h2 upcoming traffic. And big data collection can improve

h2 { margin-top: 0.21cm; margin-bottom: 0.11cm; text-align: left; page-break-inside: avoid; }h2.western { font-family: “Liberation Serif”, serif; font-size: 12pt; font-style: italic; font-weight: normal; }h2.cjk { font-family: “Noto Sans CJK SC Regular”; font-size: 10pt; font-style: italic; font-weight: normal; }h2.ctl { font-family: “FreeSans”; font-size: 12pt; font-style: italic; font-weight: normal; }h1 { margin-top: 0.28cm; margin-bottom: 0.14cm; font-variant: small-caps; page-break-inside: avoid; }h1.western { font-family: “Liberation Serif”, serif; font-size: 12pt; font-weight: normal; }h1.cjk { font-size: 10pt; font-weight: normal; }h1.ctl { font-size: 12pt; font-weight: normal; }p { margin-bottom: 0.25cm; line-height: 120%; }

Abstract
: Internet of things is the network of devices connected to the
Internet, including vehicle, wearable devices, and almost anything
with a sensor on it. These things collect and exchange data.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Internet
of vehicles enables information exchange and content sharing among
vehicles. IoV offers several benefits such as road safety, traffic
efficiency, etc. by forwarding up-to-date traffic information about
upcoming traffic. And big data collection can improve decision
making, especially path planning in IoV. But malicious users in IoV
may mislead the whole communications. How to secure the big data
collection in large scale IoV is meaningful and deserves researching.

In
an IoV architecture, initially vehicles need to register in the big
data centre to connect into the network. Afterward, vehicles
associate with big data centre via mutual authentication and single
sign-on algorithm. The business data is transferred in plain text
form while the confidential data is transferred in cipher text form.
The collected big data will be processed using Hadoop architecture to
achieve the unified management.

The
benefits of IoV are, Global Internet ID-vehicles will have IDs in
cyberspace. Which will no doubt make the operation of falsely
registered, smuggled, and illegally modified vehicles much more
difficult , Online vehicle status check, annual inspection, and
monitoring etc., It will be possible to remotely determine a
vehicle’s operational legality, regulatory compliance, and license
status of the driver, which will reduce vehicle management costs,
change industries, and save lives, Big Business Data- The cloud based
integration of heterogeneous networks with vehicular network would
result as a huge data resource. The resource could be utilized in
productive manner with wide range of businesses including automobile,
Internet, insurance and market analysis.

Keywords:
Big data, Security, Data Collection, Internet of Vehicle, IoT

Introduction
Internet
of vehicles (IoV) is an integrated network based on vehicular ad hoc
network. IoT Internet of things is the network of devices connected
to the Internet, including vehicle, wearable devices, and almost
anything with a sensor on it. These things collect and exchange data.

IoV
enables information exchange among vehicles. IoV offers benefits
such as traffic efficiency, road safety etc. by forwarding up-to-date
traffic information about traffic. IoV achieves intelligent traffic
management control, and intelligent dynamic. Big data collection can
improve decision making, especially path planning in IoV. And helps
to analyzes and solve the traffic problems, etc. But malicious users
in IoV may mislead the whole communications. How to secure the big
data collection in large scale IoV is meaningful and deserves
researching.

In
an IoV architecture, initially vehicles need to register in the big
data centre to connect into the network. Afterward, vehicles
associate with big data centre via mutual authentication and single
sign-on algorithm. Different secure protocols are needed for business
data and confidential data collection. The collected big data stored
securely using distributed storage.

The
benefits of IoV are, Global Internet ID-vehicles will have IDs in
cyberspace. Which will no doubt make the operation of falsely
registered, smuggled, and illegally modified vehicles much more
difficult , Online vehicle status check, annual inspection, and
monitoring etc., It will be possible to remotely determine a
vehicle’s operational legality, regulatory compliance, and license
status of the driver, which will reduce vehicle management costs,
change industries, and save lives, Big Business Data- The cloud based
integration of heterogeneous networks with vehicular network would
result as a huge data resource. The resource could be utilized in
productive manner with wide range of businesses including automobile,
Internet, insurance and market analysis.

EXISTING
SYSTEM

Related
works include cryptographic hash chains to authenticate Internet of
vehicle users 2, security through third party authentication 3,
security using cryptographic technique and security through
signature-based authentication 2 etc. Directly or indirectly many
methods use cryptographic hash function to increase security.

