Skip to main content
Log in

Internet of surveillance: a cloud supported large-scale wireless surveillance system

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Large-scale video surveillance systems are among the necessities for securing our life these days. The high bandwidth demand and the large storage requirements are the main challenges in such systems. To face these challenges, the system can be deployed as a multi-tier framework that utilizes different technologies. In such a framework, technologies proposed under the umbrella of the Internet of Things (IoT) can play a significant rule in facing the challenges. In video surveillance, the cameras can be considered as “the things” that are streaming videos to a central processing and storage server (the cloud) through the Internet. Wireless technologies can be used to connect wireless cameras to the surveillance system more conveniently than wired cameras. Unfortunately, wireless communication in general tend to have limited bandwidth that needs careful management to achieve scalability. In this paper, we design and evaluate a reliable IoT-based wireless video surveillance system that provides an optimal bandwidth distribution and allocation to minimize the overall surveillance video distortion. We evaluate our system using NS-3 simulation. The results show that the proposed framework fully utilizes the available cloud bandwidth budget and achieves high scalability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. https://portal.etsi.org/Portals/0/TBpages/MEC/Docs/Mobile-edge_Computing_-_Introductory_Technical_White_Paper_V1%2018-09-14.pdf.

  2. http://www.cctvsound.com/news/8/MJPEG-MPEG4-or-H-264-which-one-is-better.

References

  1. Aazam M, Huh EN (2014) Fog computing and smart gateway based communication for cloud of things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, pp 464–470

  2. Agarwal S, Dunagan J, Jain N, Saroiu S, Wolman A, Bhogan H (2010) Volley: automated data placement for geo-distributed cloud services. In: NSDI, pp 17–32

  3. Ali AMM, Ahmad NM, Amin AHM (2014) Cloudlet-based cyber foraging framework for distributed video surveillance provisioning. In: 2014 Fourth World Congress on Information and Communication Technologies (WICT), pp 199–204. doi:10.1109/WICT.2014.7076905

  4. Alletto S, Cucchiara R, Fiore GD, Mainetti L, Mighali V, Patrono L, Serra G (2016) An indoor location-aware system for an iot-based smart museum. IEEE Internet Things J 3(2):244–253. doi:10.1109/JIOT.2015.2506258

    Article  Google Scholar 

  5. Alsmirat M, Sarhan N (2012) Cross-layer optimization and effective airtime estimation for wireless video streaming. In: 2012 21st International Conference on Computer Communications and Networks (ICCCN), pp 1–7. doi:10.1109/ICCCN.2012.6289275

  6. Alsmirat MA, Jararweh Y, Obaidat I, Gupta BB (2016) Automated wireless video surveillance: an evaluation framework. J Real-Time Image Process, pp 1–20. doi:10.1007/s11554-016-0631-x

  7. Beck MT, Werner M, Feld S, Schimper S (2014) Mobile edge computing: a taxonomy

  8. Bellavista P, Cardone G, Corradi A, Foschini L (2013) Convergence of manet and wsn in iot urban scenarios. IEEE Sensors J 13(10):3558–3567. doi:10.1109/JSEN.2013.2272099

    Article  Google Scholar 

  9. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. ACM, pp 13–16

  10. Chae H, Park J, Song H, Kim Y, Jeong H (2015) The iot based automate landing system of a drone for the round-the-clock surveillance solution. In: 2015 IEEE International Conference on Advanced Intelligent Mechatronics (AIM), pp 1575–1580. doi:10.1109/AIM.2015.7222767

  11. Cmu/mit image set. http://vasc.ri.cmu.edu/idb/html/face/frontal_images/ (online; accessed Nov 2015)

  12. Cuervo E, Balasubramanian A, Cho DK, Wolman A, Saroiu S, Chandra R, Bahl P (2010) Maui: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services. ACM, pp 49–62

  13. Davis A, Parikh J, Weihl WE (2004) Edgecomputing: extending enterprise applications to the edge of the internet. In: Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers and Posters. ACM, pp 180–187

  14. Dsouza C, Ahn GJ, Taguinod M (2014) Policy-driven security management for fog computing: preliminary framework and a case study. In: 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI). IEEE, pp 16–23

