Next Article in Journal
Finger-Vein Recognition Using Heterogeneous Databases by Domain Adaption Based on a Cycle-Consistent Adversarial Network
Previous Article in Journal
Towards Robust Multiple Blind Source Localization Using Source Separation and Beamforming
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An IOHMM-Based Framework to Investigate Drift in Effectiveness of IoT-Based Systems

1
CNRS, Laboratoire I3S, Université Côte d’Azur (UCA), UMR 7271, 06900 Sophia Antipolis, France
2
Telecom Physique, Université de Strasbourg, 67400 Illkirch-Graffenstaden, France
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(2), 527; https://doi.org/10.3390/s21020527
Submission received: 17 December 2020 / Revised: 8 January 2021 / Accepted: 10 January 2021 / Published: 13 January 2021
(This article belongs to the Section Internet of Things)

Abstract

:
IoT-based systems, when interacting with the physical environment through actuators, are complex systems difficult to model. Formal verification techniques carried out at design-time being often ineffective in this context, these systems have to be quantitatively evaluated for effectiveness at run-time, i.e., for the extent to which they behave as expected. This evaluation is achieved by confronting a model of the effects they should legitimately produce in different contexts to those observed in the field. However, this quantitative evaluation is not informative on the drifts in effectiveness, it does not help designers investigate their possible causes, increasing the time needed to resolve them. To address this problem, and assuming that models of legitimate behavior can be described by means of Input-Output Hidden Markov Models (IOHMMs), a novel generic unsupervised clustering-based IOHMM structure and parameters learning algorithm is developed. This algorithm is first used to learn a model of legitimate behavior. Then, a model of the observed behavior is learned from observations gathered in the field. A second algorithm builds a dissimilarity graph that makes clear structural and parametric differences between both models, thus providing guidance to designers to help them investigate possible causes of drift in effectiveness. The approach is validated on a real world dataset collected in a smart home.

1. Introduction

Systems based on the Internet of Things (IoT-based systems) such as ambient assisted living systems (AAL) [1] and smart cyber–physical systems (CPS) [2], by interacting with the physical environment through actuators, face many challenges, pertaining to reliability, safety and resilience requirements. These challenges are difficult to meet because the physical environment is complex and difficult to model [3]. Designers are thus limited in their ability to predict the effects of their interactions at design-time and to formally verify their conformity to logical properties, whether functional or temporal. It is then necessary to quantitatively assess the effectiveness of these systems at run-time [4], i.e., the extent to which these systems behave as expected. This assessment is carried out by confronting a model of the effects legitimately expected to be produced in particular contexts to those observed in the field [5]. This model of legitimate behavior is generally built from the experience of experts, documents describing standards and safety, users’ preferences, etc., which are formulated by If-Then rules for their interpretation [6].
The quantitative effectiveness assessment, as quality (e.g., quality of service (QoS) [7,8], quality of experience (QoE) [9]), performance and reliability assessment metrics (e.g., time-to-failure (TTF), remaining useful life (RUL), etc.), can be used to highlight any deterioration of an IoT-based system and trigger analyses leading to corrective actions. However, these assessments do not provide guidance to designers that would help them direct their research and identify the possible causes of drifts in effectiveness, increasing the time needed to resolve them. More specifically, drifts in effectiveness, from the model of the legitimate behavior perspective, can be threefold: (1) the system does not behave as expected (2), the model is incomplete, the observed behavior, although legitimate, has not been foreseen and (3), there is an incipient drift in parameters, i.e., the observed behavior, although legitimate, is slightly outside the expectations (also known as concept drift). Whether it is due to unforeseen anomalous or legitimate behaviors or to parameters drifting over time, designers must be provided with tools to support them in investigating drifts in effectiveness by correlating various events and consulting system experts to possibly determine their corresponding root causes as well as their relevant data, thereby reducing the time needed to resolve them.
In this paper, we consider IoT-based systems whose model of the legitimate behavior can be described with Input-Output Hidden Markov Models (IOHMMs) [10]. This framework is widely used for behavioral modeling [11,12] and brings numerous advantages herein [13]; (1) it is an explainable graphical model [14] part of the Dynamic Bayesian Networks (DBN) family; (2) it formalizes conditional dependencies between the effects and their stimuli (i.e., contextual input, events); (3) it incorporates tolerances on expectations. On the basis of this assumption, the contribution of this paper is two-fold:
  • With the assumption that observations are stochastically correlated with the IoT-based system conditions (i.e., there exists a bijection between states and observations [15]), we develop a novel generic clustering-based algorithm for learning both the IOHMM structure Φ (states and state-transitions) and the parameters λ (distribution parameters) from continuous observations. The algorithm is proposed to be implemented with the Hierarchical Density-Based Spatial Clustering of Applications with Noise (HDBSCAN*) [16] clustering algorithm and a recent incremental extension denoted by Flexible, Incremental, Scalable, Hierarchical Density-Based Clustering for Arbitrary Data and Distance (FISHDBC) [17].
  • On the basis of this algorithm, we propose a framework for investigating drifts in effectiveness of IoT-based systems. This framework takes place in two steps as depicted in Figure 1:
    (a)
    The learning algorithm is fed with observations corresponding to the effects expected to be produced by an IoT-based system, leading to the learning of a model of the legitimate behavior. This model can further be used to quantitatively assess the effectiveness of the system at run-time as done in [5].
    (b)
    This model is incremented with observations of the effects produced by the system in operation within its environment, leading to the learning of a model of the observed behavior. Then, on the basis of these models, an algorithm is proposed and used to build a directed dissimilarity graph that highlights differences between both models, thereby helping designers direct their research and identify the possible causes of drifts in effectiveness.

