SlideShare a Scribd company logo
1 of 37
1
CHAPTER 2
2
PEER REVIEWED SUMMARY
i. Introduction
ii. Title Searches, Articles, Research Documents and Journals
iii. Big Data
a. What is Big Data
b. Examples of Big Data
c. Pros/Cons of Big Data
d. Industries using Big Data
i. Automobile ~
ii. Manufacturing
iii. Telecommunication
iv. ITS – Intelligent Transportation Systems
a. Introduction to ITS
b. Examples
c. Fields of ITS
i. Automotive Control system
ii. Public Safety
iii. Traffic Management
iv. Public Transportation system
v. Commercial Vehicles Control System
d. ITS Cyber Security
i. Definition and Importance
ii. Vulnerability incidents
v. Big Data and ITS
a. Big Data in ITS
i. Big Data from Smart Cards
ii. Big Data from GPS
iii. Big Data from Sensors
iv. Big Data from Videos
v. Big Data from Connected and Autonomous Vehicles (CAVs)
vi. Big Data from Vehicle Adhoc Network (VANET)
vii. Big Data from Other Sources
b. Gaps in Big Data for ITS
vi. Cyber security
a. Phishing
b. Eves dropping
c. Cyber terrorism
d. Vehicle communication security breach (VANET)
e. Data Breach in industries and Examples
i. Automobile
ii. Manufacturing
iii. Telecommunication
vii. Theoretical framework
viii. Review of Methodological Literature
ix. Summary
Introduction
In recent studies, big data is becoming a more appealing
research subject in Intelligent Transportation Systems (ITS), as
shown by the fact that it is employed in various projects
worldwide. The enormous volumes of data produced will have
significant ramifications for the design and implementation of
intelligent transportation systems and in turn the need to make
it safer, more efficient, and profitable. Intelligent transportation
systems will create a large amount of data, which will be used
to make transportation-related decisions (Darwish & Bakar,
2018). The first section of this chapter is dedicated to a detailed
research of the history and characteristics of big data,
intelligent transportation systems and Cyber security
combined. This chapter will also cover the ITS framework, data
collection and management techniques, data analytics
methodologies, ITS platforms, examples of Big data and
importance of Big Data and ITS in many other industries. A
wide range of topics, including road traffic accident analysis,
road traffic flow prediction, public transportation service
planning, personal travel route planning, public safety,
commercial vehicles control systems, and more, are covered in
this chapter of big data applications in intelligent transportation
systems (Darwish & Bakar, 2018). Finally, this chapter
discusses some of the problems and gaps that still need to be
researched regarding big data in Intelligent Transportation
Systems in Automobiles on cyber security vulnerabilities.
According to a research done by Transportation Research
Board, the growing use of Big Data in large-scale Internet-of-
Vehicles deployments has opened the door to previously
imagined possibilities for unified transportation sector
management and the creation of intelligent transportation
systems. As a result of the widespread heterogeneous data
collecting methods between automobiles and numerous other
application platforms, there is a growing need for secure data
collection in such architectures, which is being fulfilled by an
expanding number of suppliers. In recent years, a rise in the
number of cyber security and privacy breaches has increased the
demand for secure data collection. However, the primary goal of
this chapter is to draw the reader's attention to the challenge
above and provide a brief current background of this
research. In addition, research hurdles, prospects, and open
research topics will be explored.
Title Searches, Articles, Research Documents and Journals
The Literature review heavily depended on scholarly articles on
Big Data Cyber Security in Intelligent Transportation Systems,
mostly covering the years from 2012-2022. Scholarly articles
were searched and researched from many data bases such as
IEEE Xplore (IEEE), ProQuest Central, Google Scholarly,
ProQuest Dissertations and Theses Global. Some of the
keywords used for searching are Intelligent Transportation
Systems, Data Breach, Cyber Security, Big Data, Cyber security
vulnerabilities, Big Data in ITS, ITS in automobiles and Cyber
security challenges in ITS.
The organization of this literate review focus on three key
elements. (a) Big Data, (b) Cyber Security (c) Intelligent
Transportation Systems.
// need to write more
Big Data
What is Big Data?
Big data is referred to as large datasets with 5 main
characteristics - volume, value, variety. Velocity and veracity.
Big data is a term used to describe a massive amount of various
types of data which cannot be processed using the traditional
management systems (Sivarajah, Kamal, Irani, & Weerakkody,
2017). It is referred with 5 main characteristics - volume, value,
variety. Velocity and veracity which are called the 5Vs . Big
data initially was formed with key characteristics volume;
variety; and Velocity but later the other characteristics were
added.
According to Venkatraman and Venkatraman (2019), Big Data
can be explained with 11V’s which are the fundamentals
characteristics.
(1) Volume refers to the size of the data collected through
various sources such as
integrated systems, mobile applications, sensors, IoT devices,
social media, etc.; (2) velocity
refers to the speed at which the data is generated and processed
in real-time; (3) variety refers to
the formats of the data such as structured, unstructured and
semi-structure. Structured data uses a
underlying structure or a template to store data such as using
tables in the databases, fixed format
length files, etc., whereas unstructured data refers to that which
does not have a underlying
structure to store data, such as free text from files and social
media, audio, video, image, sensor
(digital and analog) signals, and data from other sources; (4)
veracity refers to the accuracy of
the data. Any incomplete or incorrect data would contribute to
bad decisions due to processing of
the bad data; (5) validity refers to using the processed data for
intended use at the right time to
make accurate decisions and reap benefits; (6) volatility refers
to volatility of data or for how long the data is valid. It is
important to note that any information at given particular point
in time
depends on external parameters, and if the external parameters
change the information processed
for a specific situation may not render any value; (7) value
refers to usefulness of the information
in decision making and improving performance; (8) variability
refers to inconsistencies such as
the outliers to detect exceptions; (9) visualization refers to how
data can be represented using
other visual formats such as graphs, dashboards, etc., so that it
is easier for the people using the
information to read and interpret results; (10) valence refers to
the density of the data ; (11)
vulnerability refers to the vulnerability the data which relates to
sensitivity, security and privacy.
Examples of Big Data
This data eventually converges to provide Big Data from the
Internet of Vehicles. While the number, volume, and size of this
data vary, it is of good quality the majority of the time. Big
Data analytics may aid network operators in optimizing overall
resource(s) planning for next-generation vehicle networks,
resulting in cost savings.
Consequently, national transportation authorities would have an
easier time assessing and effectively fixing the country's
chronic traffic congestion issues, increasing the overall quality
of life for millions of people throughout the country.
Automobile manufacturers have lately invested in large-scale
Big Data platforms to advance the development of intelligent
transportation systems. All of this data analytics and subsequent
decision-making becomes more difficult if a hostile vehicle can
input data into the Big Data stream of the Internet of Vehicles,
with substantial ramifications for safety-critical and non-critical
vehicular applications (Chai et al., 2020). According to safety
applications, any intentionally provided information could
result in incorrect trajectory predictions and inaccurate
assessment of a vehicle's nearby environment soon, both of
which could be extremely dangerous for passengers riding in
semi-autonomous and fully autonomous vehicles. In the case of
non-safety applications, this may result in considerable delays
in delivering requested services, but it may also expose a user's
personal information to serious hazards.
This strategy may not only drastically decrease computational
overheads but may also considerably reduce the amount of IoV
Big Data that must be cached (Chai et al., 2020). Furthermore,
real-time and historical data are critical for intelligent decision-
making in IoT infrastructures, which should not be overlooked.
Because of international storage limits and a limited number of
available spaces, it is not feasible to keep all historical IoV Big
Data in a single place for an extended time due to the nature of
the data. As a result, getting IoV Big Data is crucial, as is
ensuring that the data streams received are not kept forever and
are purged after a certain amount of time. In comparison to raw
data streams in their natural state, our proposed architecture
allows raw data streams to be organized in a way that provides
relevant information while utilizing fewer resources and taking
up less storage space.
Pros/Cons of Big Data
// need to write more
Industries using Big Data
Automobile Industry
Due to the increase in number of automobiles on the road in
recent decades across the globe, present transportation
infrastructure has been strained to its breaking point, forcing
existing infrastructure to collapse. As a consequence of this,
transportation networks have become very inefficient and
prohibitively expensive to maintain and improve over time.
According to most recent data, over one billion automobiles are
on the road, predicting that this number would double by the
end of 2035. Not only has traffic congestion in dense
metropolitan areas increased dramatically due to the increase in
the number of cars, but it has also resulted in an increase in the
number of people killed or injured in automobile accidents,
which has hampered economic development in a variety of
ways. In 2017, according to the World Health Organization,
approximately 1.25 million people died, and millions more were
injured due to road traffic accidents. Additionally, walkers,
roller skaters, and motorcyclists were among the most
vulnerable road users in 2010, accounting for almost half of all
deaths and injuries on the roads (Guevara & Auat Cheein,
2020). According to the World Bank, low- and middle-income
nations and areas account for more than 90 percent of all road
fatalities and injuries worldwide due to poor transportation
infrastructure. In terms of network manageme nt, the outcome is
a considerable drop in the quality of service for a wide variety
of safety-critical and non-safety applications and a drop in the
overall quality of the user experience for vehicle operators
(Guevara & Auat Cheein, 2020). As a result, there is a lot of
room for improvement in today's transportation systems,
especially in terms of safety and efficiency, to name a few.
Early resolution of these challenges will pave the way for
creating highly efficient intelligent transportation networks,
which will be necessary to realize the vision of connected
automobiles.
HealthCare industry
//Need to write
Telecommunication Industry
//Need to write
Big Data Collection in Vehicular Networks
The research shows that significant changes in the
transportation sector are expected soon, notably because of new
paradigms such as the Internet of Things (IoT), cloud
computing, edge and fog computing, software-defined
networking, and the newly proposed Named Data Networking.
Indeed, such novel ideas have undoubtedly aided and reinforced
the industry's efforts to develop intelligently linked automobiles
to assure safe and comfortable driving conditions. Furthermore,
new vehicle applications and services are growing because of
the ongoing expansion of high-speed mobile Internet
connections and the rising demand for seamless, ubiquitous
communication at lower prices than previously thought possible
(Gohar et al., 2018). According to the European Commission,
by the end of 2019, between 50 and 100 billion intelligent
gadgets will be directly linked to the Internet, resulting in the
generation of around 507.5 ZB of data every year. According to
Automotive News, smart cars have grown into multisensor
platforms in recent years. The average number of intelligent
sensors placed on a vehicle remains at 100 and will reach 200
by 2020. Because vehicle networks are very dynamic, the data
streams produced by these sensors are massive and extremely
quick.
Furthermore, automobile users obtain data from a range of
social networking sites daily, resulting in a massive number of
real-time traffic data. Because it is time-dependent and
location-dependent, this information is spatiotemporal.
Consequently, since the road network's dispersion often
influences the route chosen by automobiles throughout a large
geographical area, the data received differs in terms of method
of transportation, size, and information quality (Gohar et al.,
2018). Traditional vehicular ad hoc networks are being
expanded to large-scale Internet of Vehicles (IoVs). All data
collected in vehicular networks converge as Big Data in
vehicular networks, routed through core networks to regional
and regional centralized cloud computing environments and
other vehicular networks.
However, the current Internet infrastructure is inefficient and
does not scale efficiently when processing the large amounts of
IoV Big Data generated today. Furthermore, transporting such
data is time-consuming and costly since it requires a significant
quantity of bandwidth and energy. Again, real-time data
processing is necessary for various safety-critical applications,
necessitating the development of a highly efficient data
processing architecture with significant computational
capability. Due to the dispersed nature of vehicle networks,
distributed edge-based processing is preferable to centralized
systems (Payalan & Guvensan, 2019). As a consequence,
performance is improved as compared to traditional centralized
systems. However, since such distributed systems often lack
significant processing and storage capacity, they cannot
correctly cache and analyze enormous quantities of data. Not to
mention the need for a secure approach to guarantee that IoV
Big Data is collected consistently and not tampered with
throughout the collecting process (Payalan & Guvensan, 2019).
A hostile vehicle inserting counterfeit messages into the traffic
system is a definite possibility. Such an occurrence might easily
impair the whole system or even use the entire network to
engage in dangerous activity for its evil objectives. As a result,
research into effectively securing Big Data collecting in IoVs is
required. In this setting, it is critical to draw the attention of
academic and commercial research groups to the importance of
such concerns, which this chapter does wonderfully.
Intelligent Transportation System
Introduction to ITS
An intelligent transportation system (ITS) is created when a
combination of information technologies is properly combined
and implemented with the help of data-driven insights to
improve the efficiency and effectiveness of transportation. As
technology and electronic applications evolve, so does the user
base, which is alarming. Information and Communication
Technology (ICTs) have already impacted many industries and
professions, including healthcare, manufacturing, and security
(IT) (Pustokhina et al., 2018). Furthermore, as a result of
technological advances, the transportation industry is changing
and evolving. Portugal, Singapore, Germany, and the United
Kingdom are leading the transition from traditional modes of
transportation to highly technologically advanced infrastructure.
The United Kingdom is shifting to an intelligent transportation
system due to the change. Intelligent transportation systems are
increasingly recognized as a critical component in
transportation planners' toolkits for addressing long-standing
surface transportation issues that have persisted for decades.
The "info structure," a data-driven design that supports and
complements physical transportation infrastructure, is crucial to
the intelligent transportation system because it serves as its
nerve center.
The ultimate purpose of ITS is to keep passengers safe in the
case of a car accident. This is done via better mobility and
safety and improved operational performance, notably in terms
of congestion and vehicle safety evaluation, ITS goals. Only a
small percentage of the population can create jobs for others.
Increased job opportunities will also benefit the general public.
V2I and V2V systems, such as Japan's Smartway and the United
States' IntelliDrive, are designed to help drivers in keeping a
safe distance from an impending collision throughout the
process, according to its developers. According to one estimate,
IntelliDrive technology can handle 82 percent of all car
collision scenarios in the United States with healthy drivers.
Furthermore, it contributes to increasing the capacity of
existing infrastructure while reducing the need for new road
development, which is advantageous (Garg et al., 2018). For
example, in the United States, real-time traffic data has
considerably improved traffic flow. Pauses have been reduced
by 40%, while travel time has been cut by 25%, gas
consumption has been reduced by 10%, and pollution has been
reduced by 22% compared to the previous year (Garg et al.,
2018). Despite the various and considerable advantages that
intelligent transportation systems may give, many governments
are now underinvesting in them (ITS). This is since multiple
obstacles must be overcome throughout the development and
implementation of the technologies above.
Examples of ITS
// Need to write
Fields of ITS
Automotive Control system
// Need to write
Public Safety
// Need to write
Traffic Management
// Need to write
Public Transportation system
// Need to write
Commercial Vehicles Control System
// Need to write
ITS Cyber Security
Definition and Importance
// Need to write
Vulnerability incidents
// Need to write
Big Data Collection Sources in Intelligent transportation system
(ITS)
Furthermore, Big Data and analytics research supports a wide
range of application organizations by giving a significant
opportunity to utilize evidence to impact decision-making in
various domains. Is it possible to effectively apply Big Data and
analytics ideas to the transportation industry? The authors
thoroughly evaluate articles published in the last five years that
address Big Data concepts and applications in the transportation
sector, focusing on the transportation industry. This article
covers the review's conclusions and consequences (Chai et al.,
2020). One of the main goals from this research is to have a
better knowledge of the existing research, possibilities, and
constraints around Big Data and cyber security vulnerabilites in
the Intellignet Transportation Systems in Automobiles. This
research investigates and comprehends current research,
prospects, and issues from various angles. According to the
article, Big Data and analytics may give insights and improve
transportation systems by analyzing data from a range of
sources such as traffic monitoring systems, connected autos,
crowdsourcing, and social media. Numerous storage,
processing, and analytical solutions are being studied, and
specialized platforms and software architecture are built
expressly for the transportation industry. We also look at the
challenges resulting from Big Data and analytics adoption (Chai
et al., 2020). Aside from that, it significantly expands the
number of ways cities may utilize Big Data in transportation to
aid in the construction of sustainable and safer transportation
networks. Because research in Big Data and vehicle is still in its
infancy, this article cannot propose precise answers to the many
issues described. This is also a flaw in the book since it lacks
coherent replies to the many arguments presented (Sumalee &
Ho, 2018).
To guarantee the proper functioning of an intelligent
transportation system, data from a range of sources, including
CCTV cameras, sensors, RFID, GPS, and other technologies,
must be gathered. The information is compiled from various
publicly available sources, including CCTV cameras with
number plate recognition and other comparable technology.
Image processing, which aids in collecting appropriate toll
payments for the identified vehicle, and CCTV cameras for
filming purposes such as criminal identification and the
detection of misappropriated vehicle information are advanced
methods for applying toll charges (Zhou et al., 2020).
