Abstract in the big data centre to connect into

Abstract : IoT (Internet of
things) is the network of devices connected to the Internet,
including smart phones, vehicle, wearable devices, and almost
anything with a sensor on it. These “things” collect and exchange
data.

IoV(Internet of vehicles)
enables information exchange and content sharing among vehicles. IoV
offers several benefits such as road safety, traffic efficiency, etc.
by forwarding up-to-date traffic information about upcoming traffic.
And big data collection can improve decision making, especially path
planning in IoV. But malicious users in IoV may mislead the whole
communications. How to secure the big data collection in large scale
IoV is meaningful and deserves researching.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

In an IoV architecture,
initially vehicles need to register in the big data centre to connect
into the network. Afterward, vehicles associate with big data centre
via mutual authentication and single sign-on algorithm. The business
data is transferred in plain text form while the confidential data is
transferred in cipher text form. The collected big data will be
processed using Hadoop architecture to achieve the unified
management.

The benefits of IoV are,
Global Internet ID-vehicles will have IDs in cyberspace. Which will
no doubt make the operation of falsely registered, smuggled, and
illegally modified vehicles much more difficult , Online vehicle
status check, annual inspection, and monitoring etc., It will be
possible to remotely determine a vehicle’s operational legality,
regulatory compliance, and license status of the driver, which will
reduce vehicle management costs, change industries, and save lives,
Big Business Data- The cloud based integration of heterogeneous
networks with vehicular network would result as a huge data resource.
The resource could be utilized in productive manner with wide range
of businesses including automobile, Internet, insurance and market
analysis.

Keywords: Big data,
Security, Data Collection, Internet of Vehicle, IoT

I.Introduction

Internet of vehicles (IoV) is an integrated network based on
in-vehicle network and vehicular ad hoc network. IoT Internet of
things is the network of devices connected to the Internet, including
smart phones, vehicle, wearable devices, and almost anything with a
sensor on it. These “things” collect and exchange data.

IoV enables information exchange and content sharing among vehicles.
IoV offers several benefits such as road safety, traffic efficiency,
etc. by forwarding up-to-date traffic information about upcoming
traffic. IoV achieves intelligent traffic management control, and
intelligent dynamic. Big data collection can improve decision making,
especially path planning in IoV. And helps to analyzes and solve the
traffic problems, etc. But malicious users in IoV may mislead the
whole communications. How to secure the big data collection in large
scale IoV is meaningful and deserves researching.

In an IoV
architecture, initially vehicles need to register in the big data
centre to connect into the network. Afterward, vehicles associate
with big data centre via mutual authentication and single sign-on
algorithm. Different secure protocols are needed for business data
and confidential data collection. The collected big data stored
securely using distributed storage.

The
benefits of IoV are, Global Internet ID-vehicles will have IDs in
cyberspace. Which will no doubt make the operation of falsely
registered, smuggled, and illegally modified vehicles much more
difficult , Online vehicle status check, annual inspection, and
monitoring etc., It will be possible to remotely determine a
vehicle’s operational legality, regulatory compliance, and license
status of the driver, which will reduce vehicle management costs,
change industries, and save lives, Big Business Data- The cloud based
integration of heterogeneous networks with vehicular network would
result as a huge data resource. The resource could be utilized in
productive manner with wide range of businesses including automobile,
Internet, insurance and market analysis.

II.EXISTING SYSTEM

Related works include cryptographic hash chains to authenticate IoV
users 2, security through third party authentication 3, security
using cryptographic technique and security through signature-based
authentication 2 etc. Directly or indirectly many methods use
cryptographic hash function to increase security.

Cryptographic hash function is a mathematical algorithm that maps
data of arbitrary size to a bit string of fixed size. Which is a one
way function. Only way to recreate the input from an ideal
cryptographic hash output is to attempt a brute force search of
possible inputs to see if they produce a match 8.

However, the existing protocols in the related area cannot be
directly applied in big data collection in large scale IoV. As a
result, the security and efficiency issue for big data collection
still deserves research.
III.DRAWBACKS

Less scalability:

The capability of a system,
network, or process to handle a growing amount of work is less.

Data falsification attack:

Data can be falsified by
unauthorized access.

High delay

Secure Data Storage

IV.METHODOLOGY
A.Single sign-on

Single sign-on (SSO) is a property of access control of multiple
related, yet independent, software systems. With this property, a
user logs in with a single ID and password to gain access to a
connected system or systems without using different usernames or
passwords, or in some configurations seamlessly sign on at each
system.
B.cryptographic hash
function 

A cryptographic hash function is a hash function which takes an
input and returns a fixed-size alphanumeric string. The string is
called the ‘hash value’, ‘message digest’, ‘digital fingerprint’,
‘digest’ or ‘checksum’.

A hash function takes a string of any length as input and produces a
fixed length string which acts as a kind of “signature” for
the data provided. In this way, a person knowing the “hash
value” is unable to know the original message, but only the
person who knows the original message can prove the “hash value”
is created from that message.

C.Message Authentication Code

A message authentication code (MAC) is similar to a cryptographic
hash, except that it is based on a secret key. When secret key
information is included with the data that is processed by a
cryptographic hash function, the resulting hash is known as an HMAC.

D.Digital Signatures

Once a cryptographic hash is created for a
message, the hash is encrypted with the sender’s private key. This
encrypted hash is called a digital signature.

V.ADVANTAGES

• Global Internet ID (GID):-vehicles will have IDs in cyberspace.
Which will no doubt make the operation of falsely registered,
smuggled, and illegally modified vehicles much more difficult 4.

• Vehicular status perception:– The GID features various embedded
sensors and connects with a vehicular bus, such as onboard
diagnostics (OBD) or the controller–area network (CAN), enabling it
to perceive and monitor almost all static and dynamic vehicular
information, including environmental and status-diagnosis
information.

• Infrastructure as a Service (IaaS) :- Basic IoV-and
traffic-related computing services are based on the cloud framework,
including vehicle/traffic status data storage, area-based vehicle
monitoring/control, vehicle safety status monitoring/control,
real-time traffic analysis, and access billing and settlement.
Meanwhile, as a core capability, open APIs are provided to any
third-party application developer to help them rapidly build related
application services.

• Platform as a Service (PaaS) – Includes bulk GPS data and GID
data processing, ITS holographic data processing, cloud storage,
information mining and analysis, information security, and data
buses.

• Software as a Service (SaaS) :– Through basic cloud services
and third-party service resources, any developer may create certain
applications that support IoV and ITS from various terminals (PC
browsers and mobile phones) 9.

• High security :-

The mechanism meets the requirements, including authentication,
integrity, confidentiality, and authorization 1.

• Low delay

• High Efficiency :-

Single sign-on algorithm, message digest, and random key (Tk) are
designed and utilized in the proposed mechanism.

• High scalability

VI.LIMITATIONS

Connected vehicles will have to have some capability to communicate
with other vehicles and infrastructure without global network
connectivity. This communication capability will also create
additional systemic risks.

Privacy issues:-With all of this IoV data being transmitted, the
risk of losing privacy increases.

Complexity: – The IoT or IoV is a diverse and complex network. Any
failure or bugs in the software or hardware will have serious
consequences. Even power failure can cause a lot of inconvenience.

Not clearly defines about the compatibility with new communication
scheme such as 5G and above.

Hardware security needs improvement.

VII.COMPARISON

A Secure Mechanism for
Big Data Collection in Large Scale IoV 1.

On the Security of
Information

Dissemination in the IoV
2.

Reliable emergency
message

dissemination protocol

for urban IoV 6.

Standard used

IEEE 802.11p

IEEE 802.11p

IEEE 802.11p

Authentication-vehicle

Single sign on algorithm-
uses signature

Using Hash chain

Using Hash chain

Data transmission

Business data transferred in
plain text form and confidential data transferred in cipher text
form.

Plain text

Plain text

Security

Uses signature, Hash message
Authentication code

Hash code

Ready to broadcast and clear
to Broadcast emergency message handshake.

Transmission delay

Low delay

Delay reduced by reducing
contention window size

Less than 100ms

VIII.CONCLUSIONS

In the secure information collection scheme for big data in large
scale IoV, Single sign-on algorithm for authentication are utilized
with improved efficiency. The business data is transferred in plain
text form while the confidential data is transferred in cipher text
form. The collected big data will be processed using Hadoop
architecture to achieve the unified management.Vehicles have IDs in
cyberspace. Which will no doubt make the operation of falsely
registered, smuggled, and illegally modified vehicles much more
difficult.. The cloud based integration of
heterogeneous networks with vehicular network would result as a huge
data resource. The resource could be utilized in productive manner
with wide range of businesses including automobile, Internet,
insurance and market analysis.
References