Advertisement

Car Hailing and Ridesharing

  • Dietmar P. F. Möller
  • Roland E. Haas
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

This chapter is about car hailing and ridesharing. Section 9.1 introduces car hailing and ridesharing as a promising approach for reducing own car usage in a city cutting down the needed parking spaces, reducing traffic jams, and for the city as a whole helping to reduce pollution. Section 9.2 discusses online transportation network companies offering cab services/car hailing and ride-hailing which provide cab services through their respective apps for smartphones (see also Chap.  7). Section 9.3 focuses on the metropolitan area of Bangalore as an example of ridehailing and ridesharing operations with regard to cab types and prices as well as services offered. Section 9.4 describes surge pricing mechanisms taking into account peak hours where cab aggregators charge two or three times more. In Sect. 9.5 the problem of safety and initiatives to increase safety are discussed to prevent crime and increase the safety both for the customers as well as for the drivers. In this regard, Sect. 9.5.3 refers to crime incidents in ridesharing, while Sect. 9.5.4 introduces government policies for ridesharing companies and Sect. 9.5.5 presents important legal cases. Section 9.6 refers to fraud, cyberattacks, and cybersecurity in ridesharing (see also Chap.  6). Section 9.7 finally wraps up within a conclusion, while Sect. 9.8 contains a comprehensive set of questions on the carsharing business model, and the last Section 9.9 includes references and suggestions for further reading.

References and Further Reading

  1. (Abraham et al. 2016) Abraham, B., Brugger, D., Strehlke, S., Runge, W.: Autonomous driving only a trojan horse of digital companies? (in German). ATZ elektronik, 01/2016Google Scholar
  2. (Agarwal 2016a) Agarwal, S.: Bike service UberMOTO to debut in Bengaluru today; fares as low as Rs 3/km. Economic Times India online. March 3rd 2016. Available from: http://economictimes.indiatimes.com/articleshow/51231622.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst Google Scholar
  3. (Agarwal 2016b) Agarwal, M.: Uber Claims to Surpass Ola in Number of Rides; Globally Positions India as Number 2 Market after US. Inc42 online. October 5th 2016. Available from: https://inc42.com/buzz/uber-surpass-ola/
  4. (Alan and Brem 2013) Alan, T., Brem, A.: A conceptualized investment model of crowdfunding. In: Venture Capital, Vol. 15, No. 4, pp. 335–359, 2013Google Scholar
  5. (Alheeti et al. 2015) Alheeti, K. M. A., Gruebler, A., McDonald-Maier, K. D.: An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars. In: 6th International Conference on Emerging Security Technologies (EST), pp. 86–91, 2015Google Scholar
  6. (Amey 2010) Amey, A. M.: Real-Time Ridesharing – Exploring the Opportunities and Challenges of Designing a Technology-based Rideshare Trial for the MIT Community. Master Thesis Massachusetts Institute of Technology (MIT), MA, USA, 2010Google Scholar
  7. (Argus 2017) Argus Cybersecurity – Protecting Cars, Trucks and Commercial Vehicles from Hacking – an Overview. Argus Cyber Security. Available from: https://argus-sec.com/car-hacking/
  8. (Badger 2014) Badger, E.: Taxi Medallions have been the Best Investment in America for Years – Now Uber may me changing that. In: Wonkblog, Washington Post, 2014Google Scholar
  9. (Barro 2014) Barro, J.: Under pressure from Uber, taxi medallion prices are plummeting. In: The New York Times, 2014Google Scholar
  10. (Bay 2016) Bay, L.: Carsharing and Ridesharing in Germany – They Growing up so Fast. Wirtschaftswoche online. March 26th 2016. Available from: https://www.wiwo.de/unternehmen/industrie/carsharing-und-ridesharing-in-deutschland-sie-werden-so-schnell-gross/13368794.html
  11. (Berger 2015) Berger, R.: Total Cost of Car Ownership over its Lifetime. The Dough Roller. April 22nd 2015. Available from: http://www.doughroller.net/smart-spending/true-cost-of-a-car-over-its-lifetime/
  12. (Cahn and Shaheen 2012) Chan, N. D., Shaheen, S. A.: Ridesharing in North America: Past, Present, and Future.Transport Reviews, Vol. 32, No. 1, pp. 93–112, 2012Google Scholar
  13. (Eckl-Dorna 2016) Eckl-Dorna, W.: VW puts millions in car ridehailing – This is how gett VW’s new app investment works. Manager Magazin online. May 25th 2016. Available from: http://www.manager-magazin.de/unternehmen/autoindustrie/taxi-vermittlungsdienst-gett-so-funktioniert-vws-neues-investment-a-1094141.html
  14. (Fallstrand and Lindstrom 2015) Fallstrand, D., Lindstrom, V.: Automotive IDPS: Applicability analysis of intrusion detection and prevention in automotive systems. Available: http://publications.lib.chalmers.se/records/fulltext/219075/219075.pdf
  15. (Freitag et al. 2015) Freitag, M., Maier, A., Palan, D.: Apple, Google, Facebook, Uber American Hybris, Manager Magazin online. April 28th 2015. Available from: http://www.manager-magazin.de/magazin/artikel/apple-google-facebook-uber-groessenwahn-im-silicon-valley-a-1030869.html
  16. (Haykin 2009) Haykin, S.: Neural Networks and Learning Machines. 3rd edition. Pearson Education, 2009Google Scholar
  17. (Hirn 2016) Hirn, W.: Car Rental Services in China – Didi vs. Uber – The billion Dollar battles of the Chinese cousins (in German). Manager Magazin online. July 27th 2016. Availbale from: http://www.managermagazin.de/finanzen/artikel/a-1105011.html
  18. (Kirsch 2016) Kirsch, S.: Mobile Payment – How Chinese establish Mobile Mayment in Germany (in German). Wirtschaftswoche online. August 2nd 2016. Available from: https://www.wiwo.de/finanzen/geldanlage/mobiles-bezahlen-wie-chinesen-mobiles-bezahlen-in-deutschland-etablieren/v_detail_tab_print/13937126.html
  19. (Koch 2017) Koch, L: Greyball – Uber used s. ecret software (in German). Zeit online. March 4th 2017. Available from: http://www.zeit.de/digital/2017-03/greyball-uber-software-kontrollen-polizisten-umgehung
  20. (IET 2015) Automotive CyberSecurity: An IET/KTN Thought Leadership Review of riskperspectives for connected vehicles. IET. Available from: http://www.theiet.org/sectors/transport/documents/automotive-cs.cfm
  21. (Isaac and Perlroth 2015) Isaac, M. and Perlroth, N.: Uber Hires Two Engineers Who Showed Cars Could be Hacked. The New York Times online. August 28th 2015. Available from: https://www.nytimes.com/2015/08/29/technology/uberhires-two-engineers-who-showed-cars-could-be-hacked.html?mcubz=0
  22. (Intel 2015) Intel Security White Paper Automotive Security Best Practice. Intel/Mcafee. June 2016. Available from: https://www.mcafee.com/enterprise/en-us/assets/white-papers/wp-automotive-security.pdf
  23. (Kashyap 2016) Kashyap, K.: It’s Uber Vs. Ola For The Battle Of Supremacy. In: The Indian Market. Forbes online. September 21st 2016. Available from: https://www.forbes.com/sites/krnkashyap/2016/09/21/its-uber-vs-ola-for-the-battleof-supremacy-in-the-indian-market/#6ffe5799d99f
  24. (La Vinh and Cavalli 2014) La Vinh, H., Cavalli, A. R.: Security attacks and solutions in vehicular ad hoc networks: a survey. International Journal on Ad Hoc Networking Systems (IJANS), Vol 4, No. 16, pp. 1–20, 2014.Google Scholar
  25. (Lobe 2016) Lobe, A.: Hacker Alert – In a modern car today are computers and info systems that are easy to manipulate. How do the manufacturers deal with the security gap? (in German). Zeit online. August 25th 2016. Available from: http://www.zeit.de/2016/34/elektroautos-steuerung-hacker-gefahr-sicherheit-hersteller
  26. (Mahaffey 2015a) Mahaffey, K.: The New Assembly Line: 3 Best Practices for Building (secure) Connected Cars. Lookout Blog. August 6th 2015. Available from: https://blog.lookout.com/tesla-research
  27. (Mahaffey 2015b) Mahaffey, K.: Here Is How To Address Car Hacking Threats. TechCrunch. September 13th 2015. Available from: https://techcrunch.com/2015/09/12/to-protect-cars-from-cyber-attacks-a-call-for-action/
  28. (Markey 2015) Markey, E.J.: Tracking and Hacking: Security and Privacy Gaps Put American Drivers at Risk. 2015. Available from: https://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf
  29. (McMillan 2011) McMillan, R.: With Hacking, Music Can Take Control of Your Car. PCWorld online. March 11th 2011. Avaliable from: https://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/
  30. (Miller and Valasek 2014) Miller C., Valasek C.: A Survey of Remote Automotive Attack Surfaces. IOActive 2014. Available from: https://www.ioactive.com/pdfs/IOActive_Remote_Attack_Surfaces.pdf
  31. (Poulsen 2010) Poulsen, K.: Hacker disables more than 100 cars remotely. Wired online. March 17th 2010. Available from: www.wired.com/threatlevel/2010/03/hacker-bricks-cars
  32. (Ravindran et al. 2016) Ravindran, D., Hanisha, N., Punati, S.: Safety in Ride Sharing. Class Paper, Car IT and Cybersecurity, International Institute of Information Technology Bangalore (IIIT-B), May 2016Google Scholar
  33. (Sahithi et al. 2016) Sahiti, A., Ramya Reddy, D., Vedavyas, M.: OLA vs Uber. Report: Car IT and Cybersecurity, International Institute of Information Technology Bangalore (IIIT-B), May 2016Google Scholar
  34. (Schlesiger 2016) Schlesiger, C.: Flixbus – The creepy triumphal mach of the startup. Wirtschaftswoche online. October 17th 2016. Available from: http://www.wiwo.de/unternehmen/dienstleister/flixbus-der-unheimliche-siegeszug-desstart-ups/v_detail_tab_print/14680498.html
  35. (Schultz 2016) Schultz, M.: Billion loss at Uber – The evil of button-press capitalism (in German). Spiegel online. August 26th 2016. Available from: http://www.spiegel.de/forum/wirtschaft/milliardenverlust-bei-uber-das-uebel-desknopfdruck-kapitalismus-thread-505569-1.html
  36. (Spehr 2016) Spehr, M.: Internet connection in the Audi A4, Behind the steering wheel, Google shows the world (in German), FAZ online. August 18th 2016. Available from: http://www.faz.net/aktuell/technik-motor/motor/kommunikationstechnik-des-audi-a4-im-test-14387527/der-audi-a4-kommt-mit-14390627.html
  37. (Scarfone and Mell 2007) Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS) NIST. February 20th 2007. Available from: https://www.nist.gov/publications/guide-intrusion-detection-and-prevention-systems-idps
  38. (Sana 2016) Sana, S.: Ola, Uber Operating Taxis illegally in City, Delhi Government Tells HC. The Times of India. April 24th 2016. Available from: http://timesofindia.indiatimes.com/city/delhi/Ola-Uber-operating-taxis-illegally-in-city-Delhigovernment-tells-HC/articleshow/51962298.cms
  39. (Schorsch 2016) Legislative Deal between Ridesharing Companies and Taxis Dies – Florida Politics. Florida Politics. March 11th 2016. Available from: http://floridapolitics.com/archives/204373-sources-legislative-deal-reachedridesharing-companies-taxis
  40. (Serio and Wollschläger 2015) Serio, G., Wollschläger, D.: Networked Automotive Defense Strategies in the Fight Against Cyber Attacks (in German). ATZ elektronik, 06/2015Google Scholar
  41. (Sivaram 2016) Sivaraman, S.: Explaining Ola and Uber’s Surge Pricing. The Hindu online. September 11th 2016. Available from: http://www.thehindu.com/news/national/explaining-ola-and-ubers-surge-pricing/article8494839.ece
  42. (Solon 2015) Solon, O.: From Car-Jacking to Car-Hacking: How Vehicles Became Targets For Cybercriminals. Bloomberg online. August 4th 2015. Available from: https://www.bloomberg.com/news/articles/2015-08-04/hackers-force-carmakers-to-boost-security-for-driverless-era
  43. (Stewart 2016) Stewart, J.: As Tesla grows up, it gives up on free charging. Wired online. July 11th 2016. Available from: https://www.wired.com/2016/11/tesla-grows-gives-free-charging/
  44. (Symantec 2015) Symantec IoT Team – Building Comprehensive Security Into Cars. Technical Report. Symantec. 2015. Available from: https://www.symantec.com/content/dam/symantec/docs/white-papers/building-comprehensive-security-into-cars-en.pdf
  45. (Vembo 2016) Vembo, D.: Connected Cars – Architecture, Challenges and Way Forward. Whitepaper Sasken Communication Technologies Pvt. Ltd. 2016. Available from: https://www.sasken.com/sites/default/files/files/white_paper/Sasken-Whitepaper-Connected%20Cars%20Challenges.pdf
  46. (Vestlund 2009) Vestlund, C.: Intrusion Detection Systems in Networked Embedded Systems. Linköping University. Available from: https://pdfs.semanticscholar.org/10f9/455dde5674de051ae065f358b922cf8bec0f.pdf
  47. (Vikas 2016) Vikas, S. N.: Ola relaunches Outstation Taxi Service in Delhi and Jaipur. ETtech online. May 11th 2016. Available from: http://tech.economictimes.indiatimes.com/news/mobile/ola-outstation-taxi-service/52201260
  48. (Wolfsthal and Serio 2015) Wolfsthal, Y., Serio, G.: Made in IBM Labs: Solution for Detecting Cyber Intrusion to Connected Vehicles, Part I. IBM. September 9th 2015. Available from: https://securityintelligence.com/made-in-ibm-labs-solution-for-detecting-cyber-intrusions-to-connected-vehicles-part-i/
  49. (Zetter 2015) Zetter, K.: Researchers Hacked A Model S, But Tesla’s Already Released A Patch. Wired online. August 6th 2015. Available from: https://www.wired.com/2015/08/researchers-hacked-model-s-teslas-already/

Links

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Dietmar P. F. Möller
    • 1
  • Roland E. Haas
    • 2
  1. 1.Clausthal University of TechnologyClausthal-ZellerfeldGermany
  2. 2.QSO TechnologiesBangaloreIndia

Personalised recommendations