Data Spread among Vehicular Networks with Minimal Cost and Privacy

ABSTRACT


INTRODUCTION
In environment, different way of transportation evolves to satisfy people to travel one place to other with variety of choice. Some cases, malfunction of vehicles leads disappearance from the current route [1]. Drones are developed for search and rescue mission where the man couldn't step on fields, the drone can easily fly over there and capture surrounding and sends that to the base station [2].
Between the diffusion, connection is important to spread data from one area to other without any interference and data loss. At the same time privacy need to be a vital role where no other users should interfere and modify [3]. Those data packets sent from thedrones are forwarded to base station where the service providers send those to the end users with the help of routers [4][5].
Most of them lead data to a shortest base station to reduce time delay and cost wise of network where congestion is more due to increase of packets on the same channel with Underwater vehicle for surveillance with navigation and swarm network communication [6]. Even though we all solve this issue of data interference, the attacker may interfere and convert those into malicious which interacts false information among end users. Privacy proceedings are major issue to securely spread data on router with protocols that manages attackers on way and forward it to the routers to change the path of data diffusion of Enhancement of fuel consumption and efficiency of the vehicles, International Journal of Mechanical Engineering and Technology [7]. To increase the accuracy of forecast data at the base station is the main approach; therefore coding schemes based relative difference was proposed [8].

PROPOSED WORK
In proposed work, implementation of VAN router increase efficiency of data spread from one city to other with the help of service provider as well as logger where the malicious user enters the premises as shown in figure 1.

Service Provider
Service providers receive data packets from the drone and via base station. They choose the file need to be transmit and select city where the file to be forwarded. Assign router path where the service provider need to enter the router address of the end user to prevent data from un-authorized users.

Van Router
VAN router plays a vital role in this method, where it assigns the cost for the path and finds shortest path to forward the packets without any data loss. Here, we implemented honeypots to analyze the tricks of the malicious user from which node, they trying to attack. Finally, the details of the attacker is analyzed and sent to logger where it checks the node details and swap the path from the attacked node.

Malicious User
Malicious user enters the network and attack the node which carries data packets and modifies it without any knowledge to both the service provider and router.

Logger
Logger is a kind of tracking device which checks the entry of malicious user on the attacking node and intimates it back to the router to change the path of data spread. Here, the service provider can check the details of the attacker on what time on which node they tried to attack. It will be useful to further update of protocols to securely carry data packets from one station to other city without any data loss.

End User
End user have only one option where they can receive file, view files and store it on a location which is convenient for them. Intimation is send back to the service provider that they got the packets and received successfully.  Figure 2 & 3 shows the result of our proposed system concludes the efficiency of data spread via VAN router reduced time delay and data loss of packets during data diffusion through Service provider select city and end user router address and attacker process.

CONCLUSION
Hereby, our proposed system concludes the efficiency of data spread via VAN router reduced time delay and data loss of packets during data diffusion. Interference of data packets is avoided with the help of honeypots discovering malicious users while diffusion as well logger helps to identify on which node the data has been attacked. The method of logger improvises privacy among data.