Smart Bicycle Sharing System for Non-Commercial Purposes using Time-based One-Time Password Algorithm

  • Authors

    • Husna Humaira Abu Backer Sidek
    • Azrul Amri Jamal
    • Mokhairi Makhtar
    • Syed Abdullah Fadzli
    https://doi.org/10.14419/ijet.v7i3.28.23436
  • Bicycle Sharing, One Time Password, Security, Embedded Programming, Information Systems.
  • Bicycle sharing systems have been accepted openly by the public. Many developed countries prepared some kind of bicycle sharing system in order to advocate exercising and promotes healthy living. Nevertheless, these systems are usually for commercial purposes and required the user to pay some amount of money to use the service. This paper discusses regarding smart bicycle sharing system designed for non-commercial use, such as in universities, schools, or small villages where the bicycle sharing service are to be given out to users without a fee. At the same time, the whereabouts and availability of the bicycles should be managed carefully in order to avoid losing the bicycles. Several one-time password algorithms have been studied and the most suitable algorithm has been used to generate a 6-digit code in order to unlock bicycles from its bicycle stations. The system is designed to be as easy to use as possible, and with an acceptable amount of security.

     

     

  • References

    1. [1] Shaheen, S., & Guzman, S. (2011). Worldwide bikesharing. ACCESS Magazine, 1(39), 22-27.

      [2] DeMaio, P., & Gifford, J. (2004). Will smart bikes succeed as public transportation in the United States? Journal of Public Transportation, 7(2), 1-15.

      [3] Gadepalli, S., Kost, C., & Schroeder, B. (2012). Public cycle sharing systems: A planning toolkit for Indian cities. https://3gozaa3xxbpb499ejp30lxc8-wpengine.netdna-ssl.com/wp-content/uploads/2014/07/Public_cycle_sharing_toolkit_ITDP_121204.pdf.

      [4] Scott, M. https://www.criticalcycles.com/blogs/blog/16490364-the-pros-and- cons-of-bike-sharing.

      [5] Lee, S. J., Lee, J. S., Lee, M. K., Lee, S. J., Choi, D. H., & Kim, D. K. (2011). Lowâ€power design of hardware oneâ€time password generators for cardâ€type OTPs. ETRI Journal, 33(4), 611-620.

      [6] Kalaikavitha, E., & Gnanaselvi, J. (2013). Secure login using encrypted one time password (OTP) and mobile based login methodology. International Journal of Engineering and Science, 2(10), 14-17.

      [7] Hoornaert, F., Naccache, D., Bellare, M., & Ranen, O. (2005). HOTP: An HMAC-based one-time password algorithm. https://tools.ietf.org/html/rfc4226.

      [8] Tokula, U. I., & Esiefarienrhe, B. M. (2015). Design and implementation of a two-factor, one time password authentication system. International Journal of Computer and Organization Trends, 5(6), 1-4.

      [9] Ren, X., Wu, X. W., & Tang, K. (2012). TSPass: A dynamic user authentication scheme based on time and space. International Journal of Computer Science and Network Security, 12(10), 45-53.

  • Downloads

  • How to Cite

    Humaira Abu Backer Sidek, H., Amri Jamal, A., Makhtar, M., & Abdullah Fadzli, S. (2018). Smart Bicycle Sharing System for Non-Commercial Purposes using Time-based One-Time Password Algorithm. International Journal of Engineering & Technology, 7(3.28), 275-277. https://doi.org/10.14419/ijet.v7i3.28.23436