Reinforcement Learning Based Clock Synchronization in WBAN

Authors

  • Pallvi Department of Computer Science and Engineering, Beant College of Engineering and Technology, Gurdaspur, Punjab, India
  • Sunil Kumar Gupta Department of Computer Science and Engineering, Beant College of Engineering and Technology, Gurdaspur, Punjab, India
  • Rajeev Kumar Bedi Department of Computer Science and Engineering, Beant College of Engineering and Technology, Gurdaspur, Punjab, India

DOI:

https://doi.org/10.51983/ajcst-2018.7.2.1885

Keywords:

Wireless body Area Network, Throughput, TDMA, MAC protocol

Abstract

Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN therefore forms a comprehensive collection of devices that are not only capable of providing continuous information about the health status of a person but also offers helpful details about the activities and environment of the person. In this paper, we have evaluated TDMA based MAC protocol performance through several metrics and TDMA approach is used to avoid packet collision which leads to higher packet loss rate. Reinforcement Based Clock synchronization is the solution of problem like packet collision. After clocks of WBAN sensor nodes are synchronized, data can be transferred between sensor nodes and sink efficiently and rapidly. Reinforcement learning iteratively optimizes the clock synchronization technique. Experimental results indicate that the proposed algorithm is more efficient than existing techniques.

References

S. Mukherjee, K. Dolui and S. K. Datta, “Patient health management system using e-health monitoring architecture”, in Advance Computing Conference (IACC), IEEE, pp. 400-405, 2014.

X. Sun, J. Su, B. Wang and Q. Liu, “Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks”, International Journal of Security and Its Applications, Vol. 7, No. 4, 2013.

L. Zhu, Zhen Yang, Meng Li and Dan Liu, “An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, vol. 2013.

N. Wadhwa, S. Z. Hussain and Rizvi SAM, “A Combined Method for Confidentiality, Integrity, Availability and Authentication (CMCIAA)”, Proceedings of the World Congress on Engineering, WCE, Vol. 2, 2013, London, U. K.

Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin and Hung-Min Sun 2012, “RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 4.

Ruoyu Wu, Gail-JoonAhn and Hongxin Hu 2012, “Secure Sharing of Electronic Health Records in Clouds,” 8th International Conference Conference on Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2012 Pittsburgh, PA, United States.

Ed Gelbestein 2011, “Data Integrity-Information Security’s Poor Relation”, ISACA Journal, Vol. 6.

Vladimir Oleshchuk and Rune Fensli, “Remote Patient Monitoring Within a Future 5G Infrastructure,” Wireless Personal Communication, Springer Science, 2010.

Wenbo He, X. Liu, H. Nguyen, K. Nahrstedt and T. Abdelzaher, “iPDA: An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks”, IEEE MILCOM, pp. 1-7, 2008.

H. T. Chu, “A Ubiquitous Warning System for Asthma-Inducement”, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, pp. 186-191, 2006.

A. Wood, G. Virone, T. Doan, Q. Cao, L. Selvao, Y. Wu, L. Fang, Z. He, S. Lin and J. Stankovic, “ALARM-NET:Wireless Sensor Networks for Assisted Living and Residential Monitoring”, Technical Report CS-2006-13, Department of Computer Science, University of Virginia, 2006.

Y. J. Zhao, “A MEMS Viscometric Glucose Moni-toring Device”, Proc. of the 13th IEEE International Conference on Solid-State Sensors, Actuators and Microsystems, Pittsburgh, pp. 1816-1819, 2005.

J. W. P. Ng, B. P. L. Lo, O. Wells, M. Sloman, N. Peters, A. Darzi, C. Toumazou and G. Z. Yang, “Ubiquitous Monitoring Environment for Wearable and Implantable Sensors (UbiMon)”, In Proceedings of 6th International Conference on Ubiquitous Computing (UbiComp”04), Nottingham, U. K., 2004.

T. Park and K. G. Shin, “LiSP: A Lightweight Security Protocol for Wireless Sensor Networks”, in ACM Transaction, 2004.

Arjan Durresi, VamsiParuchuri, RajgopalKannan and Iyengar, “A Lightweight Protocol for Data Integrity in Sensor Networks”, IEEE, ISSNIP, SS 2004.

Downloads

Published

05-08-2018

How to Cite

Pallvi, Gupta, S. K., & Bedi, R. K. (2018). Reinforcement Learning Based Clock Synchronization in WBAN. Asian Journal of Computer Science and Technology, 7(2), 34–39. https://doi.org/10.51983/ajcst-2018.7.2.1885