Impact Conflict Detection of IoT Services in Multi-resident Smart Homes
Abstract
We propose a novel impact conflict detection framework for IoT services in multi-resident smart homes. The proposed impact assessment model is developed based on the integral of a signal deviation strategy. We mine the residents’ previous service usage records to design a robust preference estimation model. We design an impact conflict detection approach using temporal proximity and preferential proximity techniques. Experimental results on real-world datasets demonstrate the effectiveness of the proposed approach.
Index Terms:
IoT services; Multi-resident smart homes; Service impact assessment; Signal deviation strategy; proximity technique; Conflict detectionI Introduction
Internet of Things (IoT) is the umbrella term covering everyday objects (a.k.a. things) connected to the Internet. These are usually equipped with ubiquitous intelligence [1]. The rapid advancement of the underlying technologies such as wired sensor networks, wireless sensor networks, and Radio Frequency Identification (RFID) tags provide these “things” with augmented capabilities such as networking, actuating, and sensing [2]. IoT technologies enable many innovative and pioneering applications, such as smart campuses, smart offices, smart cities, intelligent transport systems, and smart grids. Smart home is another cutting-edge application domain of IoT. Any regular home fitted with IoT devices is defined as a smart home. These IoT devices are attached to everyday “things” to monitor usage patterns. For example, a sensor (i.e., an IoT device) attached to a cup may monitor a resident’s tea-cup usage patterns. The purpose of a smart home is to provide its residents with convenience and efficiency [3].
The concept of IoT is congruent with the service paradigm [4]. Each “thing” has a set of functional and non-functional (a.k.a. quality of service) properties. In this regard, we leverage the service paradigm as a framework to define the functional and non-functional properties of smart home devices as IoT services [5]. For instance, an Air-conditioning unit (AC) in a smart home is represented as an AC service. The functional property of the AC service is to control the temperature inside an ambient environment. Examples of non-functional properties include AC types (i.e., split-system, ducted, portable), capacity (i.e., a 2.6kW unit may cool the room of size to ), fan speed, fan direction, noise level, sleep mode, and dehumidifier mode.
We identify two categories of smart homes: (i) Single-resident and (ii) Multi-resident. The distinction between these two types is important since the nature of service conflicts would differ for each type. This paper focuses on IoT service conflicts that occur in multi-resident smart homes. Residents may have different preferences for using a service, which may cause IoT service conflict [6]. For example, a resident may prefer 20°C AC temperature in the living room. At the same location and time, another resident may have a different AC temperature preference, such as 25°C. Hence, a service conflict may occur as the AC cannot satisfy the preferences of both residents simultaneously. In this context, conflicts on a single IoT service are intuitive. Furthermore, conflicts may occur on multiple IoT services when residents have different preferences for using them. For example, a resident may prefer watching a movie in a theater-like atmosphere. When the resident turns on the TV, they dim the light, close the curtain, and put the AC at 20°C. At the same time, another resident enters the same room and opens the window blind service since they prefer sunlight during the day. Opening the blind may ruin the first resident’s movie-watching experience as it increases the overall illumination of the ambient environment. Although the functionalities of window blind and light services are not directly dependent, their operations may indirectly interfere via an environment property (i.e., illumination). We define it as service impact conflict since the simultaneous enactment of two or more IoT services may affect the experience of the service users in a multi-occupant smart home. Such conflicts may create a less comfortable home environment if not handled properly. This may hamper the ultimate goal of smart homes, which is to make occupants’ lives more convenient, efficient, secure, and comfortable. Indeed, a prerequisite to providing convenience that suits all occupants is to detect conflicts first and then resolve them. Therefore, this paper’s main focus is on detecting service impact conflicts.
The need to provide convenience in smart homes has, of course, not gone unnoticed. A few works focus on designing comfortable smart homes without considering IoT service conflicts [7, 8, 9]. Existing literature on conflict management is scarce in ambient intelligence systems. To date, most of the conflict detection frameworks consider multi-user conflicts regarding an individual IoT service [6, 10, 11]. Compared to the conflict detection of an individual IoT service, it is generally more difficult to detect the impact conflict of multiple IoT services. Only a limited amount of existing literature focuses on impact conflict detection considering environmental properties. An object-oriented framework is proposed in [12] to express the interaction of environment properties and services. Matsuo et al. used the notion of effect direction to extend the previous object-oriented framework [13]. Resource-locking techniques are introduced to formalize environment interactions in [14, 15], and the dependency between the control and the environment is modeled with a goal-oriented framework. However, we identify three research gaps that this work fills:
-
•
Impact Quantification: Existing frameworks do not consider the degree (or amount) of environmental impact. They only deal with the dependency between an operation (i.e., opening a window blind) and the environment (i.e., illumination) but do not quantify the impact posed by the dependency. For example, they can only identify the relationship between blind service and illumination but cannot calculate the effect of opening the blind on ambient illumination. Thus, we can not distinguish whether the impact is small or big.
