<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Risk Analysis of Personal Data Loss in Wireless Sensor Networks</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Anastasiya</forename><surname>Doroshenko</surname></persName>
							<email>anastasia.doroshenko@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>S. Bandera str. 12</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kvitoslava</forename><surname>Obelovska</surname></persName>
							<email>kvitoslava.m@lpnu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>S. Bandera str. 12</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olha</forename><surname>Bilyk</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>S. Bandera str. 12</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Risk Analysis of Personal Data Loss in Wireless Sensor Networks</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">151B47693CEAD54BE2E228C90440346F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>GDPR, Wireless Sensor Network, MAC protocol, packet loss, personal data (O.Bilyk) ORCID: 0000-0002-7214-5108 (A.Doroshenko)</term>
					<term>0000-0002-8714-460X (K.Obelovska)</term>
					<term>0000-0002-3589-5401 (O.Bilyk)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Data protection has always been a key issue in wireless sensor networks. However, with the entry into force of the General Data Protection Regulation (GDPR) on 25 May 2018, new requirements to the collection, transmission, and protection of personal data have been added to the handling of data in wireless sensor networks. This is due to the spread of IoT and Wireless Body Area Sensor Networks (WBAN) in smart homes, smart cities, applications that track physical activity and human health where the most of the data collected, transmitted, and processed are not only personal but also fall into the category of sensitive data defined in the GDPR. Accordingly, the risks of losing this data are much higher, and minimizing the loss of packets with such data is a particularly urgent task. The methodology for improving the performance of networks, focused on reducing packet loss is given on the example of sensor networks. The bottleneck of sensor wireless networks is access to a shared physical medium. There are many protocols to control access to the physical environment, the protocol choice can be important in terms of packet loss. The L-MAC sensor network protocol, which belongs to the class of scheduled protocols, and the B-MAC protocol, which belongs to the category of contention based, were studied and compared. For specific networks, results of the research showed a significant dependence of the number packets lost on the choice of MAC-sublayer protocol and on the protocol settings. When configuring the protocol, the SlotDuration parameter was used as a variable during network optimization. Research conducted using the Discrete Event Simulator OMNeT++ and INET framework.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The use of sensor networks has spread particularly rapidly in the IoT, smart cities and homes, and in medicine and the daily lives of most people in recent years. More and more gadgets that we use every day collect certain data and share it with each other. Sensors of temperature and humidity, gas and water, heartbeat, and human pressure in real-time exchange information with our smartphones and computers, which allows you to remotely control your home, prevent emergencies, or monitor human well-being. However, with the entry into force on May 25, 2018, the General Data Protection Regulation (GDPR) added to the generally accepted requirements for data transmission over wireless networks, which are caused by the requirements of the GDPR. In particular, one of the main requirements is the security of the personal data of the user, which are processed by the controller.</p><p>The article considers the problem of improving the security of data transmission in wireless sensor networks, namely -the process of controlling access to the physical environment during the transmission of sensitive personal data of the user in real-time. To reduce the risk of losing personal data during transmission, it is necessary to minimize the number of lost packets, thus avoiding their retransmission.</p><p>The main contributions of this paper can be summarized as follows:</p><p>• identified the types of personal data and sensitive personal data transmitted in wireless sensor networks, as well as described the features of working with them by the GDPR;</p><p>• it is revealed that the performance of the MAC-sublayer for the wireless sensor network depends on the media access protocol category and is different for different network size; • it is also has been shown that that use of the protocol L-MAC, which belongs to the scheduled protocols, can provide total number of packets received 40 % more than when using the B-MAC protocol from the category of contention based; • based on simulation, the conditions under which the parameter optimization for the B-MAC and L-MAC protocols could significantly decrease packet loss on MAC-sublayer, are determined.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Works</head><p>With continuing developments in miniaturization and battery design, wireless sensor networks (WSN) are poised to become common technology in our daily lives. Low cost and flexibility of deployment make WSN well suited for a wide variety of military, environmental, healthcare, and commercial applications. Some WSN applications, such as monitoring patients in hospitals or weapons targeting in battlefront require end-to-end data confidentiality <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>.</p><p>Wireless transmission method in wireless sensor networks has put forward higher requirements for private protection technology.</p><p>Data protection in WSN is one of the main requirements that must be provided at the highest level. There are various methods and approaches for data protection in wireless sensor networks. However, since WSN are made up of many resource limited sensor nodes, they are typically unable to sustain the high volumes of data transmissions. In particular, to reduce communication overhead in term of number of messages transmitted in the sensor network and to reduce computational overhead due to arithmetical operation in providing encryption and decryption in private data aggregation, in <ref type="bibr" target="#b3">[4]</ref> proposed a privacy-preserving data aggregation in WSN.