Abstract smuggled, and illegally modified vehicles much more


Abstract : Internet of things is thenetwork of devices connected to the Internet, including vehicle, wearabledevices, and almost anything with a sensor on it. These things collect andexchange data. Internet of vehicles enables informationexchange and content sharing among vehicles. IoV offers several benefits suchas road safety, traffic efficiency, etc. by forwarding up-to-date trafficinformation about upcoming traffic. And big data collection can improvedecision making, especially path planning in IoV.

But malicious users in IoVmay mislead the whole communications. How to secure the big data collection inlarge scale IoV is meaningful and deserves researching. In an IoV architecture, initiallyvehicles need to register in the big data centre to connect into the network.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Afterward, vehicles associate with big data centre via mutual authenticationand single sign-on algorithm. The business data is transferred in plain textform while the confidential data is transferred in cipher text form. Thecollected big data will be processed using Hadoop architecture to achieve theunified management. The benefits of IoV are, Global InternetID-vehicles will have IDs in cyberspace. Which will no doubt make the operationof falsely registered, smuggled, and illegally modified vehicles much moredifficult , Online vehicle status check, annual inspection, and monitoringetc., It will be possible to remotely determine a vehicle’s operationallegality, regulatory compliance, and license status of the driver, which willreduce vehicle management costs, change industries, and save lives, BigBusiness Data- The cloud based integration of heterogeneous networks withvehicular network would result as a huge data resource. The resource could beutilized in productive manner with wide range of businesses includingautomobile, Internet, insurance and market analysis.

 Keywords:Big data, Security, Data Collection, Internet of Vehicle, IoT                                                                                                                                                                I.     Introduction Internet of vehicles(IoV) is an integrated network based on vehicular ad hoc network. IoT Internet of things is the network ofdevices connected to the Internet, including vehicle, wearable devices, andalmost anything with a sensor on it. These things collect and exchange data. IoV enables information exchange among vehicles. IoV offers  benefits such as traffic efficiency, roadsafety etc. by forwarding up-to-date traffic information about  traffic.

IoV achieves intelligent trafficmanagement control, and intelligent dynamic. Big data collection can improvedecision making, especially path planning in IoV. And helps to analyzes andsolve the traffic problems, etc. But malicious users in IoV may mislead thewhole communications. How to secure the big data collection in large scale IoVis meaningful and deserves researching. In an IoVarchitecture, initially vehicles need to register in the big data centre toconnect into the network.

Afterward, vehicles associate with big data centrevia mutual authentication and single sign-on algorithm. Different secureprotocols are needed for business data and confidential data collection. Thecollected big data stored securely using distributed storage.

The benefitsof IoV are, Global Internet ID-vehicles will have IDs in cyberspace. Which willno doubt make the operation of falsely registered, smuggled, and illegallymodified vehicles much more difficult , Online vehicle status check, annualinspection, and monitoring etc., It will be possible to remotely determine avehicle’s operational legality, regulatory compliance, and license status ofthe driver, which will reduce vehicle management costs, change industries, andsave lives, Big Business Data- The cloud based integration of heterogeneousnetworks with vehicular network would result as a huge data resource. Theresource could be utilized in productive manner with wide range of businessesincluding automobile, Internet, insurance and market analysis.

                                                                                                                                                        II.    EXISTINGSYSTEM Related works include cryptographic hash chains to authenticateInternet of vehicle users 2, security through third party authentication 3,security using cryptographic technique and security through signature-basedauthentication 2 etc. Directly or indirectly many methods use cryptographichash function to increase security. Cryptographic hash function is a mathematical algorithm that mapsdata of arbitrary size to a bit string of fixed size. Which is a one wayfunction.

Only way to recreate the input from an ideal cryptographic hashoutput is to attempt a brute force search of possible inputs to see if theyproduce a match 8. However, the existing protocols in the related area cannot bedirectly applied in big data collection in large scale IoV. As a result, thesecurity and efficiency issue for big data collection still deserves research.                                                                                                                                                              III.   DRAWBACKS·        Lessscalability: ·        Thecapability of a system, network, or process to handle a growing amount of work isless. ·        Datafalsification attack: ·        Datacan be falsified by unauthorized access. ·        Highdelay ·        SecureData Storage                                                                                                                                                            IV.   METHODOLOGYA.

