You are on page 1of 6

2017 Second International Conference on Recent Trends and Challenges in Computational Models

A Study on vehicle to vehicle collision


prevention using Fog, Cloud, big data and
Elliptic curve security based on threshold
energy efficient protocol in wireless sensor
network

N.Sathishkumar, Dr.K.Rajakumar
Research Scholar, Associate Professor
Department of Computer Science and Engineering, Department of Computer Science and Engineering,
VIT University, Vellore VIT University, Vellore
sathishkumar.n2016@vitstudent.ac.in, rajakumar.krishnan@vit.ac.in

ABSTRACT I INTRODUCTION

Now a day’s more number of vehicles are growing due to Accident is the one major problem in all over the world.
populations are growing day by day. All type of vehicles like bus, In fact the vehicle to vehicle accident death is very high
car, two wheeler, plane, cycle making collision with other year by year compared than all type of death in the world.
vehicles or with other objects like wall, trees, down position, There are 120 million accident occur at work place
curve position etc. Every year almost 1.25 million people are worldwide according to work office statistics. Out of 120
killed on the road due to vehicle accident. At present one of the million 210,000 are deadly accident. There are many
biggest problems in the world is vehicle accident. The vehicle to
vehicle accident is very high compared than other type of
people carefully walking on the road due to afraid of
accident. There are many research solutions already existing for accident and Every day many men or woman do not come
preventing collision then also accident not possible to control it. out form home because of afraid of accident. There are
According to the vehicle to vehicle accident in this paper the many accidents which show very limited public notice.
proposed solution for controlling the vehicle to vehicle collision Here safety of vehicle to vehicle discussed in all existing
prevention. Not only that the information about the vehicle like research. But vehicle accident is not controlled due to
GPS location, traffic information, vehicle information and driver population. The safety is very important when we are
information also send to fog computing and then stored in cloud. travelling in any type of vehicle. Many people travelling
The cloud agent is stored incoming data into Hadoop database. in any vehicle thinking only about safety. Safety is playing
The sensor will be attached to all type of vehicle in all side based
on the vehicle to vehicle distance will be measured through
major role in all type of vehicle. The driver during driving
sensor and the data will be transmit to the Fog Computing and any vehicle must be aware of road safety. Day by day
then send to cloud agent. After that the cloud agents store all the accident is not possible to control due to high population.
information to the Hadoop database. The cloud agent playing The Internet of things is growing every year doubled.
major role between mobile app and Hadoop database. The cloud According to vehicle safety in this paper proposed the
agent analysis incoming data from the sensor and it will send the safety mobile application for driver and pedestrian safety.
message to driver mobile app. It is based on distance between Controlling the speed by driver is needed every time. The
two vehicles the mobile app produce the alarm. After the alarm use of smart phone day by day it is increasing like
driver can reduce the speed after that the vehicle will be population growing age. Traffic also consider for safety
controlled by the driver. The security is also very important for
data and protection of data based on elliptic curve cryptography
and driver. Due to traffic accident may occur or collisions
encryption and decryption with shorter key and also the data between vehicles to vehicles occur. GPS system is used for
processing can be very fast. Through mobile app all driver, traffic finding the vehicle in any place where it is present. Many
police, transport in charge and pedestrian can get information existing research scholar using this GPS concept. Recently
about the all type of vehicle information from the database. wireless sensor is playing major role in all the domain.
Separate login is provided for all type of user. Using wireless sensor in the vehicle we can avoid the
collision between vehicles to vehicle and also wireless
Keywords: Vehicles, Cloud, Big data, Smartphone, GPS, sensor used for faulty street light identification. After
Hadoop Database, Elliptic curve cryptography, Fog finding the faulty street light the message will be send to
computing, Encryption and Decryption.
the relevant authorities. There are many existing algorithm
used for vehicle safety and pedestrian. Cloud and wireless

978-1-5090-4799-4/16 $31.00 © 2017


978-1-5090-4799-4/17 2016 IEEE 273
274
275
DOI 10.1109/ICRTCCM.2017.32
sensor used for vehicle safety and also data center is used II RELATED WORK
for storing vehicle information. There are many existing
solution available for alert the driver in timely manner and In the literature review various types accident detection,
also finding the distance between two vehicle for vehicle prevention have been discussed. According to this new
communication and safety . The traffic safety is also very proposed model is proposed. Mehrdad Bagheri et al [1]
important for the safety of the vehicle. Central proposed about the safety mobile application for driver
Government and state government also taking many and pedestrian safety. It is wireless based communication
action against controlling the accident and vehicle to and also energy efficient methods for this model. It has
vehicle collision. In this proposed model we have taken been developed for vehicle and pedestrian collision
some example and according to that solution will be given. prevention system and also discussed about the cloud
analysis using geolocation city scale method. Pnar Boyraz
and John H. L. Hansen [2] investigated about the
improbability in steering wheel commands using the
drowsiness monitoring system and analyzed about the
side-slip angle, lateral controller and changing the
response in most stable areas. Sergio M et al [3] presented
about the driver protection application for mobile phone
Figure 1- vehicle to vehicle accident based on a caution Distribution protocol. They have
analyzed about the current location, route information and
Form the figure 1 the vehicle (bus) to vehicle (bus) road maps using navigation system. Now a days the
collision occur due to driver not possible to control the mobile based caution is very much useful for vehicle
speed or some other reason. Speed is the main reason for safety. Soufiene Djahel, et al [4] proposed about the
vehicle to vehicle collision occurs in real time. In our congestion in the traffic and discussed about the driver
proposed model giving solution for avoiding this type of lives. They have analyzed about the development of smart
accident. cities by avoiding traffic congestion and mitigation. In
cities the congestion of the vehicle will be very high. Essen
Joseph Leo et al [5] discussed about the vehicle using GPS
system. In that they have analyzed about the vehicle
information about the speed of the vehicle, direction of the
vehicle and type of the vehicle. The vehicle is most
important for moving one place to another place. Lijian
Xu, Member et al [6] investigated about the safety of
highway vehicle. They have used radar distance measure
sensor and wireless message channels for the safety
system and also analyzed about the control performance
Figure 2- come out from the road and communication resources relationship. Finally they
Figure 2 is example for vehicle come out form the road. have proposed the solution for vehicle safety problem.
This type of accident is very dangerous for people inside Victoria J. Hodge et al [7] presented about the wireless
the bus. There is many existing solution also available to sensor used in railway communications such as train
control this type of accident. But in our proposed model physical condition with several parameter of the train.
giving solution for all type of collision. They have analyzed about the wireless sensor with
identification of the sensor and wireless network
topologies. Huang-Chen Lee et al [8] discussed about the
street light faulty detection model. The faulty report will
be send to the relevant authorities to keep road safely.
They have added wireless senor network into street light
poles to produce the real time status report for the faulty
lights. Xinzhou Wu et al [9] proposed about prevent the
vehicle collision based on the vehicle and pedestrian
Figure 3 vehicle to vehicle collision algorithm. They have demonstrate different types of
Figure 3 is example for vehicle to vehicle collision occurs. pedestrian safety model and analyzed about the security.
There are many research based on road safety and vehicle Due to vehicle collision many people getting fear while in
safety still exist. But accident still occurs in road or any travelling in any vehicle. Safety is very important for the
vehicle to vehicle collision. Avoiding this type of accident pedestrian and vehicle collision should be avoided.
proposed model is giving complete solution. Ryangsoo Kim [10] investigated about the wireless access
point through cloud data center to vehicles with local data
storage. They have discussed about the wireless route
based data and they have used greedy algorithm and
algorithm for online learning with data center. Finally

