2021
DOI: 10.1016/j.comnet.2020.107759
|View full text |Cite
|
Sign up to set email alerts
|

IEEE 802.15.6 CSMA/CA access method for WBANs: Performance evaluation and new backoff counter selection procedure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…The consumer electronics industry has rapidly moved current standardised wireless technologies for industrial automation, including IEEE 802.15.6 and Industrial, Scientific, and Medical (ISM) radio-based protocols for personal area networks, to meet the needs of WBAN [ 86 , 87 , 88 ]. The latest wireless standards and technologies concentrate on network construction related to short-range communication, and low power and cost to satisfy the minimum requirements of a wireless technology in healthcare systems in terms of implementation [ 40 , 89 ].…”
Section: General Healthcare Communication Standards and Technologymentioning
confidence: 99%
“…The consumer electronics industry has rapidly moved current standardised wireless technologies for industrial automation, including IEEE 802.15.6 and Industrial, Scientific, and Medical (ISM) radio-based protocols for personal area networks, to meet the needs of WBAN [ 86 , 87 , 88 ]. The latest wireless standards and technologies concentrate on network construction related to short-range communication, and low power and cost to satisfy the minimum requirements of a wireless technology in healthcare systems in terms of implementation [ 40 , 89 ].…”
Section: General Healthcare Communication Standards and Technologymentioning
confidence: 99%
“…To resolve this, different techniques are used in WBAN literature such as Medium Access Control protocols (MAC protocols), role based access control etc. [29][30][31][32][33][34][35]. Revocability assures when a user/node is identified as malicious in the system then all previously granted permissions needs to be revoked from it to make the rest of the system secure [20].…”
Section: Privacy Protection Requirementsmentioning
confidence: 99%