied the impact of faults on the quality of that application. Those
faults are: short faults, noise, constant faults, and accumulative faults. Galzarano
et al. suggest that the reliability of WBAN can be enhanced by adding autonomic
elements that perform self-healing operations, and thus enhance data fault tolerance.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:24 M. Salayma et al.
The idea is realised by adopting a self-healing layer with the aim of detecting and
recovering from such situations. The layer is based on the Signal Processing In-node
Environment (SPINE) framework [Bellifemine et al. 2011], which is built on top of
the existing SPINE2 framework [Galzarano et al. 2012]. Experimental results confirm
that the defined autonomic elements can mitigate faults affecting the sensor data,
and improving the system behavior correctness [Galzarano et al. 2012]. However, this
technique is based on image-processing algorithms that require complex processing
capabilities, and resource rich devices which are not suitable for energy constrained
sensor nodes. Moreover, Galzarano et al. [2012] considered only one type of data fault,
short faults. The accuracy and performance of the self-healing layer should be proven
by testing it in reference to the occurrence of other types of data faults.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:25
such an approach in WBAN, which is considered a very short scale network, is not
trivial. Indeed, an intensive study and in depth analysis is required concerning the
optimal number of CHs, their position on the body, as well as the number of maximum
sensors in each cluster. In addition, this work does not specify the action to be taken
after assigning priorities to nodes, if the only action was to wait for faulty node isolation,
there would be a huge delay before the faulty node could be replaced which could be
fatal in an emergency situation. Thus, there must be a real-time recovery mechanism in
place, even if this is considered as temporary solution, such as the previously presented
data fusion technique.
4.1.3. Cloud-Based Node Fault Detection in WBAN. Cloud-based fault detection in WBAN
is neither a centralised nor a distributed approach, as both the node and the controller
are not responsible for tracking the node’s status or performing a reactive response.
A third party, outside the WBAN, achieves fault tolerance, i.e., the cloud-computing
Infrastructure as Service (IaaS)-based application. Jeong et al. [2014] proposed a visual
monitoring system (VMSFT) to monitor patient’s conditions and to tolerate sensor
failures immediately. The work presented in Jeong et al. [2014] differs from other works,
as it considers a large number of WBAN adopted by multiple patients simultaneously,
therefore, it is considered a local monitoring system for a group of people within target
area. VMSFT obtains patient’s data through the IaaS application and according to
this data, it can infer sensor failure. This work performs two types of explicit anomaly
detection, anomaly because of sensor failure, and anomaly because of a problem in the
human body. VMSFT can provide three responses according to the criticality of the
detected sensor anomaly. The level of criticality is assigned according to the position
of the sensor in the body. A high level is assigned for sensors close to the heart, and
a low level is assigned to hands and leg sensors. All other sensors are assigned to
the middle level. If VMSFT is connected to an emergency room, it is possible to care
for patients proactively. High-level cases are sent to emergency room as well as to
managers, middle-level incidents are sent to managers, but if a delayed response is
expected according to a specified time, calls are sent to the emergency room, whereas
a low-level response incidents are monitored periodically by the manager. However,
for abnormalities in the human body, if data changes abruptly, status is sent as an
emergency directly, but if the body data approaches a specified reference threshold,
the GP is informed to prompt a suitable proactive response. A hierarchical scheme is
suggested for management within a cloud service infrastructure. However, Jeong et al.
[2014] considered the position of the sensor as a criterion to decide the criticality of
the data readings. Sensors positioned on the body extremities have a lower priority
in triggering an emergency response, as their readings are of lower criticality than
other sensors, for example, those placed close to the heart. It is very popular, however,
for sensors being used to detect heart rate to be placed on the hand. Thus, other
criteria must be applied to decide the level of criticality. Moreover, cloud computing–
based applications for WBAN cannot be adopted, unless there is a full guarantee of
trustworthiness, which is still a major drawback of cloud computing, as level of privacy
and security are not wholly determined.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:26 M. Salayma et al.
improve network QoS and to tolerate channel impairments [Ali et al. 2010; Liu et al.
2011; Rezvani and Ghorashi 2013]. In other approaches a controller might adopt an
extra layer or middleware that prioritises traffic, tolerate and manage the channel’s
vulnerability [Zhou et al. 2011; Wu et al. 2010]. Such techniques are presented in the
following subsections.
4.2.1. Centralised Context Aware Fault Detection. According to Korel and Koo [2007], con-
text refers to any information that characterises an entity’s situation. Context aware-
ness is the ability to diagnose entities’ internal or external states. To achieve a fault
tolerant WBAN, the entity for which the context needs to be analysed is the sensor node.
More generally, context-aware WBAN is a network in which wearable and implanted
sensors’ situations can be described in accordance with the surrounding environment,
according to which, their behaviour can be modified. As stated previously, WBAN has
several challenging characteristics, one of which is its vulnerability to context and en-
vironmental changes [Wu et al. 2010]. Contextual changes include the body’s motion
and activity, and the temperature of the surrounding environment among others. Such
factors affect the reliability of the network. Context awareness can assist in the in-
terpretation of any physical and physiological data being monitored, and accounts for
the current situation as it affects the body and the surrounding environment. Thus, it
can be used as a method to determine tolerance to impairments that might occur in
the network channel. Therefore, context awareness plays a key role in WBAN, by en-
hancing reliability and helping to facilitate long-term system monitoring. Supervision
of the context awareness process in terms of data gathering, classification of context,
transitions and events, and extraction of context recognition, can either be centralised
at a single resource rich sensor node (usually the controller), or implemented in a dis-
tributed manner to a certain level at the resource constrains nodes. This subsection
presents literature that has adopted centralised context awareness for fault tolerance
in WBAN at the channel level.
Rezvani and Ghorashi [2013] studied the channel impairments that might occur in
WBAN, because of fading and body postures which cause packet loss in a star topology.
Rezvani and Ghorashi [2013] considered both medical and other types of applica-
tions, proposing an adaptive channel allocation superframe-oriented MAC protocol for
WBAN. The proposed protocol supports the heterogeneous characteristics of different
applications by separating medical and non-medical applications. Moreover, Rezvani
and Ghorashi [2013] considered correlations that may occur in medical traffic in emer-
gencies and splits that traffic into normal and emergency medical traffic. The separa-
tion between non-medical, normal medical, and emergency medical traffic is adaptive,
according to channel condition and the user’s medical situation. As medical data is usu-
ally periodic, and in order to improve the efficiency, medical nodes can follow TDMA
synchronisation. However, because non-medical data is flexible, it follows that there is
a contention-based access mechanism for traffic transmission. Moreover, according to
the condition of channel deep-fading, the interval between consecutive transmissions
changes adaptively. To summarise, the proposed protocol tolerates channel faults by
adapting the channel allocation to the classified sampled data that consider fading
effects. The proposed algorithm outperforms both IEEE 802.15.4 and IEEE 802.15.6
MAC in terms of reliability, channel utilisation, and power consumption; this is because
of the successful data packets transmission due to the adaptive resource allocation.
However, although Rezvani and Ghorashi [2013] considered emergency traffic, it
does not explain the classification process applied for different types of traffic (for
example, if they followed a threshold comparison mechanism). The proposed protocol
still follows the CSMA mechanism in emergency situations, and while it is considered
a smart solution for WSN, it does not guarantee collision avoidance in WBAN, which
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:27
4.2.2. Centralised fault Detection Using Middleware. Zhou et al. [2011] are the first to pro-
pose a middleware layer, called BodyQoS that tolerates channel faults and impairments
by performing an adaptive channel allocation strategy through which the QoS of
WBAN is improved. BodyQoS is mainly a collection of software modules, which reside
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:28 M. Salayma et al.
between MAC and transport layers Zhou et al. [2011]. BodyQoS comprises a virtual
MAC (VMAC) that makes the system radio-agnostic when following an abstraction
technique [Zhou et al. 2011]. It schedules bandwidth adaptively, without knowledge
of the implementation details of the underlying MAC protocols. Thus, the VMAC can
be easily ported from one radio platform to another, allowing it to support an array of
different MACs, including Time Division Multiple Access (TDMA), CSMA, and hybrid
approaches. VMAC re-allocates resources adaptively, to meet QoS requirements.
BodyQoS guarantees a statistical bandwidth for reliable data transmission when
channel impairments occur because of radio interference or body fading effects. If the
wireless resource available is not able to satisfy all QoS reservations, packets with
the higher priority will be processed before the lower priority ones. A resource rich
aggregator is responsible for the majority of channel scheduling computations, and
can be used to minimise the load on resource constrained sensor nodes. BodyQoS per-
formance outperforms conventional solutions, as it tolerates channel impairment with
a minimum overhead. However, although the proposed technique should guarantee
reliable data communication under channel impairments, it does not consider the
dynamic change in the reliability requirements of sensors, as it assigns a specific fixed
priority to sensor nodes based on the level of criticality and data type. In addition,
BodyQoS is prone to single points of failure, as the entire channel’s fault detection,
traffic prioritisation and classification is managed by one central node.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:29
4.3.2. Distributed Context Aware Fault Detection. Context awareness can be applied in each
resource constrained sensor nodes, without the need to rely on the controller. Several
approaches can be adopted to achieve this aim. Otal et al. [2009] explored the QoS and
reliability in WBAN and presented a novel cross-layer based on a fuzzy logic technique
to schedule transmissions in WBAN. The Distributed Queuing Body Area Network
(DQBAN) protocol was proposed by Otal et al. to modify the beacon enabled IEEE
802.15.4 MAC protocol, and improve the efficiency in terms of delay, reliability and
power consumption. DQBAN is adaptable to the heterogeneity of traffic load, number
of sensor nodes and interference. A fuzzy-rule–based system is implemented in each
sensor node to handle input variables that relate to node status. DQBAN violates the
first-come-first-served packet transmission policy because it allows the node, according
to its status, to occupy the next frame collision-free “data slot”, even if that node has
already achieved the first location in the queue. A node can also chose to temporar-
ily stop transmission if it detects channel impairments. DQBAN protocol performance
was evaluated according to two different realistic hospital scenarios following a star
topology. This revealed that DQBAN achieves higher reliabilities than other possible
MAC protocols, when considering battery limitations and latency demands. Thus, Otal
et al. ensure that all packets are treated within specific delay parameters, and with
a particular BER, while conserving power. Although the mechanism provides some
solutions for fault-tolerance in WBAN and avoids single point of failure, it does not
consider differences in the reliability and requirements of the heterogeneous sensor
nodes. Moreover, Otal et al. [2009] achieved self-monitoring, by adopting two queues to
detect the physical status of the node. This means deploying specialised hardware and
software to resource constrained nodes, which adds extra resources and increases the
computation complexity of the network. Thus, when using this technique, the trade-off
between the level of required reliability and processing complexity should be investi-
gated. As shown, some primary efforts have been undertaken to try to address fault
tolerance challenges in WBAN. These efforts have varied between designing new pro-
tocols to target network stack layers such as Medium Access Control (MAC) layer [Otal
et al. 2009; Ali et al. 2010; Liu et al. 2011; Rezvani and Ghorashi 2013], and proposing
the injection of a middleware or new layer responsible for fault diagnosis [Zhou et al.
2011; Wu et al. 2010; Galzarano et al. 2012], or new generic techniques that do not
follow the stack-layering concept [Zhou et al. 2011; Wu et al. 2010; Mahapatro and
Khilar 2011; Galzarano et al. 2012; Abarna and Venkatachalapathy 2014]. Others
make enhancements to the proposed standards to improve their fault tolerance capa-
bilities [Otal et al. 2009; Ali et al. 2010; Liu et al. 2011; Rezvani and Ghorashi 2013].
However, the majority of work follows centralised detection techniques [Zhou et al.
2011; Ali et al. 2010; Wu et al. 2010; Liu et al. 2011; Mahapatro and Khilar 2011;
Rezvani and Ghorashi 2013], neglecting the issue of a single point of failure, and while
most consider techniques for an overall fault tolerance approach, fault recovery, which
is a crucial second component of fault tolerance, is not considered, thus, these efforts
cannot be considered complete solutions to fault tolerance in WBAN. Table IV provides
a summary of fault tolerance techniques in WBAN. It classifies the proposed solutions
according to the categorization presented in Figure 8.
Table V categorizes fault tolerance solutions further. For those solutions that are
geared toward node-level faults, it shows whether they consider hardware faults, data
faults or both. It shows which work considers channel-level abnormality, and whether
the proposed solution considers abnormality in emergency situations due to the corre-
lation in medical data.
Table VI classifies the proposed solutions for fault tolerance in WBAN according
to other four criteria. It shows whether a prioritising approach is considered in each
proposed solution discussed in Section 4 along with the priotrisation technique adopted,
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:30 M. Salayma et al.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:31
Table V. A Classification for the Centralized and Distributed Approaches Fault Tolerance Approaches in WBAN
Centralized Distributed
Fault Context Node-self Context Cloud
Type/Solution Data fusion Middleware aware detection Clustering aware based
Node level Hardware AFTCS [Wu [Abarna and [Otal et al. VMSFT
et al. 2010] Venkatacha- 2009] [Jeong et al.
lapathy 2014]
2014]
Data faults [Mahapatro AFTCS [Wu [Galzarano [Abarna and VMSFT
(including and Khilar et al. 2010] et al. 2012] Venkatacha- [Jeong et al.
physiological 2011] lapathy 2014]
information) 2014]
Channel Level Body/ BodyQoS CA-MAC [Otal et al.
interference [Zhou et al. [Rezvani 2009]
2011] and
AFTCS [Wu Ghorashi
et al. 2010] 2013]
Medical correlation CA-MAC [Abarna and [Otal et al. VMSFT
(emergency) [Rezvani Venkatacha- 2009] [Jeong et al.
and lapathy 2014]
Ghorashi 2014]
2013]
it also shows whether the proposed solution follows a recovery approach and whether
the proposed approach is a generic based or based on a standardized protocol.