-
•
Preference Estimation: The notion of conflict depends on the occupants’ preferences. In practice, some residents are very flexible, and some are very strict in terms of preferences. For instance, one resident may not tolerate any external sound while studying (i.e., preferred sound range 0-20 decibels), whereas another resident does not bother about any sound while studying. Turning on the TV service impacts the ambient sound; it may create a conflict for the first resident but may not create a conflict for the second resident. Existing approaches do not consider preferences while identifying conflicts.
-
•
Determinism: Conflicts are handled deterministically by current frameworks; they either happen or not. However, impact conflicts are not always certain to occur because of the dynamics of user behavior and context (e.g., location, time, or weather). Therefore, detecting impact conflicts and their likelihood of happening not only provides additional information for conflict resolution but also accurately reflects the severity of the conflicts.
We propose a novel approach for conflict detection of IoT services considering impact and residents’ preferences. The impact is quantified from residents’ current service requirements, and preferences are estimated from historical interactions. The proposed impact assessment model is developed based on the integral of signal deviations strategy adopted from Signal Temporal Logic (STL) [16]. We then employ a distance-based clustering algorithm, DBSCAN, to extract the residents’ service usage preferences. Finally, we design the impact conflict detection approach considering preference scores and impact scores. The proposed approach employs preferential proximity and temporal proximity techniques to calculate the likelihood of conflicts. The contribution of this paper is threefold:
-
•
An impact assessment model of IoT services adopting the concept of signal deviation integration from Signal Temporal Logic (STL).
-
•
A preference estimation model based on distance-based clustering.
-
•
An impact conflict detection approach that employs preferential proximity and temporal proximity strategy to compute conflict likelihood.
The rest of the paper is structured as follows. Section II illustrates the motivation scenario to explain the challenges for service impact conflict detection. In section III, we introduce a set of terminologies and concepts that are used to formulate the problem. Section IV describes the proposed conflict detection framework. Section V presents our experiments to evaluate the proposed approach. Section VI summarizes the related work on impact conflict detection. Section VII discusses the constraints of our framework and concludes the paper with future work.
II Motivation Scenario
We discuss the following two scenarios to illustrate the notion of service impact conflict in a multi-tenant environment. In this work, we consider four environmental properties: (i) temperature, (ii) illumination, (iii) sound, and (iv) humidity.
Scenario 1: Suppose two services (AC service, window service) are located in the living room (Fig. 1(a)). Assume that the current room temperature is 25°C. At 8:00 pm, one resident (R1) requests the AC service to set the temperature to 20°C. AC will then try to set the room temperature as requested. Although it may take some time, eventually, AC will set the ambient temperature to 20°C. Here, the blue solid curve represents the expected ambient temperature when only AC is working. Another resident (R2) enters the same room and opens the window service at 8:30 pm. Let us assume that the outside temperature is 30°C. In this context, hot air may come inside, and it may increase the overall ambient temperature. AC will work hard and gradually set the indoor temperature to 20°C. Here, the cyan solid curve represents the ambient temperature when both AC and window are operating simultaneously. Assume that R1 has a temperature preference (i.e., between 18.5°C and 22.5°C represented by green dotted lines). Ambient temperature may exceed R1’s preference range due to window opening by R2. The red zone represents the violating temperature between 8:30 pm and 9:00 pm. In this regard, R1 might experience conflict with R2.

Scenario 2: Suppose two services (light service, window blind service) are located in the living room (Fig. 1(b)). At 8:00 am, R1 requests the light service to set the illumination to 10 lux. Light will then instantly set the room illumination. Let us assume there are no other light sources. Here, the blue solid line represents the expected ambient illumination when only light is working. R2 enters the same room and opens the blind at 8:30 am. Assume that approximately 20 lux light is coming inside through the blind. Thus, it may increase the overall ambient illumination. In this case, the illumination change is instantaneous. Here, the cyan solid line represents the ambient illumination when both light and blind are operating. Assume that R1 has a luminance preference (i.e., between 5 lux and 15 lux, represented by green dotted lines). Ambient illumination may exceed R1’s preference range due to blind opening by R2. The red zone represents the violating illumination, and R1 might experience conflict with R2.
Hence, impact conflict is situation-specific and dynamic. Impact conflict detection is challenging due to the following reasons:
-
•
Real-time: In a smart home, services frequently rely on real-time information for operational decision-making. One of the most common smart home services is an Air conditioning unit. It relies heavily on real-time inside temperatures and outside temperatures to control the ambient temperature.
-
•
Duration and Scale of Effect: Any function performed by a service results in an effect, which may vary in duration. Some services require a long time to make small changes (e.g., after opening a window service, ambient temperature increases/decreases progressively), while others require a short time to make significant changes (e.g., after opening a blind service, ambient illumination increases immediately during daytime).
Not all the service impacts will lead to conflicting situations. It will depend on residents’ preferences. Therefore, it is necessary to quantify the impact and estimate residents’ preferences. Only then can true conflict be captured. Capturing true conflicts is essential so that they can be resolved. The objective of smart home services is to provide its residents with convenience. Therefore, an impact conflict detection framework is required that reflects the services’ nature of impact and captures impact conflicts considering residents’ preferences.
III Definitions and Problem Formulation
We represent the notion of IoT Service (S), IoT Service Event (SE), IoT Service Request (SR), and Impact (I) to explain the concept of Impact Service Conflict. The definitions of , and have been adopted from [17].
Definition 1. An IoT Service () is a tuple of ⟨, , , ⟩ where:
-
•
represents the unique service identifier (ID).
-
•
is the name of the service.
-
•
is a set of {,,…,} where each is a functional attribute of a service. The purpose of having a service is considered as the function of a service.
-
•
is a set of {,,…,} where is a non-functional attribute of a service.
Definition 2. An IoT Service Event () records the service state along with its user, execution time, and location during the service manifestation (i.e., turn on, turn off, increase, decrease, open, close). An IoT Service Event Sequences () is a set of {, , ,…….} where each is a service event. Occupants usually interact with IoT services for various household chores, and the previous interactions are recorded as IoT service event sequences. An IoT service event is a tuple of ⟨, {⟩ where:
-
•
is the unique service event ID.
-
•
is a unique ID of the enacted service. is a set of functional attributes. is a set of non-functional attributes.
-
•
is the time interval of the service consumption. is a tuple of ⟨⟩ where and represent the start time and end time of the service.
-
•
is the service event location and is user who consumed the service.
Definition 3. An IoT Service Request () is an instantiation of a service, and it represents a resident’s current service requirement. An IoT Service Request Sequences () is a set of {, , ,…….} where each is an IoT service request. An IoT Service Request () is a tuple of ⟨, {⟩ where:
-
•
is the unique service request ID.
-
•
is a unique ID of the requested service. is a functional attribute and is a non-functional attribute of the requested service. is a tuple of ⟨⟩ where is the attribute’s name and represents the attribute’s value.
-
•
{,} represent the requested service’s start time and end time.
-
•
is the location of the service and is the user of the service.
Definition 4. Impact () specifies the effect of simultaneous service requests on the ambient environment properties (i.e., temperature, illumination, sound, humidity). Suppose that two requests are placed to two completely different services, but they may interfere with each other via an environment property. For instance, one resident wants a cool ambient environment by using AC service, and another resident wants fresh air by using window service. If the outside temperature is higher than the inside temperature, hot air may come inside and impacts the ambient temperature. Formally, given two users’ service requests ( and ) at time , an impact () may occur if , such that . It is represented:
(1) |
where is the impacted service and its associated attribute, is the time in which the impact may occur, and represents the severity of the impact.
Definition 5. Impact Conflict () in IoT environment is heavily dependent on users’ preferences. Not all the impacts will lead to a conflicting situation. Sometimes a small impact may create a conflict, whereas sometimes, a big impact may not create a conflict. On the one hand, assuming that a person has a very strict sound preference, a small change in the ambient sound may create a conflict for them. On the other hand, assuming that the same person has a very flexible temperature preference, a big temperature change may not create a conflict. Note that change in ambient environment properties is caused by another user’s service enactment and is captured by the impact () model.
Formal Problem Statement:
An IoT service () is associated with a set of functional and non-functional properties. An IoT service event () illustrates a resident’s previous service usage in conjunction with time and location. IoT service event sequences () record all the history of service events, and preferences () can be estimated from these previous events. An IoT service request () captures a resident’s current service usage requirement. Multiple residents’ requirements are stored in service request sequences (). Impact () may occur on the ambient environment properties due to the different service requests from residents. Consequently, an impact conflict () may happen if a change in ambient properties exceeds any user’s preference range. Given this information, the paper aims to identify a function , where . It is represented as:
(2) |
where is the impacted service and its associated attribute, is the user who experiences the conflict, is the likelihood of the conflict, and and represent the time and location, respectively, of the probable impact conflict.
IV Impact Conflict Detection Framework
Fig. 2(a) illustrates an abstract view of the conflict management system, and Fig. 2(b) shows our proposed framework. Note that conflict resolution is out of the scope of this paper. However, we keep it in mind when designing our framework. The framework has 3 modules: (i) impact assessment, (ii) preference estimation, and (iii) conflict detection. The impact is quantified from the residents’ present service requirements. Preference is estimated from the residents’ previous service usage. Impact and preferences are then fed into the conflict detection module to estimate the likelihood of conflicts.


IV-A Impact Assessment:
In this module, we quantify the impact from the users’ service requests. The proposed impact model is designed considering four ambient environment properties such as temperature, illumination/brightness, sound, and humidity. Two completely different services may interfere with each other via these environment properties due to their simultaneous execution. The impact may occur based on the change of an environmental variable; either it can be a progressive change or an instantaneous change. Given two service requests (, ), if the following conditions are satisfied, only then the impact is computed.
-
•
, meaning, two services (, ) are executed at the same location.
-
•
, denoting that two service requests (, ) are invoked at the same time, and there is a temporal overlap.
-
•
and , meaning these two requests are invoked on two different services by two different users.
-
•
; there exists at least one property which is similar between and (e.g., temperature linked with AC and window).
