h2 collect and exchange data. IoV enables information

h2 { margin-top: 0.21cm; margin-bottom: 0.

11cm; direction: ltr; color: rgb(0, 0, 0); text-align: left; page-break-inside: avoid; }h2.western { font-family: “Times New Roman”, serif; font-size: 10pt; font-style: italic; font-weight: normal; }h2.cjk { font-family: “SimSun”, “??”; font-size: 10pt; font-style: italic; font-weight: normal; }h2.

ctl { font-family: “Times New Roman”, serif; font-size: 10pt; font-style: italic; font-weight: normal; }h1 { margin-top: 0.28cm; margin-bottom: 0.14cm; direction: ltr; font-variant: small-caps; color: rgb(0, 0, 0); text-align: center; page-break-inside: avoid; }h1.western { font-family: “Times New Roman”, serif; font-size: 10pt; font-weight: normal; }h1.

cjk { font-family: “SimSun”, “??”; font-size: 10pt; font-weight: normal; }h1.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; font-weight: normal; }p { text-indent: 0.51cm; margin-bottom: 0.21cm; direction: ltr; color: rgb(0, 0, 0); letter-spacing: -0.1pt; line-height: 95%; text-align: justify; }p.western { font-family: “Times New Roman”, serif; font-size: 10pt; }p.cjk { font-family: “SimSun”, “??”; font-size: 10pt; }p.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; }Abstract : Internet ofthings is the network of devices connected to the Internet, includingvehicle, wearable devices, and almost anything with a sensor on it.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

These things collect and exchange data. Internet of vehicles enablesinformation exchange and content sharing among vehicles. IoV offersseveral benefits such as road safety, traffic efficiency, etc. byforwarding up-to-date traffic information about upcoming traffic. Andbig data collection can improve decision making, especially pathplanning in IoV. But malicious users in IoV may mislead the wholecommunications.

How to secure the big data collection in large scaleIoV is meaningful and deserves researching. In an IoV architecture,initially vehicles need to register in the big data centre to connectinto the network. Afterward, vehicles associate with big data centrevia mutual authentication and single sign-on algorithm. The businessdata is transferred in plain text form while the confidential data istransferred in cipher text form.

The collected big data will beprocessed using Hadoop architecture to achieve the unifiedmanagement. The benefits of IoV are,Global Internet ID-vehicles will have IDs in cyberspace. Which willno doubt make the operation of falsely registered, smuggled, andillegally modified vehicles much more difficult , Online vehiclestatus check, annual inspection, and monitoring etc., It will bepossible to remotely determine a vehicle’s operational legality,regulatory compliance, and license status of the driver, which willreduce vehicle management costs, change industries, and save lives,Big Business Data- The cloud based integration of heterogeneousnetworks with vehicular network would result as a huge data resource.The resource could be utilized in productive manner with wide rangeof businesses including automobile, Internet, insurance and marketanalysis.Keywords: Big data,Security, Data Collection, Internet of Vehicle, IoTI.Introduction Internet of vehicles (IoV) is an integrated network based on vehicular ad hoc network. IoT Internet of things is the network ofdevices connected to the Internet, including vehicle, wearabledevices, and almost anything with a sensor on it.

These thingscollect and exchange data. IoV enables information exchange among vehicles. IoV offers benefitssuch as traffic efficiency, road safety etc. by forwarding up-to-datetraffic information about traffic. IoV achieves intelligent trafficmanagement control, and intelligent dynamic.

Big data collection canimprove decision making, especially path planning in IoV. And helpsto analyzes and solve the traffic problems, etc. But malicious usersin IoV may mislead the whole communications. How to secure the bigdata collection in large scale IoV is meaningful and deservesresearching.

In an IoVarchitecture, initially vehicles need to register in the big datacentre to connect into the network. Afterward, vehicles associatewith big data centre via mutual authentication and single sign-onalgorithm. Different secure protocols are needed for business dataand confidential data collection. The collected big data storedsecurely using distributed storage. Thebenefits of IoV are, Global Internet ID-vehicles will have IDs incyberspace. Which will no doubt make the operation of falselyregistered, smuggled, and illegally modified vehicles much moredifficult , Online vehicle status check, annual inspection, andmonitoring etc., It will be possible to remotely determine avehicle’s operational legality, regulatory compliance, and licensestatus of the driver, which will reduce vehicle management costs,change industries, and save lives, Big Business Data- The cloud basedintegration of heterogeneous networks with vehicular network wouldresult as a huge data resource.

The resource could be utilized inproductive manner with wide range of businesses including automobile,Internet, insurance and market analysis.II.EXISTING SYSTEM Related works include cryptographic hash chains to authenticateInternet of vehicle users 2, security through third partyauthentication 3, security using cryptographic technique andsecurity through signature-based authentication 2 etc.

Directly orindirectly many methods use cryptographic hash function to increasesecurity. Cryptographic hash function is a mathematical algorithm that mapsdata of arbitrary size to a bit string of fixed size. Which is a oneway function. Only way to recreate the input from an idealcryptographic hash output is to attempt a brute force search ofpossible inputs to see if they produce a match 8. However, the existing protocols in the related area cannot bedirectly applied in big data collection in large scale IoV. As aresult, the security and efficiency issue for big data collectionstill deserves research.III.

DRAWBACKS Less scalability: The capability of a system, network, or process to handle a growing amount of work is less. Data falsification attack: Data can be falsified by unauthorized access. High delay Secure Data Storage IV.METHODOLOGYA.

Single sign-onSingle sign-on (SSO) is a property of access control of multiplerelated, yet independent, software systems. With this property, auser logs in with a single ID and password to gain access to aconnected system or systems without using different usernames orpasswords, or in some configurations seamlessly sign on at eachsystem.B.cryptographic hashfunction  A cryptographic hash function is a hash function which takes aninput and returns a fixed size alphanumeric string. The string iscalled the ‘hash value’, ‘message digest’, ‘digest’ or ‘checksum’.A hash function takes a string of any length as input and produces afixed length string which acts as a kind of “signature” forthe data provided. In this way, a person knowing the “hashvalue” is unable to know the original message, but only theperson who knows the original message can prove the “hash value”is created from that message.

C.Message Authentication CodeA message authentication code, It is similar to a cryptographic hash,except that it is based on a secret key. When secret key informationis included with the data that is processed by using a cryptographichash function, the output hash is known as HMAC.D.

Digital SignaturesIf a cryptographic hash is created for amessage, the hash is encrypted with private key of the sender. Thisresultant hash is called a digital signature.V.

ADVANTAGES OF IOV• Global Internet ID :-vehicles will have IDs in cyberspace. Whichwill no doubt make the operation of falsely registered, smuggled, andillegally modified vehicles much more difficult 4. • Vehicular status perception:– The GID features various embeddedsensors and connects with a vehicular bus, such as OBD or thecontroller–area network, enabling it to perceive and monitor almostall static and dynamic vehicular information, including environmentaland status-diagnosis information. • Infrastructure as a Service :- Basic IoV-and traffic-relatedcomputing services are based on the cloud framework, includingvehicle/traffic status data storage, area-based vehiclemonitoring/control, vehicle safety status monitoring/control,real-time traffic analysis, and access billing and settlement.Meanwhile, as a core capability, open APIs are provided to anythird-party application developer to help them rapidly build relatedapplication services.

• Platform as a Service – Includes bulk GPS data and GID dataprocessing, ITS holographic data processing, cloud storage,information mining and analysis, information security, and databuses. • Software as a Service :– Through basic cloud services andthird-party service resources, any developer may create certainapplications that support IoV and ITS from various terminals 9. VI.COMPARISON A Secure Mechanism for Big Data Collection in Large Scale IoV 1. On the Security of Information Dissemination in the IoV 2. Reliable emergency message dissemination protocol for urban IoV 6. Standard used IEEE 802.

11p IEEE 802.11p IEEE 802.11p Authentication-vehicle Single sign on algorithm- uses signature Using Hash chain Using Hash chain Data transmission Business data transferred in plain text form and confidential data transferred in cipher text form.

Plain text Plain text Security Uses signature, Hash message Authentication code Hash code Ready to broadcast and clear to Broadcast emergency message handshake. Transmission delay Low delay Delay reduced by reducing contention window size Less than 100ms VII.CONCLUSIONSIn the secure information collection scheme for big data in largescale IoV, Single sign-on algorithm for authentication are utilizedwith improved efficiency. The business data is transferred in plaintext form while the confidential data is transferred in cipher textform. The collected big data will be processed using Hadooparchitecture to achieve the unified management.Vehicles have IDs incyberspace. Which will no doubt make the operation of falselyregistered, smuggled, and illegally modified vehicles much moredifficult.

. The cloud based integration ofheterogeneous networks with vehicular network would result as a hugedata resource. The resource could be utilized in productive mannerwith wide range of businesses including automobile, Internet,insurance and market analysis.