2. Related Works

The problems addressed in this paper have connections with the fields of model-based fault diagnosis as well as fault detection and identification and system health monitoring, just to name a few.
In [18], authors apply IOHMM to failure diagnosis, prognosis and health monitoring of a diesel generator. The model is used to classify observations so as to determine the degradation state of the system. The model contains three states, a first one characterizing the legitimate behavior, a second one characterizing the presence of a degradation and a third one characterizing a severe degradation. This approach is commonly used in the literature [19,20] where Markovian models formalize legitimate and anomalous behaviors, often grouped into abstract states whose semantics result from an analysis carried out upfront. Faults identification and detection is then similar to a classification problem (i.e., estimation of the current state, be it legitimate or anomalous).
One of the advantages of these approaches is that HMMs (and IOHMMs) are explainable models [14]. However, while these approaches are relevant when the state space of the considered systems is limited, they are not (at best hardly) applicable to complex systems whose set of anomalous (and legitimate) states cannot be completely known upfront [21].
In order to detect unknown emerging behaviors, whether legitimate or anomalous, some authors envisage models with variable state spaces on the basis of unsupervised online learning schemes. For instance, in [22], authors developed an incremental online model learning approach that extends the BIRCH clustering algorithm [23]. While the model grows continuously as new data arrive, it has also the capability to forget obsolete observations. In [24], authors investigated the Typicality and Eccentricity Data Analytics (TEDA) clustering approach [25], based on density estimates. In addition to these approaches, some authors use adaptive HMMs to assess the health condition of mechanical systems. In [26], a method in the Statistical Process Control (SPC) is combined with an adaptive HMM for unknown wear states detection and diagnosis of a turning process. The structure of the model is changed to represent degradation processes in the presence of unknown faults. In [27], an adaptive HMM is used for online learning of dynamic changes in the health of machines. New health states are described online by adding new hidden states in the HMM. Health degradations are quantified online by a Health Index (HI) that measures the similarity between two density distributions that respectively describe the historic and current health states.
While the aforementioned approaches allow to increment models with unforeseen legitimate or anomalous behaviors, they do not provide guidance to designers to help them investigate possible causes of the anomalous behaviors. For instance, in [22], anomalous behaviors trigger alarms, incremental learning being justified for reducing the false alarm rate. In [24], designers are provided with a quantitative evaluation, not informative on the symptoms and the causes of the anomalous behaviors.
Interesting approaches have been implemented as part of the QoE. For instance, in [28], the authors use the Pseudo Subjective Quality Assessment (PSQA) approach to automatically assess the QoE in the field of video streaming. The PSQA (also known as Quantitative Quality Assessment, QQA) approach consists of learning, by performing a set of subjective tests, how humans react to quality. The learning tool used is a specific class of neural network (Random Neural Network, RNN). The QoE assessment is then based on an estimation function Q defined during the learning phase and specific features in video streams (e.g., the frame loss rate or the effective bandwidth of the connection). In [29], a systematic online health assessment approach is proposed on the basis of a Growing Hierarchical Self-Organizing Map (GHSOM) algorithm, a variant of Self-Organizing Map (SOM), a type of Artificial Neural Network (ANN), with adaptive self-learning techniques. The method enables the identification of novel working condition states, such as new rotating speed or processing recipe, and the recognition of new degradation extent in the arriving monitoring data, and includes them into the prior learning models.
RNNs can model a wide range of dynamical systems [30]. However, they have a large number of parameters making them hardly interpretable and explainable [31] and impractical for providing guidance to designers to help them investigate drifts. In [29], although SOM produce low-dimensional, discretized representation of the observation space, authors do not explicitly describe in what form engineers and operators are kept informed of any significant change in the model.
Specific to IoT, in [32], a systematic literature review has been conducted on the developed statistical and machine learning methods for anomaly detection, analysis and prediction in smart environments, transportation networks, health care systems, smart objects and industrial systems. In this study, a gap was found in the visualization of anomalies for the analysis. The authors recognize that new methods and approaches are needed in order to analyze anomalies. The approach proposed in this document aims at filling this gap. It is based on the IOHMM modeling framework, which makes it possible to define explainable behavioral models. Like some of the aforementioned approaches, we envisage models with variable state spaces on the basis of unsupervised online learning schemes for learning the behavior of a system from observations. However, unlike these approaches, we propose an algorithm that, beyond metrics, makes clear the differences between the model of the legitimate behavior and the one learned from observations, providing guidance to designers to help them investigate anomalous behaviors.

3. Background on Input-Output Hidden Markov Model

In this paper, we consider IoT-based systems whose model of the legitimate behavior can be described with the IOHMM modeling framework [10]. IOHMMs model a pair of stochastic input-output processes ( U , Y ) as a result of an underlying stochastic Markovian process X that cannot be observed (it is said hidden). From a generative point of view, a sequence of input-output continuous observations ( u ( k ) , y ( k ) ) k = 1 K , K N 🟉 ( N 🟉 is the set of positive natural numbers greater than 0), u ( k ) R n ( R n is an n-dimensional vector of real numbers), y ( k ) R m , is the outcome of a path along the states of X ; y ( k ) and u ( k ) are instances of the random variables ( U ( k ) , Y ( k ) ) whose distributions are respectively governed by density functions determined by the states and the state transitions along the path. Formally, a continuous density discrete state space (discrete time) Input-Output Hidden Markov Model (IOHMM), whose graphical representation is depicted in Figure 2, is defined by the tuple < Q , π , A , B > where:
  • Q = x 1 , x 2 , , x N is the finite set of hidden states; x ( k ) denotes the hidden state at time k,
  • π = ( π 1 , π 2 , , π N ) T is the initial state distribution vector. π i denotes the likelihood of the state i to be the first state of a state sequence. In this paper, we assume that the elements π i of π are equally probable, i.e., equal to 1 N ,
  • A is the N × N state transition matrix, where each element a i j of the matrix is a n-dimensional contextual input distribution ( 1 i , j N ). Thus, a i j ( u ) = p x ( k + 1 ) = j | x ( k ) = i , u ( k ) = u denotes the likelihood of transitioning to state x ( k + 1 ) = j at time k + 1 , given the current state x ( k ) = i and the contextual input vector u ( k ) = u R n at time k,
  • B = ( b 1 , b 2 , , b N ) T is the state emission vector, where each element b i ( 1 i N ) is a m-dimensional output distribution. b i ( y ) = p ( y ( k ) = y | x ( k ) = i ) denotes the likelihood of observing the output vector y ( k ) = y R m at time k while being in the state x ( k ) = i . The output observation y ( k ) at time k only depends on the state x ( k ) at time k.
The structure Φ of an IOHMM is defined by the number of states N and the elements a i j of the state transition matrix A such that there exists an input u that leads a transition from the state i to the state j (i.e., ∃ u s.t. a i j ( u ) > 0 , ∀ 1 i , j < N ). The parameters λ of an IOHMM correspond to the input and output distribution parameters.
This model serves as a basis for efficient solutions to several inference problems [33]:
(1)
The problem of inferring the likelihood of an observation sequence (i.e., p ( u ( k ) , y ( k ) ) k = 1 K ), as well as inferring the distribution over hidden states at the end of the observation sequence (i.e., p x ( K ) | ( u ( 1 ) , y ( 1 ) ) , , ( u ( K ) , y ( K ) ) ) can be solved by the Forward algorithm (filtering).
(2)
The problem of inferring the distribution over hidden states anywhere in the observation sequence (i.e., p x ( k ) | ( u ( 1 ) , y ( 1 ) ) , , ( u ( K ) , y ( K ) ) , k < K ) can be solved by the Forward-Backward algorithm (smoothing).
(3)
The problem of inferring the most likely sequence of hidden states that led to the generation of the observation sequence can be solved by the Viterbi algorithm.
This modeling framework brings numerous advantages [13]; (1) it is an explainable graphical model, there is a 1:1 correspondence between observations and states; (2) it formalizes conditional dependencies between the effects (outputs) and their context (inputs), making them suitable to model dynamical systems; (3) it incorporates tolerances on expectations related to uncertainties inherent in the natural variability of physical processes and disturbances possibly resulting from adaptation mechanisms [34] (randomness [35]) and/or uncertainties related to prior knowledge on the system and/or users’ expectations (epistemic uncertainties [5,36]).

