h2 collect and exchange data. IoV enables information

h2 { margin-top: 0.21cm; margin-bottom: 0.11cm; direction: ltr; color: rgb(0, 0, 0); text-align: left; page-break-inside: avoid; }h2.western { font-family: “Times New Roman”, serif; font-size: 10pt; font-style: italic; font-weight: normal; }h2.cjk { font-family: “SimSun”, “??”; font-size: 10pt; font-style: italic; font-weight: normal; }h2.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; font-style: italic; font-weight: normal; }h1 { margin-top: 0.28cm; margin-bottom: 0.14cm; direction: ltr; font-variant: small-caps; color: rgb(0, 0, 0); text-align: center; page-break-inside: avoid; }h1.western { font-family: “Times New Roman”, serif; font-size: 10pt; font-weight: normal; }h1.cjk { font-family: “SimSun”, “??”; font-size: 10pt; font-weight: normal; }h1.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; font-weight: normal; }p { text-indent: 0.51cm; margin-bottom: 0.21cm; direction: ltr; color: rgb(0, 0, 0); letter-spacing: -0.1pt; line-height: 95%; text-align: justify; }p.western { font-family: “Times New Roman”, serif; font-size: 10pt; }p.cjk { font-family: “SimSun”, “??”; font-size: 10pt; }p.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; }

Abstract : Internet of
things is the network of devices connected to the Internet, including
vehicle, wearable devices, and almost anything with a sensor on it.
These things collect and exchange data.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Internet of vehicles enables
information exchange and content sharing among vehicles. IoV offers
several benefits such as road safety, traffic efficiency, etc. by
forwarding up-to-date traffic information about upcoming traffic. And
big data collection can improve decision making, especially path
planning in IoV. But malicious users in IoV may mislead the whole
communications. How to secure the big data collection in large scale
IoV is meaningful and deserves researching.

In an IoV architecture,
initially vehicles need to register in the big data centre to connect
into the network. Afterward, vehicles associate with big data centre
via mutual authentication and single sign-on algorithm. The business
data is transferred in plain text form while the confidential data is
transferred in cipher text form. The collected big data will be
processed using Hadoop architecture to achieve the unified
management.

The benefits of IoV are,
Global Internet ID-vehicles will have IDs in cyberspace. Which will
no doubt make the operation of falsely registered, smuggled, and
illegally modified vehicles much more difficult , Online vehicle
status check, annual inspection, and monitoring etc., It will be
possible to remotely determine a vehicle’s operational legality,
regulatory compliance, and license status of the driver, which will
reduce vehicle management costs, change industries, and save lives,
Big Business Data- The cloud based integration of heterogeneous
networks with vehicular network would result as a huge data resource.
The resource could be utilized in productive manner with wide range
of businesses including automobile, Internet, insurance and market
analysis.

Keywords: Big data,
Security, Data Collection, Internet of Vehicle, IoT

I.Introduction

Internet of vehicles (IoV) is an integrated network based on
vehicular ad hoc network. IoT Internet of things is the network of
devices connected to the Internet, including vehicle, wearable
devices, and almost anything with a sensor on it. These things
collect and exchange data.

IoV enables information exchange among vehicles. IoV offers benefits
such as traffic efficiency, road safety etc. by forwarding up-to-date
traffic information about traffic. IoV achieves intelligent traffic
management control, and intelligent dynamic. Big data collection can
improve decision making, especially path planning in IoV. And helps
to analyzes and solve the traffic problems, etc. But malicious users
in IoV may mislead the whole communications. How to secure the big
data collection in large scale IoV is meaningful and deserves
researching.

In an IoV
architecture, initially vehicles need to register in the big data
centre to connect into the network. Afterward, vehicles associate
with big data centre via mutual authentication and single sign-on
algorithm. Different secure protocols are needed for business data
and confidential data collection. The collected big data stored
securely using distributed storage.

The
benefits of IoV are, Global Internet ID-vehicles will have IDs in
cyberspace. Which will no doubt make the operation of falsely
registered, smuggled, and illegally modified vehicles much more
difficult , Online vehicle status check, annual inspection, and
monitoring etc., It will be possible to remotely determine a
vehicle’s operational legality, regulatory compliance, and license
status of the driver, which will reduce vehicle management costs,
change industries, and save lives, Big Business Data- The cloud based
integration of heterogeneous networks with vehicular network would
result as a huge data resource. The resource could be utilized in
productive manner with wide range of businesses including automobile,
Internet, insurance and market analysis.

II.EXISTING SYSTEM

Related works include cryptographic hash chains to authenticate
Internet of vehicle users 2, security through third party
authentication 3, security using cryptographic technique and
security through signature-based authentication 2 etc. Directly or
indirectly many methods use cryptographic hash function to increase
security.

Cryptographic hash function is a mathematical algorithm that maps
data of arbitrary size to a bit string of fixed size. Which is a one
way function. Only way to recreate the input from an ideal
cryptographic hash output is to attempt a brute force search of
possible inputs to see if they produce a match 8.

However, the existing protocols in the related area cannot be
directly applied in big data collection in large scale IoV. As a
result, the security and efficiency issue for big data collection
still deserves research.
III.DRAWBACKS

Less scalability:

The capability of a system,
network, or process to handle a growing amount of work is less.

Data falsification attack:

Data can be falsified by
unauthorized access.

High delay

Secure Data Storage

IV.METHODOLOGY
A.Single sign-on

Single sign-on (SSO) is a property of access control of multiple
related, yet independent, software systems. With this property, a
user logs in with a single ID and password to gain access to a
connected system or systems without using different usernames or
passwords, or in some configurations seamlessly sign on at each
system.
B.cryptographic hash
function 

A cryptographic hash function is a hash function which takes an
input and returns a fixed size alphanumeric string. The string is
called the ‘hash value’, ‘message digest’, ‘digest’ or ‘checksum’.

A hash function takes a string of any length as input and produces a
fixed length string which acts as a kind of “signature” for
the data provided. In this way, a person knowing the “hash
value” is unable to know the original message, but only the
person who knows the original message can prove the “hash value”
is created from that message.

C.Message Authentication Code

A message authentication code, It is similar to a cryptographic hash,
except that it is based on a secret key. When secret key information
is included with the data that is processed by using a cryptographic
hash function, the output hash is known as HMAC.

D.Digital Signatures

If a cryptographic hash is created for a
message, the hash is encrypted with private key of the sender. This
resultant hash is called a digital signature.

V.ADVANTAGES OF IOV

• Global Internet ID :-vehicles will have IDs in cyberspace. Which
will no doubt make the operation of falsely registered, smuggled, and
illegally modified vehicles much more difficult 4.

• Vehicular status perception:– The GID features various embedded
sensors and connects with a vehicular bus, such as OBD or the
controller–area network, enabling it to perceive and monitor almost
all static and dynamic vehicular information, including environmental
and status-diagnosis information.

• Infrastructure as a Service :- Basic IoV-and traffic-related
computing services are based on the cloud framework, including
vehicle/traffic status data storage, area-based vehicle
monitoring/control, vehicle safety status monitoring/control,
real-time traffic analysis, and access billing and settlement.
Meanwhile, as a core capability, open APIs are provided to any
third-party application developer to help them rapidly build related
application services.

• Platform as a Service – Includes bulk GPS data and GID data
processing, ITS holographic data processing, cloud storage,
information mining and analysis, information security, and data
buses.

• Software as a Service :– Through basic cloud services and
third-party service resources, any developer may create certain
applications that support IoV and ITS from various terminals 9.

VI.COMPARISON

A Secure Mechanism for
Big Data Collection in Large Scale IoV 1.

On the Security of
Information

Dissemination in the IoV
2.

Reliable emergency
message

dissemination protocol

for urban IoV 6.

Standard used

IEEE 802.11p

IEEE 802.11p

IEEE 802.11p

Authentication-vehicle

Single sign on algorithm-
uses signature

Using Hash chain

Using Hash chain

Data transmission

Business data transferred in
plain text form and confidential data transferred in cipher text
form.

Plain text

Plain text

Security

Uses signature, Hash message
Authentication code

Hash code

Ready to broadcast and clear
to Broadcast emergency message handshake.

Transmission delay

Low delay

Delay reduced by reducing
contention window size

Less than 100ms

VII.CONCLUSIONS

In the secure information collection scheme for big data in large
scale IoV, Single sign-on algorithm for authentication are utilized
with improved efficiency. The business data is transferred in plain
text form while the confidential data is transferred in cipher text
form. The collected big data will be processed using Hadoop
architecture to achieve the unified management.Vehicles have IDs in
cyberspace. Which will no doubt make the operation of falsely
registered, smuggled, and illegally modified vehicles much more
difficult.. The cloud based integration of
heterogeneous networks with vehicular network would result as a huge
data resource. The resource could be utilized in productive manner
with wide range of businesses including automobile, Internet,
insurance and market analysis.

Related Posts

© All Right Reserved
x

Hi!
I'm Melba!

Would you like to get a custom essay? How about receiving a customized one?

Check it out