It is now possible to employ radio frequency identificati on
(RFID), another data source in intelligent transportation
systems, to automatically detect the unique RFID tags contained
in automobiles.
RFID tags offer information about the car's identification
number, the owner's name, and the amount of prepaid credit
presently accessible on the vehicle (Zhou et al., 2020). When a
vehicle passes through a toll bridge, the RFID tag affixed to the
vehicle is identified, and the toll fees are automatically taken
from the vehicle's account. This relatively new RFID
technology might be used for security reasons to identify
authorized vehicles, which would be helpful. Sensors are the
significant data source in intelligent transportation systems
(ITS); by deploying sensors on the road, transportation data
such as vehicle speed and position can be gathered and
evaluated. Intelligent transportation systems (ITS) are gaining
popularity. Sensors such as global positioning system-based
sensors, magnetometers, and gyroscope-based sensors, among
others, are used to collect transit data [6]. We may be able to
gather additional data about arterials and vehicle access to
highways using sensors, which may then be stored and utilized
for a variety of applications, including incident detection, active
transportation, and highway demand management (Sharma &
Kaushik, 2019). Sensor technology is used in multiple
applications, including adaptive signal control, ramp and
highway metering, and dispatching emergency response
providers. It is feasible to get reliable and fast traffic flow
information by combining sensors with big data platforms.
Aside from that, further analysis may be conducted utilizing a
range of data sources, such as identifying the owner of a car,
obtaining vehicle information, and extracting vehicle owner
details at a particular time, to name a few alternatives.
Big Data in ITS
Big Data in Intelligent Transportation Systems
There are large amounts of data sent from multiple data sources
to intelligent Transportation Systems (ITS). Some of the data
sources include GPS, video, sensor signals, social media and so
on.
Big Data from Smart Cards
In urban and modern public transport, Automatic Fare
Collection (AFC) systems are extensively used to explore the
passenger movement patterns using smart cards data which is
one of the main data sources. Passengers who wish to use buses,
trains or ferries for public transportation utilize smart cards and
the electronic readers which scan these cards collect passenger
data such as origination-destination (OD), boarding times,
transfers etc, (Zhu, et al., 2019). In the US, many transit
authorities use smart cards in cities like San Francisco Bay Area
Rapid Transit (BART) (Buneman, K., 1984)., Washington
Metropolitan Area Transit Authority (WMATA) (Miller, L. S.,
1994) and Philadelphia’s Port Authority Transit Corporation
(PATCO) Lindenwold Line NX-zonal AFC systems (Vigrass, J.
W., 1990) which in turn generate huge amounts of data. Because
smart cards are extensively, its usage data collected is a
important element for public transportation management and
planning (Zhu, et al., 2019) and most researchers agree that this
data is used by ITS for passenger travel behavior, travel time
estimation to destination, travel patterns, frequency of travel
etc. (Nishiuchi, et al., 2013).
For instance, Transportation for London (TfL) collects smart
card data from 8 million trips every day at London metro
stations.
Big Data from GPS
Global positioning System (GPS) is the most important tool
used today by users for location positioning and navigation. On
a busy commuting day, traffic data, vehicle position, vehicle
speed, vehicle density, vehicle type etc. can be collected
efficiently and precisely via GPS. Travel mode detection (Gong,
et al.,2012; Wang, et al.,2016), travel delay measurement
(Asensio, et al., 2009) and Traffic monitoring (Herrera, et al.,
2010) are some of the many traffic issues that could be
addressed from the data collected GPS and other map displaying
technologies.
Big Data from Sensors
Sensor devices connected to ITS is mainly used collect vehicle
and traffic data such as vehicle speeds, traffic flows, vehicle
density, vehicle travel time and vehicle position (Zhu, et al.,
2019).
Standard on-road sensor devices have been constantly evolving
to collect, process and transfer traffic data (Lopes, et al., 2010).
And the data collected from these sensors are mainly split into
three types: floating car data, roadside data and wide area data
(Antoniou, et al., 2008).
Roadside data is referred as data collected from sensory devices
installed alongside a main road or freeway. With evolving
technologies, sensors hardware and software has changed, and
use infrared systems, ultrasonic and acoustic sensor systems,
magnetometer vehicle detectors, light detection and ranging
(LIDAR) etc. (Zhu, et al., 2019). In the US, Colorado
department of transport (CDOT) have installed new sensors on
I-25 (Interstate-25) that can detect ice, water and temperature to
provide the most up-to-the-minute information for road crews
and feeds this data to ITS to provide road safety for the public
(colorado reference).
Floating car data (FCD) is referred as data collected on a
vehicle while it’s in motion at different locations in ITS. They
are used to collect time stamped GPS data and vehicle speeds
while the automobile is in motion, and this data is used to
provide. Along with the road side sensors, the vehicle’s
embedded GPS receiver or cellular phone also acts as a moving
sensor (Huang, E. 2010).
Wide area data refers to the wide area traffic flow data that is
collected by diverse sensor tracking techniques such as
photogrammetric processing, sound recording, video processing,
and space-based radar.
Big Data from Connected and Autonomous Vehicles (CAVs)
Connected and automated vehicles (CAVs) (a.k.a. driver-less
cars) are a transformative technology that has significant
prospects for reducing traffic accidents, enhancing the quality
of life, and improving the efficiency of transportation systems.
CAVs are built with a wide range to technologies in ITS
keeping in mind the safe efficient movement of people and
goods. May automobile industries today like Tesla, Ford etc.
generate large amounts of real-time transportation data such as
location, speed, acceleration, safety data (Uhlemann, E. 2015)
and this data is used to mitigate traffic
CAV enabled traffic system has demonstrated great potential to
mitigate congestion, reduce travel delay, and enhance safety
performance [33], [34]. Using latest network technologies such
as Software Defined Networking, data can be obtained more
efficiently [35] These data can be used to create actionable
information to support and facilitate green transportation
choices, and apply to the real-time adaptive signal
control [36], [37].
Big Data from Vehicle Adhoc Network (VANET)
// Need to write
Big Data from Other Sources
// Need to write
Big Data from Videos
// Need to write
Gaps in Big Data for Intelligent Transportation Systems
It is vital to detect possible threat actors while dealing with
Intelligent Transportation Systems. Potential ITS network
attackers have been highlighted by foreign intelligence services,
criminal gangs, hacktivists, cyberterrorists, insiders, unethical
operators, and natural disasters. National governments collect
information via software espionage tools and viruses that are
purpose-built for their goals. Intellectual property theft or
getting a competitive edge are the primary goals of this kind of
attack. During times of war, for example, a nation's information
and communications technology (IT) infrastructure may be
attacked by a cyberattack. Government-controlled hacking
teams and resources may be outsourced to third-party firms
(Sharma & Kaushik, 2019). Criminal gangs acquire access to
information technology networks and produce illegal income in
several methods. Hacktivists utilize information and
communication technology (IT) infrastructure to draw a
political cause. Previously, roadside message boards have been
hacked to propagate a political agenda. Cyberterrorists attack
information technology systems with the intent of causing
property damage, human casualties, and widespread panic.
Insiders conduct killings inside organizations in which they now
or formerly held positions, with the intent of furthering the
insider's own goals. Numerous variables contribute to the
beginning and endurance of these attacks (Sharma & Kaushik,
2019). Unscrupulous operators may target the ITS system to
avoid paying fines and taxes, avoid traffic, or eliminate
competitors, among other things. On the other side, natural
disasters may jeopardize the ITS system. Natural catastrophes
can trigger system failures, compromising the infrastructure of
the Intelligent Transportation System (ITS). The majority, if not
all, of cyberattacks, is motivated by a desire for financial gain.
The distinction between information and transportation systems
is evident, which has a considerable impact when attacked or
hacked. This kind of exposure may be a potent motivator in
some circumstances. The reasons for these persons have been
variously described as ransom, data theft, information warfare,
system gaming, robbery, revenge, and terrorism, to mention a
few. Physical, wireless, or network attacks, among others, may
be employed to get the data. A seizure may be launched using a
single vector or a collection of vectors. When attackers launch a
ransom attack, they encrypt the data and systems being targeted.
Until the victim obtains the decryption keys, the ransom is not
paid. An attacker might get access to a connected car and
disable it until the attackers are paid a ransom in bitcoin (Hîrţan
et al., 2020). It is feasible that the safety of these cars has been
risked. Stolen information may be utilized for a variety of
reasons. When it comes to stealing information from a business,
the most typical attackers are national governments and
unscrupulous competitors. The objective of data theft is to
benefit directly from the information stolen.
The term "information warfare" refers to assaults on the
information technology infrastructure (ITS) that result in a
denial of service (DoS) condition. Consequently, the systems
malfunction, resulting in more significant road congestion.
Other types of content on the website include political
commentary, demonstrations, and practical jokes. This might
have a detrimental effect on the company's reputation and result
in financial loss. If illicit vehicle-to-vehicle (V2V) broadcasts
to the general public, they can wreak havoc on the
transportation system. This kind of attack can contaminate V2V
networks with data.
Additionally, map hacking tools may be used to compromise
location transmitters, GPS receivers, and GPS signal spoofing.
If you engage in system gaming or vehicle theft, you may steal
items from both inside and outside automobiles. It is also
feasible to avoid paying fees and service charges by using ITS
systems in certain instances. Self-driving cars may be hacked
and directed to a remote location, or they can be used to convey
contraband discreetly. Self-driving vehicles may be hacked and
sent to a remote location, where valuables, car components, the
whole vehicle, or abduction are all possibilities. If you utilize
an ITS system, you may avoid paying service costs. It is
possible to remotely activate a traffic light controlled by a
computer using Mobile Infrared Transmitters (MIRT). This
permits the manipulation of light. There is a definite possibility
of hacking into a competitor's automobile to sabotage
competition and render the cars unusable. It is conceivable to
engineer a situation where autonomous vehicles are compelled
to make way for a high-priority hacking vehicle. False
ridesharing requests may be made to bill unknowing clients for
services they never requested.
While big data technologies have done an incredible job
managing 4V data, traditional business intelligence systems
have done a better job maintaining Metadata associated with
inputted data. This is because conventional methods must deal
with highly structured data, but Big Data Systems do not.
Developing a standard semantic layer for all retained data
continues to be a challenge, and the more different the data, the
more similar the semantic layer should be to maximize data
retrieval efficiency. The transportation industry has significant
challenges due to the breadth of accessible data, including
photos, structured data, and streaming data from sensors.
Unlike traditional business intelligence systems, big data
systems face this challenge in the same way as conventional
business intelligence systems do because big data is derived
from various sources that are highly likely to contain personal
information, such as Twitter and Facebook text data. Because
big data is dispersed over a distributed architecture, enforcing
security policies becomes a much more challenging task, one
that has yet to be entirely resolved to the satisfaction of
industry standards. Due to the volume of data generated by
vehicle monitoring, it is well-suited for transportation systems.
One of the most challenging difficulties confronting the
industry today is deciding which big data architectural
framework best suits the use case. This is especially tough since
big data frameworks are still in their infancy. This issue
impacts a broad spectrum of businesses, not only transportation
networks.
Cyber security
Phishing
// Need to write
Eves dropping
// Need to write
Cyber terrorism
// Need to write
Vehicle communication security breach (VANET)
// Need to write
Data Breach in industries and Examples
Automobile Industry
// Need to write
Manufacturing
// Need to write
Telecommunication
// Need to write
Summary
Transportation evolution is followed by new threats to ITS
systems concurrently with ecosystem change. Significant
changes are likely in several sectors, and the extent of these
changes is relatively wide. Accepting the need for a more
targeted approach to security, focused on preventing and
resolving attacks, is required. As previously noted, the current
models used by ITS ecosystems have several shortcomings that
must be addressed before the ecosystems can function correctly.
The following section discusses these restrictions in further
detail. Additional research is required in this area to analyze
specific solutions tailored to the unique requirements of each of
the several ITS systems and applications now available. More
study on cooperative systems is required to identify cyber risks
and develop responses to protect against them. This is why
biometric technology is essential to the long-term health of the
transportation industry's cybersecurity.
Consequently, they provide actionable data that supports critical
decision-making in various circumstances, including route
selection, trip scheduling, and whether passengers should drive
or use public transit. This article aims to provide a
comprehensive understanding of big data analytics and the
Internet of Things (IoT) in the transportation business and
identify the factors that may affect the development of an
intelligent transportation system. Apart from that, the plan will
be adequately outlined. Finally, and perhaps most importantly,
the research's objective is to understand better the effects of big
data on cyber security vulnerabilities in Intelligent
transportation system. When we complete our analysis, which
will be addressed in the next part, we will develop an integrated
implementation architecture for big data analytics and Internet
of Things-based transportation systems.
References
Abbasi, M., Rafiee, M., Khosravi, M. R., Jolfaei, A., Menon, V.
G., & Koushyar, J. M. (2020). An efficient parallel geneti c
algorithm solution for vehicle routing problems in intelligent
transportation systems cloud implementation. Journal of Cloud
Computing, 9(1), 1-14.
https://link.springer.com/article/10.1186/s13677-020-0157-4
Antoniou, C., Balakrishna, R., and Koutsopoulos, H. (2008).
Emerging data collection technologies and their impact on
traffic management applications, Proc. 10th Int. Conf. Appl.
Adv. Technol. Transp.
Arena, F., Pau, G., & Severino, A. (2020). A review on IEEE
802.11 p for intelligent transportation systems. Journal of
Sensor and Actuator Networks, 9(2), 22.
https://www.mdpi.com/701344
Asensio, López, J., R. Pagán, R., Pavón, I., and Ausejo, M.
(2009). GPS-based speed collection method for road traffic
noise mapping, Transp. Res. D Transp. Environ., vol. 14, no. 5,
pp. 360-366
Atat, R., Liu, L., Wu, J., Li, G., Ye, C., & Yang, Y. (2018). Big
data meet cyber-physical systems: A panoramic survey. IEEE
Access, 6, 73603-7
https://ieeexplore.ieee.org/abstract/document/8533338/
Buneman, K. (1984). Automated and Passenger-Based Transit
Performance Measures. In Transportation Research Record 992,
pp. 23-28, Transportation Research Board of the National
Academies
Chai, H., Leng, S., Chen, Y., & Zhang, K. (2020). A
hierarchical blockchain-enabled federated learning algorithm
for knowledge sharing on the Internet of vehicles. IEEE
Transactions on Intelligent Transportation Systems, 22(7),
3975-3986.
https://ieeexplore.ieee.org/abstract/document/9127823/
Chen, C., Liu, B., Wan, S., Qiao, P., & Pei, Q. (2020). An edge
traffic flow detection scheme based on deep learning in an
intelligent transportation system. IEEE Transactions on
Intelligent Transportation Systems, 22(3), 1840-1852.
https://ieeexplore.ieee.org/abstract/document/9210731/
Cheng, N., Lyu, F., Chen, J., Xu, W., Zhou, H., Zhang, S., &
Shen, X. (2018). Big data-driven vehicular networks. Ieee
Network, 32(6), 160-167.
https://ieeexplore.ieee.org/abstract/document/8450539/
Darwish, T. S., & Bakar, K. A. (2018). Fog-based intelligent
transportation big data analytics on the Internet of vehicles
environment: motivations, architecture, challenges, and critical
issues. IEEE Access, 6, 15679-15701.
https://ieeexplore.ieee.org/abstract/document/8316816/
Deepa, N., Pham, Q. V., Nguyen, D. C., Bhattacharya, S.,
Prabadevi, B., Gadekallu, T. R., & Pathirana, P. N. (2022). A
survey on blockchain for big data: approaches, opportunities,
and future directions. Future Generation Computer Systems.
https://www.sciencedirect.com/science/article/pii/S0167739X22
000243
Ferdowsi, A., Challita, U., & Saad, W. (2019). Deep learning
for reliable mobile edge analytics in intelligent transportation
systems: An overview. IEEE vehicular technology magazine,
14(1), 62-70.
https://ieeexplore.ieee.org/abstract/document/8600316/
Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E.
(2018). Trust-based secure clustering in WSN-based intelligent
transportation systems. Computer Networks, 146, 151-158.
https://www.sciencedirect.com/science/article/pii/S1389128618
309253
Ganin, A. A., Mersky, A. C., Jin, A. S., Kitsak, M., Keisler, J.
M., & Linkov, I. (2019). Resilience in intelligent transportation
systems (ITS). Transportation Research Part C: Emerging
Technologies, 100, 318-329.
https://www.sciencedirect.com/science/article/pii/S0968090X18
307435
Garg, S., Singh, A., Batra, S., Kumar, N., & Yang, L. T. (2018).
UAV-empowered edge computing environment for cyber-threat
detection in intelligent vehicles. IEEE Network, 32(3), 42-51.
https://ieeexplore.ieee.org/abstract/document/8370877/
Gohar, M., Muzammal, M., & Rahman, A. U. (2018). SMART
TSS: Defining transportation system behavior using big data
analytics in smart cities. Sustainable cities and society, 41, 114-
119.
https://www.sciencedirect.com/science/article/pii/S2210670717
309757
Gong, H., Chen, C., Bialostozky, E. and Lawson, C. T. (2012).
A GPS/GIS method for travel mode detection in New York City,
Comput. Environ. Urban Syst., vol. 36, no. 2, pp. 131-139.
Guerrero-Ibáñez, J., Zeadally, S., & Contreras-Castillo, J.
(2018). Sensor technologies for intelligent transportation
systems. Sensors, 18(4), 1212. https://www.mdpi.com/282582
Guevara, L., & Auat Cheein, F. (2020). The role of 5G
technologies: Challenges in smart cities and intelligent
transportation systems. Sustainability, 12(16), 6469.
https://www.mdpi.com/794798
Haghighat, A. K., Ravichandra-Mouli, V., Chakraborty, P.,
Esfandiari, Y., Arabi, S., & Sharma, A. (2020). Applications of
deep learning in intelligent transportation systems. Journal of
Big Data Analytics in Transportation, 2(2), 115-145.
https://link.springer.com/article/10.1007/s42421-020-00020-1
Herrera, J.C., Work, D. B., Herring, R., Ban, X., Jacobsond, Q.,
and Bayen, A. M. (2010). Evaluation of traffic data obtained via
GPS-enabled mobile phones: The mobile century field
experiment", Transp. Res. C Emerg. Technol., vol. 18, no. 4, pp.
568-583
Hîrţan, L. A., Dobre, C., & González-Vélez, H. (2020).
Blockchain-based reputation for intelligent transportation
systems. Sensors, 20(3), 791. https://www.mdpi.com/629918
Huang, E. (2010). Algorithmic and implementation aspects of
on-line calibration of dynamic traffic assignment
Kaffash, S., Nguyen, A. T., & Zhu, J. (2021). Big data
algorithms and applications in intelligent transportation system:
A review and bibliometric analysis. International Journal of
Production Economics, 231, 107868.
https://www.sciencedirect.com/science/article/pii/S0925527320
302279
Kelarestaghi, K. B., Foruhandeh, M., Heaslip, K., & Gerdes, R.
(2019). Intelligent transportation system security: impact-
oriented risk assessment of in-vehicle networks. IEEE
Intelligent Transportation Systems Magazine, 13(2), 91-104.
https://www.researchgate.net/profile/Kaveh-B-
Kelarestaghi/publication/330597240_Intelligent_Transportation
_System_Security_Impact-Oriented_Risk_Assessment_of_In-
Vehicle_Networks/links/5c570531299bf12be3f91bf4/Intelligent
-Transportation-System-Security-Impact-Oriented-Risk-
Assessment-of-In-Vehicle-Networks.pdf
Kim, S. (2018). Blockchain for a trusted network among
intelligent vehicles. In Advances in Computers (Vol. 111, pp.
43-68). Elsevier.
https://www.sciencedirect.com/science/article/pii/S0065245818
300238
Kim, S. (2018). Blockchain for a trusted network among
intelligent vehicles. In Advances in Computers (Vol. 111, pp.
43-68). Elsevier.
https://www.sciencedirect.com/science/article/pii/S0065245818
300238
Lopes, J., Bento, J., Huang, E., Antoniou, C., and Ben-Akiva,
M. (2010). Traffic and mobility data collection for real -time
applications, Proc. IEEE Intell. Transp. Syst. (ITSC), pp. 216-
223.
Miller, L. S. (1994). A Fare Deal for All – Mass Transit
Automatic Fare Collection Systems. In Railway Age, Issue 5,
Volume 195.
Muthuramalingam, S., Bharathi, A., Gayathri, N., Sathiyaraj,
R., & Balamurugan, B. (2019). IoT based intelligent
transportation system (IoT-ITS) for global perspective: A case
study. The Internet of Things and Big Data Analytics for Smart
Generation (pp. 279-300). Springer, Cham.
https://link.springer.com/chapter/10.1007/978-3-030-04203-
5_13
Neilson, A., Daniel, B., & Tjandra, S. (2019). A systematic
review of the literature on big data in the transportation domain:
Concepts and applications. Big Data Research, 17, 35-44.
https://www.sciencedirect.com/science/article/pii/S2214579617
303866
Nishiuchi, H., King, J., and Todoroki, T. (2013). Spatial-
temporal daily frequent trip pattern of public transport
passengers using smart card data, Int. J. Intell. Transp. Syst.
Res., vol. 11, no. 1, pp. 1-10
Payalan, Y. F., & Guvensan, M. A. (2019). Towards next-
generation vehicles featuring the vehicle intelligence. IEEE
Transactions on Intelligent Transportation Systems, 21(1), 30-
47. https://ieeexplore.ieee.org/abstract/document/8734737/
Pustokhina, I. V., Pustokhin, D. A., Rodrigues, J. J., Gupta, D.,
Khanna, A., Shankar, K., ... & Joshi, G. P. (2020). Automatic
vehicle license plate recognition using optimal K-means with
convolutional neural network for intelligent transportation
systems. Ieee Access, 8, 92907-92917.
https://ieeexplore.ieee.org/abstract/document/9088975/
Sharma, S., & Kaushik, B. (2019). A survey on Internet of
vehicles: Applications, security issues & solutions. Vehicular
Communications, 20, 100182.
https://www.sciencedirect.com/science/article/pii/S2214209619
302293
Sivarajah, U., Kamal, M. M., Irani, Z., & Weerakkody, V.
(2017). Critical analysis of Big Data
challenges and analytical methods. Journal of Business
Research, 70, 263–286.
doi:0.1016/j.jbusres.2016.08.001
Sumalee, A., & Ho, H. W. (2018). Brighter and more connected:
Future intelligent transportation system. It's Research, 42(2),
67-71.
https://www.sciencedirect.com/science/article/pii/S0386111218
300396
Tokody, D., Albini, A., Ady, L., Rajnai, Z., & Pongrácz, F.
(2018). Safety and security through the design of autonomous
intelligent vehicle systems and intelligent infrastructure in the
smart city. Interdisciplinary Description of Complex Systems:
INDECS, 16(3-A), 384-396. https://hrcak.srce.hr/clanak/303148
Uhlemann, E. (2015). Autonomous vehicles are connecting
[connected vehicles] ", IEEE Veh. Technol. Mag., vol. 10, no.
2, pp. 22-25, doi: 10.1109/MVT.2015.2414814.
Ullah, Z., Al-Turjman, F., Mostarda, L., & Gagliardi, R. (2020).
Applications of artificial intelligence and machine learning in
smart cities. Computer Communications, 154, 313-323.
https://www.sciencedirect.com/science/article/pii/S0140366419
320821
Van Wyk, F., Wang, Y., Khojandi, A., & Masoud, N. (2019).
Real-time sensor anomaly detection and identification in
automated vehicles. IEEE Transactions on Intelligent
Transportation Systems, 21(3), 1264-1276.
https://ieeexplore.ieee.org/abstract/document/8684317/
Vigrass, J. W. (1990). The Lindenwold (New Jersey to
Philadelphia) Hi-Speed Line: The First Twenty Years of the
Port Authority Transit Corporation (PATCO). West Jersey
Chapter, National Railway Historical Society, Cherry Hill, N.J.
Venkatraman, S., & Venkatraman, R. (2019). Big data security
challenges and strategies.
AIMS Mathematics, 4(3), 860–879.
doi:10.3934/math.2019.3.860
Wan, S., Gu, R., Umer, T., Salah, K., & Xu, X. (2020). Toward
offloading Internet of vehicles applications in 5G networks.
IEEE Transactions on Intelligent Transportation Systems, 22(7),
4151-4159.
https://ieeexplore.ieee.org/abstract/document/9184262/
Wang, X., Zhao, S., and Dong, L. (2016). Research and
application of traffic visualization based on vehicle GPS big
data", Proc. Int. Conf. Intell. Transp., pp. 293-302
Zhou, H., Xu, W., Chen, J., & Wang, W. (2020). Evolutionary
V2X technologies toward the Internet of vehicles: Challenges
and opportunities. Proceedings of the IEEE, 108(2), 308-323.
https://ieeexplore.ieee.org/abstract/document/8967260/
Zhu, L., Yu, F. R., Wang, Y., Ning, B., & Tang, T. (2018). Big
data analytics in intelligent transportation systems: A survey.
IEEE Transactions on Intelligent Transportation Systems, 20(1),
383-398. https://ieeexplore.ieee.org/abstract/document/9303409/
Work in Progress
The researchers say that the paradigm of vehicular
communication has shifted dramatically over the previous two
decades, and much has been learned and relearned in the
process. The idea of vehicle-to-infrastructure (V2I)
communication has developed into more modern concepts such
as vehicle-to-vehicle (V2V) communication and vehicle-to-
pedestrian (V2P) communication, setting the framework for the
future idea of vehicle-to-everything (V2X) communication.
Because of their vast communication range and very rapid data
rates, cellular networks have traditionally been utilized for
vehicle-to-vehicle communication (Muthuramalingam et al.,
2020). Although they are an unsatisfactory medium of
communication in highly dynamic networks because of their
high cost and low reliability in meeting strict delay
requirements, they offer certain benefits over other ways of
communication. Engineers and scientists alike are interested in
the development of dedicated short-range communication
(DSRC), a wireless communication system capable of sending
and receiving information over short to medium distances for
safety-based vehicle-to-vehicle (V2V) applications. It has
grown in prominence due to its ability to transmit and receive
real-time information between automobiles. While several
obstacles continue to obstruct the effective deployment of
DSRC-based vehicular networks, the US Department of
Transportation (US DoT) is actively pursuing it as one of its
major research priorities for a variety of public safety and
traffic management applications, including but not limited to
forward-collision warnings, blind intersection collision
mitigation, (approaching) emergency vehicle warnings, lane
change assistance, and a variety of other applications
(Muthuramalingam et al., 2020).
Many alternative radio access technologies (RATs) are being
explored for possible in-vehicle communication systems as an
alternative to cellular networks and direct sequence radio
communication (DSRC). The number of sensors put in
automobiles is expected to increase by orders of magnitude in
the following years, particularly as connected and autonomous
vehicles become more common. Because of this necessity, a
wireless communication system capable of transferring large
amounts of data at high data speeds must be built (Ganin et al.,
2021). All of the above considerations are especially pertinent
to network and autonomous cars. The ITS community has
gained momentum in investigating the feasibility of millimeter-
wave communication (mmWave) for vehicular networking
applications since vehicle data transmission ranges can reach up
to 1 km, and reasonable data rates can range from 2 to 6
megabits per second.
In contrast, data rates for cellular networks can only reach 100
megabits per second in high-mobility scenarios. Although
mmWave is designed to produce gigabit-per-second data speeds,
channel modeling effectiveness, security, and beam alignment
have proven significant roadblocks to its broad adoption and
deployment. Higher-frequency bands in the frequency spectrum
and terahertz communication for car networks and other uses
are generating greater attention than ever before. Thus, in the
not-too-distant future, the development and deployment of fifth-
generation (5G) and beyond fifth-generation (beyond 5G)
wireless-networking technologies will be made simpler (Tokody
et al., 2018).
The truth is that no one technology can fully address the
demands of both vehicle safety and non-safety applications
simultaneously, especially when their requirements are in direct
conflict. As a result, achieving synergy between different RATs
is critical to building an effective heterogeneous vehicular
networking platform capable of satisfying stringent
communication requirements (Kaffash et al., 2021). Although
heterogeneity is an essential and timely subject, it falls beyond
the scope of this inquiry. With the large volume of data created
by a vehicle network, the network's security and stability are
substantially jeopardized due to the network's vast number of
heterogeneous data sources (Tokody et al., 2018). This chapter
varies from previous regularly published surveys and chapters
in that it focuses primarily on the secure capturing of Big Data
in-vehicle networks rather than other difficulties.
The research by Kaffash et al. (2021) argues that the ability to
adopt an evidence-based approach to decision-making in several
settings is a benefit of studying Big Data and analytics in a
variety of professions. Big data can improve transportation
networks' overall safety and long-term profitability, particularly
in the transportation industry. Many cities have installed traffic
monitoring equipment such as cameras, roadside sensors, and
wireless sensor networks to keep track of traffic conditions and
enhance traffic flow to keep up with traffic. This technology
collects a vast amount of traffic data, allowing transportation
companies to understand traffic flow in their specific areas
better. It can now undertake historical and real-time data
analysis with new traffic data (Kaffash et al., 2021).
Consequently, traffic patterns may be disclosed, congestion can
be discovered, and accidents and near misses can be adequately
probed. Big Data analytics and methodologies, like machine
learning, may be used to filter through large volumes of traffic
data to extract relevant information that can then be utilized by
the transportation authority to take preventative steps and make
suitable judgments. Machine learning is one way that may be
used to solve this challenge.
Evaluating the data acquired makes it possible to find hidden
values in traffic data that may subsequently be utilized to
design and promote safe and sustainable transportation
networks. For example, data on vehicle speed may be collected
and analyzed using roadside sensors to identify traffic
congestion (Gaber et al., 2019). When traffic congestion is
detected, drivers may be given travel alerts to aid them in
selecting other routes and, consequently, reduce traffic
congestion. In addition to providing valuable data, research on
vehicle wait times at traffic signals may lead to the
development of creative ways for, among other things,
optimizing traffic light rules and increasing traffic flow (Cheng
et al., 2018). It can classify and categorize objects and follow
their motions using video data. It can identify and highlight
major traffic mishaps such as swerving, abrupt braking, and
near misses. Video data analysis is becoming more popular
among businesses. In the future, research like this may aid
decision-makers in making the necessary changes to improve
road safety, prevent accidents, and save lives when driving on
roads (Cheng et al., 2018).
It is indisputable that traffic data epitomizes the characteristics
of Big Data, which are often characterized in terms of volume,
variety, Velocity, honesty, and monetary value. To begin with,
the large number of pieces of equipment put on roadways to
monitor traffic generates a massive amount of data. The volume
of traffic data will skyrocket as connected cars interact and
exchange information with one another, other vehicles on the
road, road infrastructure, and other devices. According to the
National Highway Traffic Safety Administration, this is the case
(Guerrero-Ibáñez et al., 2018). Automobiles are present in the
local neighborhood. According to forecasts, linked cars will
create roughly 30 gigabytes of data every day. If the current
rate of increase continues, the amount of traffic data is expected
to exceed one terabyte in approximately one month. Second,
traffic data may be collected in a variety of forms, including
JPEG, JSON, XML (GPS), PDF (pictures, videos, and social
media posts), and other structured and unstructured data sources
(Guerrero-Ibáñez et al., 2018).
Furthermore, the speed of updating traffic data is impressive,
given the many sources that consistently supply current traffic
data. The fourth aspect of data dependability is concerned with
the inherent uncertainties in traffic data, such as erroneous or
missing information, which have previously been examined in
more depth. Last but not least, although traffic data is valuable,
it is only available in limited amounts. You may be able to
figure out what caused an accident at an intersection by looking
at the camera video from the scene. Because accidents do not
occur regularly, the vast bulk of the data consists primarily of
observations of routine vehicle traffic in the surrounding area.
Achieving real-time data processing and dependable
communication networks in the transportation industry is
crucial since some technologies, such as driverless automobiles,
cannot operate appropriately unless linked (Guerrero-Ibáñez et
al., 2018). Edge computing, which allows data processing and
computation to occur close to data sources, may be
advantageous to Big Data and analytics because of the vast data
generated today. The amount of bandwidth used and network
latency encountered between end-users and cloud computing
platforms that store, manage, and analyze data and the cost of
data storage and management are reduced. Edge computing may
show to be a viable solution for dealing with the issues that
have evolved because of exponential data expansion, limited
connection bandwidth, and vast quantities of processing power
accessible in the cloud soon.
Big Data
Solution
s in ITS
It is challenging to conserve the complex ITS ecosystem in its
entirety adequately. While cyberattacks and data breaches are
unavoidable, IT administrators should include preventative and
recovery measures into their day-to-day operations. Data
transmission should be possible within the time limitations
given by the organization (Kim, 2018). This should be done by
using simple cryptographic techniques with little overhead. Two
of the most critical security features in information technology
(IT) systems are confidentiality and authentication. Continuous
monitoring and response are required in any kind of data
security issue. Security flaws must be maintained to a bare
minimum, and sensitive data must never be lost. It is critical to
fix any security concerns to keep the system secure from
intruders. Following an attack on the ITS environment, it is
crucial to fortify defenses to fend off future attacks. These
recommendations advocate for network segmentation, firewalls
(including next-generation firewalls), and unified threat
management (UTM) gateways to satisfy the security issues and
needs stated in the previous sections.
Encryption technology, anti-malware, anti-phishing, and breach
detection systems are further alternatives (BDS). Other security
solutions, including Shodan scanning, vulnerability scanning,
and patch management, are available today in addition to
intrusion prevention and detection systems (Kim, 2018).).
Segmenting a network, which separates it into subnetworks,
helps relieve traffic congestion while boosting security and
reducing the probability of failure. When ITS controllers are
located on a network distinct from corporate networks, lateral
movement becomes less risky, and overall security improves.
Firewalls safeguard networks because they enable
administrators to manage outgoing and incoming traffic. A
popular technique for achieving this control is to apply a rule
set to the monitor. The security system detects and quarantines
apps and endpoints that generate or request harmful traffic.
Systems and services that merge several methods and services
include a single-engine or appliance, next-generation firewalls,
and Unified Threat Management gateways. Devices with low
traffic must be evaluated by comparing their network traffic at
line speed to comparable devices with higher traffic. A virus
scanner is a piece of software that, among other things, checks
files for the existence of viruses and other infections. Malware
may be detected, stopped, and removed from the computer.
Heuristics-specific and generic signatures are used in
combination to identify known and undiscovered malware.
Anti-phishing software is critical in combating stealth phishing,
one of the most common attack types. Anti-phishing systems
scan incoming emails for spam and phishing messages and take
appropriate action to prevent them from being delivered.
Malicious attachments, in addition to message sandboxes
employed in anti-phishing systems, pose a risk and should be
authenticated. Breach detection systems (BDS) identify a
targeted attack and threaten to steal data from the targeted
system if the assault is not quickly neutralized. BDS can
investigate and diagnose complicated assaults, but it is
incapable of preventing them. A variety of protocols may be
used to analyze network traffic patterns. Domains that may
contain malicious code may be identified. Emulation of
sandboxing is a method for simulating the behavior and
consequences of harmful files on the host computer (Arena et
al., 2020). Intrusion prevention systems (IPS) and intrusion
detection systems (IDS) constantly scan the whole network for
unusual activity. They also do extensive pocket inspections and
file paperwork as part of their duties. When an intrusion
detection system (IDS), a passive system, detects an assault, it
generates a report.
The firewall refuses a packet when an intrusion detection
system (IPS) detects a potentially harmful occurrence. Using
digital signature technologies, it is possible to neutralize the
bulk of assaults on ITS applications and systems. Non-digital
signature-based attacks may be mitigated via encryption.
Encryption and decryption techniques may be used to encrypt
and decrypt data. It is feasible to guard against and avoid Man-
in-the-Middle (MitM) attacks when encrypted network
communication. Patch management software, both physical and
virtual, may be used to update endpoints, servers, and remote
devices. Patch management software is also used to automate
the application of security patches and updates. Security
enforcement layers must be developed to prevent malicious
traffic from gaining access to the network. These layers must
filter out traffic that attempts to exploit known security flaws.
Endpoints, servers, networks, and apps may be scanned for
vulnerabilities using a vulnerability scanner. Unpatched
vulnerabilities may be discovered and made public. When an IT
administrator finds a vulnerability, they may mitigate the risk.
The Shodan algorithm is used to find internet-connected
devices. This technology gathers Open-Source Intelligence from
several sources (OSINT). Shodan's data might be used to
uncover unpatched vulnerabilities in publicly available cyber
assets. Owners and operators of information and communication
technology (ICT) systems may utilize Shodan to verify that
their devices and systems are not connected to the Internet.
---------------------------------------------------------------------------
------------------------------------------
DavidElliottaWalterKeenbLeiMiaob
https://www.sciencedirect.com/science/article/pii/S2095756418
302289#:~:text=Connected%20and%20automated%20vehicles%
20(CAVs,the%20efficiency%20of%20transportation%20systems
.Title: Recent advances in connected and automated vehicles

More Related Content

Similar to 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction

Data Sharing in Disruptive Technologies Lessons from Adoption of Autonomous S...
Data Sharing in Disruptive Technologies Lessons from Adoption of Autonomous S...Data Sharing in Disruptive Technologies Lessons from Adoption of Autonomous S...
Data Sharing in Disruptive Technologies Lessons from Adoption of Autonomous S...Araz Taeihagh
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...IJERDJOURNAL
 
Sameer Kumar Das International Conference Paper 53
Sameer Kumar Das International Conference Paper 53Sameer Kumar Das International Conference Paper 53
Sameer Kumar Das International Conference Paper 53Mr.Sameer Kumar Das
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesAIRCC Publishing Corporation
 
big-data-analytics-and-iot-in-logistics-a-case-study-2018.pdf
big-data-analytics-and-iot-in-logistics-a-case-study-2018.pdfbig-data-analytics-and-iot-in-logistics-a-case-study-2018.pdf
big-data-analytics-and-iot-in-logistics-a-case-study-2018.pdfAkuhuruf
 
Wearable Technology Orientation using Big Data Analytics for Improving Qualit...
Wearable Technology Orientation using Big Data Analytics for Improving Qualit...Wearable Technology Orientation using Big Data Analytics for Improving Qualit...
Wearable Technology Orientation using Big Data Analytics for Improving Qualit...IRJET Journal
 
Mining Big Data to Predicting Future
Mining Big Data to Predicting FutureMining Big Data to Predicting Future
Mining Big Data to Predicting FutureIJERA Editor
 
April 2020 top read artilce in Computer Science and Information Technology
April 2020 top read artilce in  Computer Science and Information TechnologyApril 2020 top read artilce in  Computer Science and Information Technology
April 2020 top read artilce in Computer Science and Information TechnologyAIRCC Publishing Corporation
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Big data seminar at Broadridge
Big data seminar at BroadridgeBig data seminar at Broadridge
Big data seminar at BroadridgeSoftware Engineer
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySusan Cox
 
IRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial DomainIRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial DomainIRJET Journal
 

Similar to 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction (20)

Data Sharing in Disruptive Technologies Lessons from Adoption of Autonomous S...
Data Sharing in Disruptive Technologies Lessons from Adoption of Autonomous S...Data Sharing in Disruptive Technologies Lessons from Adoption of Autonomous S...
Data Sharing in Disruptive Technologies Lessons from Adoption of Autonomous S...
 
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
An Investigation on Scalable and Efficient Privacy Preserving Challenges for ...
 
Sameer Kumar Das International Conference Paper 53
Sameer Kumar Das International Conference Paper 53Sameer Kumar Das International Conference Paper 53
Sameer Kumar Das International Conference Paper 53
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and Opportunities
 
big-data-analytics-and-iot-in-logistics-a-case-study-2018.pdf
big-data-analytics-and-iot-in-logistics-a-case-study-2018.pdfbig-data-analytics-and-iot-in-logistics-a-case-study-2018.pdf
big-data-analytics-and-iot-in-logistics-a-case-study-2018.pdf
 
Nouh (d2 its)
Nouh (d2 its)Nouh (d2 its)
Nouh (d2 its)
 
Wearable Technology Orientation using Big Data Analytics for Improving Qualit...
Wearable Technology Orientation using Big Data Analytics for Improving Qualit...Wearable Technology Orientation using Big Data Analytics for Improving Qualit...
Wearable Technology Orientation using Big Data Analytics for Improving Qualit...
 
Mining Big Data to Predicting Future
Mining Big Data to Predicting FutureMining Big Data to Predicting Future
Mining Big Data to Predicting Future
 
April 2020 top read artilce in Computer Science and Information Technology
April 2020 top read artilce in  Computer Science and Information TechnologyApril 2020 top read artilce in  Computer Science and Information Technology
April 2020 top read artilce in Computer Science and Information Technology
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Secure Data Transmission using IBOOS in VANET
Secure Data Transmission using IBOOS in VANET Secure Data Transmission using IBOOS in VANET
Secure Data Transmission using IBOOS in VANET
 
Big Data Seminar At Broadridge
Big Data Seminar At BroadridgeBig Data Seminar At Broadridge
Big Data Seminar At Broadridge
 
Big data seminar at Broadridge
Big data seminar at BroadridgeBig data seminar at Broadridge
Big data seminar at Broadridge
 
Big Data seminar BR-new
Big Data seminar BR-newBig Data seminar BR-new
Big Data seminar BR-new
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
 
Big Data.pdf
Big Data.pdfBig Data.pdf
Big Data.pdf
 
IRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial DomainIRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial Domain
 

More from EttaBenton28

1Comparing Humanistic-Existential Psychotherapy with Oth
1Comparing Humanistic-Existential Psychotherapy with Oth1Comparing Humanistic-Existential Psychotherapy with Oth
1Comparing Humanistic-Existential Psychotherapy with OthEttaBenton28
 
1Comment by Perjessy, Caroline Substan
1Comment by Perjessy, Caroline Substan1Comment by Perjessy, Caroline Substan
1Comment by Perjessy, Caroline SubstanEttaBenton28
 
1College Student’s DepressionJasmin LinthicumCours
1College Student’s DepressionJasmin LinthicumCours1College Student’s DepressionJasmin LinthicumCours
1College Student’s DepressionJasmin LinthicumCoursEttaBenton28
 
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
1Close Looking Analysis Visual ArtArtist’s Self-Portrait AnalysEttaBenton28
 
1CLA1Xueyao DongWestcliff UniversityINT 501 EF
1CLA1Xueyao DongWestcliff UniversityINT 501 EF1CLA1Xueyao DongWestcliff UniversityINT 501 EF
1CLA1Xueyao DongWestcliff UniversityINT 501 EFEttaBenton28
 
1CJ 550 2-2 Milestone One Southern New Ha
1CJ 550 2-2 Milestone One        Southern New Ha1CJ 550 2-2 Milestone One        Southern New Ha
1CJ 550 2-2 Milestone One Southern New HaEttaBenton28
 
1CLA 1Every organization aims at achieving a cer
1CLA 1Every organization aims at achieving a cer1CLA 1Every organization aims at achieving a cer
1CLA 1Every organization aims at achieving a cerEttaBenton28
 
1CHAPTER ONEThe What and Why of BudgetingAn Introduction
1CHAPTER ONEThe What and Why of BudgetingAn Introduction1CHAPTER ONEThe What and Why of BudgetingAn Introduction
1CHAPTER ONEThe What and Why of BudgetingAn IntroductionEttaBenton28
 
1Child Development Observation and Reflection
1Child Development Observation and Reflection1Child Development Observation and Reflection
1Child Development Observation and ReflectionEttaBenton28
 
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The ExterEttaBenton28
 
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBREttaBenton28
 
1CHAPTER 01G L O B A L R E P O R T O N2G
1CHAPTER 01G L O B A L  R E P O R T  O N2G1CHAPTER 01G L O B A L  R E P O R T  O N2G
1CHAPTER 01G L O B A L R E P O R T O N2GEttaBenton28
 
1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHousEttaBenton28
 
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATSEttaBenton28
 
1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of theEttaBenton28
 
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (EttaBenton28
 
1Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond21Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond2EttaBenton28
 
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.EttaBenton28
 
1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of aEttaBenton28
 
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·EttaBenton28
 

More from EttaBenton28 (20)

1Comparing Humanistic-Existential Psychotherapy with Oth
1Comparing Humanistic-Existential Psychotherapy with Oth1Comparing Humanistic-Existential Psychotherapy with Oth
1Comparing Humanistic-Existential Psychotherapy with Oth
 
1Comment by Perjessy, Caroline Substan
1Comment by Perjessy, Caroline Substan1Comment by Perjessy, Caroline Substan
1Comment by Perjessy, Caroline Substan
 
1College Student’s DepressionJasmin LinthicumCours
1College Student’s DepressionJasmin LinthicumCours1College Student’s DepressionJasmin LinthicumCours
1College Student’s DepressionJasmin LinthicumCours
 
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
1Close Looking Analysis Visual ArtArtist’s Self-Portrait Analys
 
1CLA1Xueyao DongWestcliff UniversityINT 501 EF
1CLA1Xueyao DongWestcliff UniversityINT 501 EF1CLA1Xueyao DongWestcliff UniversityINT 501 EF
1CLA1Xueyao DongWestcliff UniversityINT 501 EF
 
1CJ 550 2-2 Milestone One Southern New Ha
1CJ 550 2-2 Milestone One        Southern New Ha1CJ 550 2-2 Milestone One        Southern New Ha
1CJ 550 2-2 Milestone One Southern New Ha
 
1CLA 1Every organization aims at achieving a cer
1CLA 1Every organization aims at achieving a cer1CLA 1Every organization aims at achieving a cer
1CLA 1Every organization aims at achieving a cer
 
1CHAPTER ONEThe What and Why of BudgetingAn Introduction
1CHAPTER ONEThe What and Why of BudgetingAn Introduction1CHAPTER ONEThe What and Why of BudgetingAn Introduction
1CHAPTER ONEThe What and Why of BudgetingAn Introduction
 
1Child Development Observation and Reflection
1Child Development Observation and Reflection1Child Development Observation and Reflection
1Child Development Observation and Reflection
 
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
1CHAPTER4BUSINESS-LEVEL STRATEGYChapter 2The Exter
 
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
1CHEMICAL, BIOLOGICAL, RADIOLOGICAL AND NUCLEAR (CBR
 
1CHAPTER 01G L O B A L R E P O R T O N2G
1CHAPTER 01G L O B A L  R E P O R T  O N2G1CHAPTER 01G L O B A L  R E P O R T  O N2G
1CHAPTER 01G L O B A L R E P O R T O N2G
 
1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous1Child Growth and DevelopmentYohana MangiaficoHous
1Child Growth and DevelopmentYohana MangiaficoHous
 
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
1CHAPTER2THE EXTERNAL ENVIRONMENTOPPORTUNITIES, THREATS
 
1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the1Chapter Two Literature ReviewStudents NameName of the
1Chapter Two Literature ReviewStudents NameName of the
 
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
1CHAPTER 6 CHINAChinaBook ReferenceTerrill, R. J. (
 
1Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond21Chapter 9TelevisionBroadcast and Beyond2
1Chapter 9TelevisionBroadcast and Beyond2
 
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
1CHAPTER 5 RUSSIARussiaBook ReferenceTerrill, R. J.
 
1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a1Chapter 6Newspapers and the NewsReflections of a
1Chapter 6Newspapers and the NewsReflections of a
 
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
1CHAPTER 4 SOUTH AFRICA South AfricaConcepts to Know·
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction

  • 1. 1 CHAPTER 2 2 PEER REVIEWED SUMMARY i. Introduction ii. Title Searches, Articles, Research Documents and Journals iii. Big Data a. What is Big Data b. Examples of Big Data c. Pros/Cons of Big Data d. Industries using Big Data i. Automobile ~ ii. Manufacturing iii. Telecommunication iv. ITS – Intelligent Transportation Systems a. Introduction to ITS b. Examples c. Fields of ITS i. Automotive Control system ii. Public Safety iii. Traffic Management iv. Public Transportation system v. Commercial Vehicles Control System d. ITS Cyber Security i. Definition and Importance ii. Vulnerability incidents v. Big Data and ITS a. Big Data in ITS i. Big Data from Smart Cards ii. Big Data from GPS
  • 2. iii. Big Data from Sensors iv. Big Data from Videos v. Big Data from Connected and Autonomous Vehicles (CAVs) vi. Big Data from Vehicle Adhoc Network (VANET) vii. Big Data from Other Sources b. Gaps in Big Data for ITS vi. Cyber security a. Phishing b. Eves dropping c. Cyber terrorism d. Vehicle communication security breach (VANET) e. Data Breach in industries and Examples i. Automobile ii. Manufacturing iii. Telecommunication vii. Theoretical framework viii. Review of Methodological Literature ix. Summary Introduction In recent studies, big data is becoming a more appealing research subject in Intelligent Transportation Systems (ITS), as shown by the fact that it is employed in various projects worldwide. The enormous volumes of data produced will have significant ramifications for the design and implementation of intelligent transportation systems and in turn the need to make it safer, more efficient, and profitable. Intelligent transportation systems will create a large amount of data, which will be used to make transportation-related decisions (Darwish & Bakar, 2018). The first section of this chapter is dedicated to a detailed research of the history and characteristics of big data, intelligent transportation systems and Cyber security combined. This chapter will also cover the ITS framework, data collection and management techniques, data analytics methodologies, ITS platforms, examples of Big data and importance of Big Data and ITS in many other industries. A
  • 3. wide range of topics, including road traffic accident analysis, road traffic flow prediction, public transportation service planning, personal travel route planning, public safety, commercial vehicles control systems, and more, are covered in this chapter of big data applications in intelligent transportation systems (Darwish & Bakar, 2018). Finally, this chapter discusses some of the problems and gaps that still need to be researched regarding big data in Intelligent Transportation Systems in Automobiles on cyber security vulnerabilities. According to a research done by Transportation Research Board, the growing use of Big Data in large-scale Internet-of- Vehicles deployments has opened the door to previously imagined possibilities for unified transportation sector management and the creation of intelligent transportation systems. As a result of the widespread heterogeneous data collecting methods between automobiles and numerous other application platforms, there is a growing need for secure data collection in such architectures, which is being fulfilled by an expanding number of suppliers. In recent years, a rise in the number of cyber security and privacy breaches has increased the demand for secure data collection. However, the primary goal of this chapter is to draw the reader's attention to the challenge above and provide a brief current background of this research. In addition, research hurdles, prospects, and open research topics will be explored. Title Searches, Articles, Research Documents and Journals The Literature review heavily depended on scholarly articles on Big Data Cyber Security in Intelligent Transportation Systems, mostly covering the years from 2012-2022. Scholarly articles were searched and researched from many data bases such as IEEE Xplore (IEEE), ProQuest Central, Google Scholarly, ProQuest Dissertations and Theses Global. Some of the keywords used for searching are Intelligent Transportation Systems, Data Breach, Cyber Security, Big Data, Cyber security
  • 4. vulnerabilities, Big Data in ITS, ITS in automobiles and Cyber security challenges in ITS. The organization of this literate review focus on three key elements. (a) Big Data, (b) Cyber Security (c) Intelligent Transportation Systems. // need to write more Big Data What is Big Data? Big data is referred to as large datasets with 5 main characteristics - volume, value, variety. Velocity and veracity. Big data is a term used to describe a massive amount of various types of data which cannot be processed using the traditional management systems (Sivarajah, Kamal, Irani, & Weerakkody, 2017). It is referred with 5 main characteristics - volume, value, variety. Velocity and veracity which are called the 5Vs . Big data initially was formed with key characteristics volume; variety; and Velocity but later the other characteristics were added. According to Venkatraman and Venkatraman (2019), Big Data can be explained with 11V’s which are the fundamentals characteristics. (1) Volume refers to the size of the data collected through various sources such as integrated systems, mobile applications, sensors, IoT devices, social media, etc.; (2) velocity refers to the speed at which the data is generated and processed in real-time; (3) variety refers to the formats of the data such as structured, unstructured and semi-structure. Structured data uses a
  • 5. underlying structure or a template to store data such as using tables in the databases, fixed format length files, etc., whereas unstructured data refers to that which does not have a underlying structure to store data, such as free text from files and social media, audio, video, image, sensor (digital and analog) signals, and data from other sources; (4) veracity refers to the accuracy of the data. Any incomplete or incorrect data would contribute to bad decisions due to processing of the bad data; (5) validity refers to using the processed data for intended use at the right time to make accurate decisions and reap benefits; (6) volatility refers to volatility of data or for how long the data is valid. It is important to note that any information at given particular point in time depends on external parameters, and if the external parameters change the information processed for a specific situation may not render any value; (7) value refers to usefulness of the information in decision making and improving performance; (8) variability refers to inconsistencies such as the outliers to detect exceptions; (9) visualization refers to how data can be represented using other visual formats such as graphs, dashboards, etc., so that it is easier for the people using the information to read and interpret results; (10) valence refers to the density of the data ; (11) vulnerability refers to the vulnerability the data which relates to sensitivity, security and privacy. Examples of Big Data This data eventually converges to provide Big Data from the Internet of Vehicles. While the number, volume, and size of this data vary, it is of good quality the majority of the time. Big Data analytics may aid network operators in optimizing overall
  • 6. resource(s) planning for next-generation vehicle networks, resulting in cost savings. Consequently, national transportation authorities would have an easier time assessing and effectively fixing the country's chronic traffic congestion issues, increasing the overall quality of life for millions of people throughout the country. Automobile manufacturers have lately invested in large-scale Big Data platforms to advance the development of intelligent transportation systems. All of this data analytics and subsequent decision-making becomes more difficult if a hostile vehicle can input data into the Big Data stream of the Internet of Vehicles, with substantial ramifications for safety-critical and non-critical vehicular applications (Chai et al., 2020). According to safety applications, any intentionally provided information could result in incorrect trajectory predictions and inaccurate assessment of a vehicle's nearby environment soon, both of which could be extremely dangerous for passengers riding in semi-autonomous and fully autonomous vehicles. In the case of non-safety applications, this may result in considerable delays in delivering requested services, but it may also expose a user's personal information to serious hazards. This strategy may not only drastically decrease computational overheads but may also considerably reduce the amount of IoV Big Data that must be cached (Chai et al., 2020). Furthermore, real-time and historical data are critical for intelligent decision- making in IoT infrastructures, which should not be overlooked. Because of international storage limits and a limited number of available spaces, it is not feasible to keep all historical IoV Big Data in a single place for an extended time due to the nature of the data. As a result, getting IoV Big Data is crucial, as is ensuring that the data streams received are not kept forever and are purged after a certain amount of time. In comparison to raw data streams in their natural state, our proposed architecture allows raw data streams to be organized in a way that provides relevant information while utilizing fewer resources and taking up less storage space.
  • 7. Pros/Cons of Big Data // need to write more Industries using Big Data Automobile Industry Due to the increase in number of automobiles on the road in recent decades across the globe, present transportation infrastructure has been strained to its breaking point, forcing existing infrastructure to collapse. As a consequence of this, transportation networks have become very inefficient and prohibitively expensive to maintain and improve over time. According to most recent data, over one billion automobiles are on the road, predicting that this number would double by the end of 2035. Not only has traffic congestion in dense metropolitan areas increased dramatically due to the increase in the number of cars, but it has also resulted in an increase in the number of people killed or injured in automobile accidents, which has hampered economic development in a variety of ways. In 2017, according to the World Health Organization, approximately 1.25 million people died, and millions more were injured due to road traffic accidents. Additionally, walkers, roller skaters, and motorcyclists were among the most vulnerable road users in 2010, accounting for almost half of all deaths and injuries on the roads (Guevara & Auat Cheein, 2020). According to the World Bank, low- and middle-income nations and areas account for more than 90 percent of all road fatalities and injuries worldwide due to poor transportation infrastructure. In terms of network manageme nt, the outcome is a considerable drop in the quality of service for a wide variety of safety-critical and non-safety applications and a drop in the overall quality of the user experience for vehicle operators (Guevara & Auat Cheein, 2020). As a result, there is a lot of room for improvement in today's transportation systems, especially in terms of safety and efficiency, to name a few.
  • 8. Early resolution of these challenges will pave the way for creating highly efficient intelligent transportation networks, which will be necessary to realize the vision of connected automobiles. HealthCare industry //Need to write Telecommunication Industry //Need to write Big Data Collection in Vehicular Networks The research shows that significant changes in the transportation sector are expected soon, notably because of new paradigms such as the Internet of Things (IoT), cloud computing, edge and fog computing, software-defined networking, and the newly proposed Named Data Networking. Indeed, such novel ideas have undoubtedly aided and reinforced the industry's efforts to develop intelligently linked automobiles to assure safe and comfortable driving conditions. Furthermore, new vehicle applications and services are growing because of the ongoing expansion of high-speed mobile Internet connections and the rising demand for seamless, ubiquitous communication at lower prices than previously thought possible (Gohar et al., 2018). According to the European Commission, by the end of 2019, between 50 and 100 billion intelligent gadgets will be directly linked to the Internet, resulting in the generation of around 507.5 ZB of data every year. According to Automotive News, smart cars have grown into multisensor platforms in recent years. The average number of intelligent sensors placed on a vehicle remains at 100 and will reach 200 by 2020. Because vehicle networks are very dynamic, the data streams produced by these sensors are massive and extremely quick. Furthermore, automobile users obtain data from a range of social networking sites daily, resulting in a massive number of
  • 9. real-time traffic data. Because it is time-dependent and location-dependent, this information is spatiotemporal. Consequently, since the road network's dispersion often influences the route chosen by automobiles throughout a large geographical area, the data received differs in terms of method of transportation, size, and information quality (Gohar et al., 2018). Traditional vehicular ad hoc networks are being expanded to large-scale Internet of Vehicles (IoVs). All data collected in vehicular networks converge as Big Data in vehicular networks, routed through core networks to regional and regional centralized cloud computing environments and other vehicular networks. However, the current Internet infrastructure is inefficient and does not scale efficiently when processing the large amounts of IoV Big Data generated today. Furthermore, transporting such data is time-consuming and costly since it requires a significant quantity of bandwidth and energy. Again, real-time data processing is necessary for various safety-critical applications, necessitating the development of a highly efficient data processing architecture with significant computational capability. Due to the dispersed nature of vehicle networks, distributed edge-based processing is preferable to centralized systems (Payalan & Guvensan, 2019). As a consequence, performance is improved as compared to traditional centralized systems. However, since such distributed systems often lack significant processing and storage capacity, they cannot correctly cache and analyze enormous quantities of data. Not to mention the need for a secure approach to guarantee that IoV Big Data is collected consistently and not tampered with throughout the collecting process (Payalan & Guvensan, 2019). A hostile vehicle inserting counterfeit messages into the traffic system is a definite possibility. Such an occurrence might easily impair the whole system or even use the entire network to engage in dangerous activity for its evil objectives. As a result, research into effectively securing Big Data collecting in IoVs is required. In this setting, it is critical to draw the attention of
  • 10. academic and commercial research groups to the importance of such concerns, which this chapter does wonderfully. Intelligent Transportation System Introduction to ITS An intelligent transportation system (ITS) is created when a combination of information technologies is properly combined and implemented with the help of data-driven insights to improve the efficiency and effectiveness of transportation. As technology and electronic applications evolve, so does the user base, which is alarming. Information and Communication Technology (ICTs) have already impacted many industries and professions, including healthcare, manufacturing, and security (IT) (Pustokhina et al., 2018). Furthermore, as a result of technological advances, the transportation industry is changing and evolving. Portugal, Singapore, Germany, and the United Kingdom are leading the transition from traditional modes of transportation to highly technologically advanced infrastructure. The United Kingdom is shifting to an intelligent transportation system due to the change. Intelligent transportation systems are increasingly recognized as a critical component in transportation planners' toolkits for addressing long-standing surface transportation issues that have persisted for decades. The "info structure," a data-driven design that supports and complements physical transportation infrastructure, is crucial to the intelligent transportation system because it serves as its nerve center. The ultimate purpose of ITS is to keep passengers safe in the case of a car accident. This is done via better mobility and safety and improved operational performance, notably in terms of congestion and vehicle safety evaluation, ITS goals. Only a small percentage of the population can create jobs for others. Increased job opportunities will also benefit the general public. V2I and V2V systems, such as Japan's Smartway and the United
  • 11. States' IntelliDrive, are designed to help drivers in keeping a safe distance from an impending collision throughout the process, according to its developers. According to one estimate, IntelliDrive technology can handle 82 percent of all car collision scenarios in the United States with healthy drivers. Furthermore, it contributes to increasing the capacity of existing infrastructure while reducing the need for new road development, which is advantageous (Garg et al., 2018). For example, in the United States, real-time traffic data has considerably improved traffic flow. Pauses have been reduced by 40%, while travel time has been cut by 25%, gas consumption has been reduced by 10%, and pollution has been reduced by 22% compared to the previous year (Garg et al., 2018). Despite the various and considerable advantages that intelligent transportation systems may give, many governments are now underinvesting in them (ITS). This is since multiple obstacles must be overcome throughout the development and implementation of the technologies above. Examples of ITS // Need to write Fields of ITS Automotive Control system // Need to write Public Safety // Need to write Traffic Management // Need to write Public Transportation system // Need to write Commercial Vehicles Control System
  • 12. // Need to write ITS Cyber Security Definition and Importance // Need to write Vulnerability incidents // Need to write Big Data Collection Sources in Intelligent transportation system (ITS) Furthermore, Big Data and analytics research supports a wide range of application organizations by giving a significant opportunity to utilize evidence to impact decision-making in various domains. Is it possible to effectively apply Big Data and analytics ideas to the transportation industry? The authors thoroughly evaluate articles published in the last five years that address Big Data concepts and applications in the transportation sector, focusing on the transportation industry. This article covers the review's conclusions and consequences (Chai et al., 2020). One of the main goals from this research is to have a better knowledge of the existing research, possibilities, and constraints around Big Data and cyber security vulnerabilites in the Intellignet Transportation Systems in Automobiles. This research investigates and comprehends current research, prospects, and issues from various angles. According to the article, Big Data and analytics may give insights and improve transportation systems by analyzing data from a range of sources such as traffic monitoring systems, connected autos, crowdsourcing, and social media. Numerous storage, processing, and analytical solutions are being studied, and specialized platforms and software architecture are built
  • 13. expressly for the transportation industry. We also look at the challenges resulting from Big Data and analytics adoption (Chai et al., 2020). Aside from that, it significantly expands the number of ways cities may utilize Big Data in transportation to aid in the construction of sustainable and safer transportation networks. Because research in Big Data and vehicle is still in its infancy, this article cannot propose precise answers to the many issues described. This is also a flaw in the book since it lacks coherent replies to the many arguments presented (Sumalee & Ho, 2018). To guarantee the proper functioning of an intelligent transportation system, data from a range of sources, including CCTV cameras, sensors, RFID, GPS, and other technologies, must be gathered. The information is compiled from various publicly available sources, including CCTV cameras with number plate recognition and other comparable technology. Image processing, which aids in collecting appropriate toll payments for the identified vehicle, and CCTV cameras for filming purposes such as criminal identification and the detection of misappropriated vehicle information are advanced methods for applying toll charges (Zhou et al., 2020). It is now possible to employ radio frequency identificati on (RFID), another data source in intelligent transportation systems, to automatically detect the unique RFID tags contained in automobiles. RFID tags offer information about the car's identification number, the owner's name, and the amount of prepaid credit presently accessible on the vehicle (Zhou et al., 2020). When a vehicle passes through a toll bridge, the RFID tag affixed to the vehicle is identified, and the toll fees are automatically taken from the vehicle's account. This relatively new RFID technology might be used for security reasons to identify authorized vehicles, which would be helpful. Sensors are the significant data source in intelligent transportation systems (ITS); by deploying sensors on the road, transportation data such as vehicle speed and position can be gathered and
  • 14. evaluated. Intelligent transportation systems (ITS) are gaining popularity. Sensors such as global positioning system-based sensors, magnetometers, and gyroscope-based sensors, among others, are used to collect transit data [6]. We may be able to gather additional data about arterials and vehicle access to highways using sensors, which may then be stored and utilized for a variety of applications, including incident detection, active transportation, and highway demand management (Sharma & Kaushik, 2019). Sensor technology is used in multiple applications, including adaptive signal control, ramp and highway metering, and dispatching emergency response providers. It is feasible to get reliable and fast traffic flow information by combining sensors with big data platforms. Aside from that, further analysis may be conducted utilizing a range of data sources, such as identifying the owner of a car, obtaining vehicle information, and extracting vehicle owner details at a particular time, to name a few alternatives. Big Data in ITS Big Data in Intelligent Transportation Systems There are large amounts of data sent from multiple data sources to intelligent Transportation Systems (ITS). Some of the data sources include GPS, video, sensor signals, social media and so on. Big Data from Smart Cards In urban and modern public transport, Automatic Fare Collection (AFC) systems are extensively used to explore the passenger movement patterns using smart cards data which is one of the main data sources. Passengers who wish to use buses, trains or ferries for public transportation utilize smart cards and the electronic readers which scan these cards collect passenger data such as origination-destination (OD), boarding times, transfers etc, (Zhu, et al., 2019). In the US, many transit authorities use smart cards in cities like San Francisco Bay Area Rapid Transit (BART) (Buneman, K., 1984)., Washington Metropolitan Area Transit Authority (WMATA) (Miller, L. S.,
  • 15. 1994) and Philadelphia’s Port Authority Transit Corporation (PATCO) Lindenwold Line NX-zonal AFC systems (Vigrass, J. W., 1990) which in turn generate huge amounts of data. Because smart cards are extensively, its usage data collected is a important element for public transportation management and planning (Zhu, et al., 2019) and most researchers agree that this data is used by ITS for passenger travel behavior, travel time estimation to destination, travel patterns, frequency of travel etc. (Nishiuchi, et al., 2013). For instance, Transportation for London (TfL) collects smart card data from 8 million trips every day at London metro stations. Big Data from GPS Global positioning System (GPS) is the most important tool used today by users for location positioning and navigation. On a busy commuting day, traffic data, vehicle position, vehicle speed, vehicle density, vehicle type etc. can be collected efficiently and precisely via GPS. Travel mode detection (Gong, et al.,2012; Wang, et al.,2016), travel delay measurement (Asensio, et al., 2009) and Traffic monitoring (Herrera, et al., 2010) are some of the many traffic issues that could be addressed from the data collected GPS and other map displaying technologies. Big Data from Sensors Sensor devices connected to ITS is mainly used collect vehicle and traffic data such as vehicle speeds, traffic flows, vehicle density, vehicle travel time and vehicle position (Zhu, et al., 2019). Standard on-road sensor devices have been constantly evolving to collect, process and transfer traffic data (Lopes, et al., 2010). And the data collected from these sensors are mainly split into three types: floating car data, roadside data and wide area data (Antoniou, et al., 2008). Roadside data is referred as data collected from sensory devices
  • 16. installed alongside a main road or freeway. With evolving technologies, sensors hardware and software has changed, and use infrared systems, ultrasonic and acoustic sensor systems, magnetometer vehicle detectors, light detection and ranging (LIDAR) etc. (Zhu, et al., 2019). In the US, Colorado department of transport (CDOT) have installed new sensors on I-25 (Interstate-25) that can detect ice, water and temperature to provide the most up-to-the-minute information for road crews and feeds this data to ITS to provide road safety for the public (colorado reference). Floating car data (FCD) is referred as data collected on a vehicle while it’s in motion at different locations in ITS. They are used to collect time stamped GPS data and vehicle speeds while the automobile is in motion, and this data is used to provide. Along with the road side sensors, the vehicle’s embedded GPS receiver or cellular phone also acts as a moving sensor (Huang, E. 2010). Wide area data refers to the wide area traffic flow data that is collected by diverse sensor tracking techniques such as photogrammetric processing, sound recording, video processing, and space-based radar. Big Data from Connected and Autonomous Vehicles (CAVs) Connected and automated vehicles (CAVs) (a.k.a. driver-less cars) are a transformative technology that has significant prospects for reducing traffic accidents, enhancing the quality of life, and improving the efficiency of transportation systems. CAVs are built with a wide range to technologies in ITS keeping in mind the safe efficient movement of people and goods. May automobile industries today like Tesla, Ford etc. generate large amounts of real-time transportation data such as location, speed, acceleration, safety data (Uhlemann, E. 2015) and this data is used to mitigate traffic CAV enabled traffic system has demonstrated great potential to mitigate congestion, reduce travel delay, and enhance safety performance [33], [34]. Using latest network technologies such
  • 17. as Software Defined Networking, data can be obtained more efficiently [35] These data can be used to create actionable information to support and facilitate green transportation choices, and apply to the real-time adaptive signal control [36], [37]. Big Data from Vehicle Adhoc Network (VANET) // Need to write Big Data from Other Sources // Need to write Big Data from Videos // Need to write Gaps in Big Data for Intelligent Transportation Systems It is vital to detect possible threat actors while dealing with Intelligent Transportation Systems. Potential ITS network attackers have been highlighted by foreign intelligence services, criminal gangs, hacktivists, cyberterrorists, insiders, unethical operators, and natural disasters. National governments collect information via software espionage tools and viruses that are purpose-built for their goals. Intellectual property theft or getting a competitive edge are the primary goals of this kind of attack. During times of war, for example, a nation's information and communications technology (IT) infrastructure may be attacked by a cyberattack. Government-controlled hacking teams and resources may be outsourced to third-party firms (Sharma & Kaushik, 2019). Criminal gangs acquire access to information technology networks and produce illegal income in several methods. Hacktivists utilize information and communication technology (IT) infrastructure to draw a political cause. Previously, roadside message boards have been hacked to propagate a political agenda. Cyberterrorists attack information technology systems with the intent of causing property damage, human casualties, and widespread panic. Insiders conduct killings inside organizations in which they now
  • 18. or formerly held positions, with the intent of furthering the insider's own goals. Numerous variables contribute to the beginning and endurance of these attacks (Sharma & Kaushik, 2019). Unscrupulous operators may target the ITS system to avoid paying fines and taxes, avoid traffic, or eliminate competitors, among other things. On the other side, natural disasters may jeopardize the ITS system. Natural catastrophes can trigger system failures, compromising the infrastructure of the Intelligent Transportation System (ITS). The majority, if not all, of cyberattacks, is motivated by a desire for financial gain. The distinction between information and transportation systems is evident, which has a considerable impact when attacked or hacked. This kind of exposure may be a potent motivator in some circumstances. The reasons for these persons have been variously described as ransom, data theft, information warfare, system gaming, robbery, revenge, and terrorism, to mention a few. Physical, wireless, or network attacks, among others, may be employed to get the data. A seizure may be launched using a single vector or a collection of vectors. When attackers launch a ransom attack, they encrypt the data and systems being targeted. Until the victim obtains the decryption keys, the ransom is not paid. An attacker might get access to a connected car and disable it until the attackers are paid a ransom in bitcoin (Hîrţan et al., 2020). It is feasible that the safety of these cars has been risked. Stolen information may be utilized for a variety of reasons. When it comes to stealing information from a business, the most typical attackers are national governments and unscrupulous competitors. The objective of data theft is to benefit directly from the information stolen. The term "information warfare" refers to assaults on the information technology infrastructure (ITS) that result in a denial of service (DoS) condition. Consequently, the systems malfunction, resulting in more significant road congestion. Other types of content on the website include political commentary, demonstrations, and practical jokes. This might have a detrimental effect on the company's reputation and result
  • 19. in financial loss. If illicit vehicle-to-vehicle (V2V) broadcasts to the general public, they can wreak havoc on the transportation system. This kind of attack can contaminate V2V networks with data. Additionally, map hacking tools may be used to compromise location transmitters, GPS receivers, and GPS signal spoofing. If you engage in system gaming or vehicle theft, you may steal items from both inside and outside automobiles. It is also feasible to avoid paying fees and service charges by using ITS systems in certain instances. Self-driving cars may be hacked and directed to a remote location, or they can be used to convey contraband discreetly. Self-driving vehicles may be hacked and sent to a remote location, where valuables, car components, the whole vehicle, or abduction are all possibilities. If you utilize an ITS system, you may avoid paying service costs. It is possible to remotely activate a traffic light controlled by a computer using Mobile Infrared Transmitters (MIRT). This permits the manipulation of light. There is a definite possibility of hacking into a competitor's automobile to sabotage competition and render the cars unusable. It is conceivable to engineer a situation where autonomous vehicles are compelled to make way for a high-priority hacking vehicle. False ridesharing requests may be made to bill unknowing clients for services they never requested. While big data technologies have done an incredible job managing 4V data, traditional business intelligence systems have done a better job maintaining Metadata associated with inputted data. This is because conventional methods must deal with highly structured data, but Big Data Systems do not. Developing a standard semantic layer for all retained data continues to be a challenge, and the more different the data, the more similar the semantic layer should be to maximize data retrieval efficiency. The transportation industry has significant challenges due to the breadth of accessible data, including photos, structured data, and streaming data from sensors. Unlike traditional business intelligence systems, big data
  • 20. systems face this challenge in the same way as conventional business intelligence systems do because big data is derived from various sources that are highly likely to contain personal information, such as Twitter and Facebook text data. Because big data is dispersed over a distributed architecture, enforcing security policies becomes a much more challenging task, one that has yet to be entirely resolved to the satisfaction of industry standards. Due to the volume of data generated by vehicle monitoring, it is well-suited for transportation systems. One of the most challenging difficulties confronting the industry today is deciding which big data architectural framework best suits the use case. This is especially tough since big data frameworks are still in their infancy. This issue impacts a broad spectrum of businesses, not only transportation networks. Cyber security Phishing // Need to write Eves dropping // Need to write Cyber terrorism // Need to write Vehicle communication security breach (VANET) // Need to write Data Breach in industries and Examples Automobile Industry // Need to write Manufacturing // Need to write
  • 21. Telecommunication // Need to write Summary Transportation evolution is followed by new threats to ITS systems concurrently with ecosystem change. Significant changes are likely in several sectors, and the extent of these changes is relatively wide. Accepting the need for a more targeted approach to security, focused on preventing and resolving attacks, is required. As previously noted, the current models used by ITS ecosystems have several shortcomings that must be addressed before the ecosystems can function correctly. The following section discusses these restrictions in further detail. Additional research is required in this area to analyze specific solutions tailored to the unique requirements of each of the several ITS systems and applications now available. More study on cooperative systems is required to identify cyber risks and develop responses to protect against them. This is why biometric technology is essential to the long-term health of the transportation industry's cybersecurity. Consequently, they provide actionable data that supports critical decision-making in various circumstances, including route selection, trip scheduling, and whether passengers should drive or use public transit. This article aims to provide a comprehensive understanding of big data analytics and the Internet of Things (IoT) in the transportation business and identify the factors that may affect the development of an intelligent transportation system. Apart from that, the plan will be adequately outlined. Finally, and perhaps most importantly, the research's objective is to understand better the effects of big data on cyber security vulnerabilities in Intelligent transportation system. When we complete our analysis, which will be addressed in the next part, we will develop an integrated implementation architecture for big data analytics and Internet
  • 22. of Things-based transportation systems. References Abbasi, M., Rafiee, M., Khosravi, M. R., Jolfaei, A., Menon, V. G., & Koushyar, J. M. (2020). An efficient parallel geneti c algorithm solution for vehicle routing problems in intelligent transportation systems cloud implementation. Journal of Cloud Computing, 9(1), 1-14. https://link.springer.com/article/10.1186/s13677-020-0157-4 Antoniou, C., Balakrishna, R., and Koutsopoulos, H. (2008). Emerging data collection technologies and their impact on traffic management applications, Proc. 10th Int. Conf. Appl. Adv. Technol. Transp. Arena, F., Pau, G., & Severino, A. (2020). A review on IEEE 802.11 p for intelligent transportation systems. Journal of Sensor and Actuator Networks, 9(2), 22. https://www.mdpi.com/701344 Asensio, López, J., R. Pagán, R., Pavón, I., and Ausejo, M. (2009). GPS-based speed collection method for road traffic noise mapping, Transp. Res. D Transp. Environ., vol. 14, no. 5, pp. 360-366 Atat, R., Liu, L., Wu, J., Li, G., Ye, C., & Yang, Y. (2018). Big data meet cyber-physical systems: A panoramic survey. IEEE Access, 6, 73603-7 https://ieeexplore.ieee.org/abstract/document/8533338/ Buneman, K. (1984). Automated and Passenger-Based Transit Performance Measures. In Transportation Research Record 992, pp. 23-28, Transportation Research Board of the National Academies Chai, H., Leng, S., Chen, Y., & Zhang, K. (2020). A hierarchical blockchain-enabled federated learning algorithm
  • 23. for knowledge sharing on the Internet of vehicles. IEEE Transactions on Intelligent Transportation Systems, 22(7), 3975-3986. https://ieeexplore.ieee.org/abstract/document/9127823/ Chen, C., Liu, B., Wan, S., Qiao, P., & Pei, Q. (2020). An edge traffic flow detection scheme based on deep learning in an intelligent transportation system. IEEE Transactions on Intelligent Transportation Systems, 22(3), 1840-1852. https://ieeexplore.ieee.org/abstract/document/9210731/ Cheng, N., Lyu, F., Chen, J., Xu, W., Zhou, H., Zhang, S., & Shen, X. (2018). Big data-driven vehicular networks. Ieee Network, 32(6), 160-167. https://ieeexplore.ieee.org/abstract/document/8450539/ Darwish, T. S., & Bakar, K. A. (2018). Fog-based intelligent transportation big data analytics on the Internet of vehicles environment: motivations, architecture, challenges, and critical issues. IEEE Access, 6, 15679-15701. https://ieeexplore.ieee.org/abstract/document/8316816/ Deepa, N., Pham, Q. V., Nguyen, D. C., Bhattacharya, S., Prabadevi, B., Gadekallu, T. R., & Pathirana, P. N. (2022). A survey on blockchain for big data: approaches, opportunities, and future directions. Future Generation Computer Systems. https://www.sciencedirect.com/science/article/pii/S0167739X22 000243 Ferdowsi, A., Challita, U., & Saad, W. (2019). Deep learning for reliable mobile edge analytics in intelligent transportation systems: An overview. IEEE vehicular technology magazine, 14(1), 62-70. https://ieeexplore.ieee.org/abstract/document/8600316/ Gaber, T., Abdelwahab, S., Elhoseny, M., & Hassanien, A. E. (2018). Trust-based secure clustering in WSN-based intelligent transportation systems. Computer Networks, 146, 151-158. https://www.sciencedirect.com/science/article/pii/S1389128618 309253 Ganin, A. A., Mersky, A. C., Jin, A. S., Kitsak, M., Keisler, J. M., & Linkov, I. (2019). Resilience in intelligent transportation
  • 24. systems (ITS). Transportation Research Part C: Emerging Technologies, 100, 318-329. https://www.sciencedirect.com/science/article/pii/S0968090X18 307435 Garg, S., Singh, A., Batra, S., Kumar, N., & Yang, L. T. (2018). UAV-empowered edge computing environment for cyber-threat detection in intelligent vehicles. IEEE Network, 32(3), 42-51. https://ieeexplore.ieee.org/abstract/document/8370877/ Gohar, M., Muzammal, M., & Rahman, A. U. (2018). SMART TSS: Defining transportation system behavior using big data analytics in smart cities. Sustainable cities and society, 41, 114- 119. https://www.sciencedirect.com/science/article/pii/S2210670717 309757 Gong, H., Chen, C., Bialostozky, E. and Lawson, C. T. (2012). A GPS/GIS method for travel mode detection in New York City, Comput. Environ. Urban Syst., vol. 36, no. 2, pp. 131-139. Guerrero-Ibáñez, J., Zeadally, S., & Contreras-Castillo, J. (2018). Sensor technologies for intelligent transportation systems. Sensors, 18(4), 1212. https://www.mdpi.com/282582 Guevara, L., & Auat Cheein, F. (2020). The role of 5G technologies: Challenges in smart cities and intelligent transportation systems. Sustainability, 12(16), 6469. https://www.mdpi.com/794798 Haghighat, A. K., Ravichandra-Mouli, V., Chakraborty, P., Esfandiari, Y., Arabi, S., & Sharma, A. (2020). Applications of deep learning in intelligent transportation systems. Journal of Big Data Analytics in Transportation, 2(2), 115-145. https://link.springer.com/article/10.1007/s42421-020-00020-1 Herrera, J.C., Work, D. B., Herring, R., Ban, X., Jacobsond, Q., and Bayen, A. M. (2010). Evaluation of traffic data obtained via GPS-enabled mobile phones: The mobile century field experiment", Transp. Res. C Emerg. Technol., vol. 18, no. 4, pp. 568-583 Hîrţan, L. A., Dobre, C., & González-Vélez, H. (2020). Blockchain-based reputation for intelligent transportation
  • 25. systems. Sensors, 20(3), 791. https://www.mdpi.com/629918 Huang, E. (2010). Algorithmic and implementation aspects of on-line calibration of dynamic traffic assignment Kaffash, S., Nguyen, A. T., & Zhu, J. (2021). Big data algorithms and applications in intelligent transportation system: A review and bibliometric analysis. International Journal of Production Economics, 231, 107868. https://www.sciencedirect.com/science/article/pii/S0925527320 302279 Kelarestaghi, K. B., Foruhandeh, M., Heaslip, K., & Gerdes, R. (2019). Intelligent transportation system security: impact- oriented risk assessment of in-vehicle networks. IEEE Intelligent Transportation Systems Magazine, 13(2), 91-104. https://www.researchgate.net/profile/Kaveh-B- Kelarestaghi/publication/330597240_Intelligent_Transportation _System_Security_Impact-Oriented_Risk_Assessment_of_In- Vehicle_Networks/links/5c570531299bf12be3f91bf4/Intelligent -Transportation-System-Security-Impact-Oriented-Risk- Assessment-of-In-Vehicle-Networks.pdf Kim, S. (2018). Blockchain for a trusted network among intelligent vehicles. In Advances in Computers (Vol. 111, pp. 43-68). Elsevier. https://www.sciencedirect.com/science/article/pii/S0065245818 300238 Kim, S. (2018). Blockchain for a trusted network among intelligent vehicles. In Advances in Computers (Vol. 111, pp. 43-68). Elsevier. https://www.sciencedirect.com/science/article/pii/S0065245818 300238 Lopes, J., Bento, J., Huang, E., Antoniou, C., and Ben-Akiva, M. (2010). Traffic and mobility data collection for real -time applications, Proc. IEEE Intell. Transp. Syst. (ITSC), pp. 216- 223. Miller, L. S. (1994). A Fare Deal for All – Mass Transit Automatic Fare Collection Systems. In Railway Age, Issue 5, Volume 195.
  • 26. Muthuramalingam, S., Bharathi, A., Gayathri, N., Sathiyaraj, R., & Balamurugan, B. (2019). IoT based intelligent transportation system (IoT-ITS) for global perspective: A case study. The Internet of Things and Big Data Analytics for Smart Generation (pp. 279-300). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-030-04203- 5_13 Neilson, A., Daniel, B., & Tjandra, S. (2019). A systematic review of the literature on big data in the transportation domain: Concepts and applications. Big Data Research, 17, 35-44. https://www.sciencedirect.com/science/article/pii/S2214579617 303866 Nishiuchi, H., King, J., and Todoroki, T. (2013). Spatial- temporal daily frequent trip pattern of public transport passengers using smart card data, Int. J. Intell. Transp. Syst. Res., vol. 11, no. 1, pp. 1-10 Payalan, Y. F., & Guvensan, M. A. (2019). Towards next- generation vehicles featuring the vehicle intelligence. IEEE Transactions on Intelligent Transportation Systems, 21(1), 30- 47. https://ieeexplore.ieee.org/abstract/document/8734737/ Pustokhina, I. V., Pustokhin, D. A., Rodrigues, J. J., Gupta, D., Khanna, A., Shankar, K., ... & Joshi, G. P. (2020). Automatic vehicle license plate recognition using optimal K-means with convolutional neural network for intelligent transportation systems. Ieee Access, 8, 92907-92917. https://ieeexplore.ieee.org/abstract/document/9088975/ Sharma, S., & Kaushik, B. (2019). A survey on Internet of vehicles: Applications, security issues & solutions. Vehicular Communications, 20, 100182. https://www.sciencedirect.com/science/article/pii/S2214209619 302293 Sivarajah, U., Kamal, M. M., Irani, Z., & Weerakkody, V. (2017). Critical analysis of Big Data challenges and analytical methods. Journal of Business Research, 70, 263–286. doi:0.1016/j.jbusres.2016.08.001
  • 27. Sumalee, A., & Ho, H. W. (2018). Brighter and more connected: Future intelligent transportation system. It's Research, 42(2), 67-71. https://www.sciencedirect.com/science/article/pii/S0386111218 300396 Tokody, D., Albini, A., Ady, L., Rajnai, Z., & Pongrácz, F. (2018). Safety and security through the design of autonomous intelligent vehicle systems and intelligent infrastructure in the smart city. Interdisciplinary Description of Complex Systems: INDECS, 16(3-A), 384-396. https://hrcak.srce.hr/clanak/303148 Uhlemann, E. (2015). Autonomous vehicles are connecting [connected vehicles] ", IEEE Veh. Technol. Mag., vol. 10, no. 2, pp. 22-25, doi: 10.1109/MVT.2015.2414814. Ullah, Z., Al-Turjman, F., Mostarda, L., & Gagliardi, R. (2020). Applications of artificial intelligence and machine learning in smart cities. Computer Communications, 154, 313-323. https://www.sciencedirect.com/science/article/pii/S0140366419 320821 Van Wyk, F., Wang, Y., Khojandi, A., & Masoud, N. (2019). Real-time sensor anomaly detection and identification in automated vehicles. IEEE Transactions on Intelligent Transportation Systems, 21(3), 1264-1276. https://ieeexplore.ieee.org/abstract/document/8684317/ Vigrass, J. W. (1990). The Lindenwold (New Jersey to Philadelphia) Hi-Speed Line: The First Twenty Years of the Port Authority Transit Corporation (PATCO). West Jersey Chapter, National Railway Historical Society, Cherry Hill, N.J. Venkatraman, S., & Venkatraman, R. (2019). Big data security challenges and strategies. AIMS Mathematics, 4(3), 860–879. doi:10.3934/math.2019.3.860 Wan, S., Gu, R., Umer, T., Salah, K., & Xu, X. (2020). Toward offloading Internet of vehicles applications in 5G networks. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4151-4159. https://ieeexplore.ieee.org/abstract/document/9184262/
  • 28. Wang, X., Zhao, S., and Dong, L. (2016). Research and application of traffic visualization based on vehicle GPS big data", Proc. Int. Conf. Intell. Transp., pp. 293-302 Zhou, H., Xu, W., Chen, J., & Wang, W. (2020). Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities. Proceedings of the IEEE, 108(2), 308-323. https://ieeexplore.ieee.org/abstract/document/8967260/ Zhu, L., Yu, F. R., Wang, Y., Ning, B., & Tang, T. (2018). Big data analytics in intelligent transportation systems: A survey. IEEE Transactions on Intelligent Transportation Systems, 20(1), 383-398. https://ieeexplore.ieee.org/abstract/document/9303409/ Work in Progress The researchers say that the paradigm of vehicular communication has shifted dramatically over the previous two decades, and much has been learned and relearned in the process. The idea of vehicle-to-infrastructure (V2I) communication has developed into more modern concepts such as vehicle-to-vehicle (V2V) communication and vehicle-to- pedestrian (V2P) communication, setting the framework for the future idea of vehicle-to-everything (V2X) communication. Because of their vast communication range and very rapid data rates, cellular networks have traditionally been utilized for vehicle-to-vehicle communication (Muthuramalingam et al., 2020). Although they are an unsatisfactory medium of communication in highly dynamic networks because of their high cost and low reliability in meeting strict delay requirements, they offer certain benefits over other ways of communication. Engineers and scientists alike are interested in the development of dedicated short-range communication (DSRC), a wireless communication system capable of sending and receiving information over short to medium distances for safety-based vehicle-to-vehicle (V2V) applications. It has grown in prominence due to its ability to transmit and receive real-time information between automobiles. While several obstacles continue to obstruct the effective deployment of DSRC-based vehicular networks, the US Department of
  • 29. Transportation (US DoT) is actively pursuing it as one of its major research priorities for a variety of public safety and traffic management applications, including but not limited to forward-collision warnings, blind intersection collision mitigation, (approaching) emergency vehicle warnings, lane change assistance, and a variety of other applications (Muthuramalingam et al., 2020). Many alternative radio access technologies (RATs) are being explored for possible in-vehicle communication systems as an alternative to cellular networks and direct sequence radio communication (DSRC). The number of sensors put in automobiles is expected to increase by orders of magnitude in the following years, particularly as connected and autonomous vehicles become more common. Because of this necessity, a wireless communication system capable of transferring large amounts of data at high data speeds must be built (Ganin et al., 2021). All of the above considerations are especially pertinent to network and autonomous cars. The ITS community has gained momentum in investigating the feasibility of millimeter- wave communication (mmWave) for vehicular networking applications since vehicle data transmission ranges can reach up to 1 km, and reasonable data rates can range from 2 to 6 megabits per second. In contrast, data rates for cellular networks can only reach 100 megabits per second in high-mobility scenarios. Although mmWave is designed to produce gigabit-per-second data speeds, channel modeling effectiveness, security, and beam alignment have proven significant roadblocks to its broad adoption and deployment. Higher-frequency bands in the frequency spectrum and terahertz communication for car networks and other uses are generating greater attention than ever before. Thus, in the not-too-distant future, the development and deployment of fifth- generation (5G) and beyond fifth-generation (beyond 5G) wireless-networking technologies will be made simpler (Tokody et al., 2018). The truth is that no one technology can fully address the
  • 30. demands of both vehicle safety and non-safety applications simultaneously, especially when their requirements are in direct conflict. As a result, achieving synergy between different RATs is critical to building an effective heterogeneous vehicular networking platform capable of satisfying stringent communication requirements (Kaffash et al., 2021). Although heterogeneity is an essential and timely subject, it falls beyond the scope of this inquiry. With the large volume of data created by a vehicle network, the network's security and stability are substantially jeopardized due to the network's vast number of heterogeneous data sources (Tokody et al., 2018). This chapter varies from previous regularly published surveys and chapters in that it focuses primarily on the secure capturing of Big Data in-vehicle networks rather than other difficulties. The research by Kaffash et al. (2021) argues that the ability to adopt an evidence-based approach to decision-making in several settings is a benefit of studying Big Data and analytics in a variety of professions. Big data can improve transportation networks' overall safety and long-term profitability, particularly in the transportation industry. Many cities have installed traffic monitoring equipment such as cameras, roadside sensors, and wireless sensor networks to keep track of traffic conditions and enhance traffic flow to keep up with traffic. This technology collects a vast amount of traffic data, allowing transportation companies to understand traffic flow in their specific areas better. It can now undertake historical and real-time data analysis with new traffic data (Kaffash et al., 2021). Consequently, traffic patterns may be disclosed, congestion can be discovered, and accidents and near misses can be adequately probed. Big Data analytics and methodologies, like machine learning, may be used to filter through large volumes of traffic data to extract relevant information that can then be utilized by the transportation authority to take preventative steps and make suitable judgments. Machine learning is one way that may be used to solve this challenge.
  • 31. Evaluating the data acquired makes it possible to find hidden values in traffic data that may subsequently be utilized to design and promote safe and sustainable transportation networks. For example, data on vehicle speed may be collected and analyzed using roadside sensors to identify traffic congestion (Gaber et al., 2019). When traffic congestion is detected, drivers may be given travel alerts to aid them in selecting other routes and, consequently, reduce traffic congestion. In addition to providing valuable data, research on vehicle wait times at traffic signals may lead to the development of creative ways for, among other things, optimizing traffic light rules and increasing traffic flow (Cheng et al., 2018). It can classify and categorize objects and follow their motions using video data. It can identify and highlight major traffic mishaps such as swerving, abrupt braking, and near misses. Video data analysis is becoming more popular among businesses. In the future, research like this may aid decision-makers in making the necessary changes to improve road safety, prevent accidents, and save lives when driving on roads (Cheng et al., 2018). It is indisputable that traffic data epitomizes the characteristics of Big Data, which are often characterized in terms of volume, variety, Velocity, honesty, and monetary value. To begin with, the large number of pieces of equipment put on roadways to monitor traffic generates a massive amount of data. The volume of traffic data will skyrocket as connected cars interact and exchange information with one another, other vehicles on the road, road infrastructure, and other devices. According to the National Highway Traffic Safety Administration, this is the case (Guerrero-Ibáñez et al., 2018). Automobiles are present in the local neighborhood. According to forecasts, linked cars will create roughly 30 gigabytes of data every day. If the current rate of increase continues, the amount of traffic data is expected to exceed one terabyte in approximately one month. Second, traffic data may be collected in a variety of forms, including JPEG, JSON, XML (GPS), PDF (pictures, videos, and social
  • 32. media posts), and other structured and unstructured data sources (Guerrero-Ibáñez et al., 2018). Furthermore, the speed of updating traffic data is impressive, given the many sources that consistently supply current traffic data. The fourth aspect of data dependability is concerned with the inherent uncertainties in traffic data, such as erroneous or missing information, which have previously been examined in more depth. Last but not least, although traffic data is valuable, it is only available in limited amounts. You may be able to figure out what caused an accident at an intersection by looking at the camera video from the scene. Because accidents do not occur regularly, the vast bulk of the data consists primarily of observations of routine vehicle traffic in the surrounding area. Achieving real-time data processing and dependable communication networks in the transportation industry is crucial since some technologies, such as driverless automobiles, cannot operate appropriately unless linked (Guerrero-Ibáñez et al., 2018). Edge computing, which allows data processing and computation to occur close to data sources, may be advantageous to Big Data and analytics because of the vast data generated today. The amount of bandwidth used and network latency encountered between end-users and cloud computing platforms that store, manage, and analyze data and the cost of data storage and management are reduced. Edge computing may show to be a viable solution for dealing with the issues that have evolved because of exponential data expansion, limited connection bandwidth, and vast quantities of processing power accessible in the cloud soon. Big Data Solution
  • 33. s in ITS It is challenging to conserve the complex ITS ecosystem in its entirety adequately. While cyberattacks and data breaches are unavoidable, IT administrators should include preventative and recovery measures into their day-to-day operations. Data transmission should be possible within the time limitations given by the organization (Kim, 2018). This should be done by using simple cryptographic techniques with little overhead. Two of the most critical security features in information technology (IT) systems are confidentiality and authentication. Continuous monitoring and response are required in any kind of data security issue. Security flaws must be maintained to a bare minimum, and sensitive data must never be lost. It is critical to fix any security concerns to keep the system secure from intruders. Following an attack on the ITS environment, it is crucial to fortify defenses to fend off future attacks. These recommendations advocate for network segmentation, firewalls (including next-generation firewalls), and unified threat management (UTM) gateways to satisfy the security issues and needs stated in the previous sections. Encryption technology, anti-malware, anti-phishing, and breach detection systems are further alternatives (BDS). Other security solutions, including Shodan scanning, vulnerability scanning, and patch management, are available today in addition to intrusion prevention and detection systems (Kim, 2018).).
  • 34. Segmenting a network, which separates it into subnetworks, helps relieve traffic congestion while boosting security and reducing the probability of failure. When ITS controllers are located on a network distinct from corporate networks, lateral movement becomes less risky, and overall security improves. Firewalls safeguard networks because they enable administrators to manage outgoing and incoming traffic. A popular technique for achieving this control is to apply a rule set to the monitor. The security system detects and quarantines apps and endpoints that generate or request harmful traffic. Systems and services that merge several methods and services include a single-engine or appliance, next-generation firewalls, and Unified Threat Management gateways. Devices with low traffic must be evaluated by comparing their network traffic at line speed to comparable devices with higher traffic. A virus scanner is a piece of software that, among other things, checks files for the existence of viruses and other infections. Malware may be detected, stopped, and removed from the computer. Heuristics-specific and generic signatures are used in combination to identify known and undiscovered malware. Anti-phishing software is critical in combating stealth phishing, one of the most common attack types. Anti-phishing systems scan incoming emails for spam and phishing messages and take appropriate action to prevent them from being delivered. Malicious attachments, in addition to message sandboxes
  • 35. employed in anti-phishing systems, pose a risk and should be authenticated. Breach detection systems (BDS) identify a targeted attack and threaten to steal data from the targeted system if the assault is not quickly neutralized. BDS can investigate and diagnose complicated assaults, but it is incapable of preventing them. A variety of protocols may be used to analyze network traffic patterns. Domains that may contain malicious code may be identified. Emulation of sandboxing is a method for simulating the behavior and consequences of harmful files on the host computer (Arena et al., 2020). Intrusion prevention systems (IPS) and intrusion detection systems (IDS) constantly scan the whole network for unusual activity. They also do extensive pocket inspections and file paperwork as part of their duties. When an intrusion detection system (IDS), a passive system, detects an assault, it generates a report. The firewall refuses a packet when an intrusion detection system (IPS) detects a potentially harmful occurrence. Using digital signature technologies, it is possible to neutralize the bulk of assaults on ITS applications and systems. Non-digital signature-based attacks may be mitigated via encryption. Encryption and decryption techniques may be used to encrypt and decrypt data. It is feasible to guard against and avoid Man- in-the-Middle (MitM) attacks when encrypted network communication. Patch management software, both physical and
  • 36. virtual, may be used to update endpoints, servers, and remote devices. Patch management software is also used to automate the application of security patches and updates. Security enforcement layers must be developed to prevent malicious traffic from gaining access to the network. These layers must filter out traffic that attempts to exploit known security flaws. Endpoints, servers, networks, and apps may be scanned for vulnerabilities using a vulnerability scanner. Unpatched vulnerabilities may be discovered and made public. When an IT administrator finds a vulnerability, they may mitigate the risk. The Shodan algorithm is used to find internet-connected devices. This technology gathers Open-Source Intelligence from several sources (OSINT). Shodan's data might be used to uncover unpatched vulnerabilities in publicly available cyber assets. Owners and operators of information and communication technology (ICT) systems may utilize Shodan to verify that their devices and systems are not connected to the Internet. --------------------------------------------------------------------------- ------------------------------------------ DavidElliottaWalterKeenbLeiMiaob https://www.sciencedirect.com/science/article/pii/S2095756418 302289#:~:text=Connected%20and%20automated%20vehicles% 20(CAVs,the%20efficiency%20of%20transportation%20systems
  • 37. .Title: Recent advances in connected and automated vehicles