Skip to main content

2017 | OriginalPaper | Buchkapitel

A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment

verfasst von : Sang-Hyeon Park, Jeong-Ho Kim, Moon-Seog Jun

Erschienen in: Advances in Computer Science and Ubiquitous Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Car sharing services have become a new form of public transport after the financial crisis as consumers’ perceptions changed and their consciousness about environmental preservation and smart phone penetration increased. Countries overseas have already seen these services catch on with many users. In Korea, too, a pilot operation started in 2013 and now car sharing services boast about 200,000 members. Although the market evolved with many users, the security part is lagging behind. To rent a car, you only need to log in and you can use a smart key to open the car door and drive it. Since the simple ID/PW authentication method has many issues, a stronger authentication is needed to offer reliable services.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adam, M.-B.: Car-Sharing: where and how it succeeds, vol. 108. Transportation Research Board (2005) Adam, M.-B.: Car-Sharing: where and how it succeeds, vol. 108. Transportation Research Board (2005)
2.
Zurück zum Zitat Meijkamp, R.: Changing consumer behaviour through eco-efficient services: an empirical study of car sharing in the Netherlands. Business Strategy Environ. 7(4), 234–244 (1998)CrossRef Meijkamp, R.: Changing consumer behaviour through eco-efficient services: an empirical study of car sharing in the Netherlands. Business Strategy Environ. 7(4), 234–244 (1998)CrossRef
3.
4.
Zurück zum Zitat Chang, C.-C., Wu, T.-C.: Remote password authentication with smart cards. IEEE Proc. Comput. Digital Tech. 138(3), 165–168 (1991)CrossRef Chang, C.-C., Wu, T.-C.: Remote password authentication with smart cards. IEEE Proc. Comput. Digital Tech. 138(3), 165–168 (1991)CrossRef
5.
Zurück zum Zitat Hwang, M.-S.: A remote password authentication scheme based on the digital signature method. Intl. J. Comput. Math. 70(4), 657–666 (1999)MathSciNetCrossRefMATH Hwang, M.-S.: A remote password authentication scheme based on the digital signature method. Intl. J. Comput. Math. 70(4), 657–666 (1999)MathSciNetCrossRefMATH
6.
Zurück zum Zitat Hwang, M.-S., Lee, C.-C., Tang, Y.-L.: An improvement of SPLICE/AS in WIDE against guessing attack. Informatica 12(2), 297–302 (2001)MathSciNetMATH Hwang, M.-S., Lee, C.-C., Tang, Y.-L.: An improvement of SPLICE/AS in WIDE against guessing attack. Informatica 12(2), 297–302 (2001)MathSciNetMATH
7.
Zurück zum Zitat Wang, G., Bao, F.: Cryptanalysis of timestamp-based password authentication schemes using smart cards. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 399–409. Springer, Heidelberg (2006). doi:10.1007/11935308_28 CrossRef Wang, G., Bao, F.: Cryptanalysis of timestamp-based password authentication schemes using smart cards. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 399–409. Springer, Heidelberg (2006). doi:10.​1007/​11935308_​28 CrossRef
8.
Zurück zum Zitat Kim, et al. Tele biometrics-based authentication technologies non-face-to-face Standardization. Inf. Secur. J. 25(4), 43–50 (2015) Kim, et al. Tele biometrics-based authentication technologies non-face-to-face Standardization. Inf. Secur. J. 25(4), 43–50 (2015)
9.
Zurück zum Zitat Cassone, J.: Personal biometric authentication and authorization device. U.S. Patent No. 6,983,882. 10 Jan 2006 Cassone, J.: Personal biometric authentication and authorization device. U.S. Patent No. 6,983,882. 10 Jan 2006
10.
Zurück zum Zitat Liu, S., Mark, S.: A practical guide to biometric security technology. IT Professional 3(1), 27–32 (2001)CrossRef Liu, S., Mark, S.: A practical guide to biometric security technology. IT Professional 3(1), 27–32 (2001)CrossRef
Metadaten
Titel
A Design of Secure Authentication Method with Bio-Information in the Car Sharing Environment
verfasst von
Sang-Hyeon Park
Jeong-Ho Kim
Moon-Seog Jun
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3023-9_33

Neuer Inhalt