Cryptographic
hash function is a mathematical algorithm that maps data of arbitrary
size to a bit string of fixed size. Which is a one way function. Only
way to recreate the input from an ideal cryptographic hash output is
to attempt a brute force search of possible inputs to see if they
produce a match 8.

However,
the existing protocols in the related area cannot be directly applied
in big data collection in large scale IoV. As a result, the security
and efficiency issue for big data collection still deserves research.
DRAWBACKS

Less
scalability:

The
capability of a system, network, or process to handle a growing
amount of work is less.

Data
falsification attack:

Data
can be falsified by unauthorized access.

High
delay

Secure
Data Storage

METHODOLOGY
Single
sign-on

Single
sign-on (SSO) is a property of access control of multiple related,
yet independent, software systems. With this property, a user logs in
with a single ID and password to gain access to a connected system or
systems without using different usernames or passwords, or in some
configurations seamlessly sign on at each system.
cryptographic hash
function 

A
cryptographic hash function is a hash function which takes an input
and returns a fixed size alphanumeric string. The string is called
the ‘hash value’, ‘message digest’, ‘digest’ or ‘checksum’.

A
hash function takes a string of any length as input and produces a
fixed length string which acts as a kind of “signature” for
the data provided. In this way, a person knowing the “hash
value” is unable to know the original message, but only the
person who knows the original message can prove the “hash value”
is created from that message.

Message
Authentication Code

A
message authentication code, It is similar to a cryptographic hash,
except that it is based on a secret key. When secret key information
is included with the data that is processed by using a cryptographic
hash function, the output hash is known as HMAC.

Digital
Signatures

If
a cryptographic hash is created for a message, the hash is encrypted
with private key of the sender. This resultant hash is called a
digital signature.

ADVANTAGES
OF IOV

• Global
Internet ID :-vehicles will have IDs in cyberspace. Which will no
doubt make the operation of falsely registered, smuggled, and
illegally modified vehicles much more difficult 4.

• Vehicular
status perception:– The GID features various embedded sensors and
connects with a vehicular bus, such as OBD or the controller–area
network, enabling it to perceive and monitor almost all static and
dynamic vehicular information, including environmental and
status-diagnosis information.

• Infrastructure
as a Service :- Basic IoV-and traffic-related computing services are
based on the cloud framework, including vehicle/traffic status data
storage, area-based vehicle monitoring/control, vehicle safety status
monitoring/control, real-time traffic analysis, and access billing
and settlement. Meanwhile, as a core capability, open APIs are
provided to any third-party application developer to help them
rapidly build related application services.

• Platform
as a Service – Includes bulk GPS data and GID data processing, ITS
holographic data processing, cloud storage, information mining and
analysis, information security, and data buses.

• Software
as a Service :– Through basic cloud services and third-party
service resources, any developer may create certain applications that
support IoV and ITS from various terminals 9.

COMPARISON

A
Secure Mechanism for Big Data Collection in Large Scale IoV 1.

On
the Security of Information

Dissemination
in the IoV 2.

Reliable
emergency message

dissemination
protocol

for
urban IoV 6.

Standard
used

IEEE
802.11p

IEEE
802.11p

IEEE
802.11p

Authentication-vehicle

Single
sign on algorithm- uses signature

Using
Hash chain

Using
Hash chain

Data
transmission

Business
data transferred in plain text form and confidential data
transferred in cipher text form.

Plain
text

Plain
text

Security

Uses
signature, Hash message Authentication code

Hash
code

Ready
to broadcast and clear to Broadcast emergency message handshake.

Transmission
delay

Low
delay

Delay
reduced by reducing contention window size

Less
than 100ms

CONCLUSIONS
In
the secure information collection scheme for big data in large scale
IoV, Single sign-on algorithm for authentication are utilized with
improved efficiency. The business data is transferred in plain text
form while the confidential data is transferred in cipher text form.
The collected big data will be processed using Hadoop architecture to
achieve the unified management.Vehicles have IDs in cyberspace.
Which will no doubt make the operation of falsely registered,
smuggled, and illegally modified vehicles much more difficult..
The cloud based integration of heterogeneous networks with
vehicular network would result as a huge data resource. The resource
could be utilized in productive manner with wide range of businesses
including automobile, Internet, insurance and market analysis.