1. Introduction
The plethora of designs and applications of wireless sensor networks (WSNs) has caused them to prevail in various domains and sectors. WSNs played a significant role in paving the way for the emergence of the Internet of Things (IoT), an abundance of intelligent sensor nodes that are mounted on a variety of objects and connected to the Internet to report abundant information related to the performance/operation of those objects. As IoT applications emerge in each aspect of our day-to-day life, their performance relies on stringent requirements and specifications.
The wireless body area network (WBAN) emerges as a critical IoT application. Research into WSNs and IoT introduces WBANs as a significant building block in the health system of any nation, intended to improve health services. A WBAN is mounted on the body of a patient to monitor or collect data on the patient’s vital signs like their heartbeat, blood pressure, temperature, respiration, electromyography (EMG), electrocardiogram (ECG), and electroencephalogram (EEG) [
1]. By monitoring these signs, the WBAN helps physicians to stay up to date with respect to the patient’s health status, create patient history, allow for remote assessment of the patient, receive real-time data about the patient, and notify paramedics in cases of emergency. WBANs can significantly reduce the pressure on health systems by reducing the number of people admitted to hospitals. Also, WBANs can help patients become more mobile and stay at home rather than being confined to hospitals. This latter fact even has a positive impact on the patient’s mental health, which speeds up his/her recovery. Healthcare is a vital sector that is projected to have a significant impact on the economy worldwide. According to [
2], healthcare applications and related IoT-based services are expected to create an annual growth of USD 1.1–USD 2.5 trillion in the global economy by 2025. The authors also report that as dominant IoT applications, healthcare applications are projected to have a market share of 41% by 2025.
For the WBAN to achieve its set goals, it requires quality of service (QoS) guarantees. These guarantees include, but are not limited to, high packet delivery ratios, reduced delays, high throughputs, and energy conservation. These parameters are highly affected by the medium access control (MAC) protocol used by the WBAN. In other words, the design of the MAC protocol should recognize these QoS requirements in order for it to be adopted in the deployment of WBANs (see [
1,
3,
4] for more details on suitable MAC protocols for WBANs). As a result, MAC protocols for WBANs have received significant attention in the literature; ref. [
3] provides a recent comprehensive survey of the state-of-the-art MAC protocols for WBANs.
Being an example of WSNs, WBANs can be operated by deploying the IEEE 802.15.4 standard, i.e., the low-rate wireless personal area network standard that is highly suited for power-constrained, low-transmission-rate nodes like sensor nodes in WSNs [
5]. The IEEE 802.15.4 (in the rest of the paper, we use the terms “802.15.4” or “the standard” interchangeably with “IEEE 802.15.4.”) standard defines the specifications of both the physical layer and the MAC sub-layer of WSNs. The performance of the WSN greatly depends on how the MAC protocol parameters are tuned or defined. Improving the design of the standard MAC has been the objective of plenty of studies over the last two decades. Several survey studies that review the achievements in this field are available, like [
6,
7,
8]. Research efforts in this direction introduced the IEEE 802.15.6 standard, an IEEE standard for WBANs. However, 802.15.4 is still a potential candidate for WBANs (see the excellent surveys [
1,
8,
9,
10] that list 802.15.4 as a well-studied technology for deployment in WBANs). In fact, 802.15.4 is a potential technology for IoT applications in general, and WBANs more specifically [
10].
In a previous work, we introduced the adaptive backoff algorithm (ABA) [
11] (see also [
12]) as an improvement to the standard backoff mechanism—known as the binary exponent backoff (BEB)—in the 802.15.4 MAC protocol. ABA aimed to adapt the size of the contention window used in BEB to the value of the probability of collision. Since the probability of collision is directly impacted by the size of the WSN, ABA manages to shorten or extend the contention window dynamically based on how big or small the network is. This way, ABA responds to the level of activity happening over the wireless medium. In our evaluation of the ABA’s performance, we simulated networks of sizes up to 350 nodes while imposing an upper bound of 256 on the contention window size. We observed that the overall performance degrades as the network size increases beyond 50 nodes.
This paper introduces an improved version of ABA, and we name it the improved-ABA (I-ABA). The main objective of I-ABA is to maintain a promising performance in the network compared to the standard MAC, while increasing the size of the network to accommodate hundreds of sensor nodes in a WBAN; this is referred to as large-scale WBAN in this paper. Supporting large-scale WBANs is realistic and needed in many situations. The IEEE 802.15.6 standard itself supports a WBAN of sizes up to 256 nodes (we stress again, as mentioned earlier in this section, that the focus of this work is solely the IEEE 802.15.4 standard as it is still within the scope of a huge body of works on WBANs) [
13].