  15. Faruque MAA, Vatanparvar K (2016) Energy management-as-a-service over fog computing platform. IEEE Internet Things J 3(2):161–169. doi:10.1109/JIOT.2015.2471260

    Article  Google Scholar 

  16. Fleming K, Waweru P, Wambua M, Ondula E, Samuel L (2016) Toward quantified small-scale farms in africa. IEEE Internet Comput 20(3):63–67. doi:10.1109/MIC.2016.58

    Article  Google Scholar 

  17. Georgia tech face database. http://www.anefian.com/research/face_reco.htm (online; accessed Nov 2015)

  18. Gope P, Hwang T (2016) Bsn-care: a secure iot-based modern healthcare system using body sensor network. IEEE Sensors J 16(5):1368–1376. doi:10.1109/JSEN.2015.2502401

    Article  Google Scholar 

  19. Hassanalieragh M, Page A, Soyata T, Sharma G, Aktas M, Mateos G, Kantarci B, Andreescu S (2015) Health monitoring and management using internet-of-things (iot) sensing with cloud-based processing: opportunities and challenges. In: 2015 IEEE International Conference on Services Computing (SCC), pp 285–292. doi:10.1109/SCC.2015.47

  20. Islam SMR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708. doi:10.1109/ACCESS.2015.2437951

    Article  Google Scholar 

  21. Jararweh Y, Doulat A, AlQudah O, Ahmed E, Al-Ayyoub M, Benkhelifa E (2016) The future of mobile cloud computing: integrating cloudlets and mobile edge computing. In: 2016 23rd International Conference on Telecommunications (ICT), pp 1–5. doi:10.1109/ICT.2016.7500486

  22. Jararweh Y, Doulat A, Darabseh A, Alsmirat M, Al-Ayyoub M, Benkhelifa E (2016) Sdmec: software defined system for mobile edge computing. In: 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), pp 88–93. doi:10.1109/IC2EW.2016.45

  23. Ke CH, Shieh CK, Hwang WS, Ziviani A et al (2008) An evaluation framework for more realistic simulations of mpeg video transmission. J Inf Sci Eng 24(2):425–440

    Google Scholar 

  24. Kemp R, Palmer N, Kielmann T, Bal H (2012) Cuckoo: a computation offloading framework for smartphones. In: Mobile computing, applications, and services. Springer, Berlin, pp 59–79

  25. Khoi NM, Saguna S, Mitra K, Ahlund C (2015) Irehmo: an efficient iot-based remote health monitoring system for smart regions. In: 2015 17th International Conference on e-health Networking, Application Services (HealthCom), pp 563–568. doi:10.1109/HealthCom.2015.7454565

  26. Kokkonis G, Psannis KE, Roumeliotis M, Schonfeld D (2016) Real-time wireless multisensory smart surveillance with 3d-hevc streams for internet-of-things (iot). J Supercomput, pp 1–19. doi:10.1007/s11227-016-1769-9

  27. Kumarage H, Khalil I, Alabdulatif A, Tari Z, Yi X (2016) Secure data analytics for cloud-integrated internet of things applications. IEEE Cloud Comput 3(2):46–56. doi:10.1109/MCC.2016.30

    Article  Google Scholar 

  28. Liu Z, Yan T (2013) Study on multi-view video based on iot and its application in intelligent security system. In: Proceedings of 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), pp 1437–1440. doi:10.1109/MEC.2013.6885292

  29. Moness M, Moustafa AM (2016) A survey of cyber-physical advances and challenges of wind energy conversion systems: prospects for internet of energy. IEEE Internet Things J 3(2):134–145. doi:10.1109/JIOT.2015.2478381

    Article  Google Scholar 

  30. Obaidat I, Alsmirat MA, Jararweh Y (2016) Completing ieee 802.11e implementation in ns-3. In: 2016 7th International Conference on Information and Communication Systems (ICICS), pp 190–195. doi:10.1109/IACS.2016.7476109

  31. Ortega A, Ramchandran K (1998) Rate-distortion methods for image and video compression. IEEE Signal Process Mag 15(6):23–50

    Article  Google Scholar 

  32. Pan J, Jain R, Paul S, Vu T, Saifullah A, Sha M (2015) An internet of things framework for smart energy in buildings: designs, prototype, and experiments. IEEE Internet Things J 2(6):527–537. doi:10.1109/JIOT.2015.2413397

    Article  Google Scholar 

  33. Psannis K (2009) Efficient redundant frames encoding algorithm for streaming video over error prone wireless channels. IEICE Electron Express 6(21):1497–1502. doi:10.1587/elex.6.1497, http://ci.nii.ac.jp/naid/130000121968/en/

  34. Psannis K, Ishibashi Y (2008) Enhanced h. 264/avc stream switching over varying bandwidth networks. IEICE Electron Express 5(19), 827–832

  35. Psannis KE, Ishibashi Y (2006) Impact of video coding on delay and jitter in 3g wireless video multicast services. EURASIP J Wirel Commun Netw 2006(2):51–51. doi:10.1155/WCN/2006/24616

    Google Scholar 

  36. Recommendation 500-10: Methodology for the subjective assessment of the quality of television pictures. ITU-R Recommendation BT.500-10 (2000)

  37. Ryu M, Yun J, Miao T, Ahn IY, Choi SC, Kim J (2015) Design and implementation of a connected farm for smart farming system. In: SENSORS, 2015 IEEE, pp 1–4 (2015). doi:10.1109/ICSENS.2015.7370624

  38. Sajid A, Abbas H, Saleem K (2016) Cloud-assisted iot-based scada systems security: a review of the state of the art and future challenges. IEEE Access 4:1375–1384. doi:10.1109/ACCESS.2016.2549047

    Article  Google Scholar 

  39. Shirani S, Kossentini F, Kallel S, Ward R (1997) Reconstruction of jpeg coded images in lossy packet networks. IEEE Trans Commun (submitted)

  40. Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS). IEEE, pp 1–8

  41. Taneja M (2015) A framework to support real-time applications over ieee802.15.4 dsme. In: 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp 1–6. doi:10.1109/ISSNIP.2015.7106918

  42. The network simulator ns-3. http://www.nsnam.org/

  43. Trappe W, Howard R, Moore RS (2015) Low-energy security: limits and opportunities in the internet of things. IEEE Security Privacy 13(1):14–21. doi:10.1109/MSP.2015.7

    Article  Google Scholar 

  44. Wang WQ, Zhang X, Zhang J, Lim HB (2012) Smart traffic cloud: an infrastructure for traffic applications. In: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, pp 822–827

  45. Wang Y, Chen R, Wang DC (2015) A survey of mobile cloud computing applications: perspectives and challenges. Wirel Pers Commun 80(4):1607–1623

    Article  MathSciNet  Google Scholar 

  46. Yang G, Xie L, Mntysalo M, Zhou X, Pang Z, Xu LD, Kao-Walter S, Chen Q, Zheng LR (2014) A health-iot platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box. IEEE Trans Ind Inf 10(4):2180–2191. doi:10.1109/TII.2014.2307795

    Article  Google Scholar 

  47. Yeh LY, Chiang PY, Tsai YL, Huang JL (2015) Cloud-based fine-grained health information access control framework for lightweight iot devices with dynamic auditing and attribute revocation. IEEE Trans Cloud Comput PP(99), 1. doi:10.1109/TCC.2015.2485199

  48. Zhang T, Chowdhery A, Bahl PV, Jamieson K, Banerjee S (2015) The design and implementation of a wireless video surveillance system. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom ’15. ACM, New York, pp 426–438. doi:10.1145/2789168.2790123

Download references

Acknowledgments

This work is funded in part by the Jordan University of Science and Technology Deanship of Research Grant Number 20150310.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad A. Alsmirat.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alsmirat, M.A., Jararweh, Y., Obaidat, I. et al. Internet of surveillance: a cloud supported large-scale wireless surveillance system. J Supercomput 73, 973–992 (2017). https://doi.org/10.1007/s11227-016-1857-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-016-1857-x

Keywords

Navigation