{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T10:43:55Z","timestamp":1773744235058,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Netw Distrib Comput"],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Wireless Body Area Networks (WBANs) hold immense potential in healthcare monitoring, but ensuring reliable data transmission is crucial. While the IEEE 802.15.4 standard offers low-power operation and basic security, its Contention-Based Access (CBA) mechanism can lead to packet collisions and reduced reliability, especially in congested scenarios. This paper proposes a novel approach to enhance reliability in 802.15.4 WBANs by incorporating a Greedy Spider Monkey Optimization Algorithm (GSMA). The GSMA mimics the intelligent foraging behaviour of spider monkeys, enabling dynamic channel selection and optimal transmission scheduling. Our approach aims to minimize packet collisions by selecting channels with lower traffic based on historical data and real-time network conditions; the GSMA reduces the likelihood of collisions and data loss. Secondly, the algorithm prioritizes critical data packets based on their urgency and channel availability, ensuring the timely delivery of essential medical information. Finally, by reducing collisions and optimizing scheduling, the GSMA helps maintain efficient data flow within the WBAN. This paper presents the design and implementation of the GSMA-based approach within the 802.15.4 framework. Simulation results are presented to evaluate the effectiveness of the proposed method in improving reliability, reducing packet loss, and enhancing overall network performance in WBANs. The findings demonstrate the potential of the GSMA to address the limitations of 802.15.4 and contribute to developing more reliable and efficient WBAN solutions for healthcare applications.<\/jats:p>","DOI":"10.1007\/s44227-024-00053-w","type":"journal-article","created":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T05:53:02Z","timestamp":1735451582000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhancement in Reliability of IEEE 802.15.4 WBAN Using Greedy Spider Monkey Algorithm"],"prefix":"10.1007","volume":"13","author":[{"given":"Umashankar","family":"Pandey","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saroj Kumar","family":"Chandra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8857-8290","authenticated-orcid":false,"given":"Narendra Kumar","family":"Dewangan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,12,29]]},"reference":[{"key":"53_CR1","doi-asserted-by":"publisher","unstructured":"Dewangan NK, Ghosh P, Rai JK (2018) Satellite data network jamming attack and prevention simulation model with omnet++. In: 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), pp 701\u2013707, https:\/\/doi.org\/10.1109\/ICCONS.2018.8662992","DOI":"10.1109\/ICCONS.2018.8662992"},{"key":"53_CR2","doi-asserted-by":"publisher","unstructured":"Haggag A (2023) Implementation and evaluation of ipv6 with compression and fragmentation for throughput improvement of internet of things networks over IEEE 802.15.4. Wireless Personal Communications 130(2):1449\u20131477. https:\/\/doi.org\/10.1007\/s11277-023-10340-4","DOI":"10.1007\/s11277-023-10340-4"},{"issue":"24","key":"53_CR3","doi-asserted-by":"publisher","first-page":"18697","DOI":"10.1007\/s00500-023-09123-7","volume":"27","author":"SS Hajam","year":"2023","unstructured":"Hajam SS, Sofi SA (2023) Resource management in fog computing using greedy and semi-greedy spider monkey optimization. Soft Comput 27(24):18697\u201318707. https:\/\/doi.org\/10.1007\/s00500-023-09123-7","journal-title":"Soft Comput"},{"key":"53_CR4","doi-asserted-by":"publisher","unstructured":"Hemavathi S, Latha B (2023) Hflfo: Hybrid fuzzy levy flight optimization for improving qos in wireless sensor network. Ad Hoc Networks 142:103110, https:\/\/doi.org\/10.1016\/j.adhoc.2023.103110, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1570870523000306","DOI":"10.1016\/j.adhoc.2023.103110"},{"key":"53_CR5","doi-asserted-by":"publisher","unstructured":"Kim JW, Kim J, Lee J (2023) Efficient cluster tree topology operation and routing for IEEE 802.15.4-based smart grid networks. Sensors 