Abstract safety, traffic efficiency, etc. by forwarding up-to-date

Abstract : Internet of things is the
network of devices connected to the Internet, including vehicle, wearable
devices, and almost anything with a sensor on it. These things collect and
exchange data.

Internet of vehicles enables information
exchange and content sharing among vehicles. IoV offers several benefits such
as road safety, traffic efficiency, etc. by forwarding up-to-date traffic
information about upcoming traffic. And big data collection can improve
decision making, especially path planning in IoV. But malicious users in IoV
may mislead the whole communications. How to secure the big data collection in
large scale IoV is meaningful and deserves researching.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

In an IoV architecture, initially
vehicles need to register in the big data centre to connect into the network.
Afterward, vehicles associate with big data centre via mutual authentication
and single sign-on algorithm. The business data is transferred in plain text
form while the confidential data is transferred in cipher text form. The
collected big data will be processed using Hadoop architecture to achieve the
unified management.

The benefits of IoV are, Global Internet
ID-vehicles will have IDs in cyberspace. Which will no doubt make the operation
of falsely registered, smuggled, and illegally modified vehicles much more
difficult , Online vehicle status check, annual inspection, and monitoring
etc., It will be possible to remotely determine a vehicle’s operational
legality, regulatory compliance, and license status of the driver, which will
reduce vehicle management costs, change industries, and save lives, Big
Business Data- The cloud based integration of heterogeneous networks with
vehicular network would result as a huge data resource. The resource could be
utilized in productive manner with wide range of businesses including
automobile, Internet, insurance and market analysis.

 

Keywords:
Big data, Security, Data Collection, Internet of Vehicle, IoT

 

                                                                                                                                                               
I.     Introduction

 Internet of vehicles
(IoV) is an integrated network based on 
vehicular ad hoc network. IoT Internet of things is the network of
devices connected to the Internet, including vehicle, wearable devices, and
almost anything with a sensor on it. These things collect and exchange data.

IoV enables information exchange among vehicles. IoV offers  benefits such as traffic efficiency, road
safety etc. by forwarding up-to-date traffic information about  traffic. IoV achieves intelligent traffic
management control, and intelligent dynamic. Big data collection can improve
decision making, especially path planning in IoV. And helps to analyzes and
solve the traffic problems, etc. But malicious users in IoV may mislead the
whole communications. How to secure the big data collection in large scale IoV
is meaningful and deserves researching.

In an IoV
architecture, initially vehicles need to register in the big data centre to
connect into the network. Afterward, vehicles associate with big data centre
via mutual authentication and single sign-on algorithm. Different secure
protocols are needed for business data and confidential data collection. The
collected big data stored securely using distributed storage.

The benefits
of IoV are, Global Internet ID-vehicles will have IDs in cyberspace. Which will
no doubt make the operation of falsely registered, smuggled, and illegally
modified vehicles much more difficult , Online vehicle status check, annual
inspection, and monitoring etc., It will be possible to remotely determine a
vehicle’s operational legality, regulatory compliance, and license status of
the driver, which will reduce vehicle management costs, change industries, and
save lives, Big Business Data- The cloud based integration of heterogeneous
networks with vehicular network would result as a huge data resource. The
resource could be utilized in productive manner with wide range of businesses
including automobile, Internet, insurance and market analysis.

 

                                                                                                                                                       
II.    EXISTING
SYSTEM

Related works include cryptographic hash chains to authenticate
Internet of vehicle users 2, security through third party authentication 3,
security using cryptographic technique and security through signature-based
authentication 2 etc. Directly or indirectly many methods use cryptographic
hash function to increase security.

Cryptographic hash function is a mathematical algorithm that maps
data of arbitrary size to a bit string of fixed size. Which is a one way
function. Only way to recreate the input from an ideal cryptographic hash
output is to attempt a brute force search of possible inputs to see if they
produce a match 8.

However, the existing protocols in the related area cannot be
directly applied in big data collection in large scale IoV. As a result, the
security and efficiency issue for big data collection still deserves research.

                                                                                                                                                              
III.   DRAWBACKS

·        
Less
scalability:

·        
The
capability of a system, network, or process to handle a growing amount of work is
less.

·        
Data
falsification attack:

·        
Data
can be falsified by unauthorized access.

·        
High
delay

·        
Secure
Data Storage

 

                                                                                                                                                          
IV.   METHODOLOGY

A.   
Single sign-on

Single sign-on (SSO) is a
property of access control of multiple related, yet independent, software
systems. With this property, a user logs in with a single ID and password to
gain access to a connected system or systems without using different usernames
or passwords, or in some configurations seamlessly sign on at each system.

B.   
cryptographic hash function 

 A cryptographic
hash function is a hash function which takes an input  and returns a fixed size alphanumeric string.
The string is called the ‘hash value’, ‘message digest’, ‘digest’ or
‘checksum’.

A hash function takes a string of
any length as input and produces a fixed length string which acts as a kind of
“signature” for the data provided. In this way, a person knowing the
“hash value” is unable to know the original message, but only the
person who knows the original message can prove the “hash value” is
created from that message.

 

C.    Message Authentication Code

A message authentication code, It
is similar to a cryptographic hash, except that it is based on a secret key.
When secret key information is included with the data that is processed by
using a cryptographic hash function, the output hash is known as  HMAC.

 

D.    Digital Signatures

If a
cryptographic hash is created for a message, the hash is encrypted with private
key of the sender. This resultant hash is called a digital signature.

 

                                                                                                                                                   
V.    ADVANTAGES
OF IOV

• Global Internet ID :-vehicles will have IDs in
cyberspace. Which will no doubt make the operation of falsely registered,
smuggled, and illegally modified vehicles much more difficult 4.

• Vehicular status perception:– The GID features
various embedded sensors and connects with a vehicular bus, such as OBD or the
controller–area network, enabling it to perceive and monitor almost all static
and dynamic vehicular information, including environmental and status-diagnosis
information.

• Infrastructure as a Service  :- Basic IoV-and traffic-related computing
services are based on the cloud framework, including vehicle/traffic status
data storage, area-based vehicle monitoring/control, vehicle safety status
monitoring/control, real-time traffic analysis, and access billing and
settlement. Meanwhile, as a core capability, open APIs are provided to any
third-party application developer to help them rapidly build related
application services.

• Platform as a Service – Includes bulk GPS data and
GID data processing, ITS holographic data processing, cloud storage,
information mining and analysis, information security, and data buses.

• Software as a Service :– Through basic cloud
services and third-party service resources, any developer may create certain
applications that support IoV and ITS from various terminals 9.

 

                                                                                                                                                             
VI.   COMPARISON

   

 

 

A Secure Mechanism for Big Data
Collection in Large Scale IoV 1.
 

On the Security of Information
Dissemination
in the IoV 2.

Reliable emergency message
dissemination protocol
for urban
IoV 6.

Standard
used

IEEE 802.11p

IEEE 802.11p

IEEE 802.11p

Authentication-vehicle

Single sign on algorithm- uses signature

Using Hash chain

Using Hash chain

Data
transmission

Business data transferred in plain text
form and confidential data transferred in cipher text form.

Plain text

Plain text

Security

Uses signature, Hash message
Authentication code

Hash code

Ready to broadcast and clear to Broadcast
emergency message handshake.

Transmission
delay

Low delay

Delay reduced by reducing contention
window size

Less than 100ms

 

 

                                                                                                                                                           
VII.  CONCLUSIONS

In the secure information collection scheme for big data in large scale
IoV, Single sign-on algorithm for authentication are utilized with improved
efficiency. The business data is transferred in plain text form while the
confidential data is transferred in cipher text form. The collected big data
will be processed using Hadoop architecture to achieve the unified
management.Vehicles  have IDs in cyberspace.
Which will no doubt make the operation of falsely registered, smuggled, and
illegally modified vehicles much more difficult.. The cloud based integration
of heterogeneous networks with vehicular network would result as a huge data
resource. The resource could be utilized in productive manner with wide range
of businesses including automobile, Internet, insurance and market analysi