Main Article Content

Authors

Currently there has been an increase in insecurity and burglaries to homes, buildings, and various social places, which has led to search and implementation of mechanisms to protect people and these sites. In this way, houses with Physical Security Systems (PSS) are less affected by these events, and thanks to the technological advancement and the appearance of the Internet of Things (IoT), these systems has improved too much, being able to supply several needs with new functionalities, which are possible by new devices and technologies. In this sense, is desirable to resolve the question about what are the most used IoT devices and technologies in different PSS designs? Thus, the purpose of this article is to present the results of the literature review made, which sought to identify the common items used in modern IoT-bases PSSs, highlighting the advantages, disadvantages, and limitations of the implemented systems.

1.
Castaño Gómez M, López Echeverry AM, Villa Sánchez PA. Review of the use of IoT technologies and devices in physical security systems. inycomp [Internet]. 2022 Jan. 15 [cited 2024 Dec. 21];24(1). Available from: https://revistaingenieria.univalle.edu.co/index.php/ingenieria_y_competitividad/article/view/11034

(1) alarms.org. Burglary Statistics: The Hard Numbers | National Council for Home Safety and Security [Internet]. 2019 [cited 2020 sep 9]. Available from: https://www.alarms.org/burglary-statistics/.

(2) Girme GS, Patil SandipR. Internet of Things Based Intelligent Security using Android Application. In: 2019 International Conference on Smart Systems and Inventive Technology (ICSSIT). Tirunelveli, India: IEEE; 2019 [cited 2020 sep 9]. p. 1101–5. https://doi.org/10.1109/ICSSIT46314.2019.8987847.

(3) Venkatesan S, Jawahar A, Varsha S, Roshne N. Design and implementation of an automated security system using Twilio messaging service. In: 2017 International Conference on Smart Cities, Automation Intelligent Computing Systems (ICON-SONICS). Yogyakarta; 2017. p. 59–63. https://doi.org/10.1109/ICON-SONICS.2017.8267822.

(4) Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi A-R, Tarkoma S. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). Atlanta, GA; 2017. p. 2177–84. https://doi.org/10.1109/ICDCS.2017.283.

(5) Kitchenham B, Charters S. Guidelines for performing Systematic Literature Reviews in Software Engineering. Keele University and Durham University Joint Report; 2007 jul [cited 2021 may 21]. Report No.: EBSE 2007-001. Available from: https://www.elsevier.com/__data/promis_misc/525444systematicreviewsguide.pdf.

(6) Carrizo D, Moller C. Estructuras metodológicas de revisiones sistemáticas de literatura en Ingeniería de Software: un estudio de mapeo sistemático. Ingeniare Revista chilena de ingeniería. 2018;26(1):45-4. http://dx.doi.org/10.4067/S0718-33052018000500045.

(7) Madakam S, Ramaswamy R, Tripathi S. Internet of Things (IoT): A Literature Review. J Comput Commun. 2015; 3(5):164–73. http://dx.doi.org/10.4236/jcc.2015.35021.

(8) Fuentes Lanfor OG, Pérez Pérez JF. Implementación de un sistema de seguridad independiente y automatización de una residencia por medio del internet de las cosas. In: 2017 IEEE Central America and Panama Student Conference (CONESCAPAN). Panama City; 2017. p. 1–5. https://www.doi.org/10.1109/CONESCAPAN.2017.8277600.

(9) Greengard S. The Internet of Things. Cambridge, Massachusetts: The MIT Press; 2015. 232 p. (MIT Press Essential Knowledge series).

(10) Slama D, Puhlmann F, Morrish J, Bhatnagar RM. Enterprise IoT: Strategies and Best Practices for Connected Products and Services. 1ra ed. Beijing; Boston: O’Reilly Media; 2015. 492 p.

(11) Whitmore A, Agarwal A, Xu L. The Internet of Things—A survey of topics and trends. Inf Syst Front. 2015;17:261–74. https://doi.org/10.1007/s10796-014-9489-2.

(12) Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M. Internet of Things for Smart Cities. IEEE Internet Things J. febrero de 2014;1(1):22–32. https://doi.org/10.1109/JIOT.2014.2306328.