23(13). https:\/\/doi.org\/10.3390\/s23135950, https:\/\/www.mdpi.com\/1424-8220\/23\/13\/5950","DOI":"10.3390\/s23135950"},{"key":"53_CR6","doi-asserted-by":"publisher","unstructured":"Kumar M, Hussain S (2022) Simulation model for wireless body area network using castalia. In: 2022 1st International Conference on Informatics (ICI), pp 204\u2013207, https:\/\/doi.org\/10.1109\/ICI53355.2022.9786924","DOI":"10.1109\/ICI53355.2022.9786924"},{"key":"53_CR7","doi-asserted-by":"publisher","unstructured":"Mantilla I, Meyer F, Turau V (2023) A comprehensive performance comparison of IEEE 802.15.4 dsme and tsch in a realistic iot scenario for industrial applications. ACM Transactions on Internet of Things 4. https:\/\/doi.org\/10.1145\/3595188","DOI":"10.1145\/3595188"},{"key":"53_CR8","doi-asserted-by":"publisher","unstructured":"Mkongwa KG, Zhang C, Liu Q (2023) A reliable data transmission mechanism in coexisting IEEE 802.15.4-beacon enabled wireless body area networks. Wireless Personal Communications 128(2):1019\u20131040. https:\/\/doi.org\/10.1007\/s11277-022-09987-2","DOI":"10.1007\/s11277-022-09987-2"},{"key":"53_CR9","doi-asserted-by":"publisher","unstructured":"Muthuvel S, Rajagopal S, Subramaniam SK (2022) Analysis of security issues in wireless body area networks in heterogeneous networks. Sensors 22(19). https:\/\/doi.org\/10.3390\/s22197588, https:\/\/www.mdpi.com\/1424-8220\/22\/19\/7588","DOI":"10.3390\/s22197588"},{"key":"53_CR10","doi-asserted-by":"publisher","unstructured":"Qiu S, Cao R, Shi H, et\u00a0al (2023) 6wpsn: Reliable and efficient ipv6 packet broadcast protocol for IEEE 802.15.4-based wireless powered sensor networks. Peer-to-Peer Networking and Applications 16(2):589\u2013605. https:\/\/doi.org\/10.1007\/s12083-022-01421-5","DOI":"10.1007\/s12083-022-01421-5"},{"key":"53_CR11","doi-asserted-by":"publisher","unstructured":"Roy M, Biswas D, Aslam N et al (2022) Reinforcement learning based effective communication strategies for energy harvested wban. Ad Hoc Networks 132:102880, https:\/\/doi.org\/10.1016\/j.adhoc.2022.102880, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1570870522000737","DOI":"10.1016\/j.adhoc.2022.102880"},{"key":"53_CR12","doi-asserted-by":"publisher","unstructured":"Soni G, Selvaradjou K (2022) Optimal gts distribution to heterogeneous sensors in IEEE 802.15.4 network for healthcare monitoring applications. Person Ubiquit Comput 26(1):131\u2013153. https:\/\/doi.org\/10.1007\/s00779-021-01643-z","DOI":"10.1007\/s00779-021-01643-z"},{"key":"53_CR13","doi-asserted-by":"publisher","unstructured":"Yaghoubi M, Ahmed K, Miao Y (2022) Wireless body area network (wban): A survey on architecture, technologies, energy consumption, and security challenges. J Sensor Actuat Networks 11(4). https:\/\/doi.org\/10.3390\/jsan11040067, https:\/\/www.mdpi.com\/2224-2708\/11\/4\/67","DOI":"10.3390\/jsan11040067"},{"key":"53_CR14","doi-asserted-by":"publisher","unstructured":"Zhu YH, Jia L, Zhang Y (2022) Enhancing channel contention efficiency in IEEE 802.15.4 wireless networks. Sensors 22(4). https:\/\/doi.org\/10.3390\/s22041600, https:\/\/www.mdpi.com\/1424-8220\/22\/4\/1600","DOI":"10.3390\/s22041600"}],"container-title":["International Journal of Networked and Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44227-024-00053-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44227-024-00053-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44227-024-00053-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T18:19:58Z","timestamp":1752517198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44227-024-00053-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,29]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["53"],"URL":"https:\/\/doi.org\/10.1007\/s44227-024-00053-w","relation":{},"ISSN":["2211-7938","2211-7946"],"issn-type":[{"value":"2211-7938","type":"print"},{"value":"2211-7946","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,29]]},"assertion":[{"value":"18 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors give consent for the publication of identifiable details, which can include photograph(s) and\/or videos and\/or case history and\/or details within the text (Material) to be published in this journal.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"9"}}