The main contributions of this work are outlined as follows:
We introduce I-ABA, a new, improved IEEE 802.15.4 MAC protocol for large-scale WBANs.
The improvements in I-ABA rely on a new mathematical definition of the contention window that is not computationally complex and poses no overhead on sensor nodes to compute.
We use the Markov chain model developed in [
11] to derive mathematical expressions for essential performance metrics that include channel utilization, channel idle time, channel collision time, delay, reliability, average energy consumption, and average energy wasted in collisions.
We evaluate the performance of I-ABA using user-defined tools (programmed in Java SE 21 and C) and conduct a comparative study with the standard BEB and ABA.
The rest of the paper is organized as follows.
Section 2 provides a brief description of the binary exponent backoff (BEB) algorithm that is incorporated in the MAC protocol of the 802.15.4 standard.
Section 3 reviews recent proposals on improving the performance of the 802.15.4 MAC protocol.
Section 4 introduces the new I-ABA algorithm along with a mathematical model to evaluate its performance.
Section 5 studies I-ABA’s performance and verifies the accuracy of the mathematical model developed in
Section 4. Finally,
Section 6 concludes the paper.
3. Related Work
In this section, we highlight some state-of-the-art related work that tackled the problem of improving the standard BEB in 802.15.4 MAC to enhance its performance and serve the applications of WBAN.
In [
14], the authors proposed the genetic fuzzy logic channel optimization (GFCO) approach for IEEE-802.15.4-based low-rate wireless personal area networks. GFCO employs a genetic algorithm to modify a fuzzy logic controller optimally. The main target is to adjust the contention window size to improve the probability of medium access. Through this optimization, the performance is improved in terms of throughput, packet delivery ratio, packet loss ratio, and packet delay. In evaluating their proposed technique, the authors use extensive simulations, considering two WBAN scenarios: in one scenario, a WBAN with 10 sensors was mounted on the body of a single person; while in the other scenario, 10 to 50 persons were considered to be present in a hospital ward. The authors report results that show the ability of GFCO to outperform the standard BEB in terms of the aforementioned metrics.
The authors of [
15] focused mainly on improving the reliability of the 802.15.4 MAC protocol to better support data transmission in WBANs. After studying a simple two-dimensional Markov chain that models the CSMA-CA algorithm, the authors proved mathematically that the parameter macMaxCSMABackoffs is directly related to the reliability of packet transmission. Therefore, by properly tuning this parameter, transmission reliability can be improved. With this observation in mind, the value of macMaxCSMABackoffs will be set depending on the severity of the sensed physiological data (termed as the criticality index (CI); the CI lies between 0 and 1). The range of the CI is divided into five sub-ranges, each of which is assigned a different value of macMaxCSMABackoffs. A local processing unit assigns sensor nodes their CIs. Whenever a sensor node has critical packets to transmit, it sets its macMaxCSMABackoffs based on its CI. The reliability was finally studied as a function of the probability of collision, failure during CCA1, and CI. The reported results show promising improvements in transmission reliability when the macMaxCSMABackoffs parameter is properly tuned.
In [
16], the authors studied the lack of support of data prioritization in 802.15.4 standard and how BEB does not recognize the levels of urgency or importance among different nodes traffics. The authors introduced the class of service traffic priority MAC (CSTP-MAC) scheme to cover that gap. In the CSTP-MAC, nodes are classified based on the different priorities of the data they are carrying. Backoff periods are computed using a set of unique backoff expressions peculiar to the data priorities. The idea behind the unique expressions is to grant nodes a non-conflicting range of backoff periods, which resolves the contention among the nodes to access the shared medium of communication.
In [
17], the authors proposed the retransmission adaptive intelligent MAC (RAI-MAC) protocol to achieve fair retransmissions in WBANs. In the RAI-MAC, a coordinator node tracks the number of failed transmission attempts by each sensor node in its cluster. By learning about the number of failed transmissions, the coordinator classifies the nodes in the WBAN into priority classes. These priority classes help control the next backoff interval of all current transmitting sensors in a WBAN, which affects the retransmission priority of each node. This approach results in an adaptive adjustment of backoff intervals, which helps RAI-MAC reduce the probability of collisions and delay.
The authors in [
18] studied the improvement of the backoff and CCA mechanisms in the 802.15.4 MAC protocol to better support WBAN applications. The authors pointed out that the standard specifies that the BE is confined to the interval [0, (macMinBE, macMaxBE)]; macMinBE = 2; macMaxBE = 5. In the case of recurring collisions, and since macMaxCSMABackoffs = 4, the backoff exponent will be selected from the intervals 0–7, 0–15, 0–31, 0–31, and 0–31. Therefore, in the case of frequent collisions over the wireless medium, there will be several sensor nodes selecting their BE from the interval 0–31, and they may end up selecting the same BE, which leads to more collisions. To mitigate such situations, the authors propose using distinct intervals for each backoff period and reducing the number of backoff periods to 3. As for the CCA mechanism, the authors note that waiting for two idle CCAs may lead to unnecessary delays in communications. Therefore, they propose to allow a sensor node to send its data as soon as it finds the CCA idle. The modifications of the backoff and CCA mechanisms have been modeled mathematically using Markov chains and evaluated through simulations. The targeted performance parameters were energy conservation, packet delivery ratio, throughput, and delay. The reported results show superior performance compared to the standard 802.15.4 MAC protocol.
The authors in [
19] focused on the requirements of adaptive data traffic and QoS guarantees in several wireless applications like WBANs. As such, they introduced the enhanced superframe offering adaptive duty cycle (ESAD), a new superframe structure for the 802.15.4 standard to support adaptive traffic. ESAD aims at offering better throughput, reduced network delay, and the accommodation of more nodes to transmit data within a time frame. Specifically, the ESAD proposes that the active period of the standard superframe becomes adapted to the traffic requirements, which improves the utilization of the GTSs. Moreover, the slot size of each GTS is reduced in an attempt to double the total number of GTSs. Finally, the allocation of the GTSs by the personal area network coordinator is achieved based on the shortest-job-first algorithm instead of the first-come-first-served algorithm. The performance of the ESAD has been evaluated through simulations. The targeted performance parameters were as follows: delay; data transmission; GTS utilization; and the number of GTS requesting nodes. The generated results show that the ESAD is superior to the conventional 802.15.4 MAC protocol in terms of these parameters.
The authors in [
20] pointed out that based on the specifications of the standard 802.15.4 MAC protocol, whenever a node detects a busy wireless medium, it increases its BE by 1 (up to macMaxBE). The next backoff period for this node will expand while the node that has attained access to the medium will have a better chance of accessing the medium in the future as its backoff period will be shorter. To fix this unfairness for WBANs, the authors proposed using a fixed value of BE during the execution of all BEB steps. This way, all nodes experience the same backoff periods in their transmission attempts, leading to equal opportunities for medium access. This proposal has been evaluated using simulations focusing on packet reception rate, average delay, and throughput. The simulations considered the typical traffics generated by five biomedical sensors in a patient monitoring system. The reported results indicate that using a fixed BE among different nodes leads to significant improvements in the performance in terms of the parameters mentioned above.
In [
21], the authors introduced the traffic class prioritization-based CSMA/CA (TCP-CSMA/CA) scheme to support medium access priorities among heterogenous-natured biomedical sensor nodes (BMSNs) in intra-WBANs. The TCP-CSMA/CA provides prioritized medium access to nodes of different traffic classes to improve performance parameters like packet delivery delay, packet loss, energy consumption, throughput, and packet delivery ratio (PDR). Patients’ data are classified based on four traffic classes. Prioritizing access to the medium is made possible by allocating a distinct, minimized, and prioritized backoff period range to each traffic class in every backoff during contention. Furthermore, the BE is made to start from 1, rather than 0, to avoid having the same third, fourth, and fifth backoff ranges (as was the case with [
18]). The performance of TCP-CSMA/CA in terms of the parameters mentioned above was studied via extensive simulations, which showed it to be superior to the 802.15.4 standard.
In [
22], the authors proposed REO, a reliable and energy-efficient optimization algorithm that optimizes delay, reliability, and energy trade-offs based on traffic and QoS requirements. The authors refer to the delay and energy specifications of medical sensors that are commonly used in WBANs. The best packet size and data rate combination that maximizes the sensor node’s battery lifetime was investigated based on these specifications. By properly adjusting the MAC parameters to be consistent with the packet size and data rate selected, QoS requirements could be achieved. Simulation results reflect that REO can outperform comparable works in delay, energy consumption, and reliability.
In [
23], the authors focused on the fact that 802.15.4 uses a fixed superframe structure without considering the different needs of the nodes. The 802.15.4 does not recognize the demands of different applications. To improve 802.15.4 in this direction, the authors proposed a content-based dynamic superframe adaptation (CDSA) scheme by which to adapt BO and SO based on the content requirements simultaneously. The network coordinator uses five QoS parameters (i.e., data rate, receive ratio, size of the network, number of collisions, and delay) to adjust the superframe and the BE dynamically to achieve the optimal solution. The superframe adjustment scheme aims at achieving higher throughput and reducing end-to-end latency. Furthermore, the nodes’ duty cycle is reduced during no activity periods. This way, the network lifetime is enhanced. Performance evaluation through simulations showed that CDSA, compared to 802.15.4 and other schemes that adjust SO and/or BO, can achieve a better packet delivery ratio and throughput, more energy savings, and lower end-to-end delay.
In light of reviewing the works above, we can make the following observations:
These are very recent studies that prove the validity of the problem we are tackling in this paper, that is, proposing improvements to the MAC protocol as an important means of enhancing the performance in WBANs.
These studies focus on IEEE 802.15.4 MAC, which proves that this protocol is still a potential candidate for deployment in WBANs.
Within the limits of our review, works in the literature are mainly focusing on small-scale WBANs. This fact motivates the investigation of new MAC protocols that maintain promising performance as the WBAN grows in size; that is, studying MAC protocols in large-scale WBANs is validated.
5. Performance Evaluation and Verification of the Mathematical Model
In this section, we evaluate the performance of I-ABA by implementing the algorithm in
Figure 4 using two different tools developed independently: one is Java-based while the second is C-based. Two of the authors developed each tool independently. The purpose of creating these two separate implementations was to ensure the accuracy and reliability of our results by comparing outputs from different programming environments. The primary advantage of utilizing user-defined tools is to streamline future extensions, expedite development, and facilitate troubleshooting. We also use MATLAB to generate data based on the mathematical model we have developed. The data generated by MATLAB are used to verify the data generated by the two user-defined tools.
Figure 6,
Figure 7,
Figure 8,
Figure 9,
Figure 10,
Figure 11,
Figure 12 and
Figure 13 show how the data generated by the two tools for I-ABA compare to what MATLAB generated using the Markov-based model. In these figures, the curves related to the Java-based simulator, the C-based simulator, and MATLAB are denoted as IABA_J, IABA_C, and IABA_T. These figures clearly show that both simulation tools are generating data that are comparable to a high degree. This enhances confidence in both the design of the simulation tools and the results they generate, especially since the tools were developed independently by two different software developers. To better quantify how close the simulations results are to the MATLAB results, we compute the coefficient of variation of the root-mean-square deviation RSMD (CV(RMSD)) for the performance parameters in
Figure 6,
Figure 7,
Figure 8,
Figure 9,
Figure 10,
Figure 11,
Figure 12 and
Figure 13. CV(RMSD) is a good measure of accuracy between two sets of data, and it is defined as follows:
where
is the predicted theoretical value by the Markov-based model,
is the simulated value,
is the average of the observed values, and
is the total number of the sample values used. An accurate theoretical model should achieve low values for CV (RMSD).
Table 2 shows the CV(RMSD) values for all parameters in
Figure 6,
Figure 7,
Figure 8,
Figure 9,
Figure 10,
Figure 11,
Figure 12 and
Figure 13. The table shows the difference between the two simulation tools (J_Sim/C_Sim), the Java-based simulator and MATLAB (J_Sim/Theoretical), and the C-based simulator and MATLAB (C_Sim/Theoretical). It is fairly evident in this table that the CV(RMSD) values are fairly small, which proves that the simulation tools are generating highly comparable results and that both tools closely match what MATLAB is generating. However, it is essential to highlight a relatively high CV(RMSD) value of around 16% for the channel collision time parameter between the simulation results and the MATLAB results. The discrepancy between the theoretical and simulation models for this metric can be explained by the fact that the theoretical value is calculated as C = 1 − U − T, where the error is the sum of errors of U and T.
The implementations for the Java-based simulator, C-based simulator, and MATLAB are made available at GitLab (see [
25,
26,
27]). The simulation settings and parameters are specified in
Table 3. The simulation setup is described next.
We utilized custom-developed tools based on Java and C to evaluate the performance of the network. The Java-based tool was used for the initial development and debugging of the algorithm. The standard JDK with additional networking and data handling libraries have been used. The C-based tool was used to run extensive simulations and gather performance metrics (C was selected due to it being optimized for performance). The GNU Compiler Collection (GCC) and POSIX libraries were used for low-level network simulations and timing functions. Furthermore, Python was used for curve-fitting to derive the mathematical expression that relates the optimal contention window to the network size. The simulations were run on Linux and Windows to ensure platform independence and robustness. Each simulation was run extensively (at least 100 runs). Performance metrics were averaged over all runs to obtain the final results, and 95% confidence intervals were calculated. Since floating-point arithmetic can lead to precision errors, especially in simulations involving small time scales or energy measurements, we carefully managed precision by using double-precision floating-point numbers where necessary. To minimize rounding errors, we applied appropriate rounding techniques only during the final result presentation. To ensure reproducibility and avoid biases due to random number generation, we used fixed random seeds for simulations. We compared our results with those from the standard BEB and ABA to ensure that any performance gains observed were due to the improvements in I-ABA, not experimental biases. The results obtained from the Java and C simulations were cross-validated to check for consistency between different simulation platforms. All simulation runs were logged with detailed information about the network configuration, the number of collisions, and other relevant parameters to trace and debug any anomalies.
For validity threats, we next discuss the internal and external threats to our simulations. We identify programming bugs, model accuracy, and simplified simulation assumptions as potential internal threats. Programming bugs could potentially lead to incorrect results. To mitigate this situation, we conducted thorough code reviews, unit testing, and cross-validation between the Java and C implementations to minimize the risk imposed by errors on our results. For model accuracy, it is apparent that inaccurate models fail to mimic real-world scenarios and, as such, lead to invalid and potentially misleading results. To deal with this, we ensured that the simulation parameters (e.g., network size, node behavior, collision detection, etc.) closely match those used in real-world WBAN deployments. We validated our model against known results from established backoff algorithms like BEB and ABA. For simplified simulation assumptions, there is always the risk of oversimplifying the simulation or experimental environment to the extent that it no longer reflects a practical situation (for example, the use of a uniform node distribution or deterministic patterns). To mitigate this, we used randomized inputs and varied simulation parameters across multiple runs. This randomness helps mimic the unpredictability of real-world environments. We also identify the applicability to real networks and environmental factors as potential external threats to our simulations. These threats are legitimate and can be better mitigated through actual deployment and experimentation on real sensor nodes, which is beyond the scope of this study and is left for future investigation.
In
Figure 14, we consider the probability of collision over the wireless medium as the size of the network increases. The figure clearly shows that as the network size increases and becomes as high as 350 nodes, the standard BEB performs poorly, leading to high collision probabilities. However, compared to the standard BEB and ABA, I-ABA can maintain a slow increase in the probability of collision as the size of the network increases. As the size reaches 340 nodes, the collision probability is around 40%, while it is 49% and 95.2% for ABA and the standard BEB, respectively. I-ABA is also able to remained closer to the optimal protocol compared to ABA. At 340 nodes, the probability of collision is 28.2% with the optimal protocol.
In
Figure 15, we depict the performance in terms of channel utilization. It is evident again that the standard BEB channel utilization deteriorates with the increase in network size. At 340 nodes, BEB hits a channel utilization of 13.3%, which is extremely poor. For I-ABA and ABA, the channel utilization is 61.1% and 57.6%, respectively. Again, I-ABA is closer to the optimal protocol that achieves a channel utilization of 63.7% at a network size of 340 nodes.
The performance in terms of channel idle time is illustrated in
Figure 16. As shown, the standard BEB is far from the optimal case that maintains the channel idle time percentage at around 24.5%. BEB decreases the channel idle time percentage to 12.8% as the network size reaches 340 nodes. I-ABA, however, supports a channel idle time of 19.8% at a network size of 340 nodes. ABA, on the other hand, hits a channel idle time of 17.8%. These results show again that I-ABA is still closer to the optimal case compared to ABA and BEB.
In
Figure 17, we examine channel collision time, a parameter that should be lowered as it indicates how long the wireless medium was busy with useless activity. The figure shows the rapid increase in channel collision time with BEB. It reaches a percentage as high as 74% at 350 nodes. I-ABA and ABA significantly reduce channel collision time to 19% and 24.6%, respectively, at 340 nodes. Consequently, I-ABA is still superior to the other techniques in reducing channel collision time.
Figure 18 focuses on the transmission delay. As the size of the network increases, the delay with the standard BEB increases rapidly to reach 11.4 ms at 340 nodes. In the meanwhile, I-ABA achieves a delay of 2.5 ms at the same network size. It is lower than the delay with ABA (2.65 ms) and closer to the optimal protocol (2.4 ms).
In
Figure 19, the performance in terms of reliability is illustrated. It is interesting to note that I-ABA achieves high reliability at high network sizes. This reliability is as high as 57.8% at a network size of 340 nodes. This reliability is superior to both the standard BEB (3%) and ABA (46.2%) at the same network size.
In
Figure 20, we show the performance in terms of the average energy consumption. The performance of both I-ABA and ABA is quite comparable. However, both techniques manage to reduce energy consumption compared to the standard BEB. At a network size of 340 nodes, BEB consumes average energy of 46 W.s., while I-ABA and ABA consume around 33 W.s.
Figure 21 depicts the performance in terms of the average energy wasted in collisions. Again, I-ABA and ABA performance are comparable and much better than the standard BEB. At a network size of 340 nodes, BEB consumes an average energy of 7.47 W.s., while I-ABA and ABA consume 1.17 and 1.56 W.s., respectively.
Finally,
Figure 22 reflects how fair the techniques under the scope of this paper are. The figure clearly shows that I-ABA, ABA, and the standard BEB can achieve a fairness index close to 1. It indicates that these medium access controls are fair and guarantee an equal opportunity for every node in the network to access the wireless medium.
Table 4 summarizes the data that have been collected at a network size of 340 nodes and provides a comparison between I-ABA, ABA, and the standard BEB.
Based on the performance evaluation of I-ABA, we now provide a general comparison between I-ABA and the related works that were covered in
Section 3. The comparison is provided in
Table 5. The comparison criteria are based on the network topology, network size, application area, whether the work relies on 802.15.4 parameter tuning, the applicability to large-scale WBANs (as was defined in
Section 1), and performance metrics. Also, the table provides noteworthy comments about each work. While different works use different performance evaluation metrics, the metrics provided in the table are the ones we have evaluated in this paper. These metrics are compared to show how comprehensive and distinguished our evaluation is compared to other works. Also, since this work targets supporting large-scale WBANs, the table examines whether each performance metric has been evaluated against the network size. As a result, the works that lack such evaluation are given the description “not applicable” (NA) in the respective table cell. Furthermore, for convenience, and since different works assess how efficient their techniques are in utilizing the wireless channel using different (but comparable) metrics, channel efficiency is used in this table to refer to channel utilization, channel idle time, channel collision time, throughput, or goodput; that is, any work that supports one or more of these metrics is assumed to have evaluated channel efficiency (of course, against network size). All works, including I-ABA, assume a single-hop star topology (with the exception of [
16], as explained shortly). Finally, power or energy consumption refers to whether there has been any power or energy analysis (including consumption and wastage due to collisions) conducted in the work.
Based on
Table 5, we can see that our work is distinguished by designing a new technique that focuses on scalability. I-ABA is the only technique in this table that supports single-hop WBANs that are composed of hundreds of nodes. Furthermore, the table shows that our performance evaluation is comprehensive and covers an important set of performance metrics; none of the surveyed works covers all of the listed metrics. The only exception is reference [
16], which studies networks composed of 100 nodes. However, the evaluated topology is multi-hop, and the targeted application is non-medical; the same reference uses a single-hop WBAN of 14 nodes to evaluate the performance. For references [
14,
17,
19], which evaluate the performance with network sizes 50, 30, and 40 nodes, respectively, it is not clear how the performance will behave when the network size reaches hundreds of nodes, as is the case with I-ABA. Furthermore, reference [
17] relies on the PAN coordinator in its operation, which poses a single point of failure, and reference [
19] targets the efficient allocation of GTS while GTS is not used in I-ABA. It is also worth noting that I-ABA requires no parameter tuning for 802.15.4 MAC, while several works rely on that [
15,
19,
22,
23]; that is, I-ABA requires no changes to the default parameters of 802.15.4 MAC and imposes minimal changes to its mechanism (as evident when comparing
Figure 1 and
Figure 4). Finally, it is worth mentioning that the proposal in [
14] follows the same approach as in both ABA and I-ABA in terms of optimizing the size of the contention window (CW) based on the conditions over the wireless medium that lead to collisions. However, as stated earlier, the work in [
14] does not consider large-scale WBANs.