Iot-Based Automated Security Architecture With Real-Time Detection, Comparative Performance Analysis, and Mobile Alerts for Institutional Asset Protection

Authors

I. C. O. De Leon

First City Providential College, Graduate Studies, City of San Jose del Monte, Bulacan (Philippines)

L.J.B. Abaloyan

First City Providential College, Graduate Studies, City of San Jose del Monte, Bulacan (Philippines)

N. J. S. Cabansag

First City Providential College, Graduate Studies, City of San Jose del Monte, Bulacan (Philippines)

J. B. Drilon

First City Providential College, Graduate Studies, City of San Jose del Monte, Bulacan (Philippines)

H. R. Lucero

First City Providential College, Graduate Studies, City of San Jose del Monte, Bulacan (Philippines)

Article Information

DOI: 10.51584/IJRIAS.2025.101100072

Subject Category: Computer Science

Volume/Issue: 10/11 | Page No: 767-781

Publication Timeline

Submitted: 2025-12-05

Accepted: 2025-12-11

Published: 2025-12-18

Abstract

Security systems have rapidly evolved with the rise of the Internet of Things (IoT), sensor technologies, and mobile computing. This study presents the design, development, and evaluation of an IoT-powered automated security architecture intended for modern establishments. The system integrates motion detection, real-time video monitoring, mobile alerts, and automated alarm responses to enhance security readiness and reduce risks associated with theft, intrusion, and unauthorized access. Using an IoT microcontroller as the core processor, the system collects sensor data, triggers automated alarms, and sends mobile notifications when abnormal activity is detected. A mobile application enables remote activation, monitoring, and video retrieval through cloud storage. Results show that the system achieved a “Very Highly Acceptable” overall rating (mean = 4.60/5.00) in safety, motion accuracy, alarm responsiveness, and notification reliability, outperforming traditional CCTV in detection accuracy and notification speed. While the system proved effective, limitations such as reliance on stable power and network connectivity were identified. Future work will focus on enhancing scalability, integrating advanced analytics, and strengthening data privacy measures. The findings demonstrate that IoT-driven integrated security systems can effectively strengthen establishment protection, increase situational awareness, and support rapid response during potential security breaches.

Keywords

IoT, Security System, Motion Detection, GSM Notification, Mobile Application, Asset Protection

Downloads

References

1. K. R. Pontiveros, et al., “Development of Multi-Home Alarm System Based on GSM Technology,” International Journal of Electronics and Electrical Engineering, vol. 4, no. 4, Aug. 2016. [Google Scholar] [Crossref]

2. O. G. Eseosa, et al., “GSM Based Intelligent Home Security System for Intrusion Detection,” International Journal of Engineering and Technology, vol. 4, no. 10, Oct. 2014. [Google Scholar] [Crossref]

3. Gupta, “Intelligent Home Security Using GSM Communication Module,” International Journal of Innovation and Scientific Research, vol. 13, no. 1, pp. 239–242, Jan. 2015. [Google Scholar] [Crossref]

4. Mudgiil, et al., “Design and Development of Sensor Based Home Automation and Security System Using GSM Module and Locking System,” International Journal of Advanced Engineering Research and Science (IJAERS), vol. 1, issue 4, Sept. 2014. [Google Scholar] [Crossref]

5. J. E. Presado, “The Level of Security Management in the University of Eastern Philippines,” International Conference on Research in Social Sciences, Humanities and Education (SSHE-2016), May 20–21, 2016, Cebu, Philippines. [Google Scholar] [Crossref]

6. D. Cortez, et al., “Development of Home Alarm System Based on GSM Technology,” Computer Department, Centro Escolar University, Manila, Philippines, Aug. 2016. [Google Scholar] [Crossref]

7. B. Alb Is, Jr., et al., “A Study On The Effectivity Of The Philippine Prison System,” PLJ, vol. 52, no. 1-03, June 2016. [Google Scholar] [Crossref]

8. Quezon City Ordinance No SP-2139, S-2012, Jan. 13, 2014. [Online]. Available: (Accessed Nov. 22, 2017). [Google Scholar] [Crossref]

9. Parker, “The Advancement of New Technology. Positive or Negative?” Apr. 12, 2015. [Online]. Available: (Accessed Aug. 31, 2017). [Google Scholar] [Crossref]

10. R. Fiddis, “Public Safety: The Impact of Technology,” Aug. 8, 2016. [Online]. Available: (Accessed Aug. 31, 2017). [Google Scholar] [Crossref]

11. J. Byrne and G. Marx, “Technological Innovations in Crime Prevention and Policing,” Nov. 2013. [Online]. Available: (Accessed Aug. 31, 2017). [Google Scholar] [Crossref]

12. ISO/IEC 25010:2011, “Systems and software engineering Systems and software Quality Requirements and Evaluation (SQuaRE) System and software quality models.” [Google Scholar] [Crossref]

13. ISO/IEC 27001:2013, “Information technology Security techniques Information security management systems Requirements.” [Google Scholar] [Crossref]

14. L. Breiman, “Random Forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001. [Google Scholar] [Crossref]

15. T. Cover and P. Hart, “Nearest neighbor pattern classification,” IEEE Transactions on Information Theory, vol. 13, no. 1, pp. 21–27, 1967. [Google Scholar] [Crossref]

16. H. Zhang, “The Optimality of Naive Bayes,” Proceedings of the Seventeenth International Florida Artificial Intelligence Research Society Conference, 2004. [Google Scholar] [Crossref]

17. I. C. O. De Leon, R. A. Elandag, D. W. L. Enojo, J. G. Ferrer, and A. I. Lianza, “Developing Automated Security System for PhilHealth Quezon City,” Capstone Project, Institute of Computer Studies, Colegio de Montalban, Rodriguez, Rizal, 2018. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles