Connecting Wireless Alarm Systems to ARC Monitoring Centers: A Technical Guide

Table of Contents

Connecting Wireless Alarm Systems to ARC Monitoring Centers: A Technical Guide

You have installed a wireless alarm system at a 500 m² commercial site, sensors paired, zones configured, and the customer expects a monitoring center to know about an intrusion within 30 seconds. But the path from a triggered PIR sensor to an ARC operator’s console involves multiple protocols, transmission paths, and compliance requirements that most installers discover only when something fails.

This guide covers the full technical chain: how alarm events travel from wireless sensors to ARC receivers, which protocols carry them, what European standards govern the connection, and how to design dual-path communication that meets Grade 2 and Grade 3 requirements under EN 50131.

How ARC Communication Works: The Event Path

An alarm event travels through five distinct stages before an operator sees it:

  1. Sensor trigger — A PIR motion sensor detects infrared changes and transmits an alert via the proprietary RBF Protocol to the Roombanker hub.
  2. Hub processing — The hub validates the event, applies any zone configuration (entry/exit delays, confirmed alarm logic), and formats the event into a structured message.
  3. Transmission — The hub sends the formatted event across the primary path (Ethernet or WiFi) to the ARC receiver, with automatic failover to the backup path (4G LTE) if the primary is unavailable.
  4. ARC receiver — The monitoring station’s receiver decodes the transmission, authenticates the source, and routes the event to the appropriate operator console.
  5. Operator action — The operator evaluates the event against the customer’s verification profile and initiates the response protocol.

End-to-end transmission time from sensor trigger to ARC receiver display should not exceed 30 seconds for Grade 2 installations and 10 seconds for Grade 3 under EN 50131-1. In internal testing across 40 residential and commercial sites in Germany and Poland during Q3 2025, the Roombanker hub completed this chain in an average of 6.2 seconds over Ethernet and 8.4 seconds over 4G LTE backup.

ARC Protocols: SIA DC-09, SIA DC-04, and Wireless Relay

Three primary protocol families connect alarm panels to ARC receivers. Each serves a different communication path and offers distinct tradeoffs in data richness, reliability, and bandwidth.

SIA DC-09 (Contact ID over IP)

The dominant protocol for new ARC installations in Europe. SIA DC-09 transmits Contact ID event codes over TCP/IP or UDP/IP networks using a structured data format that includes the account number, event code, zone or user number, and partition identifier.

The protocol delivers 16 digits of information per transmission:

  • Account number (4 or 6 digits): identifies the customer
  • Event code (3 digits): identifies the type of event, defined by the Contact ID standard
  • Zone or user number (3 digits): identifies the specific sensor or user
  • Partition number (2 digits): identifies the area within the site
  • Checksum (2 digits): validates message integrity

The message format follows a fixed structure that every SIA DC-09-compatible receiver parses identically, which is why Contact ID over IP has become the default protocol for new monitoring station connections across Europe.

SIA DC-04 (Contact ID over Voice)

The older protocol standard that transmits Contact ID codes via voice-frequency signaling over a standard PSTN or cellular voice channel. DC-04 uses DTMF tones to encode the same 16-digit message format as DC-09, modulated over an audio path.

DC-04 remains relevant for two specific scenarios: sites where IP connectivity is unavailable or unreliable, and legacy ARC receivers that have not upgraded to IP-based reception. The tradeoff is longer transmission time (8-15 seconds for tone transmission vs. under 1 second for IP) and no built-in encryption.

Wireless Relay (GSM/4G Direct)

Some ARC receivers accept direct wireless transmissions from alarm panels without an intermediate IP network. The hub embeds a cellular module (typically 4G LTE Cat 1 or Cat M1) that opens a secure data session directly with the ARC receiver’s cellular receiver.

Wireless relay eliminates dependence on the site’s local network infrastructure, which is valuable for sites with unreliable internet or for high-security installations where the monitoring path must be physically independent of the customer’s network. The tradeoff is higher per-device data cost and slightly increased latency (typically 300-800 ms additional) for the cellular attach procedure.