The following section summarises some interference solutions presented in this sec-
tion. It highlights the strengths and the drawbacks of the presented approaches and
suggests trends that can be adopted in the future to achieve a more reliable WBAN by
overcoming the drawbacks of the literature presented.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:32 M. Salayma et al.
Table VI. Priority and Recovery Mechanisms Proposed by Fault Tolerance Approaches in WBAN
Protocol/ Fault recovery
Criteria Prioritization mechanism Solution Algorithm
BodyQoS [Zhou Specific and fixed priority N/A Dynamic Generic
et al. 2011] based on level of criticality Chanel (VMAC)
of sensor and data type. Allocation
AFTCS [Wu et al. Default priority statically N/A Dynamic Generic Based
2010] configured by the clinician. Chanel on BodyQoS
Based on the perceived Allocation
fault-related information it
adjusts the priority.
[Mahapatro and N/A Isolation Feature-level Generic
Khilar 2011] Fusion
[Rezvani and It adjusts the priority N/A Dynamic MAC based on
Ghorashi 2013] based on the Physician’s Chanel IEEE 80.15.4
recognition and health Allocation and IEEE
condition of the user and 802.15.6
CA-MAC [Rezvani Adaptive priority according N/A Dynamic MAC Based
and Ghorashi to traffic and channel Scheduling on IEEE
2013] status. 802.15.6
[Otal et al. 2009] Adaptive priority according N/A Distributed MAC Based
to node physical status. Queues on IEEE
802.15.4
[Galzarano et al. N/A Isolation Autonomic Generic Based
2012] Elements on SPIN∗
[Abarna and Adaptive priority according Isolation of Dynamic Generic based
Venkatachalapathy to a specified fixed faulty node. Priority on AFTCS
2014] threshold. Nodes under
faulty CH
re-cluster
themselves
and elect new
cluster head.
VMSFT [Jeong Priority according node Isolation by Three levels IaaS
et al. 2014] position on body. emergency of response cloud-based
response based on application
abnormality
criticality
On the other hand, few studies have focused on inter-BAN communication where, in
Davenport et al. [2009], the authors conduct a study on the measurement of coupling
between 10 nodes within a WBAN. This was done in a single room using the 2400–
2500MHz frequency band and within a hospital environment. Note that, although the
measurements were interesting, yet it did not consider the mobility of the nodes which
is an important characteristic of WBANs. In addition, the authors didn’t show the
effect of the measured interference on the degradation of the application performance
and the coexistence strategies proposed were limited to the packet delivery ratio
performance only. Furthermore, the effect of interference in Dotlic [2011] was studied
when using both of the chirp and the sampling receivers. Finally, in Alasti et al. [2014],
the authors addressed co-channel interference between co-located multiple WBANs
where couple of uncoordinated schemes were presented. In both approaches, the co-
ordinator node re-allocates slots in the TDMA scheme. However, such approaches are
limited since they use several unrealistic assumptions including lack of mobility and
absence of computation or estimation of actual interference. Nonetheless, there is still
a need for IEEE 802.15.6-compliant radio transceivers that are available commercially.
In addition, communicating WBANs form a very complex network that cannot be
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:33
4.4.1. The Multi-RAT Coordination Approach. Through coordination protocols, the different
technologies exchange traffic information and negotiate system parameters for optimal
system performance. In a WBAN-ZigBee coexistence scenario, for example, the WBAN
coordinator node (a.k.a the hub) will coordinate with the ZigBee coordinator node; co-
ordination occurs through a predefined coordination protocol and dedicated interfaces.
In general, a coordinated system follows the algorithm shown in Figure 9, where the
coordinating technologies switch between regular modes and coexistence modes. This
approach has proven to be useful in several scenarios, however, it is not suitable for
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:34 M. Salayma et al.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:35
REFERENCES
K. T. Meena Abarna and K. Venkatachalapathy. 2014. Cluster based failure detection and recovery technique
for wireless body area networks. Research Journal of Applied Sciences, Engineering and Technology 7,
17 (2014), 3458–3465. DOI:10.19026/rjaset.7.697
Raza H. Abedi, Nauman Aslam, and Sayeed Ghani. 2011. Fault tolerance analysis of heterogeneous wireless
sensor network. In Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering
(CCECE). IEEE, 000175-000179. DOI:10.1109/CCECE.2011.6030433
Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. 2002. A survey on sensor
networks. IEEE Communications Magazine 40, 8 (2002), 102–114. DOI:10.1109/MCOM.2002.1024422
Rasha Al-Khansa and Hassan Artail. 2015. A semi-distributed LTE-WiFi system design for future LTE-
unlicensed: Deployments in small-cell environments. In Proceedings of the 11th IEEE International
Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 43–
50. DOI:10.1109/WiMOB.2015.7347939
Muhammad Mahtab Alam and Elyes Ben Hamida. 2015. Interference mitigation and coexistence strate-
gies in IEEE 802.15.6 based wearable body-to-body networks. In Proceedings of the International Con-
ference on Cognitive Radio Oriented Wireless Networks. Springer International Publishing, 665–677.
DOI:10.1007/978-3-319-24540-9_55
Atif Alamri, Wasai Shadab Ansari, Mohammad Mehedi Hassan, M. Shamim Hossain, Abdulhameed Alelaiwi,
and M. Anwar Hossain. 2013. A survey on sensor-cloud: Architecture, applications, and approaches.
International Journal of Distributed Sensor Networks 2 (2013), 18. 917923. DOI:10.1155/2013/917923
Mehdi Alasti, Martina Barbi, and Kamran Sayrafian. 2014. Uncoordinated strategies for inter-BAN interfer-
ence mitigation. In Proceedings of the 25th IEEE Annual International Symposium on Personal, Indoor,
and Mobile Radio Communication (PIMRC). IEEE, 2150–2154. DOI:10.1109/PIMRC.2014.7136528
Khaled A. Ali, Jahangir H. Sarker, and Hussein T. Mouftah. 2010. Urgency-based MAC protocol for wireless
sensor body area networks. In Proceedings of the IEEE International Conference on Communications
Workshops. IEEE, 1–6. DOI:10.1109/ICCW.2010.5503911
Erika Almeida, André M. Cavalcante, Rafael C. D. Paiva, Fabiano S. Chaves, Fuad M. Abinader, Robson D.
Vieira, Sayantan Choudhury, Esa Tuomaala, and Klaus Doppler. 2013. Enabling LTE/WiFi coexistence
by LTE blank subframe allocation. In Proceedings of the IEEE International Conference on Communi-
cations (ICC). IEEE, 5083–5088. DOI:10.1109/ICC.2013.6655388
Nancy Alrajei and Huirong Fu. 2014. A survey on fault tolerance in wireless sensor networks. In Proceedings
of the 3rd International Conference on Sensor Technologies and Applications, 2009 (SENSORCOMM’09).
366–371.
Deena M. Barakah and Muhammad Ammad-uddin. 2012. A survey of challenges and applications of wireless
body area network (WBAN) and role of a virtual doctor server in existing architecture. In Proceedings
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:36 M. Salayma et al.
of the 3rd International Conference on Intelligent Systems Modelling and Simulation. IEEE, 214–219.
DOI:10.1109/ISMS.2012.108
M. Bellalouna, and A. Ghabri. 2013. A priori methods for fault tolerance in wireless sensor networks, In
Proceedings of the 2013 World Congress on Computer and Information Technology (WCCIT), IEEE, 1–6.
Monia Bellalouna and Afef Ghabri. 2013. A priori methods for fault tolerance in wireless sensor networks.
In Proceedings of the 2013 World Congress on Computer and Information Technology (WCCIT). IEEE,
1–6. DOI:10.1109/WCCIT.2013.6618654
Fabio Bellifemine, Giancarlo Fortino, Roberta Giannantonio, Raffaele Gravina, Antonio Guerrieri, and Marco
Sgroi. 2011. SPINE: A domain-specific framework for rapid prototyping of WBSN applications. Software:
Practice and Experience 41, 3 (2011), 237–265. DOI:10.1002/spe.998
Lucia Lo Bello and Emanuele Toscano. 2009. Coexistence issues of multiple co-located IEEE 802.15.4/Zig-
Bee networks running on adjacent radio channels in industrial environments. IEEE Transactions on
Industrial Informatics 5, 2 (2009), 157–167. DOI:10.1109/TII.2009.2018541
Elyes Ben Hamida, Guillaume Chelius, and Jean-Marie Gorce. 2009. Impact of the physical layer mod-
eling on the accuracy and scalability of wireless network simulation. Simulation 85 (2009), 574–588.
DOI:10.1177/0037549709106633
Azzedine Boukerche. 2005. Handbook of Algorithms for Wireless Networking and Mobile Computing. CRC
Press.
Riccardo Cavallari, Flavia Martelli, Ramona Rosini, Chiara Buratti, and Roberto Verdone. 2014. A survey on
wireless body area networks: technologies and design challenges. IEEE Communications Surveys and
Tutorials 16, 3 (2014), 1635–1657. DOI:10.1109/SURV.2014.012214.00007
Craig A. Chin, Garth V. Crosby, Tirthankar Ghosh, and Renita Murimi. 2012. Advances and chal-
lenges of wireless body area networks for healthcare applications. In Proceedings of the 2012
International Conference on Computing, Networking and Communications (ICNC). IEEE, 99–103.