4. IOHMM Structure and Parameters Learning

The approach proposed in this paper considers the modeling of the legitimate behavior of an IoT-based system as an IOHMM and compares this model with that learned from field observations. The objective was to highlight the differences in behavior that may appear during the operation of the system. To achieve this, the proposed approach thus requires an IOHMM model to be learned from observations prior considering comparing both models and highlighting their differences, i.e., it requires to learn the IOHMM structure and parameters from field observations. While structure and parameters learning problem has been intensively studied in the case of HMMs, no solution has been proposed to date within the IOHMM framework apart from learning the parameters [11,37,38]. The algorithm proposed in the sequel is then a novel algorithm. As part of the solutions proposed within the HMM framework, local search algorithms [39] start from an initial guess of the structure Φ and iterate, by adding, removing states and transitions and by reversing state transitions, until reaching the structure that maximizes the Bayes Information Criterion (BIC). State merging algorithms [40] (conceptually, very similar to agglomerative clustering algorithms) first build a maximum likelihood structure Φ where a different state is associated to each of the observations and where transitions relative to consecutive states (i.e., consecutive observations) are assigned a probability of 1 while the others are assigned a probability of 0. Then, at each iteration, the structure Φ is modified by merging the states on the basis of the maximization of the posterior Bayesian probability criterion. Other approaches have been studied in the literature. For instance, in [41], authors propose an algorithm using both state splitting and state merging operations. In [42], authors incrementally construct the structure Φ using an Instantaneous Topological Map (ITM) algorithm [43]. Here, the hidden state space is continuous and supposed to be discretizable into a finite number of observable regions, every region being represented by a discrete state in the HMM.
Structure learning, whether through local search or state merging, consists in empirically estimating the best state space segmentation from data. In all the aforementioned approaches, parameters λ are learned by using an Incremental Expectation-Maximization (EM) clustering algorithm (e.g., Baum-Welch [44]). Underlying this algorithm is the assumption that observations can be modeled by Gaussian mixture models (GMMs) [45] where parameters λ are described by the mean and the covariance matrix. In the case of multimodal likelihood functions, however, there is no guarantee that the algorithm will avoid becoming trapped at a local maximum, resulting in an inferior clustering solution [46].
In the sequel, we propose a novel unsupervised generic algorithm for learning IOHMM structure Φ and parameters λ . It is generic in the sense that it can accommodate any continuous space clustering algorithm and is not limited to GMMs.

4.1. A Generic Unsupervised Clustering-Based IOHMM Learning Algorithm

What characterizes discrete state space IOHMMs and derivatives is that they model stochastic processes whose states are hidden, i.e., they can only be inferred from continuous observation sequences. Learning the structure Φ and parameters λ (i.e., identifying the model) is first and foremost about segmenting the observation space into a finite number of relevant regions such that each region represents a discrete state, i.e., it is assumed that observations are stochastically correlated with the system conditions, thereby taking advantage of understanding its structure [47]. A region, in this context, refers to "a state of nature that governs the observation generation process. It can be viewed as a source of observations whose distribution is governed by a density function specific to the region" [48].
Observation space segmentation into regions can be achieved using unsupervised clustering algorithms. “These algorithms try to group observations so that the regions thereby obtained reflect the different generation processes they are governed by” [48]. On this basis, we consider a two steps generic algorithm for learning the structure Φ and parameters λ of first order IOHMMs from continuous observation sequences ( u ( k ) , y ( k ) ) k = 1 K . The proposed algorithm is described hereafter (Algorithm 1).
Algorithm 1: Learning of IOHMM structure Φ and parameters λ .
Sensors 21 00527 i001
The first step consists of segmenting the output observation space ( y ( k ) ) k = 1 K into regions (corresponding discrete states in the model) using a clustering algorithm defined by the function f o : R m N 🟉 . Each region is associated with all output observations belonging to it ( c o ( i ) , line 2). The set of output regions CO (line 3) provides us with Q (line 4) and the elements b i of the vector B (i.e., the output distribution parameters) are computed by fitting the set c o ( i ) of output observations associated with the region i into the most appropriate (multivariate) distribution (line 7) (With the number of states given by Q, one can alternatively compute the parameters λ using an Expectation-Maximization algorithm, though it assumes observations whose distributions are Gaussian).
The second step consists of segmenting the input observation space ( u ( k ) ) k = 1 K into regions using a clustering algorithm defined by the function f i : R n N 🟉 . Here again, each input observation is associated with the region it belongs to ( c i ( i ) , line 8). The set of input regions is defined by CI (line 9). Then, input and output observation spaces are classified according to the identified regions, i.e., each observation in the sequences ( u ( k ) ) k = 1 K and ( y ( k ) ) k = 1 K is associated to its corresponding region. One obtains the sequence of input regions (SI line 10) and the sequence of states (SO line 11) from which is built the state transition matrix A. The sequence of states SO determines elements a i j to be populated (lines 15 and 16) with input distribution parameters (line 14). Here, each state transition is allowed to handle multiple distributions. Although not allowed in the standard (probabilistic) IOHMM model, this will be useful in investigating the differences between legitimate and observed behaviors (see Section 5).
Let us consider the example depicted in the table below:
k123456789
SI111222200
SO000111122
Output observations first belong to the state 0 (as defined for k = 2 in SO), then there are state transitions from the state 0 to the state 0 ( k : 2 3 and k : 3 4 ), then a state transition from the state 0 to the state 1 ( k : 4 5 ), then from the state 1 to the state 1 ( k : 5 6 , k : 6 7 and k : 7 8 ), etc. Following this sequence of states, elements a 00 , a 01 , a 11 , a 12 and a 22 have to be populated with input distribution parameters. Recall from the IOHMM model that the state at time k depends on the input at time k 1 . Thus, a k 1 , k CI SI ( k 1 ) , i.e., a k 1 , k contains the distribution parameters obtained by fitting the set of input observations associated with the input region SI ( k 1 ) at time k 1 into most appropriate (multivariate) distribution. Thus, considering k : 2 3 , a 00 contains distribution parameters associated with input observations of the input region 1 (as defined in SI at time k = 2 ), a 01 and a 11 contain those associated with input observations of the input region 2, etc.
As such, the proposed algorithm accommodates any unsupervised (possibly incremental) clustering algorithm where incremental has to be understood here as the ability to process continuous observation sequences as they arrive [49]. In this paper, we assume the following hypotheses:
  • The number of states | Q | is not known a priori.
  • The processes underlying the observations are unknown, so neither their distribution, their density, nor their law of generation (shape) are known.
  • Observations could be noisy and, considering incremental learning, incomplete.
So as to address these hypotheses, we consider the HDBSCAN* hierarchical density-based clustering algorithm [16].