   Single sign-onSingle sign-on (SSO) is aproperty of access control of multiple related, yet independent, softwaresystems. With this property, a user logs in with a single ID and password togain access to a connected system or systems without using different usernamesor passwords, or in some configurations seamlessly sign on at each system.B.   cryptographic hash function  A cryptographichash function is a hash function which takes an input  and returns a fixed size alphanumeric string.The string is called the ‘hash value’, ‘message digest’, ‘digest’ or’checksum’.A hash function takes a string ofany length as input and produces a fixed length string which acts as a kind of”signature” for the data provided. In this way, a person knowing the”hash value” is unable to know the original message, but only theperson who knows the original message can prove the “hash value” iscreated from that message.

 C.    Message Authentication CodeA message authentication code, Itis similar to a cryptographic hash, except that it is based on a secret key.When secret key information is included with the data that is processed byusing a cryptographic hash function, the output hash is known as  HMAC. D.    Digital SignaturesIf acryptographic hash is created for a message, the hash is encrypted with privatekey of the sender.

This resultant hash is called a digital signature.                                                                                                                                                    V.    ADVANTAGESOF IOV• Global Internet ID :-vehicles will have IDs incyberspace. Which will no doubt make the operation of falsely registered,smuggled, and illegally modified vehicles much more difficult 4.

• Vehicular status perception:– The GID featuresvarious embedded sensors and connects with a vehicular bus, such as OBD or thecontroller–area network, enabling it to perceive and monitor almost all staticand dynamic vehicular information, including environmental and status-diagnosisinformation. • Infrastructure as a Service  :- Basic IoV-and traffic-related computingservices are based on the cloud framework, including vehicle/traffic statusdata storage, area-based vehicle monitoring/control, vehicle safety statusmonitoring/control, real-time traffic analysis, and access billing andsettlement. Meanwhile, as a core capability, open APIs are provided to anythird-party application developer to help them rapidly build relatedapplication services. • Platform as a Service – Includes bulk GPS data andGID data processing, ITS holographic data processing, cloud storage,information mining and analysis, information security, and data buses.

• Software as a Service :– Through basic cloudservices and third-party service resources, any developer may create certainapplications that support IoV and ITS from various terminals 9.                                                                                                                                                               VI.   COMPARISON        A Secure Mechanism for Big Data Collection in Large Scale IoV 1.   On the Security of Information Dissemination in the IoV 2. Reliable emergency message dissemination protocol for urban IoV 6.

Standard used IEEE 802.11p IEEE 802.11p IEEE 802.11p Authentication-vehicle Single sign on algorithm- uses signature Using Hash chain Using Hash chain Data transmission Business data transferred in plain text form and confidential data transferred in cipher text form. Plain text Plain text Security Uses signature, Hash message Authentication code Hash code Ready to broadcast and clear to Broadcast emergency message handshake. Transmission delay Low delay Delay reduced by reducing contention window size Less than 100ms                                                                                                                                                              VII.  CONCLUSIONSIn the secure information collection scheme for big data in large scaleIoV, Single sign-on algorithm for authentication are utilized with improvedefficiency.

The business data is transferred in plain text form while theconfidential data is transferred in cipher text form. The collected big datawill be processed using Hadoop architecture to achieve the unifiedmanagement.Vehicles  have IDs in cyberspace.Which will no doubt make the operation of falsely registered, smuggled, andillegally modified vehicles much more difficult.. The cloud based integrationof heterogeneous networks with vehicular network would result as a huge dataresource.

The resource could be utilized in productive manner with wide rangeof businesses including automobile, Internet, insurance and market analysi

x

Hi!
I'm William!

Would you like to get a custom essay? How about receiving a customized one?

Check it out