276
275
274
discussed about the different types of vehicles. Jiun-Ren network. Peng Zenget et al [21] investigated about the
Lin et al [11] discussed about the blind zone alert system simple curved shape cryptanalysis and the hash
which monitor about the vehicle and alert to the driver in concatenation in wireless sensor system and also analyzed
a timely manner. The main benefit of this model is low about the built-in defect in the designing and incontestable
cost and 99% detection rate with 15% alarm will be falls about the enhanced novel access control protocol is
rate. The alert system is used many domain for security. assailable due to new node masquerade party onslaught
Xiaohuan Li et al [12] analyzed about the new design for and a court-ordered node masquerade party attack, in
the one-hop delay and multi-hop delay and average-hop misdemeanor of their condition assertion.
delay in vehicle to vehicle communication with many
factors like transmission range, density of the vehicle, III BIG DATA
distance of the propagation, length of the vehicle average
and minimum distance between vehicle safety. They have Big data is nothing but very large data stored in the
used genetic algorithm in real time vehicular. Yaser P. database. Examples are [22] discussed about the Hadoop
Fallah et al [13] proposed about the vehicle safety and big data flat database and [23] discussed about the green
broadcast of the vehicle state over a wireless local area metric of the big data and [24] discussed about the big data
network only with short range communication. They have analytics for the health condition monitoring model. The
analyzed about the two available control algorithms big data used for the many social networking like Google,
according to spatial fairness and time stability. Finally face book, Amazon, flibkart etc. these type of website
discussed about the fairness property achieved through storing millions of data, picture, video every seconds
power control system.Yi-Sheng Huang et al [14] discussed through internet or through in mobile app. Storing the very
about the model for the emergency vehicle system for large incoming data and processing the very big data is
traffic safety in the road ways. They have discussed about considered to be big data. For storing the data there are
the emergency vehicles should with no or less delay. many numbers of computer machines and many numbers
Finally they have been analyzed about the transition with of databases should be used. The Big data is analyzed with
time sequence. They have verified similarity of the the help of Map Reduce concept. It is taking and
proposed model. Paolo Braca et al [15] proposed about the processing the large data in across multiple computers, in
two dispersal model in which data are shared among the parallel. It consists of two parts. One is Map function is
wireless sensor consist of different parameter like local used for filtering and sorting, placing and taking data from
detection stage, contacts and track. The parameter are inside so that it can analyzed and second one is Reduce
playing major role in the sensor and discussed about the function used to display summary of this data and by
tacking model using sensor used in several domain. combining it all together. For analyzing big data Apache
Chunsheng Zhu1 et al [16] investigated about wireless Hadoop is used. Hadoop can be run in hardware and it is
sensor network and analyzed about time and precedence used for analysis in the cloud and making it easy to use an
based data transmittal and also discussed about the existing data center. Hadoop is divide into four pats. One
precedence based sleep programming algorithm to save is the Hadoop distributed file system, which is a
physical phenomenon. Chia-Mu Yu et al [17] discussed distributed system designed for very large aggregate
about the data privacy and data completeness issue and bandwidth and second one YARN is a stage for managing
also proposed VPAA for cloud through computer Hadoop's resources and the Hadoop infrastructure run
simulation and prototype execution. Finally proved that based on scheduling programs and third one Map Reduce
VPAA is energy businesslike and data private is effectual. is model for big data processing and fourth one is common
The privacy of the data is very important mostly in health set of libraries.
data. This type of cloud based analysis is very much useful
IV CLOUD COMPUTING AND FOG COMPUTING
for the domain. Dr.V.Vijayalakshmi et al [18] investigated
about the Track Clustering Sector and Hyper Simple Cloud is the combination of hardware and software
Curve Cryptanalysis and also implemented with less than available in anywhere. Fog computing is the combination
100 bit size, which is give the less memory storage and of cloud and internet of device. Anyone in the world can
more efficient. The less bit size is very much useful in fast get information in online without knowing the where the
encryption and decryption data in domain. Non data is available and without knowing the hardware and
Thiranantet et al [19] analyzed about the presentation software. All the software in cloud managed by
comparison between public security key cryptography and themselves. No need to worry about licenses for any
Simple security Curve Cryptography based on QR Code software or keeping them up to date. Example for cloud
Seal. The security is playing major role. The security is managed is a Google doc is helping for us to open any type
needed in all the application. Without security very of document in Gmail. No need to worry anything about
difficult to safe guard the especially military data, medical google doc. Managing software and hardware is very easy
data and vehicle information data. Ana H. Jokhio1 et al in cloud. Cloud is an on demand. It is based on
[20] investigated about the security for wireless sensor subscription basis or pay according to what u buy. So
network application and also discussed about the safety, buying cloud is similar to buy electricity, telephone
ability and low power in the network. They also discussed services and Internet access from any company. Cloud is
about the light Wight encryption and decryption in the the pay based series mostly Google cloud are pay services