DOI:10.1109/ICCNC.2012.6167576
C. N. A. P. Staff. 2013. Network Basics Companion Guide. Cisco Press.
G. V. Crosby, T. Ghosh, R. Murimi, and C. A. Chin. 2012. Wireless body area networks for healthcare: A
survey. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) 3, 3, 1–19.
Garth V. Crosby, Tirthankar Ghosh, Renita Murimi, and Craig A. Chin. 2012. Wireless body area networks
for healthcare: A survey. International Journal of Ad Hoc, Sensor and Ubiquitous Computing (IJASUC)
3, 3 (2012), 1–19. DOI:10.5121/ijasuc.2012.3301
David M. Davenport, Budhaditya Deb, and Fergus J. Ross. 2009. Wireless propagation and coexistence of
medical body sensor networks for ambulatory patient monitoring. In Proceedings of the 6th International
Workshop on Wearable and Implantable Body Sensor Networks. IEEE, 41–45. DOI:10.1109/BSN.2009.8
Ruben de Francisco, Li Huang, and Guido Dolmans. 2009. Coexistence of WBAN and WLAN in medical
environments. In Proceedings of the 70th IEEE Vehicular Technology Conference Fall (VTC 2009-Fall).
IEEE, 1–5. DOI:10.1109/VETECF.2009.5378807
Jie Dong and David Smith. 2013. Coexistence and interference mitigation for wireless body area networks:
Improvements using on-body opportunistic relaying. arXiv preprint arXiv, 1305.6992.
Igor Dotlic. 2011. Interference performance of IEEE 802.15.6 impulse-radio ultra-wideband physical layer.
In Proceedings of the 22nd IEEE International Symposium on Personal Indoor and Mobile Radio Com-
munications (PIMRC). IEEE. 2148–2152. DOI:10.1109/PIMRC.2011.6139895.
Du Dakun, Hu Fengye, Wang Feng, Wang Zhijun, Du Yu, and Wang Lu. 2015. A game theoretic approach
for inter-network interference mitigation in wireless body area networks. China Communications 12, 9
(2015), 150–161.
Stefano Galzarano, Giancarlo Fortino, and Antonio Liotta. 2012. Embedded self-healing layer for detecting
and recovering sensor faults in body sensor networks. In Proceedings of the IEEE International Confer-
ence on Systems, Man, and Cybernetics (SMC). IEEE, 2377–2382. DOI:10.1109/ICSMC.2012.6378098
Satish K. Garg, Sherwyn Schwartz, and Steven V. Edelman. 2004. Improved glucose excursions using an
implantable real-time continuous glucose sensor in adults with type 1 diabetes. Diabetes Care 27, 3
(2004), 734–738.
Sai Anand Gopalan and Jong-Tae Park. 2010. Energy-efficient MAC protocols for wireless body area net-
works: Survey. In Proceedings of the International Congress on Ultra Modern Telecommunications and
Control Systems and Workshops (ICUMT). IEEE, 739–744. DOI:10.1109/ICUMT.2010.5676554
Thaier Hayajneh, Ghada Almashaqbeh, Sana Ullah, and Athanasios V. Vasilakos. 2014. A survey of wireless
technologies coexistence in WBAN: Analysis and open research issues. Wireless Networks 20, 8 (2014),
2165–2199.
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
Wireless Body Area Network (WBAN) 3:37
Hongliang Ren and Max Q.-H. Meng. 2006. Understanding the mobility model of wireless body sensor
networks. In Proceedings of the 2006 IEEE International Conference on Information Acquisition. IEEE,
306–310. DOI:10.1109/ICIA.2006.306015
Young-Sik Jeong, Hyun-Woo Kim, and Jong Hyuk Park. 2014. Visual scheme monitoring of sensors for fault
tolerance on wireless body area networks with cloud service infrastructure. International Journal of
Distributed Sensor Networks 2014. DOI:10.1155/2014/154180
Jamil Y. Khan and Mehmet R. Yuce. 2010. Wireless body area network (WBAN) for medical applications.
New Developments in Biomedical Engineering. INTECH (2010), ISBN 978-953-7619-57-2, 592–627.
DOI:10.5772/7598
Barbara T. Korel and Simon G. M. Koo. 2007. Addressing context awareness techniques in body sensor
networks. In Proceedings of the 21st International Conference on Advanced Information Networking and
Applications Workshops (AINAW’07) 2 (2007), IEEE, 798–803. DOI:10.1109/AINAW.2007.69
Ravindra V. Kshirsagar and Ashish B. Jirapure. 2011. A survey on fault detection and fault tolerance in
wireless sensor networks. In Proceedings of the International Conference on Benchmarks in Engineering
Science and Technology (ICBEST (1)). 3 (2011), International Journal of Computer Science. 130–138.
Benoı̂t Latré, Bart Braem, Ingrid Moerman, Chris Blondia, and Piet Demeester. 2011. A survey on wireless
body area networks. Wireless Networks 17, 1 (2011), 1–18. DOI:10.1007/s11276-010-0252-4
Thien T. T. Le and Sangman Moh. 2015. Interference mitigation schemes for wireless body area sensor
networks: A comparative survey. Sensors 15, 6 (2015), 13805–13838. DOI:10.3390/s150613805
Bin Liu, Zhisheng Yan, and Chang Wen Chen. 2011. CA-MAC: A hybrid context-aware MAC protocol for
wireless body area networks. In Proceedings of the 13th IEEE International Conference on e-Health Net-
working Applications and Services (Healthcom). IEEE, 213–216. DOI:10.1109/HEALTH.2011.6026748
Hai Liu, Amiya Nayak, and Ivan Stojmenović. 2009. Fault-tolerant algorithms/protocols in wireless sensor
networks. In Guide to Wireless Sensor Networks, Springer, London, 261–291. DOI:10.1007/978-1-84882-
218-4_10
Arunanshu Mahapatro and Pabitra Mohan khilar. 2011. Online fault detection and recovery in body sen-
sor networks. In Proceedings of the World Congress on Information and Communication Technologies
(WICT). IEEE, 407–412. DOI:10.1109/WICT.2011.6141280
Vikash Mainanwal, Mansi Gupta, and Shravan Kumar Upadhayay. 2015. A survey on wireless body area
network: Security technology and its design methodology issue. In Proceedings of the International
Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS). IEEE,
1–5. DOI:10.1109/ICIIECS.2015.7193088
Bhavneesh Malik and V. R. Singh. 2013. A survey of research in WBAN for biomedical and scientific appli-
cations. Health and Technology 3, 3 (2013), 227–235. DOI:10.1007/s12553-013-0056-5
Jhon. M. Maloney and John T. Santini, Jr. 2004. Implantable microchips for controlled drug delivery. In
Proceedings of the 26th IEEE Annual International Conference Engineering in Medicine and Biology
Society (IEMBS’04). 1 (2004), 2668–2669. DOI:10.3109/10717544.2014.903579
Flavia Martelli and Roberto Verdone. 2012. Coexistence issues for wireless body area networks at 2.45 gHz.
In Proceedings of the 18th European Wireless Conference 2012, EW, VDE. 1–6.
Sushruta Mishra, Lambodar Jena, and Aarti Pradhan. 2012. Fault tolerance in wireless sensor networks. In-
ternational Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE),
2, 10, 146–153.
Amirhossein Moravejosharieh and Jaime Lloret. 2015. A survey of IEEE 802.15.4 effective system parame-
ters for wireless body sensor networks. International Journal of Communication Systems (2015). 1–24.
DOI:10.1002/dac.3098
Samaneh Movassaghi, Mehran Abolhasan, and Justin Lipman. 2013. A review of routing protocols in wireless
body area networks’. Journal of Network and Computer Applications 8, 3, (March 2013), 559–575.
10.4304/jnw.8.3
Samaneh Movassaghi, Mehran Abolhasan, Justin Lipman, David Smith, and Abbas Jamalipour. 2014. Wire-
less body area networks: A survey. IEEE Communications Surveys and Tutorials 16, 3, (2014), 1658–
1686. DOI:10.1109/SURV.2013.121313.00064
Georgia D. Ntouni, Athanasios S. Lioumpas, and Konstantina S. Nikita. 2014. Reliable and energy-efficient
communications for wireless biomedical implant systems. IEEE Journal of Biomedical and Health
Informatics 18, 6, (2014), 1848–1856.
Horacio Antonio Braga, Fernandes De Oliveira, Azzedine Boukerche, Eduardo Freire Nakamura, and An-
tonio Alfredo Ferreira Loureiro. 2009. An efficient directed localization recursion protocol for wireless
sensor networks. IEEE Transactions on Computers 58, 5, (2009), 677–691. DOI:10.1109/TC.2008.221
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.
3:38 M. Salayma et al.
Begonya Otal, Christos Verikoukis, and L. Alonso. 2009. Fuzzy-logic scheduling for highly reliable and
energy-efficient medical body sensor networks. In Proceedings of the 2009 IEEE International Conference
on Communications Workshops. IEEE, 1–5. DOI:10.1109/ICCW.2009.5208088
Chris Otto, Aleksandar Milenkovic, Corey Sanders, and Emil Jovanov. 2006. System architecture of a wireless
body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia 1, 4, (2006),
307–326.
Maulin Patel and Jianfeng Wang. 2010. Applications, challenges, and prospective in emerging body
area networking technologies. IEEE Wireless Communications Magazine 17, 1, (2010), 80–88.
DOI:10.1109/MWC.2010.5416354
K. M. Karthick Raghunath and N. Rengarajan. 2013. Investigation of faults, errors and failures in wireless
sensor network: A systematical survey. International Journal of Advanced Computer Research 3, 3,
(2013), 151.
Sanaz Rezvani and Seyed Ali Ghorashi. 2013. Context aware and channel-based resource allocation for wire-
less body area networks. IET Wireless Sensor Systems 3, 1 (2013), 16–25. DOI:10.1049/iet-wss.2012.0100
Nadisanka Rupasinghe and İsmail Güvenç. 2015. Reinforcement learning for licensed-assisted access of LTE
in the unlicensed spectrum. In Proceedings of the 2015 IEEE Wireless Communications and Networking
Conference (WCNC). IEEE, 1279–1284. DOI:10.1109/WCNC.2015.7127653
Tom Rutherford and A. Socio. 2012. Population ageing: Statistics. House of Commons library (Standard not.
Retrieved Jan 2, 2013, From: www. Parliament. uk/Topics/PopulationArchive (2012)
Marwa Salayma, Wail Mardini, Yaser Khamayseh, and Muneer Bani Yasin. 2013a. Optimal beacon and
superframe orders in WSNs. In Proceedings of the 5th International Conference on Future Computational
Technologies and Applications, Topology 6 (2013), 49–55.
Marwa Salayma, Wail Mardini, Yaser Khamayseh, and Muneer Bani Yasin. 2013b. IEEE 802. 15.4 Perfor-
mance in Various WSNs Applications. 2013. In Proceedings of the 7th International Conference on Sensor
Technologies and Applications. 139–144.
Leo Selavo, Anthony Wood, Qing Cao, Tamim Sookoor, Hengchang Liu, Aravind Srinivasan, and
Yafeng Wu. 2007. LUSTER: Wireless sensor network for environmental research. In Proceed-
ings of the 5th International Conference on Embedded Networked Sensor Systems. ACM, 103–116.
DOI:10.1145/1322263.1322274
TG4. 2003. IEEE 802.15 WPANTM Task Group 4 (TG4). Retrieved Juanuary 31, 2016 from http://www.
ieee802.org/15/pub/TG4.html.
TG4a. 2007. IEEE 802.15 WPAN Low Rate Alternative PHY Task Group 4a (TG4a). Retrieved Juanuary 31,
2016 from http://www.ieee802.org/15/pub/TG4a.html.
TG4j. 2012. TG 4j Amendment Draft. Internal Report, unpublished.
TG6. 2012. IEEE standard for local and metropolitan area networks: Part 15.6: Wireless body area networks,
802.15.6-2012. Retrieved Juanuary 31, 2016 from https://standards.ieee.org/findstds/standard/802.15.6-
2012.html.
Wen Sun, Yu Ge, and Wai-Choong Wong. 2015. A stochastic geometry analysis of inter-user interference in
IEEE 802.15. 6 body sensor networks. In Proceedings of the 2015 IEEE Wireless Communications and
Networking Conference (WCNC). IEEE, 1912–1917. DOI:10.1109/WCNC.2015.7127760
Sana Ullah, Henry Higgins, Bart Braem, Benoit Latre, Chris Blondia, Ingrid Moerman, Shahnaz Saleem,
Ziaur Rahman, and Kyung Sup Kwak. 2012. A comprehensive survey of wireless body area networks.
Journal of Medical Systems 36, 3, (2012), 1065–1094. DOI:10.1007/s10916-010-9571-3
Xuan Wang and Lin Cai. 2011. Interference analysis of co-existing wireless body area networks.
In Proceedings of the Global Telecommunications Conference (GLOBECOM 2011). IEEE, 1–5.
DOI:10.1109/GLOCOM.2011.6133624
Wikipedia The Free Encyclopedia. 2015. Middleware. Retrieved April 14, 2015 from http://www.ieee802.
org/15/pub/TG4.html.
Guowei Wu, Jiankang Ren, Feng Xia, and Zichuan Xu. 2010. An adaptive fault-tolerant communication
scheme for body sensor networks. Sensors 10, 11 (2010), 9590–9608. DOI:10.3390/s101109590
Mengjie Yu, Hala Mokhtar, and Madjid Merabti. 2007. Fault management in wireless sensor networks. IEEE
Wireless Communications 14, 6 (2007), 13–19. DOI:10.1109/MWC.2007.4407222
Gang Zhou, Qiang Li, Jingyuan Li, Yafeng Wu, Shan Lin, Jian Lu, Chieh-Yih Wan, Mark D. Yarvis, and
John A. Stankovic. 2011. Adaptive and radio-agnostic qos for body sensor networks. ACM Transactions
on Embedded Computing Systems (TECS) 10, 4 (2011), 48. DOI:10.1145/2043662.2043672
ACM Computing Surveys, Vol. 50, No. 1, Article 3, Publication date: March 2017.