Skip to main content

A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing (UCAWSN 2016, CUTE 2016, CSA 2016)

Abstract

Car sharing services have become a new form of public transport after the financial crisis as consumers’ perceptions changed and their consciousness about environmental preservation and smart phone penetration increased. Countries overseas have already seen these services catch on with many users. In Korea, too, a pilot operation started in 2013 and now car sharing services boast about 200,000 members. Although the market evolved with many users, the security part is lagging behind. To rent a car, you only need to log in and you can use a smart key to open the car door and drive it. Since the simple ID/PW authentication method has many issues, a stronger authentication is needed to offer reliable services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adam, M.-B.: Car-Sharing: where and how it succeeds, vol. 108. Transportation Research Board (2005)

    Google Scholar 

  2. Meijkamp, R.: Changing consumer behaviour through eco-efficient services: an empirical study of car sharing in the Netherlands. Business Strategy Environ. 7(4), 234–244 (1998)

    Article  Google Scholar 

  3. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  4. Chang, C.-C., Wu, T.-C.: Remote password authentication with smart cards. IEEE Proc. Comput. Digital Tech. 138(3), 165–168 (1991)

    Article  Google Scholar 

  5. Hwang, M.-S.: A remote password authentication scheme based on the digital signature method. Intl. J. Comput. Math. 70(4), 657–666 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  6. Hwang, M.-S., Lee, C.-C., Tang, Y.-L.: An improvement of SPLICE/AS in WIDE against guessing attack. Informatica 12(2), 297–302 (2001)

    MathSciNet  MATH  Google Scholar 

  7. Wang, G., Bao, F.: Cryptanalysis of timestamp-based password authentication schemes using smart cards. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 399–409. Springer, Heidelberg (2006). doi:10.1007/11935308_28

    Chapter  Google Scholar 

  8. Kim, et al. Tele biometrics-based authentication technologies non-face-to-face Standardization. Inf. Secur. J. 25(4), 43–50 (2015)

    Google Scholar 

  9. Cassone, J.: Personal biometric authentication and authorization device. U.S. Patent No. 6,983,882. 10 Jan 2006

    Google Scholar 

  10. Liu, S., Mark, S.: A practical guide to biometric security technology. IT Professional 3(1), 27–32 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moon-Seog Jun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Park, SH., Kim, JH., Jun, MS. (2017). A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment. In: Park, J., Pan, Y., Yi, G., Loia, V. (eds) Advances in Computer Science and Ubiquitous Computing. UCAWSN CUTE CSA 2016 2016 2016. Lecture Notes in Electrical Engineering, vol 421. Springer, Singapore. https://doi.org/10.1007/978-981-10-3023-9_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3023-9_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3022-2

  • Online ISBN: 978-981-10-3023-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics