The potential use of smart cards in vehicle management with particular reference to the situation in Western Australia

Vehicle management may be considered to consist of traflic managcml.!nt, usage control, maintenance, and security. Various regulatory authorities undertake the first aspect, fleet managers will be concerned with all aspects, and owner~drivcrs will· be intere~ted mainly in maintenance and security. Car theft poses a universal security problem. Personalisation, including navigational assistance, might be achieved as a by-product of an improved management system. Authorities and fleet managers may find smartcards to be key components of an improved system, but owners may feel that the need for improved security does not justify its cost. This thesis seeks to determine whether smartcards may be used to personalise vehicles in order to improve vehicle management within a forseeable time and suggest when it might happen. In the process four broad questions are addressed. • First, what improvements in technology are needed to make any improved scheme using smartcards practicable, and what can be expected in the near future? • Second, what problems and difficulties may impede the development of improved management? • Third, what non-vehicle applications might create an environment in which a viable scheme could emerge? • Finally, is there a perceived need for improved vehicle management? The method involved a literature search, the issue of questionnaires to ownerdrivers and fleet managers, discussions with fleet managers, the preparation of data-flow and state diagrams, and the construction of a simulation of a Ill

[1]  Viiveke Fåk,et al.  Computer verification of human users' identity: A theoretical model and some evaluation criteria , 1991, Comput. Secur..

[2]  D. J. Clark,et al.  Results of the Cambridge experiment in congestion management , 1994 .

[3]  J.-J. Quisquater,et al.  SCALPS: Smart card for limited payment systems , 1996, IEEE Micro.

[4]  David M'Raïhi,et al.  Cryptographic smart cards , 1996, IEEE Micro.

[5]  Ching Y. Suen,et al.  A fast parallel algorithm for thinning digital patterns , 1984, CACM.

[6]  Jason Reid,et al.  Making Sense of Smart Card Security Certifications , 2000, CARDIS.

[7]  Joseph P. Campbell,et al.  Update on the US Government's Biometric Consortium , 1997 .

[8]  Suzanne Stevens,et al.  To Russia with love. , 1997, CDS review.

[9]  D. M. Weber,et al.  A cost effective fingerprint verification algorithm for commercial applications , 1992, Proceedings of the 1992 South African Symposium on Communications and Signal Processing.

[10]  Ernst Bovelander,et al.  Smartcards and biometrics: an overview☆ , 1995 .

[11]  Ware Myers On Trial at the Summer Olympic Games: Smart Cards , 1996, Computer.

[12]  R. K. Jurgen The electronic motorist , 1995 .

[13]  S. W. Redfern A radar based mass movement sensor for automotive security applications , 1993 .

[14]  Jose M. Oton,et al.  Smart cards , 1994 .

[15]  Ron Morris,et al.  Integrated Circuit Cards , 1999 .

[16]  Jerome Svigals Smart cards: The ultimate personal computer , 1985 .

[17]  C Devery,et al.  Patterns of motor vehicle theft , 1993 .

[18]  Andreas Crede,et al.  Electronic Commerce and the Banking Industry: The Requirement and Opportunities for New Payment Systems Using the Internet , 2006, J. Comput. Mediat. Commun..

[19]  Josep Domingo-Ferrer,et al.  A Performance Comparison of Java Cards for Micropayment Implementation , 2000, CARDIS.

[20]  Dave Andrews,et al.  PCs catch criminals using fingerprint analysis , 1993 .

[21]  Benjamin Arazi Vehicular implementations of public key cryptographic techniques , 1991 .

[22]  Dave Sims,et al.  Decriminalizing the fingerprint , 1994, IEEE Computer Graphics and Applications.

[23]  Hyun-jung Kim Biometrics, is it a viable proposition for identity authentication and access control? , 1995, Comput. Secur..

[24]  Anil K. Jain,et al.  Adaptive flow orientation-based feature extraction in fingerprint images , 1995, Pattern Recognit..

[25]  Ying Shan,et al.  Fingerprint preclassification using key-points , 1994, Proceedings of ICSIPNN '94. International Conference on Speech, Image Processing and Neural Networks.

[26]  C. H. Kuo,et al.  A topology-based matching algorithm for fingerprint authentication , 1991, Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology.

[27]  Ying Sun,et al.  Hybrid optical/digital access control using fingerprint identification , 1995 .

[28]  M. Kamijo Classifying fingerprint images using neural network: deriving the classification state , 1993, IEEE International Conference on Neural Networks.

[29]  M. Higgs Smartcards-the key to unlocking revenue growth , 1996 .

[30]  C. H. Fancher In your pocket: smartcards , 1997 .

[31]  P. Wallich How to steal millions in chump change. , 1999, Scientific American.