(13) Mattern F, Floerkemeier C. From the Internet of Computers to the Internet of Things. En: Sachs K, Petrov I, Guerrero P, editores. From Active Data Management to Event-Based Systems and More: Papers in Honor of Alejandro Buchmann on the Occasion of His 60th Birthday. Berlin, Heidelberg: Springer; 2010 [cited 2020 sep 11]. p. 242–59. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-642-17226-7_15.

(14) Li T, Chen L. Internet of Things: Principle, Framework and Application. En: Zhang Y, editor. Future Wireless Networks and Information Systems. Berlin, Heidelberg: Springer; 2012. p. 477–82. (Lecture Notes in Electrical Engineering; vol. 144). https://doi.org/10.1007/978-3-642-27326-1_61.

(15) Singh V, Kharat V. A Proposed System for Security in Campuses using IoT Platform: A Case Study of A Women’s University. En: 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC). Mysore: IEEE; 2017. p. 305–10. https://www.doi.org/10.1109/CTCEEC.2017.8455076.

(16) El-Mougy A, Ibnkahla M, Hegazy L. Software-defined wireless network architectures for the Internet-of-Things. En: 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops). Clearwater Beach, FL; 2015. p. 804–11. https://www.doi.org/10.1109/LCNW.2015.7365931.

(17) Atzori L, Iera A, Morabito G. The Internet of Things: A survey. Comput Netw [Internet]. 28 de octubre de 2010 [cited 2020 sep 11];54(15):2787–805. https://doi.org/10.1016/j.comnet.2010.05.010.

(18) Calabrese F, Colonna M, Lovisolo P, Parata D, Ratti C. Real-Time Urban Monitoring Using Cell Phones: A Case Study in Rome. IEEE Trans Intell Transp Syst. 2011;12(1):141–51. https://www.doi.org/10.1109/TITS.2010.2074196.

(19) Sevincer A, Bhattarai A, Bilgi M, Yuksel M, Pala N. LIGHTNETs: Smart LIGHTing and Mobile Optical Wireless NETworks — A Survey. IEEE Commun Surv Tutor. 2013;15(4):1620–41. https://www.doi.org/10.1109/SURV.2013.032713.00150.

(20) Khatoun R, Zeadally S. Smart cities: concepts, architectures, research opportunities. Commun ACM. 2016;59(8):46–57. https://doi.org/10.1145/2858789.

(21) Rashidi P, Cook DJ, Holder LB, Schmitter-Edgecombe M. Discovering Activities to Recognize and Track in a Smart Environment. IEEE Trans Knowl Data Eng. 2011;23(4):527–39. https://www.doi.org/10.1109/TKDE.2010.148.

(22) Habibzadeh M, Xiong W, Zheleva M, Stern EK, Nussbaum BH, Soyata T. Smart city sensing and communication sub-infrastructure. En: 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS). Boston, MA; 2017. p. 1159–62. https://www.doi.org/10.1109/MWSCAS.2017.8053134.

(23) Waleed A-KA, Kharchenko V, Uzun D, Solovyov O. IoT-based physical security systems: Structures and PSMECA analysis. En: 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). Bucharest; 2017. p. 870–3. https://www.doi.org/10.1109/IDAACS.2017.8095211.

(24) Sassani BA, David A, Li X, Mehdipour F. AgentPi: An IoT Enabled Motion CCTV Surveillance System. En: 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). Fukuoka, Japan; 2019. p. 454–8. https://www.doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00092.

(25) Kumar J, Ramesh PR. Low-Cost Energy Efficient Smart Security System with Information Stamping for IoT Networks. En: 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU). Bhimtal; 2018. p. 1–5. https://www.doi.org/10.1109/IoT-SIU.2018.8519875.

(26) Reisslein M, Rinner B, Roy-Chowdhury A. Smart Camera Networks [Guest editors’ introduction]. Computer. 2014;47(5):23–5. https://www.doi.org/10.1109/MC.2014.134.

(27) Winkler T, Rinner B. Security and Privacy Protection in Visual Sensor Networks: A Survey. ACM Comput Surv. 2014;47(1):1-42. https://doi.org/10.1145/2545883.

(28) Fernandes E, Jung J, Prakash A. Security Analysis of Emerging Smart Home Applications. En: 2016 IEEE Symposium on Security and Privacy (SP). San Jose, CA; 2016. p. 636–54. https://www.doi.org/10.1109/SP.2016.44.

