was detected). The attribute p can be used to spec-
ify a room (both physical and virtual) from which the
translation was started, or, e.g., a floor of the house.
Except for the starting node v
0
of Behavioural
walk BW , all subsequent adjacent pairs of nodes and
edges (e
k−1
, v
k
) where 1 < k ≤ n can be converted by
the process B into the simplified manifestation of be-
haviour vector as described in Equation 10:
B : {e
k−1
, v
k
} →
−→
γ
i
0
(11)
The final Behaviour vector sequence
−→
Γ
0
:
−→
Γ
0
=
n
−→
γ
0
1
,
−→
γ
0
2
, ...,
−→
γ
0
m
o
(12)
where 0 < i ≤ m then contains m behaviour vectors
which is equal to the length of initial Behavioural
walk BW .
4 USE CASES
We assume that a person’s behaviour is partly pre-
dictable and that he or she does not try to disguise
his or her behaviour intentionally. Following sections
describe several typical situations which can occur
in the monitored apartment and presents how the be-
havioural vector sequence
−→
Γ
0
is gradually created. It
is obvious that
−→
Γ
0
can be created by batch process-
ing or by real-time processing when the system can
decide with a certain degree of confidence. For the
description, we present the real-time variant.
The person (identified by ‘s’) gets up of his bed
in the morning and is moving around the bedroom.
PIR sensors detect movement. The Grid-EYE sen-
sor confirms the living person is present. We do not
create any behaviour vector that would describe this
state. Right now, we understand movement in the
room as a standard situation which does not need to
be further detailed. The person is opening the bed-
room’s door, and the magnetic sensor warns that the
door is opened. The person is going through to the
hall. After a while, PIR sensors in the bedroom do
not detect any activity, nor does the Grid-EYE. On
the other hand, PIR sensors and the Grid-EYE sensor
in the hall detect the presence of the person. Taking
the description of defined Behavioural walk (BW ) in
mind, the person just moved from the starting node
v
0
to the node v
1
via the edge e
1
. This transition is
therefore described by simplified behavioural vector
−→
γ
1
0
= (‘s’, ‘eh’, ‘e’, t
1
) where ‘s’ stands for the per-
son, ‘eh’ is the identification of the movement ac-
tion from node e to h, and t
1
is the variable repre-
senting the timestamp when this behaviour was de-
tected. The system resets (updates, stores, etc.) its
internal state and understands the living person is
present in the hall. The person further visits the
toilet, has breakfast in the kitchen, and then leaves
the apartment. Without the same level of details,
the rest of these steps is identified by the following
behaviour vectors: (‘s’, ‘ht’, ‘h’,t
2
), (‘s’, ‘th’, ‘t’, t
3
),
(‘s’, ‘hl’, ‘h’, t
4
), (‘s’, ‘lk’, ‘l’, t
5
), (‘s’, ‘kl’, ‘k’, t
6
),
(‘s’, ‘lh’, ‘l’,t
7
), (‘s’, ‘h−exit’, ‘h’,t
8
). The last action
‘h −exit’ expresses that the person left the apartment.
By taking this situation as the initial state, we can
imagine that the person has a robotic vacuum cleaner
which starts to clean the apartment. Movement is de-
tected by PIR sensors, but the evidence of living per-
son is missing, so the activity is logged, but this has
no influence on the overall behaviour of the person.
Last but not least, let’s imagine an extreme situ-
ation. A living person has left the apartment, and
suddenly the magnetic sensor of the window in the
kitchen detects the window is being opened. This can
simply mean the sensor could have been broken and
it needs to be repaired, but in combination with the
PIR sensors and the Grid-EYE sensor in the kitchen,
the presence and movement of a living person are de-
tected. Since this is the transition from the node o to k
via the edge ‘ok’, this behaviour should be described
by a behaviour vector, but in this case, the system
is missing the context, and the activity is suspicious.
This behaviour is logged, but the identifier for an un-
known person is used. As can be seen in Figure 2,
this particular transition follows dashed line marked
in blue. This edge is a part of W E set which can be
understood as the set of edges with warnings. Any
of behaviour vectors which are created by following
these types of lines must be reported as unusual and
the operator of the system, as same as the user (if it is
relevant or possible), should be informed about these
events.
5 DISCUSSION
The proposed model deals with the conversion of
transactional data coming from IoT sensors into be-
havioural feature space represented by behavioural
vectors. These behavioural vectors can be used fur-
ther by the processes which try to identify behavioural
patterns. It is obvious that the topology of the mon-
itored apartment must be taken into account and it
forms an undivided part of the whole system. For
instance, the distribution of edges among two sep-
arated sets DE, and WE allows immediately distin-
guish which transition (detected behaviour) is natural
and which requires further actions (transitions follow-
ing edges which are as part of the latter set). Events
Behavioural Data Modeling: A Case Study in IoT
263