4.2. Implementation with HDBSCAN*

The HDBSCAN 🟉 algorithm [16], and its incremental extension (FISHDBC [17]), is a clustering algorithm for exploratory data analysis that extends the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm [50]. It can operate correctly up to 100 dimensional data (https://hdbscan.readthedocs.io/en/latest/faq.html).
In the context of this paper, the main advantages of the algorithm lie in the fact that:
  • It does not require to specify upfront the number of clusters in the data.
  • It can find non-linearly separable clusters of varying shapes and densities.
  • The ordering of the data does not matter.
  • It supports outlier (or noise) assignments as being observations isolated in sparse regions.
Among the aforementioned advantages, the notion of outliers is particularly relevant when considering model learning. Let us consider two types of outliers:
  • Intrinsic outliers depend on how conservative one wants to be in learning the model, governed by the HDBSCAN* min_samples parameter. The larger the value of min_samples, the more conservative the clustering, i.e., clusters will be restricted to progressively more dense regions with, as a consequence, a higher number of outliers (https://hdbscan.readthedocs.io/en/latest/parameter_selection.html) (Figure 3). The notion of conservatism can be related to that of distinguishability, i.e., the structure of an IOHMM is distinguishable when all the distributions (elements of the transition matrix A and the emission vector B ) are pairwise distinct, supporting a bijection between states and observations [15]. On the contrary, the structure of an IOHMM is completely hidden when all observation distributions are equal thereby, it is clearly impossible to distinguish between states and inference of the structure is impossible. In between these two extrema, increasing the min_samples parameter thus helps making observation distributions pairwise distinct (see Figure 3),
  • Extrinsic outliers depend on the observations (noise) and are particularly interesting in the context of incremental learning. Indeed, while observation sequences arrive progressively, some might reinforce the density of an existing region while some others might form a sparse region not yet dense enough to be considered as a cluster (i.e., there is a lack of knowledge leading these observations to be temporarily considered as outliers and discounted from the clustering process).
Whether intrinsic or extrinsic, outliers have to be discounted from the clustering process. Assuming that they are associated to a dummy cluster c ( i ) , i < 0 , Algorithm 1 is modified as described in Algorithm 2.
Algorithm 2: Outliers removal (extension of Algorithm 1).
Sensors 21 00527 i002

4.3. Experimental Evaluation

The experimentation is carried out on a real world dataset gathered in a smart-home equipped with 54 IoT devices offering up to 228 sensors and actuators (Figure 4). The associated infrastructure is depicted in the Figure 5. Several IoT protocols are used to communicate with all devices (ZWave, Wifi, etc.). Computational resources (Arduino Uno/Nano, Raspberry Pi) are made available at the edge of the infrastructure where software components are deployed through docker containers. These software components define the control logic for actuators (e.g., roller shutters) or extract features from sensor observations (e.g., the sound characteristics of the microphone signal). Observations are recorded into a database (InfluxDB) on a regular basis. For instance, ZWave devices provide one observation per minute, Netatmo devices provide observations each 10 min, the status of the Neato smart vacuum cleaner is updated each minute, etc.
On the basis of this setup, the objective is to learn a model of the legitimate behavior of a set of devices in different contexts on the basis of sound features. The devices considered for this experiment are the TV and the Amazon Echo smart speaker.
From a modeling perspective, output observations (legitimate effects) are characterized by Mel-Frequency Cepstral Coeffs (MFCCs) and Zero Crossing Rate (ZCR) sound features, extracted from a microphone signal and processed at the edge of the IoT infrastructure by a Raspberry Pi. Input observations (contexts) are characterized by the operating status of the TV and the Amazon Echo smart speaker. MFCC and ZCR features have been selected for their capacity at producing a good segmentation of the observation space.
While both devices can produce sound into the environment, users expect that they do not produce it simultaneously. The dataset used for the experiment reproduces this legitimate behavior as depicted in Figure 6.
Observations are colored according to the contexts identified by the HDBSCAN* algorithm with min_samples = 40. Input observations (i.e., TV_Status and Echo_Status) are segmented into three clusters. Observations are colored in cyan when both devices are switched OFF. Observations are colored in yellow when the TV is ON and the Amazon Echo smart speaker is OFF. Finally, observations are colored in magenta when the TV is OFF and the Amazon Echo smart speaker is OFF. Output observations (i.e., ZCR and MFCC sound features) are also segmented into three clusters. The blue one corresponds to the silence; the orange one characterizes the sound emitted by the TV and the green one characterizes the sound emitted by the Amazon Echo smart player (here, playing music). As expected, none of the devices operate simultaneously.
The dataset is applied to the Algorithm 1 implemented with HDBSCAN* with min_samples parameter set to 40. The IOHMM model of the legitimate behavior learned from the dataset is depicted in Figure 7 where distributions are fitted into Gaussian Mixture Models (GMMs), characterized by the mean and the standard deviation of each feature (i.e., <feature> -> [<mean>,<stdev>]).
The completeness of the IOHMM model learned here depends, however, on the input-output observations the algorithm has been fed with during the learning process. There is no certainty that the model is complete, a legitimate behavior may occur in the long run that was not part of the initial set of observations. For instance, what if a new device producing sound is added into the environment? A new state should appear, whether legitimate or not, characterizing the sound emitted by this new device. Generally speaking, the behavior observed in the field in the long run may no longer correspond to that which is supposed to be legitimate, defined at a certain point in time. Whether this is due to the fact that the model of the legitimate behavior is incomplete (e.g., not enough observations), that its parameter values do not fit the concrete legitimate behavior anymore (e.g., due to the drift in the system parameters) or that new legitimate or illegitimate states and/or state transitions have appeared, it is necessary to provide designers with tools that allow them to investigate and understand changes that have potentially occurred.

5. Investigating Drifts in Effectiveness

In this paper, the study of drifts in effectiveness is carried out by identifying the structural and parametric dissimilarities between the model of the legitimate behavior of an IoT-based system and a model learned from field observations. In the literature, dissimilarities between two HMMs are mainly characterized by a measure. In [51], authors present a method that computes a variant of the Hellinger distance between two HMMs representing legitimate and observed behaviors. In [52], authors use the Wasserstein distance. While these quantitative assessments might be useful as performance indicators, they do not explain, however, the structural and parametric differences between the models. Moreover, the aforementioned measures provide a global distance between the distributions of probability thereby, are limited to only provide dissimilarities on the parameters.
In the sequel, we propose an algorithm that builds a dissimilarity graph between legitimate and observed behaviors, making clear both structural and parametric differences and providing guidance to designers to help them investigate possible causes of drift in effectiveness, reducing the time needed to resolve them.