(29) Bahgat MM, Farag HH, Mokhtar B. IoT-Based Online Access Control System for Vehicles in Truck-Loading Fuels Terminals. En: 2018 30th International Conference on Microelectronics (ICM). Sousse, Tunisia: IEEE; 2018. p. 1–4. https://www.doi.org/10.1109/ICM.2018.8704087.

(30) Zurawski R, editor. Industrial Communication Technology Handbook. 2a ed. CRC Press; 2014. 1564 p. (Industrial Information Technology).

(31) Reynders D, Mackay S, Wright E, Mackay S. Practical Industrial Data Communications: Best Practice Techniques. Elsevier; 2004 [cited 2020 sep 17]. 432 p. Available from: https://doi.org/10.1016/B978-0-7506-6395-3.X5000-1.

(32) Stallings W. Data and Computer Communications. 7a ed. Upper Saddle River, N.J: Prentice Hall; 2003. 864 p.

(33) Khattab A, Jeddi Z, Amini E, Bayoumi M. RFID Security: A Lightweight Paradigm [Internet]. 1a ed. Springer International Publishing; 2017 [cited 2020 sep 17] 171 p. (Analog Circuits and Signal Processing). Available from: https://doi.org/10.1007/978-3-319-47545-5.

(34) Chandra P, Bensky D, Bradley T, Hurley C, Rackley SA, CISM JRP, et al. Wireless Security: Know It All. Amsterdam; Boston: Newnes; 2008. 744 p.

(35) Prarthana RJ, Dhanzil AM, Mahesh NI, Raghul S. An Automated Garage Door and Security Management System (A dual control system with VPN IoT & Biometric Database). In: 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). Coimbatore: IEEE; 2018. p. 1468–72. https://www.doi.org/10.1109/ICECA.2018.8474630.

(36) ALshukri D, R VL, P SE, Krishnan P. Intelligent Border Security Intrusion Detection using IoT and Embedded systems. In: 2019 4th MEC International Conference on Big Data and Smart City (ICBDSC). Muscat, Oman: IEEE; 2019. p. 1–3. https://www.doi.org/10.1109/ICBDSC.2019.8645587.

(37) Deepty RR, Alam A, Islam MdE. IoT and Wi-Fi Based Door Access Control System using Mobile Application. In: 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON). Dhaka, Bangladesh: IEEE; 2019. p. 21–4. https://www.doi.org/10.1109/RAAICON48939.2019.09.

(38) Jain S, Jatain A, Bhaskar S. Smart City Management System using IoT with Deep Learning. In: 2019 International Conference on Communication and Electronics Systems (ICCES). Coimbatore, India: IEEE; 2019. p. 1214–22. https://www.doi.org/10.1109/ICCES45898.2019.9002414.

(39) Alex AM, Jose ME, Rinsily KS, Bosco S, Shaji S. Android based intelligent robot for border security. Int Res J Eng Technol. 2017;4(4):2041–3. https://www.irjet.net/archives/V4/i4/IRJET-V4I4526.pdf.

(40) Kumar CN, Ramesh B, Shivakumar G, Manjunath JR. Android Based Autonomous Intelligent Robot for Border Security. Int J Innov Sci Eng Technol. 2014;1(5):544–8. http://ijiset.com/v1s5/IJISET_V1_I5_81.pdf.

(41) Prajakta S. J, Honrao SB. Advance Border Security Using Android Application. Int J Adv Res Innov Ideas Educ IJARIIE. 2016;2(3):3458–65. http://ijariie.com/AdminUploadPdf/Advance_Border_Security_Using_Android_Application_ijariie2615.pdf.

(42) Thilagavathy R, Murali J, Kamal P, Arunpandiyan P. Intelligent Unmanned Army Robot. Int J Adv Res Comput Eng Technol [Internet]. 2015;4(2):473–7. Available from: http://ijarcet.org/wp-content/uploads/IJARCET-VOL-4-ISSUE-2-473-477.pdf.

(43) Sudhakar S, Kumar EP, Thiyagarajan S. Border Security and Multi Access Robot using Embedded System. Indian J Sci Technol [Internet]. 2016 [cited 2020 sep 25];9(16):1–5. https://www.doi.org/10.17485/ijst/2016/v9i16/92205.

(44) Jain K, Suluchana V. Design and Development of Smart Robot Car for Border Security. Int J Comput Appl. 2013;76(7):23–9. https://doi.org/10.5120/13260-0739.

(45) Fang L, Meng Z, Chen C, Hui Q. Smart Motion Detection Surveillance System. In: 2009 International Conference on Education Technology and Computer. Singapore: IEEE; 2009. p. 171–5. https://www.doi.org/10.1109/ICETC.2009.10.

(46) Khan AA, Iqbal M. A Motion Detection Based Surveillance System (MDSS). In: 2011 First International Conference on Informatics and Computational Intelligence. Bandung; 2011. p. 132–7. https://www.doi.org/10.1109/ICI.2011.31.

(47) Prasad S, Mahalakshmi P, Sunder AJC, Swathi R. Smart Surveillance Monitoring System Using Raspberry PI and PIR Sensor. Int J Comput Sci Inf Technol. 2014;5(6):7107–9. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.658.6805&rep=rep1&type=pdf.

(48) Twilio. What is Twilio and How Do Twilio APIs Work? [Internet]. (s.f). Available from: https://www.twilio.com/learn/twilio-101/what-is-twilio/.

(49) Bhatkule AV, Shinde UB, Zanwar SR. Home Based Security Control System using Raspberry Pi and GSM. Int J Innov Res Comput Commun Eng. 2016;4(9):16259–64. Available from: http://www.ijircce.com/upload/2016/september/83_9_Home.pdf.

(50) Choudhury B, Choudhury TS, Pramanik A, Arif W, Mehedi J. Design and implementation of an SMS based home security system. In: 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). Coimbatore: IEEE; 2015. p. 1–7. https://www.doi.org/10.1109/ICECCT.2015.7226115.

(51) Peng Z, Kato T, Takahashi H, Kinoshita T. Intelligent home security system using agent-based IoT devices. In: 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE). Osaka: IEEE; 2015. p. 313–4. https://www.doi.org/10.1109/GCCE.2015.7398644.

(52) Huang H, Xiao S, Meng X, Xiong Y. A Remote Home Security System Based on Wireless Sensor Network and GSM Technology. In: 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. Wuhan, Hubei: IEEE; 2010. p. 535–8. https://www.dor.org/10.1109/NSWCTC.2010.132.

(53) Sriskanthan N, Tan F, Karande A. Bluetooth based home automation system. Microprocess Microsyst. 2002; 26 (6):281–9. https://doi.org/10.1016/S0141-9331(02)00039-X.

(54) Kodali RK, Jain V, Bose S, Boppana L. IoT based smart security and home automation system. In: 2016 International Conference on Computing, Communication and Automation (ICCCA) [Internet]. Greater Noida, India: IEEE; 2016 [citado 25 de septiembre de 2020]. p. 1286–9. https://www.doi.org/10.1109/CCAA.2016.7813916.

(55) Oliver A, Odena A, Raffel CA, Cubuk ED, Goodfellow I. Realistic evaluation of deep semi-supervised learning algorithms. In: 32nd Conference on Neural Information Processing Systems (NeurIPS 2018) [Internet]. Monteréal, Canada; 2018. p. 3235–46. Disponible en: https://dl.acm.org/doi/pdf/10.5555/3327144.3327244.

(56) Shah M, Kapdi R. Object detection using deep neural networks. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). Madurai: IEEE; 2017. p. 787–90. https://www.doi.org/10.1109/ICCONS.2017.8250570.

(57) Britto J, Chaudhari V, Mehta D, Kale A, Ramteke J. A Sixth Sense Door using Internet of Things. En: Smys S, Bestak R, Chen JI-Z, Kotuliak I, editores. International Conference on Computer Networks and Communication Technologies. Singapore: Springer; 2019. p. 545–55. (Lecture Notes on Data Engineering and Communications Technologies). https://doi.org/10.1007/978-981-10-8681-6_49.

(58) Chitnis S, Deshpande N, Shaligram A. An Investigative Study for Smart Home Security: Issues, Challenges and Countermeasures. Wirel Sens Netw. 2016;8(4):61–8. http://dx.doi.org/10.4236/wsn.2016.84006.

(59) Lee A, Tyroler D, Chen H-J, Yuk H. Home automation system monitored by security system [Internet]. US9368009B2; 2016 [cited 2020 sep 25]. Disponible en: https://patents.google.com/patent/US9368009/en.

(60) Surantha N, Wicaksono WR. Design of Smart Home Security System using Object Recognition and PIR Sensor. Procedia Comput Sci [Internet]. 2018 [cited 2020 sep 25];135:465–72. https://doi.org/10.1016/j.procs.2018.08.198.

(61) Asnani H, Khan S, Nandeesh S. Securing an IoT based Home using Digital Image Processing and an Android Application. Int Res J Eng Technol [Internet]. 2018;5(8):410–5. Available from: https://www.irjet.net/archives/V5/i8/IRJET-V5I872.pdf.

(62) Hung C-H, Bai Y-W, Ren J-H. Design and implementation of a single button operation for a door lock control system based on a near field communication of a smartphone. In: 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin). Berlin: IEEE; 2015. p. 260–1. https://www.doi.org/10.1109/ICCE-Berlin.2015.7391251.

(63) Ibrahim A, Paravath A, Aswin PK, Iqbal SM, Abdulla SU. GSM based digital door lock security system. In: 2015 International Conference on Power, Instrumentation, Control and Computing (PICC). Thrissur: IEEE; 2015. p. 1–6. https://www.doi.org/10.1109/PICC.2015.7455796.

(64) Khan SR, Al Mansur A, Kabir A, Jaman S, Chowdhury N. Design and implementation of low cost home security system using GSM network. Int J Sci Eng Res [Internet]. 2012;3(3):1–6. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.302.6908&rep=rep1&type=pdf.

(65) Ragade RR. Embedded home surveillance system with pyroelectric infrared sensor using GSM. In: 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM). Aurangabad: IEEE; 2017. p. 321–4. https://www.doi.org/10.1109/ICISIM.2017.8122192.

(66) Kale PV, Sharma DD. Intelligent Home Security System using illumination sensitive background model. Int J Adv Eng Ing Res Dev. 2014;1(5):1–11. https://doi.org/10.21090/ijaerd.0105105.

(67) Gupta RK, Balamurugan S, Nbsp KA and RM. IoT Based Door Entry System. Indian J Sci Technol. 6 de mayo de 2016;9(37):1–5. https://dx.doi.org/10.17485/ijst/2016/v9i37/102136.

(68) Kulkarni S, Bagul M, Dukare A, Gaikwad A. Face Recognition System Using IoT. Int J Adv Res Comput Eng Technol [Internet]. 2017;6(11):1720–3. Available from: http://ijarcet.org/wp-content/uploads/IJARCET-VOL-6-ISSUE-11-1720-1723.pdf.

(69) Zaman HasanU, Tabassum TE, Islam T, Mohammad N. Low-cost multi-level home security system for developing countries. In: 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). Madurai: IEEE; 2017. p. 549–54. https://www.doi.org/10.1109/ICCONS.2017.8250522.

(70) Sarika CG, Bharathi Malakreddy A, Harinath HN. IoT-Based Smart Login Using Biometrics. En: Smys S, Bestak R, Chen JI-Z, Kotuliak I, editores. International Conference on Computer Networks and Communication Technologies. Singapore: Springer; 2019. p. 589–97. (Lecture Notes on Data Engineering and Communications Technologies). https://doi.org/10.1007/978-981-10-8681-6_54.

(71) Loong Pang K, Seng Teh H. Mobile-Based access control system with wireless access controller [Internet]. US 2019 318 559A1; 2019 [cited 2020 sep 25]. Available from: https://patentswarm.com/patents/US20190318559A1.

(72) Kamelia L, Noorhassan A, Sanjaya M, Mulyana WSE. Door Automation System Using Bluetooth-Based Android for Mobile Phone. ARPN J Eng Appl Sci [Internet]. 2014;9(10):1759–62. Available from: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1045.7192&rep=rep1&type=pdf.

(73) Kassem A, Murr SE, Jamous G, Saad E, Geagea M. A smart lock system using Wi-Fi security. In: 2016 3rd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA). Beirut: IEEE; 2016. p. 222–5. https://www.doi.org/10.1109/ACTEA.2016.7560143.

Received 2021-02-20
Accepted 2021-06-03
Published 2022-01-15