Event Codes: Contact ID and SIA Formats

The Contact ID standard defines over 150 event codes organized by category. Every ARC-compatible alarm system must encode events using these codes, because the receiving station uses the code to determine the event type, priority, and required operator response.

Common Contact ID Event Codes

CodeEvent TypeDescription
100MedicalEmergency medical alert
110FireFire or smoke alarm
120PanicPanic alarm from keyfob or button
121DuressCoercion code entered at keypad
130BurglaryPerimeter or interior intrusion
131Burglary (day/night zone)Violation of a 24-hour zone
13224-hour zone (auxiliary)24-hour non-burglary alarm
133Gas detectedGas sensor alarm
134RefrigerationTemperature threshold breach
137Water detectedFlood or leak sensor
138Burglary (interior follow)Interior zone alarm in armed state
139Burglary (perimeter instant)Perimeter zone alarm, no entry delay
140AC lossMains power failure
141System low batteryPanel or hub battery low
301AC restoreMains power restored
302System battery restorePanel battery restored
381Supervision failureSensor fails to check in
383Supervision restoreSensor check-in restored
411Force armingSystem armed with bypassed zones
421CancelRecent closing cancellation
570System faultGeneral system fault
602Periodic testScheduled communication test

Each event code is sent with the zone or user identifier that allows the ARC operator to pinpoint the exact device or location. For example, event code 138 with zone 007 tells the operator that the PIR motion sensor in the ground-floor storage room (zone 7) has triggered while the system was armed.

SIA Format Codes

SIA format, defined in SIA DC-04 and expanded in SIA DC-07, uses alphabetic codes rather than numeric three-digit codes. The most common SIA event identifiers include:

  • BA (Burglary Alarm)
  • FA (Fire Alarm)
  • PA (Panic Alarm)
  • KA (Keypad Alarm)
  • TA (Tamper Alarm)
  • LT (Low Temperature)
  • WAT (Water Alarm)
  • AC (AC Power Loss)
  • LB (Low Battery)
  • YR (System Arming)
  • YP (System Disarming)
  • RB (Restore, Battery)
  • RC (Restore, AC)
  • RP (Restore, Power)
  • RS (Restore, Supervisory)

SIA format carries richer data per event than Contact ID because the code length varies and additional qualifiers can be appended. However, SIA format is less universally supported across ARC receivers, particularly outside North America. Most European ARCs handle Contact ID as the minimum common denominator and SIA format as an upgrade path for richer event data.

Dual-Path Failover: Primary and Backup Communication

A single communication path is a single point of failure. If the site’s internet connection drops during a weekend break-in, the alarm event never reaches the ARC. Dual-path communication solves this by maintaining two independent transmission channels and failing over automatically.

How Dual-Path Works

The Roombanker hub maintains two concurrent communication paths:

  • Primary path: Ethernet (RJ-45) or WiFi (802.11 b/g/n) connection to the site’s broadband router
  • Backup path: Integrated 4G LTE Cat 1 cellular module with dedicated SIM slot

The hub sends all events over the primary path when available. The backup path remains in standby mode, performing periodic connectivity checks. When the hub detects that the primary path has failed—either through TCP connection timeout or loss of link integrity—it switches to the backup path. In the Roombanker hub, this failover completes in under 5 seconds in internal testing across 30 test cycles with simulated network disconnection.

The hub continues to monitor the primary path while operating on backup. When the primary path is restored, the hub reverts automatically, ensuring that the higher-bandwidth, lower-latency path is used for ongoing communication.

EN 50131 Dual-Path Requirements

EN 50131-1 defines transmission path requirements by security grade:

  • Grade 2: Requires at least one reliable transmission path. Dual-path is recommended but not mandatory. Maximum transmission time: 30 seconds.
  • Grade 3: Requires dual-path communication or a single path with confirmed delivery. Maximum transmission time: 10 seconds.
  • Grade 4: Requires dual-path with independent routing and hardened communication. Maximum transmission time: 5 seconds.

For Grade 3 installations, the backup path must be physically independent of the primary path. A 4G LTE module that shares the hub’s enclosure meets the independence requirement because it uses a separate network interface and cellular infrastructure independent of the site’s broadband connection. See the wireless alarm installation workflow for commercial sites for more on Grade 3 deployment planning.

Supervision Heartbeat: EN 50131 Timing and Polling Intervals

Supervision is the mechanism by which the hub confirms that each wireless sensor is still operational and within range. Without supervision, a sensor could fail silently—battery depleted, tamper removed, radio path obstructed—and the system would appear normal until an actual event fails to transmit.

How Supervision Works

Each enrolled sensor transmits a supervision signal at a programmed interval. The hub expects to receive this signal within a defined timeout window. If the window expires without a supervision signal, the hub generates a supervision failure event (Contact ID code 381) and transmits it to the ARC.

The Roombanker hub polls its enrolled devices at user-configurable intervals. Default supervision intervals by device type:

  • PIR Motion Sensors: 15 minutes
  • Door/Window Magnetic Sensors: 30 minutes
  • Smoke Detectors: 10 minutes
  • Keyfobs and Panic Buttons: 60 minutes

The hub maintains a supervision fault tolerance of 3 consecutive missed check-ins before declaring a device offline. This prevents transient RF interference from generating false supervision failures while ensuring that a genuinely missing device is reported within 45 to 90 minutes depending on device type.

EN 50131 Supervision Requirements

EN 50131-2-2 (for PIR detectors) and EN 50131-2-6 (for magnetic contacts) specify maximum supervision intervals:

  • Grade 2: Device must report status at least every 24 hours. A fault must be indicated within 24 hours of a missed check-in.
  • Grade 3: Device must report status at least every 4 hours. A fault must be indicated within 4 hours of a missed check-in.

The Roombanker hub’s default 15-minute polling for PIR sensors exceeds Grade 3 requirements by a factor of 16, providing significantly faster detection of sensor failure than the standard minimum.

Polling vs. Mesh Overhead Comparison

Wireless alarm systems typically use one of two supervision architectures: polling (star topology) or mesh (peer-to-peer routing). Each approach has distinct implications for network overhead, battery life, and scalability.

DimensionPolling (Star)Mesh (Peer-to-Peer)
TopologyHub polls each sensor directlySensors relay data through peers
Bandwidth overheadN x polling packets per cycleN + M relay packets per cycle (M = number of relay hops)
Battery impactLow. Sensor wakes, transmits, sleepsHigher. Relay devices stay awake longer to forward traffic
Scalability limitLimited by hub radio capacityLimited by cumulative relay overhead
Supervision latencyDeterministic. Fixed per-device intervalVariable. Depends on relay route availability
PredictabilityHigh. Each device’s schedule is knownLower. Route changes affect timing

In a polling architecture with 50 sensors at 15-minute intervals, the hub sends 50 polling messages and receives 50 responses per cycle—200 messages total per hour (combining polls and supervision signals per device). Each sensor is active for approximately 120 ms per cycle, resulting in a duty cycle of 0.013%.

In a mesh architecture with 50 sensors where each device must relay for 3-5 peers, the same 50 devices generate 200-300 messages per cycle due to relay forwarding. Devices acting as relays have duty cycles 3-5x higher than leaf devices, which creates uneven battery drain and unpredictable supervision timing.

The Roombanker hub uses a star topology with the proprietary RBF Protocol for sensor communication. The polling approach is deliberate: it provides deterministic supervision timing, uniform battery consumption across all sensors, and predictable network overhead regardless of installation size.

ARC Integration by European Country

ARC requirements vary significantly across European markets. An installer working across borders needs to understand each country’s specific standards and expectations.

United Kingdom: BS 8243

The UK standard governs the format and content of alarm messages transmitted from alarm systems to ARC receivers. BS 8243 defines three message levels:

  • Level 1: Basic alarm event with account number and event type
  • Level 2: Level 1 plus zone identity and event time
  • Level 3: Level 2 plus confirmed alarm status and verification information

Most UK ARCs expect Level 2 messages as minimum and many now require Level 3 for police response. BS 8243 also mandates dual-path communication for systems that request police dispatch, with the backup path capable of carrying the full Level 3 message load.

The Roombanker hub supports BS 8243 Level 3 messaging with dual-path failover, transmitting Contact ID codes with zone and partition data that satisfies UK ARC requirements without additional protocol converters.

Germany: VdS

VdS (Verband der Sachversicherer) certification is the standard for insurance-grade alarm systems in Germany. VdS 2311 specifies the requirements for hazard alarm systems, including transmission to ARCs.

VdS requires:

  • Dual-path communication with transmission time under 30 seconds (Grade 2) or 10 seconds (Grade 3)
  • Encrypted communication between the alarm panel and the ARC receiver
  • Supervision of the communication path with fault reporting within 5 minutes
  • Event logging with minimum 30-day storage at the panel

VdS also requires that the ARC receiver acknowledge each transmission. If acknowledgment is not received within a defined window, the panel must retry on the alternate path.

France: APSAD

APSAD P3/P4 certification, managed by CNPP, is the French standard for alarm transmission to monitoring centers. APSAD defines two categories:

  • P3: Standard intrusion detection with unsupervised transmission
  • P4: Monitored transmission with path supervision, typically required for insurance compliance

French ARCs generally expect dual-path communication for P4 compliance, with transmission time under 30 seconds. APSAD also requires compatibility with the French-language event code format used by many domestic monitoring stations, alongside standard Contact ID codes.

The Roombanker hub’s configurable event code mapping allows translation of standard Contact ID codes into the formats expected by French ARCs, which eliminates the need for an external protocol converter at the hub level.

EN 18031-1 Cybersecurity Requirements for ARC Communication

EN 18031-1, effective from February 2025, establishes cybersecurity requirements for radio equipment connected to communication networks. For ARC-connected alarm systems, the standard introduces three specific requirements:

Mutual authentication: The alarm hub and the ARC receiver must authenticate each other before establishing a data session. This prevents unauthorized devices from injecting false events into the monitoring stream and prevents the hub from connecting to fraudulent receivers. The Roombanker hub implements mutual TLS (mTLS) authentication using X.509 certificates pre-provisioned during ARC onboarding.

Secure firmware update: The hub must verify the integrity and authenticity of firmware updates before applying them. EN 18031-1 requires signed firmware with cryptographic verification, preventing compromised firmware from altering event transmission behavior.

Secure communication session: The data path between the hub and ARC must be encrypted using algorithms specified in the standard. Communication that falls back to an unencrypted path during failover violates the requirement.

At time of writing, EN 18031-1 compliance is mandatory for new radio equipment placed on the EU market. Existing installations must comply by February 2026.

Encrypted Communication: AES-128 and TLS

ARC communication travels over public network infrastructure, which means it can be intercepted, modified, or replayed without encryption. Two encryption layers protect ARC transmissions.

Transport Layer Security (TLS)

TLS 1.2 or 1.3 encrypts the TCP connection between the hub and the ARC receiver. This provides protection at the transport layer, ensuring that the entire message payload, headers, and protocol metadata are encrypted during transit.

TLS also provides server authentication through X.509 certificates, which allows the hub to verify that it is connecting to the legitimate ARC receiver and not an impostor. When mutual TLS is configured, the ARC receiver also verifies the hub’s identity.

AES-128 Payload Encryption

In addition to TLS, the SIA DC-09 protocol supports AES-128 encryption of the Contact ID message payload. This provides end-to-end encryption from the hub to the ARC receiver’s decoding software, independent of the transport layer.

The dual-layer approach protects against two different threat models: TLS protects the communication channel (mitigating man-in-the-middle attacks on the network path), while AES-128 payload encryption protects the event data itself (ensuring that even a compromised ARC receiver infrastructure cannot decrypt historical event data).

The Roombanker hub supports both TLS 1.2 and AES-128 payload encryption simultaneously, which is the configuration recommended by EN 18031-1 guidance. Hardware-accelerated encryption on the RBF SIP Chip keeps the performance impact below measurable latency increase in production testing.

FAQ: ARC Integration for Wireless Alarm Systems

1. What is the difference between SIA DC-09 and Contact ID?

Contact ID is the event code format that defines the meaning of each alarm event (138 = burglary, 110 = fire, etc.). SIA DC-09 is the protocol specification that defines how Contact ID messages are packaged and transmitted over IP networks. Think of Contact ID as the language and SIA DC-09 as the envelope. All SIA DC-09 implementations carry Contact ID event codes, but Contact ID codes can also be carried over other protocols (SIA DC-04 over voice, or proprietary formats).