5.1. An Algorithm for Identifying IOHMMs Structural and Parametric Dissimilarities

The approach proposed for identifying IOHMMs structural and parametric dissimilarities is based on the learning Algorithm 1, implemented with the FISHDBC algorithm [17], a recent incremental extension of the HDBSCAN* clustering algorithm. The main idea (Algorithm A2) is first to learn, using the learning Algorithm 1 implemented with FISHDBC, a model of the legitimate behavior of the IoT-based system from input-output observations, either generated from simulations or gathered from the field. Then, at some point in time, field observations, gathered on the long run, are incrementally fed into the algorithm. The following scenarios, denoting dissimilarities between legitimate and observed behaviors, may occur:
  • (Structure related) Output observations gathered from the field lead new clusters to occur. These new clusters define new states (either legitimate or anomalous) not anticipated/foreseen in the model of the legitimate behavior.
  • (Structure related) Input observations gathered from the field lead new state transitions to occur (either legitimate or anomalous) not anticipated/foreseen in the model of the legitimate behavior.
  • (Parameters related) Input and output observations gathered from the field lead distribution parameters (e.g., mean and standard deviation) to be slightly modified, denoting a drift in the initial parameter values.
  • (Structure and Parameters related) Input-output observations gathered from the field do not cover the states and state transitions defined in the model of the legitimate behavior. This situation implies that either not enough observations have been gathered from the field (e.g., rare events) or that the model is somehow wrong, i.e., it expects a different behavior than the one concretely implemented.
IOHMMs being graphical models one can highlight the aforementioned dissimilarities, thereby helping designers to identify changes that may have occurred. To this end, the algorithm described in Appendix A builds a dissimilarity graph as follows:
  • (lines 3 and 4) First, using the Algorithm 1 implemented with FISHDBC clustering algorithm, a model of the legitimate behavior is learned from observations ( u ( v ) , y ( v ) ) v = 1 V . Then, this model is incremented with observations ( u ( w ) , y ( w ) ) w = 1 W gathered from the field in the long run.
  • (line 5) On the basis of the sets of clusters CI and CO and the sequences of clusters SI and SO obtained from the previous step, one can compute, using the Algorithm A1, the vector B w and the matrix A w of the frequency of occurrence of each state and state transition, respectively.
  • (lines 6 to 16) The first V elements of SO correspond to the expected states computed from ( y ( v ) ) v = 1 V . The remaining V + W + 1 elements correspond to the states obtained from output observations ( y ( w ) ) w = 1 W gathered from the field. The idea is to parse states associated to the latter and verify if they are present or not in the former. A node is created in the dissimilarity graph for each state whose color depends on whether the state is present (blue, meaning the state is expected) or not (red, the state is not expected). The reverse process is done (lines 13 to 16) to detect states that are present in the former but not present in the latter (orange, an expected state is not covered). The width of the states depends on their frequency of occurrence given by B w .
  • (lines 17 to 21) This part of the algorithm is devoted to compute the transition matrix A corresponding to the first V elements of SI and SO corresponding to the legitimate behavior.
  • (lines 22 to 30) Transition matrices A and A are compared for dissimilarities. Edges are added into the dissimilarity graph for each state transition whose color depends on whether a legitimate (blue) or illegitimate (red) state transition occurred. Legitimate state transitions not covered are associated to edges colored in orange in the dissimilarity graph. The width of the state transitions depends on their frequency of occurrence given by A w .

5.2. Experimental Evaluation

The dataset used in the Section 4.3, corresponding to the legitimate behavior of an IoT-based system is complemented with longer run observations gathered from the same physical environment (Figure 8).
This dataset highlights two unforeseen behaviors (denoted in magenta in Figure 8) that will have to be highlighted by the dissimilarity graph algorithm described in the previous section. A first behavior concerns a configuration on the TV and the Amazon Echo smart speaker, both operating simultaneously (Figure 8, input features from observation#80 to #230). This behavior is illegitimate, both devices must not operate simultaneously. The second behavior is related to a new device that has appeared in the environment. This device is an autonomous smart vacuum cleaner the inhabitants have recently acquired (Figure 8, output features from observation#280 to #430, then from observation#520 to #610 and, finally, from observation#800 to #1000). This behavior is legitimate, the model of the legitimate behavior has to be updated according to this new device.
The dataset representing the legitimate behavior (Figure 6) and the dataset representing the behavior observed from the field (Figure 8) are applied to the Algorithm A2. The resulting dissimilarity graph is depicted in Figure 9.
Observations from the field whose behavior corresponds to the legitimate behavior lead blue states and state transitions to appear, while those whose behavior is not legitimate or legitimate but unforeseen in the model, lead red states and state transitions to appear. For instance, the state 0 in Figure 9 corresponds to the smart vacuum cleaner emitting noise while being in operation. This state is not part of the model of the legitimate behavior, i.e., ZCR/MFCC observations characterizing this state do not correspond to any state defined in the model of the legitimate behavior. Thus, according to the model of the legitimate behavior, this device is not supposed to exist. Thus, a drift in effectiveness occurs as soon as the smart vacuum cleaner enters the environment. In this case, the model of the legitimate behavior must be updated with this legitimate state as well as with the operating status of the vacuum cleaner as a condition for entering/exiting this new state. As such, the dissimilarity graph provides the symptoms of drifts in effectiveness, not their root cause. From the designers’ point of view, investigations must be carried out, leading to correlate, in this case, the ZCR/MFCC observation values with the smart vacuum cleaner.
In addition to this new state, additional state transitions occur, denoting unforeseen legitimate and illegitimate behaviors. For instance, state transitions occur where both the TV and the Amazon Echo smart speaker operate simultaneously (denoted in magenta in Figure 8, TV_Status and Echo_Status are set to one). This behavior is not legitimate (users expect that these devices do not produce sound simultaneously) and, from a designer perspective, the root cause analysis is straightforward. It should be noted that such a configuration does not lead to the emergence of a new state. Actually, from the selected sound features, the configuration where both devices operate simultaneously leads to oscillate between state 1, state 2 and state 3 characterizing the TV in operation, the Amazon Echo smart speaker in operation and the silence, respectively. In this context, the IOHMM modeling framework leveraged in this paper, by allowing to specify contextual inputs, adds valuable information that help designers to analyze drifts in effectiveness.
Additional state transitions occur where either the TV or the Amazon Echo smart speaker are in operation. These configurations are legitimate but were not part of the data used to learn the model of the legitimate behavior.
The proposed algorithm enables statistical analysis on states and state transitions, i.e., the width of the states and the state transitions depends on their frequency of occurrence. For instance, the state 3 (corresponding to the silence) in Figure 9, occurs more frequently than others. Providing designers with this information may add valuable insights on the behavior of the system beyond dissimilarities between states and state transitions.

