Application of Biometric Security in Agent based Hotel Booking System - Android Environment

Full Text (PDF, 1037KB), PP.64-75

Views: 0 Downloads: 0

Author(s)

Wayne Lawrence 1,* Suresh Sankaranarayanan 2,3

1. Mona Institute of Applied Sciences, University of WestIndies, Jamaica

2. Computing & Information Systems, Institut Teknologi Brunei, Brunei

3. Department of Computing, University of WestIndies, Jamaica

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2012.03.08

Received: 20 Apr. 2012 / Revised: 12 May 2012 / Accepted: 10 Jun. 2012 / Published: 8 Jul. 2012

Index Terms

Agents, SSL, MD5, JADE-LEAP, Android

Abstract

The process of finding the finest hotel in central location is time consuming, information overload and overwhelming and in some cases poses a security risk to the client. Some of the more advanced web sites allow for a search of the destination via a map for example hotelguidge.com and jamaica.hotels.hu. Booking of hotels is secured by the standard Secure Sockets Layer (SSL) to confirm the identity of a website or server, encrypt data during transmission, and ensure the integrity of transmitted data. Even with this in place, hackers have broken the Secure Sockets Layer (SSL) by targeting weaknesses in the MD5 algorithm.
Recently good amount of work been carried in the use of Intelligent agents towards hotel search on J2ME based mobile handset which still has some weakness. So taking the weakness in the current agent based system, smart software agents been developed that overcomes the weakness in the previous system In addition to smart agent based system been developed and published elsewhere, we here propose to extend the system with the booking capability that allows the user to book a hotel of choice where the authenticity of the client may be determined securely using biometric security and information transmitted using Secure Sockets Layer (SSL) (Server-Gated Cryptography (SGC)) on the internet which is novel and unique. This will be facilitated on Android 2.2-enabled mobile phone using JADE-LEAP Agent development kit.

Cite This Paper

Wayne Lawrence, Suresh Sankaranarayanan, "Application of Biometric Security in Agent based Hotel Booking System - Android Environment", International Journal of Information Engineering and Electronic Business(IJIEEB), vol.4, no.3, pp.64-75, 2012. DOI:10.5815/ijieeb.2012.03.08

Reference

[1]Baleleng, T (2011). Hotel Reservation Techniques Retrieved from http://artificialintelligenceseo.info/2011/09/hotel-reservation-techniques

[2]Baloch, H (1999). Online Intelligent Hotel Reservation (IHR) using WAP Enable Mobile Phones. Retrieved from http://www.pardis.ir/articles/pdf/p06139.pdf

[3]SSLGUARD (2010). Server-Gated Cryptography .Retrieved from http://www.sslguard.com/datasheets/Thawte-sgc.pdf

[4]SearchSecurity (2001). MD5. Retrieved from http://searchsecurity.techtarget.com/definition/MD5

[5]Bailey, L S and Suresh, S(2009). Intelligent Agent based Mobile Tour Planner. Proceedings of First Caribbean Conference on Information and Communication Technology, Kingston, Jamaica. Pp 8-13.

[6]McTavish, C A and Suresh, S (2010). Intelligent Agent based Hotel Search & Booking System. Proceedings of 2010 IEEE International conference on Electro/Information Technology, Chicago, USA, May 20-22, 2010.pp.331-336 

[7]Lawrence, W (2011). Application of Agents in Hotel Search and Secured Booking System. M.sc computer Science Dissertation, Department of Computing, University of WestIndies, Jamaica

[8]Lawrence, W and Suresh, S (2012)" Smart Agent Learning Hotel Search System- Android Environment", Accepted in International Journal of Information Technology and Computer Science , MECS Publishers.

[9]Ding et al, (2003), "On Programming Information Agent Systems - An Integrated Hotel Reservation Service as Case Study". Proceedings of First German Conference on Multiagent System Technologies, MATES 2003, Erfurt, Germany.

[10]Gobin, B A and Subramanian R K (2007). Knowledge Modeling for a Hotel Recommendation System, World Academy of Science, Engineering and Technology, Vol.25. pp 244-248.

[11]Franklin, S. and Graesser, A. (1996). Is it an Agent, or just a Program? A Taxonomy for Autonomous Agents. Retrieved from http://www.msci.memphis.edu/~franklin/AgentProg.html

[12]Jennings, N. R., and Wooldridge, M. (1998). Applications of Intelligent Agents. Retrieved from http://agents.umbc.edu/introduction/jennings98.pdf

[13]Poole et al. (1998). Computational Intelligence. New York: Oxford University

[14]Reilly, D. (1998). Mobile Agents - Process migration and its implications. Retrieved from http://www.davidreilly.com/topics/software_agents/mobile-agents

[15]Naraine, R (2008). SSL broken! Hackers create rogue CA certificate using MD5 collisions. Retrieved from http://www.zdnet.com/blog/security/ssl-broken-hackers-create-rogue-ca-certificate-using-md5-collisions/2339

[16]Russell, K (2005). "QuickStudy: Biometric authentication." Computer World. Retrieved from http://www.computerworld.com/s/article/print/100772/Biometric_Authentication?taxonomyName=Security&taxonomyId=17

[17]Kumar, D and Ryu, Y (2009). A Brief Introduction of Biometrics and Fingerprint Payment Technology Retrieved from http://www.sersc.org/journals/IJAST/vol4/4.pdf

[18]Motorola (2011). Answers – Fingerprint Smart Sensor Retrieved from http://motorola-global-portal.custhelp.com

[19]Lynn, T (2006). Citibank S'pore launches biometric payment service. Retrieved from http://www.zdnetasia.com/citibank-spore-launches-biometric-payment-service_print-61965886.htm

[20]Ziemba, J (2004). Credit Card Processing: Biometrics Retrieved from http://business.lovetoknow.com/wiki/Credit_Card_Processing:_Biometrics

[21]Bocoum, M. (1999). Acceptance Threshold's Adaptability in Fingerprint-Based Authentication Methods. Master of Science Thesis, School of Computer Science, McGill University, Montreal, Canada.

[22]VeriSign (2011a). Beginner's Guide to Digital SSL Certificates. Retrieved fromhttp://www.verisign.com/ssl/ssl-information-center/ssl- resources/guide-ssl-beginner.pdf

[23]VeriSign (2011b). Secure Sockets Layer (SSL): How It Works. Retrieved from https://www.verisign.com/ssl/ssl- information-center/how-ssl- security-works/index.html

[24]VeriSign (2011c). SGC: True 128-Bit SSL Encryption Retrieved from http://www.verisign.com/ssl/sslinformation center/strongest-ssl-encryption/

[25]Microsoft (2007). Microsoft SQL Server 2008 Top New Features. Retrieved from www.microsoft.com/sqlserver/en/us/editions.aspx

[26]Google (2011). What is Android. Retrieved from http://code.google.com/android/what-is-android.html

[27]Bellifemine, F et al (2006). Developing Multi-Agent Systems with JADE. Wiley Publishing