277
276
275
and Public cloud is the web based services mostly all the VI APPROACHES BASED ON ELLIPTIC
services are free like Google email, docs etc and hybrid CURVE SECURITY
cloud is the combination of public or private. Cloud is
divided into three different types of cloud, where different Simple elliptic curve security is an open key encryption
types of services are being provided for all the people in and it is utilized to faster encryption and decryption. It
the world. One is Infrastructure as a service means buying generates keys from elliptic curve equation as they product
storage in online it consist set of hardware and software of very large prime number and it used small keys for
and second one is software as services means software encrypt and decrypt. It is proposed by Diffie-Hellman in
installed in cloud. Anyone can access software in the 1970. The benefit of ECC is used smaller keys it reduce
world that is stored in the cloud and third one is platform storage and transmission requirements. In this proposed
as a service means anyone can develop application using model mathematical object are used to encrypt with
web oriented tools. So it can run on hardware and software shorter keys and decrypt with shorter keys then those of
by another company. In our proposed system cloud agent public cryptography. The shorter keys produce faster
is used store the incoming data from wireless sensor and processing, less memory power and battery power will be
process the data according to vehicle to vehicle distance very long. In our proposed system related to previous
and send the alarm message to driver app. So that drive security we have used elliptic curve cryptography for
can reduce the speed after getting the alarm. encryption and decryption for all data and also used
shorter keys for encryption and decryption for less
processing time and energy efficient.
V SECURE END TO END SENSITIVE ENERGY
EFFICIENT PROTOCOL
VII INTRODUCTION TO SMARTPHONES
In this secure protocol the sensor will be sense the medium MOBILE APPLICATION
continuously in the network , the data it transmit only if
the value changes on soft threshold value and hard
threshold value and if the value is not sending the medium
it is forced to send the data in the network. It is used in tine
division access mechanism to send the data according to
the time slot.

5.1 Functioning Of SEESEEP

The bunch heads broadcasts the data in four ways. One is


the property it is a set of physical parametric quantity of
the data and second one is the beginning it is a parametric
quantity exist of a both hard threshold and a soft threshold
in a wireless sensor network protocol and third is the agent Figure 4 types of smart phone user
it is a tine division agenda, assignment a position to all
node reported time and fourth one is the total time taken In Recent years the mobile phone is playing major role in
for communication between one end to other end systems. all the people in the world. In any single home every one
having the mobile phone. Day by day the mobile phone
5.2 Main Features of the SEESEEP user is increasing due to population increasing day by day.
Due to that in smart mobile app is playing major role for
It combines both retroactive and activated policies in the all type of work. There are many production company is
sensor network and in this method user is allowed available like Lenovo, Motorola, Samsung, Panasonic,
according to count time and value based on property. The polo, etc. day by day the company also increasing. The
physical Phenomenon intake can be dynamical the number person is willing to buy mobile his or her own choices
of time as well as the first values and the Disadvantage of depend upon money and configuration. From figure 4 in
the network is required the number of time in the sensor our proposed model mobile app is developed for driver,
network. It is sensitive energy efficient because the traffic police, transport in charge, pedestrian and police.
sending of data through sensor is based hard threshold Here all type users can get the information with the
value and soft threshold value and also it process in less username and password the driver can get the vehicle
time and more efficient. distance between two vehicle and transport in charge can
get transport information like GSP location and driver
information and also the traffic police and police can get
traffic information about the vehicle. Table 1 shows the

278
277
276
VIII SEVEN LEVEL OF VEHICLE TO VEHICLE ACCIDENT COLLISION PREVENTION

Figure 5- Architecture diagram for six level of vehicle to vehicle collision prevention

In our proposed model form figure-5 seven level of vehicle to vehicle collision prevention and security for vehicle related
data are used here. First level is vehicle to vehicle distance will be measure using wireless sensor protocol and send to Fog
Computing device. Not only distance other parameter like GPS location, Vehicle information, driver information and People
information also send to Fog device. Second level is fog computing it is combination cloud and internet of device. It stores
the incoming data and send to cloud agent. Third level is cloud agent. It is used to store the incoming data to the Hadoop
database and process the incoming data and send alarm message to driver mobile app based on vehicle to vehicle distance and
also send information to all type of mobile user. Fourth level is Hadoop database and it stored and process the data using Map
Reduce. Fifth level is Mobile App. It is support for driver, traffic police, people, Transport in charge and station police. Sixth
level in security. In our proposed model we have used Elliptic curve security for encryption and decryption and also shorter
keys used for fast encryption and decryption. Seventh level is Wireless sensor protocol. Here Adaptive threshold sensitive
energy efficient protocol used for communication. This protocol fully based on soft threshold and hard threshold. Our
proposed model gives complete solution vehicle to vehicle collision prevention and also security for all related data.

IX COMPARISON BETWEEN EXISTING SOLUTION AND PROPOSED SOLUTION

Exiting solution Existing technology Proposed solution Proposed technology


¾
Mobile application for driver and pedestrian safety ¾Wireless Sensor, ¾ Wireless sensor network
¾
Mobile based caution distribution system ¾GPS system ¾
Vehicle to vehicle distance base collision with energy saving
¾
Vehicle to pedestrians safety ¾Google navigation method prevention using wireless sensor protocol.
¾
Vehicle information for security ¾Cloud data center ¾
Mobile application for driver pedestrians, ¾ Big data Hadoop database.
¾
Vehicle and driver alert system ¾Blind zone alert system transport in charge and traffic police ¾ Cloud agent.
¾
Wireless sensor used in light Wight protocol ¾Genetic algorithm ¾
GPS location ¾ Elliptic curve Security for
¾
Access control mechanism in wireless sensor ¾Wireless local area ¾
Driver information, vehicle information in data.
protocol mobile app
¾
Mapping big data concept
¾
Challenges of big data
¾
Big data used in health care.

Table 2-comparison model for proposed system

279
278
277
Table 2-comparison model for proposed system 6. Lijian Xu, Member, IEEE, Le Yi Wang, Fellow, IEEE, George Yin,
Explanation Fellow, IEEE, and Hongwei Zhang, Senior Member, IEEE Impact of
Communication Erasure Channels on the Safety of Highway Vehicle
Platoons IEEE Transactions On Intelligent Transportation Systems,
In this comparison model from table 2 we have analyzed vol. 16, no. 3, June 2015.
many reference according to that the gap available for 7. Victoria J. Hodge, Simon O’Keefe, Michael Weeks, and Anthony
vehicle safety and vehicle data security. The proposed Moulds ,”Wireless Sensor Networks for Condition Monitoring in the
Railway Industry: A Survey ”,IEEE Transactions On Intelligent
model gives the complete solution for vehicle to vehicle Transportation Systems, vol. 16, no. 3, June 2015.
collision prevention and online solution for all the vehicles 8. Huang-Chen Lee, Senior Member, IEEE, and Huang-Bin Huang ,”A
and vehicle data security. Through mobile app all type of Low-Cost and Noninvasive System for the Measurement and
user can get information like vehicle information, traffic Detection of Faulty Streetlights ”,IEEE Transactions On
Instrumentation And Measurement, vol. 64, no. 4, April 2015.
information, driver information, GPS location and vehicle 9. Xinzhou Wu‫ כ‬, Radovan Miucic† , Sichao Yang‫ כ‬, Samir Al-
to vehicle distance. Stouhi† , James Misener‫ כ‬, Sue Bai , and Wai-hoi Chan ,”Cars Talk
to Phones: A DSRC Based Vehicle-Pedestrian Safety System ”, 978-
X CONCLUSION 1-4799-4449-1/14/$31.00 ©2014 IEEE.
10. Ryangsoo Kim, Hyuk Lim, Member, IEEE, and Bhaskar
Krishnamachari, Member, IEEE, ”Prefetching-Based Data
In this proposed model big data, fog computing and cloud Dissemination in Vehicular Cloud Systems ”,IEEE Transactions On
concept is used for storing vehicle GSP location, traffic Vehicular Technology, vol. 65, no. 1, January 2016.
information, vehicle information, driver information, and 11. Jiun-Ren Lin, Student Member, IEEE, Timothy Talty, Senior
Member, IEEE, and Ozan K. Tonguz, Member, IEEE ,”A Blind Zone
distance of the vehicle. The proposed models give the Alert System Based on Intra-Vehicular Wireless Sensor Networks ”,
solution for vehicle to vehicle collision prevention with IEEE Transactions On Industrial Informatics, Vol. 11, No. 2, APRIL
wireless sensor and adaptive threshold sensitive energy 2015.
efficient protocol for communication. The wireless 12. Xiaohuan Li 1, 2 ‫خ‬, Bin-jie Hu 1, Hongbin Chen 2, Bing Li 1,
Huanglong Teng 1,3, Manman Cui ,”Multi-hop delay reduction for
protocol used for communication between wireless sensor
safety-related message broadcasting in vehicle-to-vehicle
and cloud agent. The elliptic curve cryptography used for communications ”, special Issue on Advances in Device-to-Device
encryption and decryption and also we have used shorter Communications and Networks.
keys of encryption and decryption all vehicle information. 13. Yaser P. Fallah, Neda Nasiriani, and Hariharan Krishnan, Member,
IEEE, ”Stable and Fair Power Control in Vehicle Safety Networks ”,
The shorter keys used here for less time encryption and
IEEE Transactions On Vehicular Technology, Vol. 65, No. 3, March
energy will be more. The wireless sensor measures the 2011.
distance between vehicle and vehicle and send the data to 14. Yi-Sheng Huang, Senior Member, IEEE, Yi-Shun Weng, and
fog computing and then send to cloud agent. The cloud MengChu Zhou, Fellow, IEEE ,”Design of Traffic Safety Control
Systems for Emergency Vehicle Preemption Using Timed Petri
agent process the incoming data and send the alarm
Nets ”,IEEE Transactions On Intelligent Transportation Systems,
message to driver smart phone app. The driver app in vol. 16, no. 4, August 2015.
smart phone based on vehicle to vehicle distance the alarm 15. Paolo Braca, Member, IEEE, Ryan Goldhahn, Gabriele Ferri,
will be ringing. After that based on alarm the driver can Member, IEEE, and Kevin D. LePage ,”Distributed Information
Fusion in Multistatic Sensor Networks for Underwater
reduce the speed of the vehicle and collision between
Surveillance ”, IEEE sensors journal, vol. 16, no. 11, June 1, 2016.
vehicle and vehicle can be avoided. The people will be 16. Chunsheng zhu1, (student member, ieee), zhengguo sheng1,
safe and accident can be avoided. (member, ieee), victor c. M. Leung1, (fellow, ieee), lei shu2,
(member, ieee), and laurence t. Yang3, (member, ieee). ”Toward
Offering More Useful Data Reliably to Mobile Cloud from Wireless
REFERENCE Sensor Network”. Volume 3, no. 1, march 2015.
17. Chia-Mu Yu, Chi-Yuan Chen, and Han-Chieh Chao, ”Verifiable,
1. Mehrdad Bagheri and Matti Siekkinen,Jukka K. Nurminen, ”Cloud- Privacy-Assured, and Accurate Signal Collection for Cloud-Assisted
Based Pedestrian Road-Safety with Situation-Adaptive Energy- Wireless Sensor Networks”. IEEE Communications Magazine •
Efficient Communication”, IEEE Intelligent transportation systems August 2015.
18. Dr.V.Vijayalakshmi.R.Sharmila R.Shalini, ”Hierarchical Key
magazine,2016. Management Scheme using Hyper Elliptic Curve Cryptography in
2. Pnar Boyraz, John H. L. Hansen,”Active Accident Avoidance Case Wireless Sensor Networks2015”, 3r International Conference on
Study: Integrating Drowsiness Monitoring System with Lateral Signal Processing, Communication andNetworking (ICSCN).
Control and Speed Regulation in Passenger Vehicles”, Proceedings 19. Non Thiranant*, Young Sil Lee*, HoonJae Lee, ”Performance
of the 2008 IEEE International Conference on Vehicular Electronics Comparison between RSA and Elliptic Curve Cryptography-based
and Safety Columbus, OH, USA. September 22-24, 2008. QR Code Authentication”, 2015 29th International Conference.
20. ana H. Jokhio1, Imran Ali Jokhio2, Andrew H. Kemp3,”Light-
3. Sergio M. Tornell, Carlos T. Calafate, Juan-Carlos Cano and Pietro weight framework for security-sensitive wireless sensor networks
Manzoni ,”Evaluating the feasibility of using smartphones for ITS applications”,ET Wirel. Sens. Syst., 2013, Vol. 3, Iss. 4, pp. 298–306.
safety applications ”,2013 IEEE. 21. Peng Zeng, Kim-Kwang Raymond Choo, and Da-Zhi Sun,”On the
4. Soufiene Djahel, Ronan Doolan, Gabriel-Miro Muntean, and John Security of an Enhanced Novel Access Control Protocol for Wireless
Murphy ,”A Communications-Oriented Perspective on Traffic Sensor Networks”, IEEE Transactions on Consumer Electronics,
Management Systems for Smart Cities: Challenges and Innovative Vol. 56, No. 2, May 2010.
Approaches ”,IEEE communication surveys & tutorials, vol. 17, no. 22. A. F. Rojas, n. Y. Gelvez, “Distributed processing using cosine
1, first quarter 2015. similarity for mapping Big Data in Hadoop”, IEEE Latin America
5. Essen Joseph Leo , R.Monisha ,B.T.Tharani Sri Sakthi , A. John Transactions, vol. 14, no. 6, June 2016.
Clement Sunder ,”Ehicle Movement Control And Accident 23. Jinsong Wu, Senior Member, IEEE, Song Guo, Senior Member,
Avoidance In Hilly Track ”,International Conference on Electronics IEEE, Jie Li, Senior Member, IEEE, and Deze Zeng, Member, IEEE,
and Communication System JCECS -2014. “Big Data Meet Green Challenges: Greening Big Data”, IEEE
systems journal, vol. 10, no. 3, September 2016.
24. Ping Jiang, Jonathan Winkley, Can Zhao, Robert Munnoch, Geyong
Min, and Laurence T. Yang, Member, IEEE, “An Intelligent
Information Forwarder for Healthcare Big Data Systems With
Distributed Wearable Sensors”, IEEE systems journal, vol. 10, no.
3, September 2016.

280
279
278

You might also like