6. Conclusions and Perspectives

IoT-based systems whose purpose is achieved through interactions with the physical environment are complex and difficult to model. State-of-the-art formal verification techniques carried out at design-time are often ineffective even though the trustworthiness of these systems remains a first class concern. One way to address this problem is to quantitatively evaluate their effectiveness at run-time on the basis of a model of their legitimate behavior and field observations. However, while this quantitative evaluation can be leveraged as part of a monitoring process, thereby triggering actions in the field and/or conceptual investigations on the system in response to drifts in effectiveness, it does not provide guidance to designers to help them investigate their possible causes, increasing the time needed to resolve them. To address this problem, a novel unsupervised generic clustering-based Input-Output Hidden Markov Model (IOHMM) structure and parameters learning algorithm, implemented with HDBSCAN*/FISHDBC clustering algorithms was presented. These algorithms were first leveraged to learn the model of the legitimate behavior of an IoT-based system from continuous observations either generated from simulations or gathered from the field. This model was then complemented with observations from the field, characterizing the IoT-based system in operation. Then, a second algorithm was proposed to generate a dissimilarity graph making it clear to designers the structural and parametric differences between both models, helping them to investigate their possible causes. In [32], a gap was found in the visualization of anomalies for the analysis of IoT-based systems. The authors recognize that new methods and approaches are needed. The approach proposed in this paper contributes to this field.
The approach proposed in this paper is generic; assuming that observations are stochastically correlated with the IoT-based system conditions, (1) the unsupervised learning algorithm can accommodate any continuous observation space clustering algorithm, (2) observations can be fitted into any distribution type beyond Gaussian Mixture Models (GMM) usually assumed, for instance, in the Expectation-Maximization-based (EM) algorithms (e.g., Baum-Welch).
Although promising, the approach presented in this paper raises questions that shall be addressed in future research. For instance, specific to the HDBSCAN* algorithm and derivatives is the question on how to choose the min_samples parameter. A possible approach would be to handle model learning as an optimization problem where the min_samples parameter value chosen is the one maximizing a particular criteria (e.g., likelihood, Bayesian Information Criteria (BIC)). The IOHMM unsupervised learning algorithm presented in this paper is based on observation space clustering and we also plan to leverage clustering evaluation indexes (e.g., silhouette [53], Davies-Bouldin [54] or Calinski-Harabasz [55]) as criteria. Finally, we plan to implement a functionality that would enable the learning algorithm to forget the obsolete elements of the IOHMM model learned from field observations.

Author Contributions

Conceptualization, G.R. and J.-Y.T.; methodology, G.R.; software, G.R., G.C. and F.D.; validation, G.C. and S.L.; resources, S.L.; data curation, S.L.; writing—original draft preparation, G.R.; project administration, J.-Y.T. and S.L.; funding acquisition, J.-Y.T. All authors have read and agreed to the published version of the manuscript.

Funding

The research leading to these results has received funding from the European Commission’s H2020 Program under grant agreement numbers 780351 (ENACT).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Publicly available datasets were analyzed in this study. This data can be found here: https://gitlab.com/enact/behavioural_drift_analysis/-/blob/master/demos/demo_smarthome/Dataset_MDPI_Sensors.zip.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Dissimilarity Graph Computation Algorithms

Algorithm A1: States and state transitions weights computation.
Sensors 21 00527 i003
Algorithm A2: Dissimilarity graph computation.
Sensors 21 00527 i004

