h2 serif; font-size: 10pt; font-weight: normal; }p { text-indent:

h2 { margin-top: 0.21cm; margin-bottom: 0.11cm; direction: ltr; color: rgb(0, 0, 0); text-align: left; page-break-inside: avoid; }h2.western { font-family: “Times New Roman”, serif; font-size: 10pt; font-style: italic; font-weight: normal; }h2.cjk { font-family: “SimSun”, “??”; font-size: 10pt; font-style: italic; font-weight: normal; }h2.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; font-style: italic; font-weight: normal; }h1 { margin-top: 0.28cm; margin-bottom: 0.

14cm; direction: ltr; font-variant: small-caps; color: rgb(0, 0, 0); text-align: center; page-break-inside: avoid; }h1.western { font-family: “Times New Roman”, serif; font-size: 10pt; font-weight: normal; }h1.cjk { font-family: “SimSun”, “??”; font-size: 10pt; font-weight: normal; }h1.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; font-weight: normal; }p { text-indent: 0.51cm; margin-bottom: 0.21cm; direction: ltr; color: rgb(0, 0, 0); letter-spacing: -0.1pt; line-height: 95%; text-align: justify; }p.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

western { font-family: “Times New Roman”, serif; font-size: 10pt; }p.cjk { font-family: “SimSun”, “??”; font-size: 10pt; }p.ctl { font-family: “Times New Roman”, serif; font-size: 10pt; }Abstract: Internet of things is the network of devices connected to theInternet, including vehicle, wearable devices, and almost anythingwith a sensor on it. These things collect and exchange data. Internetof vehicles enables information exchange and content sharing amongvehicles. IoV offers several benefits such as road safety, trafficefficiency, etc.

by forwarding up-to-date traffic information aboutupcoming traffic. And big data collection can improve decisionmaking, especially path planning in IoV. But malicious users in IoVmay mislead the whole communications. How to secure the big datacollection in large scale IoV is meaningful and deserves researching.In anIoV architecture, initially vehicles need to register in the big datacentre to connect into the network. Afterward, vehicles associatewith big data centre via mutual authentication and single sign-onalgorithm. The business data is transferred in plain text form whilethe confidential data is transferred in cipher text form.

Thecollected big data will be processed using Hadoop architecture toachieve the unified management. Thebenefits of IoV are, Global Internet ID-vehicles will have IDs incyberspace. Which will no doubt make the operation of falselyregistered, smuggled, and illegally modified vehicles much moredifficult , Online vehicle status check, annual inspection, andmonitoring etc., It will be possible to remotely determine avehicle’s operational legality, regulatory compliance, and licensestatus of the driver, which will reduce vehicle management costs,change industries, and save lives, Big Business Data- The cloud basedintegration of heterogeneous networks with vehicular network wouldresult as a huge data resource.

The resource could be utilized inproductive manner with wide range of businesses including automobile,Internet, insurance and market analysis.Keywords:Big data, Security, Data Collection, Internet of Vehicle, IoTI.Introduction Internet of vehicles (IoV) is an integratednetwork based on vehicular ad hoc network. IoT Internet of things isthe network of devices connected to the Internet, including vehicle,wearable devices, and almost anything with a sensor on it. Thesethings collect and exchange data. IoV enables information exchange among vehicles.

IoV offers benefits such as traffic efficiency, road safety etc. byforwarding up-to-date traffic information about traffic. IoVachieves intelligent traffic management control, and intelligentdynamic. Big data collection can improve decision making, especiallypath planning in IoV. And helps to analyzes and solve the trafficproblems, etc.

But malicious users in IoV may mislead the wholecommunications. How to secure the big data collection in large scaleIoV is meaningful and deserves researching. Inan IoV architecture, initially vehicles need to register in the bigdata centre to connect into the network. Afterward, vehiclesassociate with big data centre via mutual authentication and singlesign-on algorithm. Different secure protocols are needed for businessdata and confidential data collection. The collected big data storedsecurely using distributed storage.

Thebenefits of IoV are, Global Internet ID-vehicles will have IDs incyberspace. Which will no doubt make the operation of falselyregistered, smuggled, and illegally modified vehicles much moredifficult , Online vehicle status check, annual inspection, andmonitoring etc., It will be possible to remotely determine avehicle’s operational legality, regulatory compliance, and licensestatus of the driver, which will reduce vehicle management costs,change industries, and save lives, Big Business Data- The cloud basedintegration of heterogeneous networks with vehicular network wouldresult as a huge data resource. The resource could be utilized inproductive manner with wide range of businesses including automobile,Internet, insurance and market analysis.

II.EXISTING SYSTEM Related works include cryptographic hash chainsto authenticate Internet of vehicle users 2, security through thirdparty authentication 3, security using cryptographic technique andsecurity through signature-based authentication 2 etc. Directly orindirectly many methods use cryptographic hash function to increasesecurity. Cryptographic hash function is a mathematicalalgorithm that maps data of arbitrary size to a bit string of fixedsize. Which is a one way function. Only way to recreate the inputfrom an ideal cryptographic hash output is to attempt a brute forcesearch of possible inputs to see if they produce a match 8. However, the existing protocols in the relatedarea cannot be directly applied in big data collection in large scaleIoV.

As a result, the security and efficiency issue for big datacollection still deserves research.III.DRAWBACKS Less scalability: The capability of a system, network, or process to handle a growing amount of work is less. Data falsification attack: Data can be falsified by unauthorized access. High delay Secure Data Storage IV.METHODOLOGYA.Singlesign-onSingle sign-on (SSO) is a property of accesscontrol of multiple related, yet independent, software systems. Withthis property, a user logs in with a single ID and password to gainaccess to a connected system or systems without using differentusernames or passwords, or in some configurations seamlessly sign onat each system.

B.cryptographic hashfunction  A cryptographic hash function is a hash functionwhich takes an input and returns a fixed size alphanumeric string.The string is called the ‘hash value’, ‘message digest’, ‘digest’ or’checksum’.A hash function takes a string of any length asinput and produces a fixed length string which acts as a kind of”signature” for the data provided. In this way, a personknowing the “hash value” is unable to know the originalmessage, but only the person who knows the original message can provethe “hash value” is created from that message.C.Message AuthenticationCodeA message authentication code, It is similar to acryptographic hash, except that it is based on a secret key. Whensecret key information is included with the data that is processed byusing a cryptographic hash function, the output hash is known as HMAC.

D.Digital SignaturesIf a cryptographic hash iscreated for a message, the hash is encrypted with private key of thesender. This resultant hash is called a digital signature.

V.ADVANTAGES OF IOV• Global Internet ID :-vehicles will have IDsin cyberspace. Which will no doubt make the operation of falselyregistered, smuggled, and illegally modified vehicles much moredifficult 4. • Vehicular status perception:– The GIDfeatures various embedded sensors and connects with a vehicular bus,such as OBD or the controller–area network, enabling it to perceiveand monitor almost all static and dynamic vehicular information,including environmental and status-diagnosis information. • Infrastructure as a Service :- Basic IoV-andtraffic-related computing services are based on the cloud framework,including vehicle/traffic status data storage, area-based vehiclemonitoring/control, vehicle safety status monitoring/control,real-time traffic analysis, and access billing and settlement.Meanwhile, as a core capability, open APIs are provided to anythird-party application developer to help them rapidly build relatedapplication services. • Platform as a Service – Includes bulk GPSdata and GID data processing, ITS holographic data processing, cloudstorage, information mining and analysis, information security, anddata buses.

• Software as a Service :– Through basiccloud services and third-party service resources, any developer maycreate certain applications that support IoV and ITS from variousterminals 9. VI.COMPARISON A Secure Mechanism for Big Data Collection in Large Scale IoV 1. On the Security of Information Dissemination in the IoV 2. Reliable emergency message dissemination protocol for urban IoV 6. Standard used IEEE 802.11p IEEE 802.11p IEEE 802.

11p Authentication-vehicle Single sign on algorithm- uses signature Using Hash chain Using Hash chain Data transmission Business data transferred in plain text form and confidential data transferred in cipher text form. Plain text Plain text Security Uses signature, Hash message Authentication code Hash code Ready to broadcast and clear to Broadcast emergency message handshake. Transmission delay Low delay Delay reduced by reducing contention window size Less than 100ms VII.CONCLUSIONSIn the secure information collection scheme forbig data in large scale IoV, Single sign-on algorithm forauthentication are utilized with improved efficiency.

The businessdata is transferred in plain text form while the confidential data istransferred in cipher text form. The collected big data will beprocessed using Hadoop architecture to achieve the unifiedmanagement.Vehicles have IDs in cyberspace. Which will no doubt makethe operation of falsely registered, smuggled, and illegally modifiedvehicles much more difficult.. The cloudbased integration of heterogeneous networks with vehicular networkwould result as a huge data resource.

The resource could be utilizedin productive manner with wide range of businesses includingautomobile, Internet, insurance and market analysis.