</p><p>In <ref type="bibr" target="#b4">[5]</ref> proposing to use in-network data aggregation, where sensor data from multiple nodes can be combined before being forwarded to neighboring nodes; and thus, energy consumption can be reduced significantly. But in situations where sensor nodes privacy is non-negotiable, data aggregation cannot be implemented at the cost of security. Therefore, there is a strong need for secure data aggregation protocols designed to fit the unique properties and considerable constraints of WSNs. In <ref type="bibr" target="#b4">[5]</ref> proposed a novel solution for the secure aggregation of data in WSNs based on probabilistic homomorphic encryption. By combining with a unique encoding function, their solution guarantees the privacy of sensor data, while also greatly reducing communication costs.</p><p>However, aggregation is a very energy-intensive operation that significantly reduces energy efficiency of WSN. Energy efficient privacy preserving data aggregation is important in power constrained wireless sensor networks. Existing hop by hop encrypted privacy preserving data aggregation protocols does not provide efficient solutions for energy constrained and security required WSN due to the overhead of performing power consuming decryption and encryption at the aggregator node for the data aggregation and the increased number of transmissions for achieving data privacy. The decryption of data at the aggregator node will increase the frequency of node compromise attack. Thereby aggregator node reveals large amounts of data to adversaries. Therefore, in <ref type="bibr" target="#b5">[6]</ref> was proposed privacy homomorphism-based privacy preservation protocol achieves non delayed data aggregation by performing aggregation on encrypted data. Thereby decreases the node compromise attack frequency. The main aim of research was to provide a secure data aggregation scheme which guarantees the privacy, authenticity and freshness of individual sensed data as well as the accuracy and confidentiality of the aggregated data without introducing a significant overhead on the battery limited sensors <ref type="bibr" target="#b6">[7]</ref>.</p><p>According to the packet loss problem of private protection algorithm based on slice technology, in <ref type="bibr" target="#b5">[6]</ref> was described the data private protection algorithm with redundancy mechanism, which ensures privacy by privacy homomorphism mechanism and guarantees redundancy by carrying hidden data. It selects the routing tree generated by Collection Tree Protocol as routing path for data transmission. By dividing at the source node, it adds the hidden information and also the privacy homomorphism. At the same time, the information feedback tree is established between the destination node and the source node. In addition, the destination node immediately sends the packet loss information and the encryption key via the information feedback tree to the source node. As a result, it improves the reliability and privacy of data transmission and ensures the data redundancy <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>.</p><p>The protection of personal data transmitted via WSN can be considered as a separate task. After all, a huge number of indicators that are transmitted from different sensors in a smart home or within a smart city can be used to identify users, analyze their behavior and make automated decisions. Starting from May 25, 2018, all these actions must be regulated by the GDPR and meet its requirements <ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref>.</p><p>A smart home is a building in which ubiquitous computing and information technology are deployed to expect and respond to the occupants' needs and to enhance their every day's life. To achieve this goal, smart homes rely on WSN for collecting all kind of personal data. Nevertheless, information privacy is one of the most sensitive issues for users nowadays. Therefore, it becomes of utmost importance to ensure this privacy in smart homes. This is particularly challenging because of the specific characteristics of WSN (e.g. limited resources: energy, storage, computation, communication) and the specific smart home environment. In <ref type="bibr" target="#b6">[7]</ref> overviewed existing techniques for content-based privacy and contextual-based privacy in smart home environments according to a set of proposed criteria.</p><p>Also, now Wireless Body Area Sensor Networks (WBAN) are becoming more and more popular and have shown great potential in real-time monitoring of the human body. With the promise of cost effective, unobtrusive, and unsupervised continuous monitoring, WBAN have attracted a wide range of monitoring applications such as healthcare, sport activity and rehabilitation systems. However, in using the advantage of WBAN, a number of challenging issues should be resolved. Besides open issues in WBAN such as standardization, energy efficiency and Quality of Service, security and privacy issues are one of the major concerns. Since these wearable systems control life-critical data, they must be secure. Nevertheless, addressing security in these systems faces some difficulties. WBANs inherit most of the well-known security challenges from WSN. However, typical characteristics of WBAN, such as severe resource constraints and harsh environmental conditions, pose additional unique challenges for security and privacy support. In <ref type="bibr" target="#b11">[12]</ref>, was surveyed major security and privacy issues and potential attacks in WBAN and explained an unsolved quality of service problem which has great potential to pose a serious security issue in WBANs.</p><p>For different applications of WSN, the loss of data packets has its risks. In particular, for emergency monitoring and prevention systems, the loss of a package containing critical data means that appropriate actions to prevent or respond to an emergency will not be taken in time <ref type="bibr" target="#b9">[10]</ref>. Loss of data in the WBAN medical direction can also lead to the fact that critical patient readings will not be processed in time, which can lead to fatal consequences.</p><p>On the other hand, according to the GDPR, data describing a person's whereabouts, physical and medical characteristics belong to sensitive personal data and must be protected with particular care. That is why the urgent task is to minimize data loss during simultaneous access to the physical environment in real-time <ref type="bibr" target="#b10">[11]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Method and techniques of research</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Enforcing GDPR regulation to wireless sensor networks</head><p>Data privacy in WSN remains a major concern of regulation bodies. The introduction of the European General Data Protection Regulation (GDPR) enables users to control how their data is accessed and processed, requiring consent from users before any data manipulation is carried out on their personal data by smart devices or cloud-hosted services (article 1 GDPR). The GDPR applies to the processing of personal data of data subjects in the Union in the context of the activities of an establishment of a controller or a processor in the Union, regardless of whether the processing takes place in the Union or not (article 3 GDPR) <ref type="bibr" target="#b8">[9]</ref>.</p><p>Following the privacy-by-design approach system should supporting GDPR compliance checking for smart devices. The privacy requirements of such applications are related to GDPR obligations of device and software systems operators (such as user consent, data protection, right to forget etc.) <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b13">14]</ref>.</p><p>In order to identify and minimize project data protection risks, it is recommended to conduct a Data Protection Impact Assessment (DPIA). DPIA is a way for organization to systematically and comprehensively analyze its processing and help to identify and minimize data protection risks.</p><p>DPIAs should consider compliance risks, but also broader risks to the rights and freedoms of individuals, including the potential for any significant social or economic disadvantage. The focus is on the potential for harm -to individuals or to society at large, whether it is physical, material or non-material. To assess the level of risk, a DPIA must consider both the likelihood and the severity of any impact on individuals <ref type="bibr" target="#b12">[13]</ref>.</p><p>A DPIA does not have to indicate that all risks have been eradicated. But it should help you document them and assess whether or not any remaining risks are justified.</p><p>DPIAs are a legal requirement for processing that is likely to be high risk. But an effective DPIA can also bring broader compliance, financial and reputational benefits, helping you demonstrate accountability and building trust and engagement with individuals. A DPIA may cover a single processing operation or a group of similar processing operations. A group of controllers can do a joint DPIA.</p><p>Table <ref type="table" target="#tab_0">1</ref> described the correlation between WSN, WBAN and GDPR obligations and rights <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>. Therefore, from the above we can conclude that for most tasks that use wireless sensor networks, risk assessment through the implementation of the DPIA is mandatory. Once the risks are identified, it is necessary to choose organizational and technical methods to minimize them. In particular, one of such methods is the selection of optimal parameters for data transmission via WSN to minimize the loss of packets with personal data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Wireless networking technologies for data transmission</head><p>Wireless networking technologies are based on the use of a shared environment for data transmission. That is why the bottleneck of any wireless local area networks, wireless sensor networks have access to the physical medium. Management of access to the physical environment is regulated by the Media Access Control (MAC) sublayer of network architecture. The primary task of any MAC protocol is to control the access of the nodes to the shared medium. There are four protocol categories as contention based, scheduling based, channel polling based, and hybrid <ref type="bibr" target="#b15">[16]</ref> and a large number of MAC protocols specifically designed for this sublayer in wireless sensor networks <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b17">18]</ref>. For research in this paper we have chosen the two most important categories: contention based and scheduling based. In the contention-based protocols the channel access policy is based on competition. Each time a node needs to send a packet, it tries to access the channel. These protocols cannot provide guaranteed access to the network. Schedule-based protocols can be scheduling packets on nodes or scheduling nodes to access a channel. Some of these protocols take battery charge into account when scheduling nodes.</p><p>We will focus in detail on the study of two protocols B-MAC and L-MAC, which respectively belong to contention-oriented and scheduling based.</p><p>B-MAC (Berkeley MAC) protocol is a carrier sense media access protocol that provides effective collision avoidance, high channel utilization and low power operation. L-MAC (Lightweight MAC) is an energy-efficient medium access protocol based on time-division multiple access to give nodes in the WSN the opportunity to communicate collision-free.</p><p>WSN optimization requires a lot of time and money if you do it directly with real sensors. That is why it is important to create models of wireless sensor networks for their research and optimization. As a tool we used OMNeT ++ Discrete Event Simulator using INET framework that contains the implementation of MAC protocols for wireless sensor networks <ref type="bibr" target="#b18">[19,</ref><ref type="bibr" target="#b19">20]</ref>.</p><p>There are many network parameters, which are studied by various authors, such as the data transmission time <ref type="bibr" target="#b20">[21]</ref>, the number of retries and conflicts <ref type="bibr" target="#b21">[22]</ref>, reliability <ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref>, data loss <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b26">27]</ref>, network throughput, backoff time and delay <ref type="bibr" target="#b24">[25,</ref><ref type="bibr" target="#b27">[28]</ref><ref type="bibr" target="#b28">[29]</ref><ref type="bibr" target="#b29">[30]</ref>, energy consumption <ref type="bibr" target="#b30">[31]</ref>, etc. We mainly focused on how to reduce data loss. We compare B-MAC and L-MAC protocols in terms of the number of packets carried by the network. We want to find the values of the parameters for each protocol that lead to the best performance of the network in a particular scenario. We want to minimize packet loss, so we need to optimize the number of packets received by the server. Optimization of protocols will be performed depending on the parameter Slot Duration. For both protocols, we will select this parameter specifically for the available number of nodes in the network. We will find the value of the Slot Duration, at which the server will receive the maximum number of packets during the network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results of Experiment</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">The architecture of wireless sensor networks</head><p>We will conduct our experiment using two networks, which include 5 (Figure <ref type="figure" target="#fig_1">1</ref>) and 10 (Figure <ref type="figure" target="#fig_1">1</ref>) sensor nodes that send data packets to the server.</p><p>To begin with, we will conduct an experiment with both protocols, where each sensor will send data packets to the server with an interval of 1 second. The start time of sending the first packet of each node is determined by the exponential distribution in the range from 0 to    Analysis of the results shows that for the studied networks, the use of the L-MAC protocol provided more packets than the use of the B-MAC protocol for both networks. For a network with 5 nodes by 40%, and with 10 nodes -by 8%.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Optimizing for packet loss</head><p>Now we implement the process of optimizing the number of packets received by the server. The scenario of the experiment is as follows. For each protocol, change the slotDuration parameter in 0.01 second increments from 0.01 seconds to 1 second and count the number of packets the server will receive in 100 seconds of network operation. As mentioned earlier, repeat this experiment 10 times to increase the sample. With the best slotDuration parameter, the number of received packets by the server will be the largest, respectively, the number of lost packets is minimal.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.1.">B-MAC protocol</head><p>In the OMNET ++ environment for the B-MAC protocol, the condition of the above-described parameter changes and time constraints are set as follows: **.mac.slotDuration = ${slotDuration=0.01..1 step 0.01}s sim-time-limit = 100s repeat = 10</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">sensors in the network</head><p>The results of starting the simulator in the above scenario using the B-MAC protocol for a network with 5 nodes are shown in Figure <ref type="figure" target="#fig_4">4</ref> and Table <ref type="table" target="#tab_1">3</ref>.   <ref type="figure" target="#fig_4">4</ref> illustrates the significant dependence of packets number received by the server, depending on the variable SlotDuration. We perform optimization in order to maximize the number of received packets. And as can be seen from Figure <ref type="figure" target="#fig_4">4</ref>, the maximum number of packets received by the server averages 392 packets (392 ± 33.2). Before optimization, according to the previous experiment, this value was 356 packets (see Figure <ref type="figure" target="#fig_4">4</ref> or Figure <ref type="figure">3 a</ref>)). For the network, which includes 5 sensors, when using the B-MAC protocol, the best option is to set the parameter Slot Duration = 0.16 seconds. At this value of the Slot Duration parameter, the number of received packets by the server will be the maximum and 10% more than before optimization. 10 sensors in the network</p><p>In Figure <ref type="figure" target="#fig_6">5</ref> shows the results of a similar experiment for a network with 10 sensor nodes. The graph on fig 5 <ref type="figure">.</ref> shows that the best value of the SlotDuration parameter for this network is 0.07 seconds. The average number of packets received by the server, with a SlotDuration value of 624 packets. An interval of 0.06 seconds also gives a very close to optimal number of received packets. The data of both optimization experiments, as well as the results of the optimization results are summarized in Table <ref type="table" target="#tab_1">3</ref>. Comparison of the results before and after optimization shows that for the B-MAC protocol for both five-and 10-node networks, the number of packets received by the server due to optimization increased significantly, by 10% and 17% respectively.</p><p>We will conduct similar studies for the L-MAC protocol.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.2.">L-MAC protocol</head><p>For the L-MAC protocol, the change of the SlotDuration parameter will be set in the same way as in the experiment with the B-MAC protocol: **.mac.slotDuration = ${slotDuration=0.01..1 step 0.01}s sim-time-limit = 100s repeat = 10</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">sensors in the network</head><p>Figure <ref type="figure" target="#fig_7">6</ref> presents the results of the simulator in the script, which allows to maximize the number of packets received by the server using the L-MAC protocol. The variable parameter is the value of SlotDuration.</p><p>According to the graph on fig. <ref type="figure" target="#fig_7">6</ref> when using the L-MAC protocol in a network with 5 nodes, the maximum value of the average number of received packets 497 was obtained for both Slot Duration = 0.05 and Slot Duration = 0.1 seconds, which is set by default. That is, optimization in this case does not win. However, the nature of the curve indicates that a further increase in Slot Duration will lead to a sharp decrease in the number of received packets.  The best value of the SlotDuration parameter for this network is 0.05 seconds. The number of packets received by the server in this case is 994. This is 72% more than when the SlotDuration value is 0.1 second, set by default.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Discussions</head><p>As shown by the results in Figures <ref type="figure">3a) and 3b</ref>) for the studied sensor networks, the L-MAC protocol, which belongs to the class of scheduled protocols, provides less packet loss on MACsublayer than when using the B-MAC protocol, which belongs to the category of contention based. Research shows for a network with 10 nodes, the number of received packets increased by 40 %, for networks with 5 nodes -by 8 %.</p><p>For quantitative analysis of the optimization results, the default value of the SlotDuration parameter was set to the default value of SlotDuration in the Simulator OMNeT ++ equal to 0.1 second. Figures <ref type="figure" target="#fig_8">4-7</ref> illustrate the optimization results depending on the SlotDuration parameter and illustrate the significant effect of this parameter on the number of lost packets for both the B-MAC protocol and the L-MAC protocol. Data analysis shows that this effect is different for networks with different numbers of nodes.</p><p>For the B-MAC protocol for both five-and 10-node networks, the number of packets received by the server due to optimization increased significantly, by 10% and 17% respectively.</p><p>For the L-MAC for five-node networks, optimization does not give a gain, because the accepted base value of SlotDuration in this configuration also provides the optimal result. Regarding the L-MAC protocol for ten-node networks, the optimization gave a significant improvement, namely an increase in the number of packets received by the server by as much as 72%.