2. Can a wireless alarm system achieve Grade 3 ARC transmission time?

Yes. Grade 3 requires transmission within 10 seconds. In internal testing across 40 sites in Germany and Poland in Q3 2025, the Roombanker hub averaged 6.2 seconds over Ethernet and 8.4 seconds over 4G LTE. The limiting factor for wireless systems is not the radio path between sensors and the hub (which operates in milliseconds) but the wide-area network transmission to the ARC receiver. A dual-path configuration with a responsive IP path and 4G LTE backup meets Grade 3 timing thresholds in the majority of real-world installations.

3. What happens if both communication paths fail simultaneously?

If both primary and backup paths are unavailable when an event occurs, the Roombanker hub buffers up to 500 events in non-volatile memory. The hub continues to retry transmission on both paths at 30-second intervals. When a path is restored, the hub transmits all buffered events in chronological order, including the timestamp of each original event. The ARC receiver processes these as delayed events. For Grade 3 installations where guaranteed delivery is critical, a secondary 4G LTE module from a different carrier provides additional path diversity.

4. Do I need different hardware for different European countries?

No. The Roombanker hub supports multi-region ARC communication through software configuration. The same hub can transmit Contact ID codes in the UK format expected by BS 8243 Level 3 receivers, the VdS-compliant encrypted format used in Germany, and the APSAD P4 format required in France. Country-specific configurations are applied through the Roombanker Portal at deployment time. The cellular module supports the 4G LTE bands used across Europe (B1, B3, B7, B8, B20) in a single SKU.

5. How does EN 18031-1 affect existing ARC installations?

EN 18031-1 is a transitional requirement. New equipment placed on the EU market from February 2025 must comply. Existing installations have until February 2026 to upgrade. For ARC-connected systems, the practical impact is: (a) the hub and ARC must authenticate mutually (typically through mTLS with X.509 certificates), (b) the communication path must be encrypted with no unencrypted fallback, and (c) firmware updates must be cryptographically signed. Roombanker hubs manufactured from January 2025 support all three requirements. Older hubs require a firmware update to enable TLS 1.2 with mutual authentication.

6. What supervision interval is sufficient for Grade 2 compliance?

EN 50131-2-2 requires Grade 2 sensors to report status at least once every 24 hours. Roombanker’s default 15-minute PIR sensor supervision interval exceeds this by a factor of 96. The shorter interval provides practical benefits beyond compliance: faster detection of device tamper or battery failure, earlier warning of range degradation, and more frequent path quality data for the installer monitoring system health through the Roombanker Portal.

7. Can I integrate a Roombanker system with an existing ARC contract?

In most cases, yes. The Roombanker hub transmits Contact ID event codes over SIA DC-09, which is the protocol supported by the majority of European ARC receivers. If your ARC uses a different protocol, the hub can be configured to connect through a third-party alarm receiver that performs protocol translation. The Roombanker technical team provides ARC compatibility verification during the onboarding process. Contact your regional distributor for pre-deployment testing with your monitoring station.

Download the ARC Integration Specification

Get the full technical specification including protocol message formats, receiver compatibility matrix, and country-specific configuration templates. This document is intended for security integrators and ARC technical teams planning Roombanker system integration.

Download ARC Integration Specification PDF


Technical accuracy note: Transmission time data cited from internal testing (Q3 2025, 40 sites, Germany and Poland). Supervision interval and failover timing data from Roombanker engineering test reports, documented per ISO 17025 test methodology standards. EN 50131 references based on published CEN/CENELEC standard texts. Protocol specifications referenced from SIA DC-09 and DC-04 published standards. The EN 50131 standard (CEN/CENELEC, 2016) provides the framework for alarm transmission requirements cited throughout this guide.


Explore more: RBF Protocol Technical Deep-Dive | SSG Romania Case Study | Roombanker Smart Hub | Become a Distributor

Scroll to Top
Contact Us

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Be Our Distributors &Partners!

      This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

      Smart Security & Automation System