At first, we find the overlapping segment () (i.e., intersection) between two service requests. Starting time () of would be the maximum of the two start times in and . Ending time () of would be the minimum of the two end times in and (e.g., for two requests, if two ranges are 8 pm to 10 pm and 9 pm to 11 pm, the is 9 pm to 10 pm). We use Signal Temporal Logic (STL) based runtime verification technique to measure the degree of impact. STL is a formalism used to specify real-time properties of discrete (e.g., instantaneous change) and continuous (e.g., progressive change) signals (e.g., illumination, temperature). We refer readers to [16] for the formal definition of STL semantics. We find that most smart home service requirements can be specified using STL formula in the form of where is a signal about environment property and is a setpoint (i.e., threshold). For instance, considering motivation scenario 1, STL formula for resident R1’s service requirement, : . We now describe how to compute the degree of impact in which a signal, either continuous or discrete, about an environment property violates a service requirement. A notion of robustness value for violating STL formulas is formally defined in [16]. The robustness value of a signal violating at time is defined as:
(3) |
Intuitively, the robustness value indicates extremum points of the signal. The robustness value is useful for telling the worst-case performance, but it does not show the average or overall performance. For impact assessment, we are interested to know both. We use the following example to describe why measuring the robustness value only is not enough for finding the severity of impact. Recall our motivation scenario 1. The impact may occur between 8:30 pm and 9:00 pm. We compute impact considering R1’s requirement : . In this case, the temperature is between 20°C and 25°C for 30 minutes. Therefore, the robustness value () is 5 (Fig. 3(a)). Assume that, in another case, the outside temperature is 40°C, and the AC has a higher capacity to cool. In this context, the temperature fluctuates between 20°C and 30°C for 10 minutes. The robustness value () is 10 (Fig. 3(d)). If only robustness is considered for impact assessment, then the second case will have a higher impact. Thus, they will have a higher conflict likelihood. However, this is not always true since the impact duration is very short. Although the first case has lower robustness, it may have a higher likelihood of conflict as the impact duration is long.

To address this limitation, we present a concept of signal deviation to measure the degree of impact. At first, we calculate the percentage of time when a requirement is violated. To start with, we define Equations 4 and 5 to calculate the positive part and the negative part of a function f(x), respectively.
(4) |
(5) |
We compute the percentage of time given a signal as:
(6) |
We then use Equation 7 to compute the integral of signal deviations accumulated in a period when the requirement is violated.
(7) |
IV-B Preference Estimation:
In this module, we estimate users’ preferences for a service based on previous usage records. Impact module outputs the degree of impact, the name of the impacted services, and their overlapping time period where an impact may occur. We use overlapping impacted time periods to extract residents’ service usage patterns from their previous history. Then, it calculates the preference range of frequently used services. We scan the previous history to find out all the overlapping service events (algorithm 1). The input of this algorithm is the previous service usage dataset () and the overlapping segment () when an impact may occur. All the previous events that have overlapped with the given overlapping segment are the output of this algorithm. Each location has IoT services, and we mine out the frequent service interactions based on location. We can determine if a person uses specific services more frequently by evaluating their service interactions over a long period. A distance-based clustering algorithm, DBSCAN, is employed, resulting in clusters containing services that the resident has used many times during this overlapping period [18]. For example, an impact related to a light service occurs in the living room between 20:00 and 20:30. This component searches all the service events that previously occurred, either partially or fully, between 20:00 and 20:30 in the living room and stores them in a list (). This list contains the overlapping service events and their timestamps.
In order to estimate preferences from this list, we then plot all the data points in a two-dimensional plane. Note that, in this paper, we only deal with numerical data associated with IoT services such as temperature, illumination, and sound. X-axis represents each service attribute’s values (e.g., AC temperature, light illumination), and Y-axis represents frequency. We extract the range from the X-axis, where most data points are located. We get the optimal preference range (a.k.a. preference band) based on a dynamic programming approach from the plotted values. The width of the preference band can be of different sizes. For example, Fig.4 depicts four residents’ preferred AC temperature range. Each color denotes each resident’s preferred temperature distribution. The blue curve represents a very strict (i.e., very narrow range of AC temperature) nature of a resident. In contrast, the yellow curve represents another resident’s very flexible (i.e., very wide range of AC temperature) nature. This depicts the residents’ actual preferences in terms of range.

IV-C Service Impact Conflict Detection
We use the preference range generated from the preference estimation module and the impact weight generated from the impact assessment module to estimate the conflict likelihood. IoT Service Impact Conflict occurs when two services cannot satisfy the preferences of one or multiple users at the same location and time duration. If there is no impact (i.e., the value of impact weight is 0), we assume there is no impact conflict. For example, one resident prefers to have dim light while watching movies in a theatre-like environment. Another resident enters the same room at the same time and opens the window blind to enjoy the outside beauty (assuming the window is glass-made). If it is night and no light enters, there is no impact of opening the blind; thus, there is no conflict. If the value of the impact score is greater than 0, we only then check the preference range of the residents and the change in the ambient environment.
