Smart Bicycle Sharing System for Non-Commercial Purposes using Time-based One-Time Password Algorithm

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Bicycle sharing systems have been accepted openly by the public. Many developed countries prepared some kind of bicycle sharing system in order to advocate exercising and promotes healthy living. Nevertheless, these systems are usually for commercial purposes and required the user to pay some amount of money to use the service. This paper discusses regarding smart bicycle sharing system designed for non-commercial use, such as in universities, schools, or small villages where the bicycle sharing service are to be given out to users without a fee. At the same time, the whereabouts and availability of the bicycles should be managed carefully in order to avoid losing the bicycles. Several one-time password algorithms have been studied and the most suitable algorithm has been used to generate a 6-digit code in order to unlock bicycles from its bicycle stations. The system is designed to be as easy to use as possible, and with an acceptable amount of security.

     

     


  • Keywords


    Bicycle Sharing; One Time Password; Security; Embedded Programming; Information Systems.

  • References


      [1] Shaheen, S., & Guzman, S. (2011). Worldwide bikesharing. ACCESS Magazine, 1(39), 22-27.

      [2] DeMaio, P., & Gifford, J. (2004). Will smart bikes succeed as public transportation in the United States? Journal of Public Transportation, 7(2), 1-15.

      [3] Gadepalli, S., Kost, C., & Schroeder, B. (2012). Public cycle sharing systems: A planning toolkit for Indian cities. https://3gozaa3xxbpb499ejp30lxc8-wpengine.netdna-ssl.com/wp-content/uploads/2014/07/Public_cycle_sharing_toolkit_ITDP_121204.pdf.

      [4] Scott, M. https://www.criticalcycles.com/blogs/blog/16490364-the-pros-and- cons-of-bike-sharing.

      [5] Lee, S. J., Lee, J. S., Lee, M. K., Lee, S. J., Choi, D. H., & Kim, D. K. (2011). Low‐power design of hardware one‐time password generators for card‐type OTPs. ETRI Journal, 33(4), 611-620.

      [6] Kalaikavitha, E., & Gnanaselvi, J. (2013). Secure login using encrypted one time password (OTP) and mobile based login methodology. International Journal of Engineering and Science, 2(10), 14-17.

      [7] Hoornaert, F., Naccache, D., Bellare, M., & Ranen, O. (2005). HOTP: An HMAC-based one-time password algorithm. https://tools.ietf.org/html/rfc4226.

      [8] Tokula, U. I., & Esiefarienrhe, B. M. (2015). Design and implementation of a two-factor, one time password authentication system. International Journal of Computer and Organization Trends, 5(6), 1-4.

      [9] Ren, X., Wu, X. W., & Tang, K. (2012). TSPass: A dynamic user authentication scheme based on time and space. International Journal of Computer Science and Network Security, 12(10), 45-53.


 

View

Download

Article ID: 23436
 
DOI: 10.14419/ijet.v7i3.28.23436




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.