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>Among the huge amount of data transmitted through wireless sensor networks, a significant part of personal data of people is transmitted, which, according to the GDPR, require special protection. The study concluded that it is particularly important for WSN and WBAN to identify the risks associated with the collection and transmission of sensitive personal data (such as information about a person's physical condition, indicators that determine his health, coordinates and location, etc.). To do this, it is advisable to identify all possible risks associated with compliance with the GDPR using DPIA.</p><p>The methodology for improving the performance of networks, focused on reducing packet loss, is given on the example of sensor networks. The bottleneck of sensor wireless networks, like other wireless networks, is access to a shared physical medium. There are many protocols to control access to the physical environment that can be divided into four protocol categories as contention based, scheduling based, channel polling based, and hybrid. Analysis of different categories protocol showed that for specific networks, the choice categories protocol can be important in terms of packet loss. Thus, for the studied sensor networks, the L-MAC protocol, which belongs to the class of scheduled protocols, provides less packet loss on MAC-sublayer than when using the B-MAC protocol, which belongs to the category of contention based. Research conducted using the Discrete Event Simulator OMNeT++ and INET framework show that for a network with 5 nodes, the number of received packets increased by 40 %.</p><p>Optimization of protocol settings allowed to reduce the number of lost packets considerably. The SlotDuration parameter was used as a variable during optimization.</p><p>Experiments have shown that for a certain type of measurement, the number of packets received by the server through optimization increased by both B-MAC and L-MAC by 17% and 72%, respectively.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>1 second: *.sensor*.app[0].sendInterval = 1s *.sensor*.app[0].startTime = exponential(1s). For both B-MAC [19] and L-MAC [20], we will use a value of 0.1 second as the slotDuration parameter: **.wlan[*].mac.slotDuration = 0.1s, and the length of the message -10 Byte: *.sensor*.app[0].messageLength = 10 Byte.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Network structure with 5 sensor nodes</figDesc><graphic coords="7,134.30,105.45,336.00,213.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Network structure with 10 sensor nodesTo increase the size of the statistical sample, we will repeat each experiment 10 times and then find and analyze the arithmetic mean of the number of packets delivered to the server.</figDesc><graphic coords="7,134.90,350.53,334.80,247.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Table 2 Figure 3 :</head><label>23</label><figDesc>Comparison of the number of received packets for B-MAC and L-MAC protocols 5 Total number of packets received: a) for the network of 5 sensor nodes; b) for the network of 10 sensor nodes</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: B-MAC statistics for a network of 5 nodes</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure</head><label></label><figDesc>Figure4illustrates the significant dependence of packets number received by the server, depending on the variable SlotDuration. We perform optimization in order to maximize the number of received packets. And as can be seen from Figure4, the maximum number of packets received by the server averages 392 packets (392 ± 33.2). Before optimization, according to the previous experiment, this value was 356 packets (see Figure4or Figure3 a)). For the network, which includes 5 sensors, when using the B-MAC protocol, the best option is to set the parameter Slot Duration = 0.16 seconds. At this value of the Slot Duration parameter, the number of received packets by the server will be the maximum and 10% more than before optimization.</figDesc><graphic coords="9,90.05,185.13,423.85,200.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: B-MAC statistics for a network of 10 nodes</figDesc><graphic coords="10,106.55,191.78,391.20,216.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Statistics for L-MAC protocol in a network with 5 nodes Find the optimal SlotDuration parameter for a network with 10 nodes. 10 sensors in the network</figDesc><graphic coords="11,107.30,118.10,390.00,206.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Statistics for L-MAC protocol in a network with 10 nodes</figDesc><graphic coords="11,103.55,392.26,397.20,225.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Correlation between WSN, WBAN and GDPR obligations and rights</figDesc><table><row><cell></cell><cell>GDPR obligations and rights</cell><cell>Article of</cell><cell>WSN</cell><cell>WBAN</cell></row><row><cell></cell><cell></cell><cell>GDPR</cell><cell></cell></row><row><cell cols="2">Right to be informed</cell><cell>Article 15</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Right of access</cell><cell>Article 15</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Right to rectification</cell><cell>Article 16</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Right to be forgotten</cell><cell>Article 17</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Right to restriction of processing</cell><cell>Article 18</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Right to be notified about rectification or erasure</cell><cell>Article 19</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Right to data portability</cell><cell>Article 20</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Right to object</cell><cell>Article 21</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Right to deter automated decision-making</cell><cell>Article 22</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Subject`s consent</cell><cell>Article 7</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Child consent</cell><cell>Article 8</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Privacy by design</cell><cell>Article 25</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Breach Notification within 72h</cell><cell>Article 33</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Data Privacy Impact Assessment</cell><cell>Article 35</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">DPIA is recommended to be performed if the system:</cell><cell></cell><cell></cell></row><row><cell>•</cell><cell>use innovative technology;</cell><cell></cell><cell></cell></row><row><cell>•</cell><cell cols="3">use profiling or special category data to decide on access to services;</cell></row><row><cell>•</cell><cell>profile individuals on a large scale;</cell><cell></cell><cell></cell></row><row><cell>•</cell><cell>process biometric data;</cell><cell></cell><cell></cell></row><row><cell>•</cell><cell>process genetic data;</cell><cell></cell><cell></cell></row><row><cell>•</cell><cell cols="2">match data or combine datasets from different sources;</cell><cell></cell></row><row><cell>•</cell><cell cols="4">collect personal data from a source other than the individual without providing them with</cell></row><row><cell cols="2">a privacy notice;</cell><cell></cell><cell></cell></row><row><cell>•</cell><cell>track individuals' location or behavior;</cell><cell></cell><cell></cell></row><row><cell>•</cell><cell cols="2">profile children or target marketing or online services at them;</cell><cell></cell></row><row><cell>•</cell><cell cols="4">process data that might endanger the individual's physical health or safety in the event of</cell></row><row><cell cols="2">a security breach.