References

  1. Marques, G. Ambient assisted living and internet of things. In Harnessing the Internet of Everything (IoE) for Accelerated Innovation Opportunities; IGI Global: Hershey, PA, USA, 2019; pp. 100–115. [Google Scholar]
  2. Delicato, F.C.; Al-Anbuky, A.; Kevin, I.; Wang, K. Smart Cyber–Physical Systems: Toward Pervasive Intelligence systems. Future Gener. Comput. Syst. 2020, 107, 1134–1139. [Google Scholar] [CrossRef]
  3. Ladyman, J.; Lambert, J.; Wiesner, K. What is a complex system? Eur. J. Philos. Sci. 2013, 3, 33–67. [Google Scholar] [CrossRef]
  4. Rocher, G.; Tigli, J.Y.; Lavirotte, S.; Thanh, N.L. Overview and Challenges of Ambient Systems, towards a Constructivist Approach to their Modelling. arXiv 2020, arXiv:2001.09770. [Google Scholar]
  5. Rocher, G.; Tigli, J.Y.; Lavirotte, S.; Le Thanh, N. A Possibilistic I/O Hidden Semi-Markov Model For Assessing Cyber-Physical Systems Effectiveness. In Proceedings of the 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–9. [Google Scholar]
  6. Ekanayake, T.; Dewasurendra, D.; Abeyratne, S.; Ma, L.; Yarlagadda, P. Model-based fault diagnosis and prognosis of dynamic systems: A review. Procedia Manuf. 2019, 30, 435–442. [Google Scholar] [CrossRef]
  7. Yu, B.; Zhou, J.; Hu, S. Cyber-Physical Systems: An Overview. In Big Data Analytics for Cyber-Physical Systems; Springer: Berlin/Heidelberg, Germany, 2020; pp. 1–11. [Google Scholar]
  8. Sodhro, A.H.; Malokani, A.S.; Sodhro, G.H.; Muzammal, M.; Zongwei, L. An adaptive QoS computation for medical data processing in intelligent healthcare applications. Neural Comput. Appl. 2020, 32, 723–734. [Google Scholar] [CrossRef]
  9. Piamrat, K.; Viho, C.; Bonnin, J.M.; Ksentini, A. Quality of experience measurements for video streaming over wireless networks. In Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations, Las Vegas, NV, USA, 27–29 April 2009; pp. 1184–1189. [Google Scholar]
  10. Bengio, Y.; Frasconi, P. An input output HMM architecture. In Advances in Neural Information Processing Systems; AT&T Bell Labs: Holmdel, NJ, USA, 1995; pp. 427–434. [Google Scholar]
  11. Guillory, A.; Nguyen, H.; Balch, T.; Isbell, C.L., Jr. Learning executable agent behaviors from observation. In Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems, Hakodate, Japan, 8–12 May 2006; pp. 795–797. [Google Scholar]
  12. Zeng, X.; Wang, J. A stochastic driver pedal behavior model incorporating road information. IEEE Trans. Hum. Mach. Syst. 2017, 47, 614–624. [Google Scholar] [CrossRef]
  13. Weber, P.; Simon, C. Benefits of Bayesian Network Models; John Wiley & Sons: Hoboken, NJ, USA, 2016. [Google Scholar]
  14. Hagras, H. Toward human-understandable, explainable AI. Computer 2018, 51, 28–36. [Google Scholar] [CrossRef]
  15. Schliep, A. A Bayesian Approach to Learning Hidden Markov Model Topology with Applications to Biological Sequence Analysis. Ph.D. Thesis, University of Cologne, Cologne, Germany, 2001. [Google Scholar]
  16. Campello, R.J.; Moulavi, D.; Sander, J. Density-based clustering based on hierarchical density estimates. In Pacific-Asia Conference on Knowledge Discovery and Data Mining; Springer: Berlin/Heidelberg, Germany, 2013; pp. 160–172. [Google Scholar]
  17. Dell’Amico, M. FISHDBC: Flexible, Incremental, Scalable, Hierarchical Density-Based Clustering for Arbitrary Data and Distance. arXiv 2019, arXiv:1910.07283. [Google Scholar]
  18. Klingelschmidt, T.; Weber, P.; Simon, C.; Theilliol, D.; Peysson, F. Fault diagnosis and prognosis by using Input-Output Hidden Markov Models applied to a diesel generator. In Proceedings of the 2017 25th Mediterranean Conference on Control and Automation (MED), Valletta, Malta, 3–6 July 2017; pp. 1326–1331. [Google Scholar]
  19. Kouadri, A.; Hajji, M.; Harkat, M.F.; Abodayeh, K.; Mansouri, M.; Nounou, H.; Nounou, M. Hidden Markov model based principal component analysis for intelligent fault diagnosis of wind energy converter systems. Renew. Energy 2020, 150, 598–606. [Google Scholar] [CrossRef]
  20. Ge, N.; Nakajima, S.; Pantel, M. Online diagnosis of accidental faults for real-time embedded systems using a hidden Markov model. Simulation 2015, 91, 851–868. [Google Scholar] [CrossRef] [Green Version]
  21. Smyth, P. Markov monitoring with unknown states. IEEE J. Sel. Areas Commun. 1994, 12, 1600–1612. [Google Scholar] [CrossRef] [Green Version]
  22. Burbeck, K.; Nadjm-Tehrani, S. Adaptive real-time anomaly detection with incremental clustering. Inf. Secur. Tech. Rep. 2007, 12, 56–67. [Google Scholar] [CrossRef]
  23. Zhang, T.; Ramakrishnan, R.; Livny, M. BIRCH: A new data clustering algorithm and its applications. Data Min. Knowl. Discov. 1997, 1, 141–182. [Google Scholar] [CrossRef]
  24. Bezerra, C.G.; Costa, B.S.J.; Guedes, L.A.; Angelov, P.P. An evolving approach to unsupervised and real-time fault detection in industrial processes. Expert Syst. Appl. 2016, 63, 134–144. [Google Scholar] [CrossRef] [Green Version]
  25. Angelov, P. Anomaly detection based on eccentricity analysis. In Proceedings of the 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS), Orlando, FL, USA, 9–12 December 2014; pp. 1–8. [Google Scholar]
  26. Lee, S.; Li, L.; Ni, J. Online degradation assessment and adaptive fault detection using modified hidden Markov model. J. Manuf. Sci. Eng. 2010, 132, 021010. [Google Scholar] [CrossRef]
  27. Yu, J. Adaptive hidden Markov model-based online learning framework for bearing faulty detection and performance degradation monitoring. Mech. Syst. Signal Process. 2017, 83, 149–162. [Google Scholar] [CrossRef]
  28. Rubino, G. Quantifying the quality of audio and video transmissions over the Internet: The PSQA approach. In Communication Networks and Computer Systems: A Tribute to Professor Erol Gelenbe; World Scientific: Singapore, 2006; pp. 235–250. [Google Scholar]
  29. Di, Y. Enhanced System Health Assessment using Adaptive Self-Learning Techniques. Ph.D. Thesis, University of Cincinnati, Cincinnati, OH, USA, 2018. [Google Scholar]
  30. Siegelmann, H.T.; Sontag, E.D. On the computational power of neural nets. J. Comput. Syst. Sci. 1995, 50, 132–150. [Google Scholar] [CrossRef] [Green Version]
  31. Dezfouli, A.; Ashtiani, H.; Ghattas, O.; Nock, R.; Dayan, P.; Ong, C.S. Disentangled behavioural representations. In Proceedings of the Advances in Neural Information Processing Systems, Vancouver, BC, Canada, 8–14 December 2019; pp. 2254–2263. [Google Scholar]
  32. Fahim, M.; Sillitti, A. Anomaly detection, analysis and prediction techniques in iot environment: A systematic literature review. IEEE Access 2019, 7, 81664–81681. [Google Scholar] [CrossRef]
  33. Rabiner, L.R. A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 1989, 77, 257–286. [Google Scholar] [CrossRef]
  34. Ruiz-Arenas, S.; Rusák, Z.; Mejía-Gutiérrez, R.; Horváth, I. Implementation of System Operation Modes for Health Management and Failure Prognosis in Cyber-Physical Systems. Sensors 2020, 20, 2429. [Google Scholar] [CrossRef]
  35. Rocher, G.; Tigli, J.Y.; Lavirotte, S. Probabilistic models toward controlling smart-* environments. IEEE Access 2017, 5, 12338–12352. [Google Scholar] [CrossRef]
  36. Rocher, G.; Tigli, J.Y.; Lavirotte, S.; Le Thanh, N. Effectiveness assessment of Cyber-Physical Systems. Int. J. Approx. Reason. 2020, 118, 112–132. [Google Scholar] [CrossRef] [Green Version]
  37. Shahin, K.I.; Simon, C.; Weber, P. Estimating IOHMM parameters to compute remaining useful life of system. In Proceedings of the 29th European Safety and Reliability Conference, Hannover, Germany, 22–26 September 2019. [Google Scholar]
  38. Bengio, Y.; Frasconi, P. Input-output HMMs for sequence processing. IEEE Trans. Neural Netw. 1996, 7, 1231–1249. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  39. Friedman, N. Learning belief networks in the presence of missing values and hidden variables. ICML 1997, 97, 125–133. [Google Scholar]
  40. Binsztok, H.; Artières, T. Learning model structure from data: An application to on-line handwriting. ELCVIA Electron. Lett. Comput. Vis. Image Anal. 2005, 5, 30–46. [Google Scholar] [CrossRef] [Green Version]
  41. Gavaldà, R.; Keller, P.W.; Pineau, J.; Precup, D. PAC-learning of Markov models with hidden state. In European Conference on Machine Learning; Springer: Berlin/Heidelberg, Germany, 2006; pp. 150–161. [Google Scholar]
  42. Vasquez, D.; Fraichard, T.; Laugier, C. Incremental learning of statistical motion patterns with growing hidden markov models. IEEE Trans. Intell. Transp. Syst. 2009, 10, 403–416. [Google Scholar] [CrossRef]
  43. Jockusch, J.; Ritter, H. An instantaneous topological mapping model for correlated stimuli. In Proceedings of the International Joint Conference on Neural Networks (IJCNN’99), Washington, DC, USA, 10–16 July 1999; Volume 1, pp. 529–534. [Google Scholar]
  44. Baum, L.E.; Petrie, T.; Soules, G.; Weiss, N. A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Ann. Math. Stat. 1970, 41, 164–171. [Google Scholar] [CrossRef]
  45. Reynolds, D.A. Gaussian Mixture Models. Encycl. Biom. 2009, 741, 659–663. [Google Scholar]
  46. O’Hagan, A.; Murphy, T.B.; Gormley, I.C. Computational aspects of fitting mixture models via the expectation–maximization algorithm. Comput. Stat. Data Anal. 2012, 56, 3843–3864. [Google Scholar] [CrossRef] [Green Version]
  47. Jardine, A.K.; Lin, D.; Banjevic, D. A review on machinery diagnostics and prognostics implementing condition-based maintenance. Mech. Syst. Signal Process. 2006, 20, 1483–1510. [Google Scholar] [CrossRef]
  48. Jain, A.K.; Murty, M.N.; Flynn, P.J. Data clustering: A review. ACM Comput. Surv. (CSUR) 1999, 31, 264–323. [Google Scholar] [CrossRef]
  49. Gepperth, A.; Hammer, B. Incremental learning algorithms and applications. In Proceedings of the European Symposium on Artificial Neural Networks (ESANN), Bruges, Belgium, 24–27 April 2016. [Google Scholar]
  50. Ester, M.; Kriegel, H.P.; Sander, J.; Xu, X. A density-based algorithm for discovering clusters in large spatial databases with noise. Kdd 1996, 96, 226–231. [Google Scholar]
  51. Azzalini, D.; Castellini, A.; Luperto, M.; Farinelli, A.; Amigoni, F. HMMs for Anomaly Detection in Autonomous Robots. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, Auckland, New Zealand, 9–13 May 2020; pp. 105–113. [Google Scholar]
  52. Chen, Y.; Ye, J.; Li, J. Aggregated Wasserstein Distance and State Registration for Hidden Markov Models. IEEE Trans. Pattern Anal. Mach. Intell. 2019, 42, 2133–2147. [Google Scholar] [CrossRef] [PubMed]
  53. Shahapure, K.R.; Nicholas, C. Cluster Quality Analysis Using Silhouette Score. In Proceedings of the 2020 IEEE 7th International Conference on Data Science and Advanced, Sydney, Australia, 6–9 October 2020; pp. 747–748. [Google Scholar]
  54. Davies, D.L.; Bouldin, D.W. A cluster separation measure. IEEE Trans. Pattern Anal. Mach. Intell. 1979, PAMI-1, 224–227. [Google Scholar] [CrossRef]
  55. Caliński, T.; Harabasz, J. A dendrite method for cluster analysis. Commun. Stat. Theory Methods 1974, 3, 1–27. [Google Scholar] [CrossRef]
Figure 1. Steps to implement the proposed approach.
Figure 1. Steps to implement the proposed approach.
Sensors 21 00527 g001
Figure 2. Bayesian network expressing conditional dependencies of an Input-Output Hidden Markov Model (IOHMM). The model is said ”hidden” because the states of the processes they model are not directly observable but inferred from contextual input u output y .
Figure 2. Bayesian network expressing conditional dependencies of an Input-Output Hidden Markov Model (IOHMM). The model is said ”hidden” because the states of the processes they model are not directly observable but inferred from contextual input u output y .
Sensors 21 00527 g002
Figure 3. Example of clustering results for different values of min_samples (total obs = 2624). The larger the value of min_samples, the more conservative the clustering, i.e., clusters will be restricted to progressively more dense regions (outliers are depicted in red).
Figure 3. Example of clustering results for different values of min_samples (total obs = 2624). The larger the value of min_samples, the more conservative the clustering, i.e., clusters will be restricted to progressively more dense regions (outliers are depicted in red).
Sensors 21 00527 g003
Figure 4. Experimentation setup.
Figure 4. Experimentation setup.
Sensors 21 00527 g004
Figure 5. IoT infrastructure.
Figure 5. IoT infrastructure.
Sensors 21 00527 g005
Figure 6. Real dataset representing the sound effects legitimately produced by two devices (TV and Amazon Echo smart speaker) in different contexts. Observations are colored according to the clusters identified by the HDBSCAN* algorithm with min_samples = 40.
Figure 6. Real dataset representing the sound effects legitimately produced by two devices (TV and Amazon Echo smart speaker) in different contexts. Observations are colored according to the clusters identified by the HDBSCAN* algorithm with min_samples = 40.
Sensors 21 00527 g006
Figure 7. IOHMM model of the legitimate behavior learned from the input/output observations depicted in Figure 6 applied to Algorithm 1 (min_samples = 40).
Figure 7. IOHMM model of the legitimate behavior learned from the input/output observations depicted in Figure 6 applied to Algorithm 1 (min_samples = 40).
Sensors 21 00527 g007
Figure 8. Observations from the field colored according to the clusters identified by the FISHDBC algorithm with min_samples = 40. Observations colored in magenta denote behaviors not anticipated/foreseen in the model of the legitimate behavior depicted in Figure 7, learned on the basis of the dataset depicted in Figure 6.
Figure 8. Observations from the field colored according to the clusters identified by the FISHDBC algorithm with min_samples = 40. Observations colored in magenta denote behaviors not anticipated/foreseen in the model of the legitimate behavior depicted in Figure 7, learned on the basis of the dataset depicted in Figure 6.
Sensors 21 00527 g008
Figure 9. Dissimilarity graph between the legitimate behavior whose model is depicted in Figure 7 and the behavior observed from field observations, depicted in Figure 8. States and state transitions colored in red denote differences between both models (min_samples = 40).
Figure 9. Dissimilarity graph between the legitimate behavior whose model is depicted in Figure 7 and the behavior observed from field observations, depicted in Figure 8. States and state transitions colored in red denote differences between both models (min_samples = 40).
Sensors 21 00527 g009
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Rocher, G.; Lavirotte, S.; Tigli, J.-Y.; Cotte, G.; Dechavanne, F. An IOHMM-Based Framework to Investigate Drift in Effectiveness of IoT-Based Systems. Sensors 2021, 21, 527. https://doi.org/10.3390/s21020527

AMA Style

Rocher G, Lavirotte S, Tigli J-Y, Cotte G, Dechavanne F. An IOHMM-Based Framework to Investigate Drift in Effectiveness of IoT-Based Systems. Sensors. 2021; 21(2):527. https://doi.org/10.3390/s21020527

Chicago/Turabian Style

Rocher, Gérald, Stéphane Lavirotte, Jean-Yves Tigli, Guillaume Cotte, and Franck Dechavanne. 2021. "An IOHMM-Based Framework to Investigate Drift in Effectiveness of IoT-Based Systems" Sensors 21, no. 2: 527. https://doi.org/10.3390/s21020527

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop