Pervasive Home Security: An Intelligent Domotics Application

被引:0
作者
Carchiolo, Vincenza [1 ]
Longheu, Alessandro [1 ]
Malgeri, Michele [1 ]
Mangioni, Giuseppe [1 ]
Torrisi, Danilo [1 ]
机构
[1] Univ Catania, Fac Ingn, Dip Ingn Informat & Telecomunicaz, I-95124 Catania, Italy
来源
INTELLIGENT DISTRIBUTED COMPUTING IV | 2010年 / 315卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The pervasive computing paradigm promotes new applications in several scenarios. Among these, domotics is receiving a considerable attention. This work presents an intelligent and pervasive surveillance system for home and corporate security based on the ZigBee protocol which detects and classifies intrusions discarding false positives, also providing remote control and cameras live streaming. Results of tests in different environments show the effectiveness of the proposed system.
引用
收藏
页码:155 / 164
页数:10
相关论文
共 50 条
[41]   Intelligent transportation and pervasive computing [J].
Farkas, Keith I. ;
Heidemann, John ;
Iftode, Liviu .
IEEE PERVASIVE COMPUTING, 2006, 5 (04) :18-19
[42]   Security Architecture for RFID Application in Home Environment [J].
Li, Xuemei ;
Xu, Gang ;
Yu, Degui .
2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, :467-+
[43]   IoT Application Development: Home Security System [J].
Anvekar, Raj G. ;
Banakar, Rajeshwari M. .
2017 IEEE TECHNOLOGICAL INNOVATIONS IN ICT FOR AGRICULTURE AND RURAL DEVELOPMENT (TIAR), 2017, :68-72
[44]   MULTI-MODEL AND PERVASIVE INTELLIGENT DECISION SUPPORT SYSTEM FOR UNIVERSITY APPLICATION [J].
Magalhaes, Tiago ;
Portela, Filipe ;
Santos, Manuel Filipe .
ICERI2014: 7TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2014, :5035-5041
[45]   AmI in good care? Developing design principles for ambient intelligent domotics for elderly [J].
Meulendijk, Michiel ;
Van de Wijngaert, Lidwien ;
Brinkkemper, Sjaak ;
Leenstra, Herbert .
INFORMATICS FOR HEALTH & SOCIAL CARE, 2011, 36 (02) :75-88
[46]   Towards pervasive computing security [J].
Mohammed, L. A. .
WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, :810-815
[47]   Design and Modeling of Intelligent Home Security Monitoring System Based on CPS [J].
Sun, Chen ;
Zhang, Lichen .
PROCEEDINGS OF 2021 IEEE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2021, :186-189
[48]   What the heck is this application doing? - A security-by-contract architecture for pervasive services [J].
Dragoni, N. ;
Massacci, F. ;
Walter, T. ;
Schaefer, C. .
COMPUTERS & SECURITY, 2009, 28 (07) :566-577
[49]   The Application of XML and Web service on Database Security Control Mode in Pervasive Space [J].
Zhang, Zengguang ;
Gong, Peng .
2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, :365-369
[50]   APPLICATION OF INTELLIGENT TECHNOLOGIES IN ECONOMIC SECURITY SYSTEM OF A BANK [J].
Moiseenko, I. P. ;
Martyniuk, O. A. .
ACTUAL PROBLEMS OF ECONOMICS, 2012, (138) :234-238