</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 3</head><label>3</label><figDesc>Comparison of the number of received packets for B-MAC and L-MAC protocols without and with</figDesc><table><row><cell cols="3">SlotDuration parameter optimization</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell cols="2">5 sensor nodes</cell><cell></cell><cell></cell><cell cols="2">10 sensor nodes</cell><cell></cell></row><row><cell>Protocol</cell><cell cols="2">B-MAC</cell><cell cols="2">L-MAC</cell><cell cols="2">B-MAC</cell><cell cols="2">L-MAC</cell></row><row><cell></cell><cell cols="4">optimization optimization</cell><cell cols="2">optimization</cell><cell cols="2">optimization</cell></row><row><cell>SlotDuration, sec</cell><cell>0,1</cell><cell>0,16</cell><cell>0,1</cell><cell>0,05</cell><cell>0,1</cell><cell>0,07</cell><cell>0,1</cell><cell>0,05</cell></row><row><cell>The number of packets</cell><cell>356</cell><cell>392</cell><cell>497</cell><cell>497</cell><cell>532</cell><cell>624</cell><cell>576</cell><cell>994</cell></row><row><cell>received by the server</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Acknowledgements</head><p>This work was realized within the framework of the program Erasmus+ Jean Monnet Module "Data Protection in EU"' (611692-EPP-1-2019-1-UAEPPJMO-MODULE).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Security and Privacy in Wireless Body Area Networks for Health Care Applications</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Javadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Razzaque</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-36169-2_6</idno>
		<idno>-642-36169-2_6</idno>
		<ptr target="https://doi.org/10.1007/978-3-642-36169-2_6" />
	</analytic>
	<monogr>
		<title level="m">Wireless Networks and Security: Issues, Challenges and Research Trends</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Khan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A.-S</forename><surname>Khan Pathan</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg; Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="165" to="187" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Analysis of the Distribution of COVID-19 in Italy Using Clustering Algorithms</title>
		<author>
			<persName><forename type="first">A</forename><surname>Doroshenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/DSMP47368.2020.9204202</idno>
		<idno>doi: 10.1109/DSMP47368.2020.9204202</idno>
		<ptr target="https://doi.org/10.1109/DSMP47368.2020.9204202" />
	</analytic>
	<monogr>
		<title level="m">IEEE Third International Conference on Data Stream Mining &amp; Processing (DSMP)</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="325" to="328" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Forest Fire Monitoring System Based on UAV Team, Remote Sensing, and Image Processing</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sherstjuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zharikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Sokol</surname></persName>
		</author>
		<idno type="DOI">10.1109/DSMP.2018.8478590</idno>
		<ptr target="https://doi.org/10.1109/DSMP.2018.8478590" />
	</analytic>
	<monogr>
		<title level="m">IEEE Second International Conference on Data Stream Mining &amp; Processing (DSMP)</title>
				<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="590" to="594" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Preserving data and key privacy in Data Aggregation for Wireless Sensor Networks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Akila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sheela</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCCT2.2017.7972286</idno>
		<ptr target="https://doi.org/10.1109/ICCCT2.2017.7972286" />
	</analytic>
	<monogr>
		<title level="m">2017 2nd International Conference on Computing and Communications Technologies (ICCCT)</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="282" to="287" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">PEPPDA: Power efficient privacy preserving data aggregation for wireless sensor networks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Jose</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Princy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Jose</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICE-CCN.2013.6528518</idno>
		<ptr target="https://doi.org/10.1109/ICE-CCN.2013.6528518" />
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)</title>
				<imprint>
			<date type="published" when="2013">2013. 2013</date>
			<biblScope unit="page" from="330" to="336" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Research on data privacy protection algorithm with homomorphism mechanism based on redundant slice technology in wireless sensor networks</title>
		<author>
			<persName><forename type="first">P</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Dong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wang</surname></persName>
		</author>
		<idno type="DOI">10.23919/j.cc.2019.05.012</idno>
		<ptr target="https://doi.org/10.23919/j.cc.2019.05.012" />
	</analytic>
	<monogr>
		<title level="j">China Communications</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="158" to="170" />
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">An overview of privacy preserving techniques in smart home Wireless Sensor Networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alami</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Benhlima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">10th International Conference on Intelligent Systems: Theories and Applications (SITA)</title>
				<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Optimized Secure Data Aggregation in Wireless Sensor Networks</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Thompson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Samanthula</surname></persName>
		</author>
		<idno type="DOI">10.1109/PST.2017.00055</idno>
		<ptr target="https://doi.org/10.1109/PST.2017.00055" />
	</analytic>
	<monogr>
		<title level="m">2017 15th Annual Conference on Privacy, Security and Trust (PST)</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="394" to="3942" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Application of global optimization methods to increase the accuracy of classification in the data mining tasks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Doroshenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CEUR-WS.Org</title>
		<imprint>
			<biblScope unit="volume">2353</biblScope>
			<biblScope unit="page" from="98" to="109" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<ptr target="https://op.europa.eu/en/publicationdetail/-/publication/3e485e15-11bd-11e6-ba9a-01aa75ed71a1/language-en" />
		<title level="m">free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance)</title>
				<imprint>
			<date type="published" when="2016-04">April 2016. 2020</date>
		</imprint>
	</monogr>
	<note>Regulation (EU) 2016/679 of the European Parliament and of the Council of 27. Op.europa.eu</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Risks of Loss of Personal Data in the Process of Sending and Printing Documents</title>
		<author>
			<persName><forename type="first">O</forename><surname>Tymchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Havrysh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Khamula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Havrysh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CEUR-WS.org</title>
		<imprint>
			<biblScope unit="volume">2805</biblScope>
			<biblScope unit="page" from="373" to="384" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Security and Privacy in Wireless Body Area Networks for Health Care Applications</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Javadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Razzaque</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-36169-2_6</idno>
		<ptr target="https://doi.org/10.1007/978-3-642-36169-2_6" />
	</analytic>
	<monogr>
		<title level="m">Wireless Networks and Security, Signals and Communication Technology</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Khan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Khan Pathan</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">GDPR Interference With Next Generation 5G and IoT Networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rizou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Alexandropoulou-Egyptiadou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">E</forename><surname>Psannis</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2020.3000662</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="108052" to="108061" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Enforcing GDPR regulation to vehicular 5G communications using edge virtual counterparts</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ortiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Fernández</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sanchez-Iborra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Bernabe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Santa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Skarmeta</surname></persName>
		</author>
		<idno type="DOI">10.1109/5GWF49715.2020.9221248</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 3rd 5G World Forum (5GWF)</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="121" to="126" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Preserving Privacy in Personal Data Processing</title>
		<author>
			<persName><forename type="first">C</forename><surname>Saatci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename></persName>
		</author>
		<idno type="DOI">10.1109/ubmyk48245.2019.8965432</idno>
	</analytic>
	<monogr>
		<title level="m">1st International Informatics and Software Engineering Conference (UBMYK)</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Medium Access Control Protocols for Wireless Sensor Networks Classifications and Cross-Layering</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Althobaiti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abdullah</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.procs.2015.09.070</idno>
		<ptr target="https://doi.org/10.1016/j.procs.2015.09.070" />
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">65</biblScope>
			<biblScope unit="page" from="4" to="16" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Contention and TDMA-based MAC wireless in scheduled and unscheduled settings</title>
		<author>
			<persName><forename type="first">S</forename><surname>Alsamer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Aleesa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Saad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Mohammed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Albadran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ARPN Journal of Engineering and Applied Sciences</title>
		<idno type="ISSN">1819-6608</idno>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="2859" to="2865" />
			<date type="published" when="2016-03">march 2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Design by Improved Energy Efficiency MAC Protocol based on Wireless Sensor Networks</title>
		<author>
			<persName><surname>Cs Lee</surname></persName>
		</author>
		<idno type="DOI">10.13067/JKIECS.2017.12.3.439</idno>
		<idno>2288-2189</idno>
		<ptr target="http://dx.doi.org/10.13067/JKIECS.2017.12.3.439" />
	</analytic>
	<monogr>
		<title level="j">Journal of the KIECS</title>
		<idno type="ISSN">1975- 8170</idno>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="439" to="444" />
			<date type="published" when="2017">Jun. 30 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<ptr target="https://doc.omnetpp.org/inet/api-current/neddoc/inet.linklayer.lmac.LMac.html" />
		<title level="m">OMNeT++ Documentation: BMAC protocol</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<ptr target="https://doc.omnetpp.org/inet/api-current/neddoc/inet.linklayer.bmac.BMac.html" />
		<title level="m">OMNeT++ Documentation: LMAC protocol</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Analysis of behavior of MAC protocol and Simulation of different MAC protocol and proposal protocol for wireless sensor network</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">B</forename><surname>Agnihotri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pandey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Verma</surname></persName>
		</author>
		<idno type="DOI">10.1109/CIACT.2018.8480373</idno>
		<ptr target="https://doi.org/10.1109/CIACT.2018.8480373" />
	</analytic>
	<monogr>
		<title level="m">2018 4th International Conference on Computational Intelligence &amp; Communication Technology (CICT)</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">New Proposals to Improve a MAC Layer Protocol in Wireless Sensor Networks</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Ruiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Macià</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Calleja</surname></persName>
		</author>
		<idno type="DOI">10.15388/Informatica.2019.199</idno>
		<ptr target="https://doi.org/10.15388/Informatica.2019.199" />
	</analytic>
	<monogr>
		<title level="j">Informatica</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="91" to="116" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">A MAC protocol for reliable communication in low power body area networks</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Prabh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Royo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tennina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Olivares</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.sysarc.2016.04.001</idno>
		<ptr target="https://doi.org/10.1016/j.sysarc.2016.04.001" />
	</analytic>
	<monogr>
		<title level="j">Journal of Systems Architecture</title>
		<imprint>
			<biblScope unit="volume">66</biblScope>
			<biblScope unit="page" from="1" to="13" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Modelling Reliability Characteristics of Technical Equipment of Local Area Computer Networks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Teslyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sydor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Karovič</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pavliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kazymyra</surname></persName>
		</author>
		<idno type="DOI">10.3390/electronics10080955</idno>
		<ptr target="https://doi.org/10.3390/electronics10080955" />
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Time-Critical Transmission Protocols in Wireless Sensor Networks: A Survey</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Raut</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">P</forename><surname>Khandait</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Shrawankar</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-981-13-5953-8_30</idno>
		<ptr target="https://doi.org/10.1007/978-981-13-5953-8_30" />
	</analytic>
	<monogr>
		<title level="m">Emerging Research in Computing, Information, Communication and Applications</title>
				<editor>
			<persName><forename type="first">N</forename><forename type="middle">R</forename><surname>Shetty</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><forename type="middle">M</forename><surname>Patnaik</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Nagaraj</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><forename type="middle">N</forename><surname>Hamsavath</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Nalini</surname></persName>
		</editor>
		<meeting><address><addrLine>Singapore, Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="351" to="364" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Piecewiselinear Approach for Medical Insurance Costs Prediction using SGTM Neural-Like Structure</title>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Izonin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kryvinska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Chopyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lotoshynska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Danylyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CEUR-WS.org</title>
		<imprint>
			<biblScope unit="volume">2255</biblScope>
			<biblScope unit="page" from="170" to="179" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">A digital watermarking scheme based on autoassociative neural networks of the geometric transformations model</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Tsymbal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/DSMP.2016.7583547</idno>
		<ptr target="https://doi.org/10.1109/DSMP.2016.7583547" />
	</analytic>
	<monogr>
		<title level="m">IEEE First International Conference on Data Stream Mining Processing (DSMP)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="231" to="234" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<title level="m" type="main">Performance Analysis of IEEE 802.11 EDCA for a Different Number of Access Categories and Comparison with DCF</title>
		<author>
			<persName><forename type="first">O</forename><surname>Leontyeva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Obelovska</surname></persName>
		</author>
		<editor>A. Kwiecień, P. Gaj, P. Stera</editor>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="95" to="104" />
			<pubPlace>Berlin Heidelberg; Berlin, Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">An Adaptive ACs Number Adjusting Algorithm for IEEE 802.11 EDCA</title>
		<author>
			<persName><forename type="first">O</forename><surname>Panova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Obelovska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS&apos;2015)</title>
				<meeting>the 8th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS&apos;2015)<address><addrLine>Warsaw, Poland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015-09-26">24-26 September 2015</date>
			<biblScope unit="page" from="823" to="826" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Implementation of a Modified Wireless Sensor Network MAC Protocol for Critical Environments</title>
		<author>
			<persName><forename type="first">V</forename><surname>Richert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Issac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Israr</surname></persName>
		</author>
		<idno type="DOI">10.1155/2017/2801204</idno>
		<ptr target="https://doi.org/10.1155/2017/2801204" />
	</analytic>
	<monogr>
		<title level="j">Wireless Communications and Mobile Computing</title>
		<imprint>
			<biblScope unit="volume">2017</biblScope>
			<biblScope unit="page">2801204</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">A MAC Protocol of Concurrent Scheduling Based on Spatial-Temporal Uncertainty for Underwater Sensor Networks</title>
		<author>
			<persName><forename type="first">X</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Du</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.1155/2021/5558078</idno>
		<ptr target="https://doi.org/10.1155/2021/5558078" />
	</analytic>
	<monogr>
		<title level="j">Journal of Sensors</title>
		<imprint>
			<biblScope unit="page">5558078</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
