An Intelligent and Pervasive Surveillance System for Home Security

Alessandro Longheu, Vincenza Carchiolo, Michele Malgeri, Giuseppe Mangioni


Domotics is a promising area for intelligent and pervasive applications that aims at achieving a better quality of life. Harnessing modern technologies is valuable in many contexts, in particular in home surveillance scenario, where people safety or security might be threatened. Modern home security systems endorse monitoring as well as control functions in a remote fashion, e.g. via devices as a laptops, PDAs, or cell phones, thus implementing the pervasive computing paradigma; moreover, the intelligence is now often embedded into modern applications, e.g. surveillance systems could adapt to the environment through a self-learning algorithm. This work presents an intelligent and pervasive surveillance system for home and corporate security based on the ZigBee protocol which detects and classifies intrusions discarding false positives, also providing remote control and cameras live streaming. Results of tests in different environments show the effectiveness of the proposed system.


Home surveillance systems; pervasive systems; ZigBee protocol

Full Text:



Jacobson, J., Understanding Home Automation, Electronic House, 14(6):18-21, 2001

Rodden, Tom and Benford, Steve, The evolution of buildings and implications for the design f ubiquitous domestic environments, CHI '03: Proceedings of the SIGCHI conference on uman factors in computing systems, ACM, New York, USA, pp. 9-16,2003

Lorente, S., Key issues regarding Domotic applications, International Conference on Information nd Communication Technologies: From Theory to Applications, pp. 121 - 122, 2004

Park, Sang Hyun and Won, So Hee and Lee, Jong Bong and Kim, Sung Woo, Smart homedigitally ngineered domestic life, Personal and Ubiquitous Computing, Springer London, (3):189-196, 2003

Luo, R.C. and Hsu, T.Y. and Lin, T.Y. and Su, K.L., The development of intelligent home ecurity robot, Mechatronics, 2005. ICM '05. IEEE International Conference on, pp. 422-427, 2005

European Institute for Corporate Security,

Chunduru, V. and Subramanian, N., Perimeter-Based High Performance Home Security System, onsumer Electronics, 2007. ISCE 2007. IEEE International Symposium on, pp. 1 -7, 007

Russell, Stuart J. and Norvig, Peter, Artificial intelligence: a modern approach, Prentice-Hall, nc., 2010

Nieuwdorp, Eva, The pervasive discourse: an analysis, Comput. Entertain., ACM, New York, Y, USA, vol. 5(2):13-13, 2007

Bell, Genevieve and Dourish, Paul, Yesterday's tomorrows: notes on ubiquitous computing's ominant vision, Personal Ubiquitous Comput., Springer-Verlag, London, UK, 11(2):133-143, 007

Jun Hou and Chengdong Wu and Zhongjia Yuan and Jiyuan Tan and Qiaoqiao Wang and un Zhou, Research of Intelligent Home Security Surveillance System Based on ZigBee, Intelligent nformation Technology Application Workshops, International Symposium on, IEEE omputer Society, Los Alamitos, CA, USA, pp. 554-557, 2008

Krausz, Barbara and Herpers, Rainer, Event detection for video surveillance using an expert ystem, AREA '08: Proceeding of the 1st ACM workshop on Analysis and retrieval of vents/actions and workflows in video streams, Vancouver, British Columbia, Canada, ACM, ew York, NY, USA, pp. 49-56,2008

Want, Roy and Pering, Trevor, System challenges for ubiquitous & pervasive computing, CSE '05: Proceedings of the 27th international conference on Software engineering, St. Louis, O, USA, ACM, New York, NY, USA, pp. 9-14,2005

McCullough, Malcolm, Digital Ground: Architecture, Pervasive Computing, and Environmental nowing, MIT Press, Cambridge, MA, USA, 2004

Weiser, M. and Gold, R. and Brown, J. S., The origins of ubiquitous computing research at ARC in the late 1980s, IBM Syst. Journal,IBM Corp., Riverton, NJ, USA, 38(4):693-696, 999

Weiser, Mark, The computer for the 21st century, SIGMOBILE Mob. Comput. Commun. ev., ACM, New York, NY, USA, 3(3):3-11, 1999

Hansmann, Uwe and Nicklous, Martin S. and Stober, Thomas, Pervasive computing handbook, pringer-Verlag New York, Inc., New York, NY, USA, 2011

Miori, Vittorio and Russo, Dario and Aliberti, Massimo, Domotic technologies incompatibility ecomes user transparent, Commun. ACM, New York, NY, USA, 53(1):153-157, 2010

Egan, D., The emergence of ZigBee in building automation and industrial control, Computing & Control Engineering Journal, 16(2):14-19, 2005

Fukui Kiyoshi and Tanimoto Akira and Fukunaga Shigeru, ZigBee Technology for Low- ost and Low-Power Radio Communication Systems, Journal of the Institute of Electronics, nformation and Communication Engineers, vol. 88(1):40-45, 2005

Wang Dong and Zhang Jin-rong and Wei Yan, Building Wireless Sensor Networks (WSNs) y Zigbee Technology, Journal of Chongqing University (Natural Science Edition), 29(8):95- 8, 2006

Li Cai and Nina Dai, The Home Security System Based on ZigBee Technology, Wireless ommunications Networking and Mobile Computing (WiCOM), 2010 6th International Conference n, pp. 1-2, 2010

The ZigBee Protocol OB/EL, sp,, 2009

Carchiolo V. et al, Pervasive home security: an intelligent domotics application, Intelligent istributed Computing IV (IDC 2010) conference, pp. 145-154, 2010

Danilo Torrisi, Sistema di sicurezza perimetrale con allarmistica e controllo a distanza, 2009, ech. Report - Dipartimento di Ingegneria Informatica e delle Telecomunicazioni - Facolta' i Ingegneria - Universita' di Catania

Qt Nokia Framework,


OpenCV libraries,

Brian R. Williams and Ming Zhang, Multiple Dimension Chrominance Model for Background ubtraction, Computational Intelligence, pp. 438-443, 2005

Lee, Dar-Shyang, Effective Gaussian Mixture Learning for Video Background Subtraction, EEE Trans. Pattern Anal. Mach. Intell., IEEE Computer Society, Washington, DC, USA, 7(5):827-832, 2005

Eugster, Patrick Th. and Felber, Pascal A. and Guerraoui, Rachid and Kermarrec, Anne- arie, The many faces of publish/subscribe, ACM Computing Survey, ACM, New York, NY, SA, 35(2):114-131, 2003

Pohja, Mikko, Server push with instant messaging, SAC '09: Proceedings of the 2009 ACM ymposium on Applied Computing, Honolulu, Hawaii, ACM, New York, NY, USA, pp. 653- 58, 2009

Apple Push Notification Service,

Introducing JSON, 2011,

Cocoa Touch Framework,

Philip Orlik and Jinyun Zhang and Bharat Bhargava and Gang Ding and Gang Ding and afer Sahinoglu and Zafer Sahinoglu, Reliable Broadcast in ZigBee Networks, In Proceedings f SECON IEEE Conference, 2005


Copyright (c) 2017 Alessandro Longheu, Vincenza Carchiolo, Michele Malgeri, Giuseppe Mangioni

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

CC-BY-NC  License for Website User

Articles published in IJCCC user license are protected by copyright.

Users can access, download, copy, translate the IJCCC articles for non-commercial purposes provided that users, but cannot redistribute, display or adapt:

  • Cite the article using an appropriate bibliographic citation: author(s), article title, journal, volume, issue, page numbers, year of publication, DOI, and the link to the definitive published version on IJCCC website;
  • Maintain the integrity of the IJCCC article;
  • Retain the copyright notices and links to these terms and conditions so it is clear to other users what can and what cannot be done with the  article;
  • Ensure that, for any content in the IJCCC article that is identified as belonging to a third party, any re-use complies with the copyright policies of that third party;
  • Any translations must prominently display the statement: "This is an unofficial translation of an article that appeared in IJCCC. Agora University  has not endorsed this translation."

This is a non commercial license where the use of published articles for commercial purposes is forbiden. 

Commercial purposes include: 

  • Copying or downloading IJCCC articles, or linking to such postings, for further redistribution, sale or licensing, for a fee;
  • Copying, downloading or posting by a site or service that incorporates advertising with such content;
  • The inclusion or incorporation of article content in other works or services (other than normal quotations with an appropriate citation) that is then available for sale or licensing, for a fee;
  • Use of IJCCC articles or article content (other than normal quotations with appropriate citation) by for-profit organizations for promotional purposes, whether for a fee or otherwise;
  • Use for the purposes of monetary reward by means of sale, resale, license, loan, transfer or other form of commercial exploitation;

    The licensor cannot revoke these freedoms as long as you follow the license terms.

[End of CC-BY-NC  License for Website User]

INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (IJCCC), With Emphasis on the Integration of Three Technologies (C & C & C),  ISSN 1841-9836.

IJCCC was founded in 2006,  at Agora University, by  Ioan DZITAC (Editor-in-Chief),  Florin Gheorghe FILIP (Editor-in-Chief), and  Misu-Jan MANOLESCU (Managing Editor).

Ethics: This journal is a member of, and subscribes to the principles of, the Committee on Publication Ethics (COPE).

Ioan  DZITAC (Editor-in-Chief) at COPE European Seminar, Bruxelles, 2015:

IJCCC is covered/indexed/abstracted in Science Citation Index Expanded (since vol.1(S),  2006); JCR2018: IF=1.585..

IJCCC is indexed in Scopus from 2008 (CiteScore2018 = 1.56):

Nomination by Elsevier for Journal Excellence Award Romania 2015 (SNIP2014 = 1.029): Elsevier/ Scopus

IJCCC was nominated by Elsevier for Journal Excellence Award - "Scopus Awards Romania 2015" (SNIP2014 = 1.029).

IJCCC is in Top 3 of 157 Romanian journals indexed by Scopus (in all fields) and No.1 in Computer Science field by Elsevier/ Scopus.


 Impact Factor in JCR2018 (Clarivate Analytics/SCI Expanded/ISI Web of Science): IF=1.585 (Q3). Scopus: CiteScore2018=1.56 (Q2); Editors-in-Chief: Ioan DZITAC & Florin Gheorghe FILIP.