At first, we follow a preferential proximity approach to find the likelihood of having a conflict. Suppose we have two ranges of ambient temperature. One range denotes the resident’s preferred temperature captured from the preference estimation module. Assume one resident’s preference is between 19°C and 21°C, represented as [a_s, b_s] where a_s = 19 and b_s = 21. Another range denotes fluctuated ambient temperatures captured from the impact assessment module. Assume it is between 20°C and 23°C and is represented as [a_e, b_e] where a_e = 20 and b_e = 23. Preferential proximity is computed as follows:
(8) |
Here, the value of determines the likelihood of conflicts. For the example mentioned above, the value of is 0.25. Therefore, the likelihood of conflict is (1-0.25) = 0.75. If the value of becomes 1, then the preferred range and fluctuated range match completely, and no conflict will occur. However, if the value is 0, then there is no range overlapping, and there will be a high likelihood of conflicts occurring. The more the preferential proximity value leans towards 0, the more possibility of having a conflict. Then, we use the temporal proximity strategy to find out the weight of the potential conflict time over impacted time. For instance, the impact overlapping segment is [8:30 pm - 9:20 pm], and the potential conflict time is [8:45 pm - 9:00 pm] (see motivation scenario 1). The temporal proximity technique for evaluating the distance between time-interval data is adopted from [19]. For each impact overlapping segment, , we use a function with respect to to map the temporal aspect of . Segment start time and end time are represented with and , respectively. is formalized in Equation (9).
(9) |
We generate a set of functions corresponding to the overlapping segments () and potential conflict time. Equation (10) calculates the temporal proximity () for all the overlapping events.
(10) |
Here, and are the first and last time information of overlapped events from , and is the number of instances. Consider the following two events of potential impact conflict. One impacted segment is between 20:00 and 21:00; a potential conflict time is between 20:45 and 21:45. Here, potential conflict time denotes a time-period when the fluctuated signal may exceed any user’s preference range. Using Equation 10, the temporal proximity of these two intervals can be calculated as ((20:45-20:00)+(21:00-20:45)*2+(21:45-21:00))/((21:45-20:00)*2)
=0.57. Consider another impacted segment is between 18:00 and 19:00. An potential conflict time is between 18:10 and 19:10. The temporal proximity of these two events can be calculated as ((18:10-18:00)+(19:00-18:10)*2+(19:00-19:10))/((19:10-18:00)*2)=0.86. Thus the latter case has more weight while calculating the likelihood of a conflict. Therefore, for each pair of overlapping service requests, conflict likelihood () is computed, including impact weight (), preferential proximity (), and temporal proximity (()) as:
(11) |
V Experimental Results and Discussion
V-A Dataset and Experimental Setup
We use a dataset collected from the Center for Advanced Studies in Adaptive Systems (CASAS) to evaluate the proposed conflict detection framework [20]. There exist a few multi-resident activity datasets. Nevertheless, these datasets do not capture conflicting situations for service usage. Thus they are not helpful enough for our experiment. These publicly available datasets reflect the compromises of the residents interacting with services. As a result, they do not have any IoT service conflicts. Records of a single resident interacting with IoT services, on the other hand, reveal an individual’s true preferences. Consequently, we combine individual inhabitants’ service interaction records (labels HH102, HH104, HH105, and HH106 are used from the CASAS dataset) to mimic a multi-resident smart home environment. These labels were chosen because they feature actions from the same time period (between June 15, 2011, and August 14, 2011). Table I contains descriptions of dataset attributes.
Attributes | Description |
---|---|
Date | The service execution date |
Time | The service execution time |
Sensor | Name of the sensors such as motion sensors, light switch, light sensors, door sensors, temperature sensors |
Status | ON, when the service starts, and OFF, when the service stops |
V-B Ground-truth and Metrics
The service interactions from various users overlap in terms of time in the merged dataset. The dataset is annotated with different activity labels and has the layout of the home. However, it lacks interaction records related to windows and blinds. Therefore, we create events such as opening and/or closing window and blind services to mimic the realistic environment. Each room has a thermostat, and we assume that the set temperature is the preferred temperature for a user. We then estimate how much time it will take to cool/hot inside temperature if the window is opened using this formula, “Time taken to cool/hot (in hours) = (volume of the room * density of air * change in temperature * specific heat of air)/ (latent heat of fusion * ton capacity of AC * 1000 / 24). For simplicity, we keep most of the variables constant. The dataset has “Watch_TV” activity label and indoor light level. However, the sound volume and outdoor illumination information are missing. Hence, we augment the dataset by randomly generating these values based on a uniform distribution. After that, whenever two users simultaneously use two services that set the state of an environment property in contradictory ways, a conflict observation is created. We assume that a conflict involving more than two parties can be broken down into numerous pairwise conflicts. We discretize numerical contexts to produce potential context scenarios, and then we tally the occurrences of each scenario in the data; this result reflects how frequently a user has encountered a certain context. If a conflict observation is made at each occurrence, the number of conflicts is increased. Each individual user and service pair’s count is kept individually. Thus, the number of conflicts experienced by that pair of users for that environment property divided by the number of times that context scenario occurred is used to calculate the ground-truth likelihood for two users to have conflicts for a service under a possible scenario. We first evaluate our approach based on accuracy, precision, and recall metrics. Then, we represent the performance across the studies using the mean absolute error (MAE). We can contrast the likelihood based on the ground truth with the likelihood predicted by the method. For instance, to calculate the anticipated likelihood for each sample while evaluating our methodology, we look up the likelihood in the conflict scenario that includes this sample. For a set of samples, the number of samples, the where is ground-truth likelihood and is the estimated likelihood of the proposed approach.
V-C Performance Evaluation
At first, we measure our proposed framework’s accuracy, precision, and recall score. The first set of experiments is conducted without considering residents’ preferences (fig. 5(a)). This set only considers impact as a binary decision (i.e., if there is an impact, there is a conflict). It is visible from the figure that the accuracy score is very low when preference is not considered. Because this approach detects a scenario as a conflict even when the temperature difference is only 1°C as 1°is considered as an impact here. It counts many non-conflicting situations as conflicts, thus increasing false positive numbers. This reduces the approach’s overall accuracy. However, this approach performs better while detecting non-conflicting situations. This is why the precision and recall scores regarding no-conflict are high. Then, we conduct the second set of experiments considering preference scores. This approach detects both conflicting and non-conflicting situations more accurately based on precision, recall, and f1-score (fig. 5(b)). This approach considers preference as a range. Therefore, when an impact occurs, it checks the residents’ interaction history and mines out the preference range. If the impact value falls within the preference range, then it does not detect the situation as a conflict. If the impact value falls beyond the preference range, only then is it accounted as conflict. Our proposed approach achieves a high accuracy score of about 90%. Precision, recall, and f1-scores are also high.


We conduct the third set of experiments to evaluate the conflict likelihood value based on MAE. The proposed approach performs well regarding temperature and illumination variables (Table II). The reason is our impact model can successfully capture the gradual change and instantaneous change with time granularity. It also captures users’ preference ranges, taking into account different contextual factors. However, our model does not perform well in detecting sound impact conflict. Because the proposed preference estimation model cannot extract residents’ preferences when no service request data is available. For example, a resident prefers to have less sound as they want to study. Here, the study is an activity, and there is no sound data associated with service requests. Finally, we adjust the temporal and preferential proximity values to observe the detection accuracy variation. Fig. 6 demonstrates that increasing temporal and decreasing preferential proximity capture conflicts more accurately. When the temporal threshold is small, and the preferential threshold is big, there are lots of overlapping events that are pruned. However, increasing the temporal and decreasing the preferential threshold denotes more capturing ability of conflicts.
Environment Property | Conflict | No Conflict | Overall |
---|---|---|---|
Temperature | 9.3 0.3 | 1.2 0.2 | 4.6 0.2 |
Illumination | 13.1 1.4 | 24.4 6.0 | 13.8 1.7 |
Sound | 24.4 0.9 | 0.5 0.0 | 1.0 0.0 |


VI Related Work
The exploration of conflict detection spans across various domains, notably in software engineering and smart home environments. They reflect diverse challenges and methodologies tailored to each field’s unique requirements. In software engineering, the focus is on reconciling stakeholder requirements, while in smart homes, conflicts arise from the interactions among devices/services and occupants, necessitating innovative approaches to ensure seamless cohabitation and system functionality. This section delves into the existing literature to understand the mechanisms of conflict detection, highlighting the differences and complexities inherent to these domains.
VI-A Conflicts in Software Engineering
Conflict detection and resolution are key in software engineering, especially during requirement engineering, which involves defining a system’s needs and limitations. Differences between managing conflicts in software engineering versus smart home IoT environments highlight the unique challenges in each domain:
-
•
Nature of conflicts: Software engineering conflicts often emerge from stakeholders’ differing needs during the requirements phase, usually due to misinterpretations or inconsistent priorities [21, 22]. In smart homes, conflicts arise from interactions among multiple devices, services, and users, leading to issues like resource contention or privacy concerns [23, 24].
-
•
System complexity: Smart homes involve complex, interconnected physical systems influenced by dynamic factors, necessitating consideration of physical constraints and safety [23]. Conversely, software engineering conflicts focus more on aligning stakeholder expectations without the immediate impact of real-time physical interactions [21, 22].
-
•
Stakeholders: While software engineering conflicts mainly involve human stakeholders (i.e., developers, managers, customers), smart home conflicts also include interactions between IoT devices and services, requiring a more comprehensive approach to conflict management [24].
VI-B Conflicts in Smart Homes
“Conflict is a natural disagreement between different attitudes, beliefs, values, or needs” [25]. A home in Australia, on average, has 17 connected devices (i.e., services)111https://tinyurl.com/vg3lh6w. In addition, 2.6 residents usually live per household222https://tinyurl.com/y6jzjwf4. Therefore, there is a high chance of conflict in multi-occupant homes. The concepts of conflict and conflict detection are surveyed in the relevant literature. We identify three criteria to categorize conflicts: (i) source, (ii) intervenience, and (iii) solvability. Conflicts may occur depending on different types of sources [26]. A conflict may occur when many users utilize a resource such as a TV defined as a resource-level conflict [27]. A conflict may occur when several applications try to use a resource simultaneously. For example, application-level conflicts involve building management applications and a human trying to control a light bulb inside a room [28]. A conflict may emerge between space and the user when a user disputes space policies. For instance, a user’s smartphone may ring inside a library with a silence policy [8]. A conflict may also occur when diverse user inclinations in a similar setting are known as profile-level conflict [29]. For instance, one user likes to enjoy a TV program with the room light at half limit, and another user wants to peruse with the lights at the full limit. Time is another crucial factor for conflict detection [30].
Intervenience is a key criterion that may cause conflicts [31]. Conflict is usually common in multi-resident smart homes, yet a conflict may occur in a single-resident home. For instance, a conflict may occur based on contradictory intentions such as comfort and saving energy simultaneously. An object-oriented approach is proposed in [32] to detect conflict in a single-occupant smart home. The model is further improved in [12] by considering environmental requirements and impacts. The proposed effect model is qualitative (i.e., either an effect exists or it does not exist at all), which is the limitation of their work. Solvability is another key criterion for conflict categorization [33]. Usually, a conflict is detected during its occurrence (i.e., run-time) [34]. However, sometimes a system cannot detect conflict during its run-time and later realizes that it happened because of delayed sensor information [35].
None of the above research considers impact conflict detection of IoT services, and existing conflict detection approaches cannot be applied directly. Current frameworks recognize the relationship between actions (e.g., opening a window blind) and their environmental effects (e.g., changes in illumination) but fail to measure the actual impact. Moreover, understanding conflicts within these systems requires knowing the preferences of the people who use them, necessitating to estimate their preferences. These estimated preferences are then fed into the impact conflict detection module to assess a conflict situation. To the best of our knowledge, this work is the first attempt to quantify the impact, estimate preferences, and then develop a conflict detection approach that can capture impact conflicts with their associated likelihood values.
VII Conclusion and Future Work
We propose a novel approach for impact conflict detection of IoT services by quantifying the impact and estimating preferences. The proposed impact assessment model is developed based on the integral of signal deviations strategy adopted from STL. We employ DBSCAN clustering algorithm to extract the residents’ service usage preferences. Conflict likelihood is computed using preferential proximity and temporal proximity strategies. Experimental results show the effectiveness of the proposed approach.
While offering convenience, smart home IoT devices collect extensive personal data, raising substantial privacy and security concerns. The risk of data breaches and unauthorized access, such as hacking or malware, can compromise resident privacy and even allow physical intrusion into homes. Additionally, sharing collected data with third parties without consent highlights the privacy and ethical issues [36]. Despite the importance of robust security measures to protect user data, this research does not cover privacy and security considerations. Research topics, such as “occupancy estimation”, “resident identification” play a crucial role in the smart home research domain [37, 38]. However, addressing the challenge of attributing service events to specific users in a multi-user environment is beyond the scope of this study.
Future enhancements to our framework will involve integrating additional contextual data, such as interpersonal relationships, to improve conflict detection and resolution in smart homes. We aim to test our solutions in more complex scenarios using broader experimental setups and larger datasets. Moreover, we will examine these mechanisms’ ethical and legal considerations to prioritize privacy, autonomy, and well-being.
References
- [1] A. Nauman, Y. A. Qadri, M. Amjad, Y. B. Zikria, Afzal et al., “Multimedia internet of things: A comprehensive survey,” IEEE Access, vol. 8, pp. 8202–8250, 2020.
- [2] P. Marwedel, Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things. Springer Nature, 2021.
- [3] D. Chaki and A. Bouguettaya, “Adaptive priority-based conflict resolution of iot services,” in 2021 IEEE International Conference on Web Services (ICWS). IEEE, 2021, pp. 663–668.
- [4] A. Bouguettaya, Q. Z. Sheng, B. Benatallah, A. G. Neiat, S. Mistry, S. Nepal, and L. Yao, “An internet of things service roadmap,” CACM, vol. 64, no. 9, pp. 86–95, 2021.
- [5] B. Huang, A. Bouguettaya, H. Dong, and L. Chen, “Service mining for internet of things,” in ICSOC. Springer, 2016, pp. 566–574.
- [6] D. Chaki, A. Bouguettaya, and S. Mistry, “A conflict detection framework for iot services in multi-resident smart homes,” in IEEE ICWS. IEEE, 2020, pp. 224–231.
- [7] B. Huang, A. Bouguettaya, and A. G. Neiat, “Convenience-based periodic composition of iot services,” in ICSOC. Springer, 2018, pp. 660–678.
- [8] J. Hua, C. Liu, T. Kalbarczyk et al., “riot: Enabling seamless context-aware automation in the internet of things,” in IEEE ICMASS. IEEE, 2019, pp. 227–235.
- [9] B. Huang, A. Bouguettaya, and A. G. Neiat, “Discovering spatio-temporal relationships among iot services,” in IEEE ICWS. IEEE, 2018, pp. 347–350.
- [10] J. Hua et al., “Copi: Enabling probabilistic conflict prediction in smart space through context-awareness,” in IEEE/ACM IoTDI. IEEE, 2022, pp. 30–42.
- [11] D. Chaki and A. Bouguettaya, “Fine-grained conflict detection of iot services,” in IEEE SCC. IEEE, 2020, pp. 321–328.
- [12] M. Nakamura et al., “Considering impacts and requirements for better understanding of environment interactions in hns,” Comp. Net., vol. 57, no. 12, pp. 2442–2453, 2013.
- [13] T. Matsuo, P. Leelaprute, T. Tsuchiya, and T. Kikuno, “Verifying feature interactions in home network systems,” IPSJ Journal, vol. 49, no. 6, pp. 2129–2143, 2008.
- [14] M. Kolberg, E. H. Magill et al., “Compatibility issues between services supporting networked appliances,” IEEE Communications Magazine, vol. 41, no. 11, pp. 136–147, 2003.
- [15] L. du Bousquet and J. Richier, “Considering side effects in service interactions in home automation-an online approach,” FISCS IX, p. 172, 2008.
- [16] A. Donzé and O. Maler, “Robust satisfaction of temporal logic over real-valued signals,” in ICFMATS. Springer, 2010, pp. 92–106.
- [17] D. Chaki and A. Bouguettaya, “Dynamic conflict resolution of iot services in smart homes,” in ICSOC. Springer, 2021, pp. 368–384.
- [18] M. Choksi, D. Chaki, A. Lakhdari, and A. Bouguettaya, “You are what you use: Usage-based profiling in iot environments,” in Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022, pp. 21–23.
- [19] W. Shao, F. D. Salim, A. Song, and A. Bouguettaya, “Clustering big spatiotemporal-interval data,” IEEE Transactions on Big Data, vol. 2, no. 3, pp. 190–203, 2016.
- [20] D. J. Cook, A. S. Crandall, B. L. Thomas, and N. C. Krishnan, “Casas: A smart home in a box,” Computer, vol. 46, no. 7, pp. 62–69, 2012.
- [21] S. Easterbrook, “Resolving requirements conflicts with computer-supported negotiation,” Requirements engineering: social and technical issues, vol. 1, pp. 41–65, 1994.
- [22] B. Nuseibeh, J. Kramer, and A. Finkelstein, “A framework for expressing the relationships between multiple views in requirements specification,” IEEE Transactions on software engineering, vol. 20, no. 10, pp. 760–773, 1994.
- [23] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” FGCS, vol. 29, no. 7, pp. 1645–1660, 2013.
- [24] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the internet of things: A survey,” IEEE communications surveys & tutorials, vol. 16, no. 1, pp. 414–454, 2013.
- [25] W. Wang and S. Ting, “Development of a computational simulation model for conflict management in team building,” IJEBM, vol. 3, p. 14, 2011.
- [26] H. Ibrhim, H. Hassan, and E. Nabil, “A conflicts’ classification for iot-based services: a comparative survey,” PeerJ Computer Science, vol. 7, p. e480, 2021.
- [27] P. Lalanda, R. B. Hadj, C. Hamon, and G. Vega, “Conflict management in service-oriented pervasive platforms,” in IEEE SCC. IEEE, 2017, pp. 249–256.
- [28] V. Tuttlies, G. Schiele, and C. Becker, “Comity-conflict avoidance in pervasive computing environments,” in OTM. Springer, 2007, pp. 763–772.
- [29] P. Carreira, S. Resendes, and A. C. Santos, “Towards automatic conflict detection in home and building automation systems,” PMC, vol. 12, pp. 37–57, 2014.
- [30] F. J. Miandashti et al., “An empirical approach to modeling user-system interaction conflicts in smart homes,” IEEE Transactions on HMS, vol. 50, no. 6, pp. 573–583, 2020.
- [31] M. Yagita, F. Ishikawa et al., “An application conflict detection and resolution system for smart homes,” in IEEE/ACM WSESCPS. IEEE, 2015, pp. 33–39.
- [32] M. Nakamura, H. Igaki, and K.-i. Matsumoto, “Feature interactions in integrated services of networked home appliances,” in Proc. of ICFI, 2005, pp. 236–251.
- [33] E. Goynugur, K. Talamadupula, G. de Mel, and M. Sensoy, “Automatic resolution of policy conflicts in iot environments through planning,” in ICAPS, 2016.
- [34] B. Huang, H. Dong, and A. Bouguettaya, “Conflict detection in iot-based smart homes,” in IEEE ICWS. IEEE, 2021, pp. 303–313.
- [35] A. Al Farooq, E. Al-Shaer et al., “Iotc 2: A formal method approach for detecting conflicts in large scale iot systems,” in IEEE SINSM. IEEE, 2019, pp. 442–447.
- [36] B. Huang, D. Chaki, A. Bouguettaya, and K.-Y. Lam, “A survey on conflict detection in iot-based smart homes,” ACM Computing Surveys, vol. 56, no. 5, pp. 1–40, 2023.
- [37] Z. Qin, D. Chaki, A. Lakhdari, A. Abusafia, and A. Bouguettaya, “Occupancy estimation from thermal images,” in International Conference on Service-Oriented Computing. Springer, 2021, pp. 301–305.
- [38] Z. Song, D. Chaki, A. Lakhdari, and A. Bouguettaya, “Positional encoding-based resident identification in multi-resident smart homes,” ACM Transactions on Internet Technology, vol. 24, no. 1, pp. 1–27, 2023.