Patient data prioritization in the cross-layer designs of wireless body area network

In Wireless Body Area Network (WBAN), various biomedical sensors (BMSs) are deployed to monitor various vital signs of a patient for detecting the abnormality of the vital signs. These BMSs inform the medical staff in advance before the patient's life goes into a threatening situation. In WBAN,...

Full description

Saved in:
Bibliographic Details
Main Authors: Ullah, Fasee, Abdullah, Abdul Hanan, Jan, Muhammad Qasim, Quresh, Kashif Naseer
Format: Article
Language:English
Published: Hindawi Publishing Corporation 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/58762/1/FaseeUllah2015_PatientDataPrioritizationintheCross.pdf
http://eprints.utm.my/id/eprint/58762/
http://dx.doi.org/10.1155/2015/516838
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In Wireless Body Area Network (WBAN), various biomedical sensors (BMSs) are deployed to monitor various vital signs of a patient for detecting the abnormality of the vital signs. These BMSs inform the medical staff in advance before the patient's life goes into a threatening situation. In WBAN, routing layer has the same challenges as generally seen in WSN, but the unique requirements of WBANs need to be addressed by the novel routing mechanisms quite differently from the routing mechanism in Wireless Sensor Networks (WSNs). The slots allocation to emergency and nonemergency patient's data is one of the challenging issues in IEEE 802.15.4 and IEEE 802.15.6 MAC Superframe structures. In the similar way, IEEE 802.15.4 and IEEE 802.15.6 PHY layers have also unique constraints to modulate the various vital signs of patient data into continuous and discrete forms. Numerous research contributions have been made for addressing these issues of the aforementioned three layers in WBAN. Therefore, this paper presents a cross-layer design structure of WBAN with various issues and challenges. Moreover, it also presents a detail review of the existing cross-layer protocols in the WBAN domain by discussing their strengths and weaknesses.