International Journal of Information Engineering and Electronic Business(IJIEEB)
ISSN: 2074-9023 (Print), ISSN: 2074-9031 (Online)
Published By: MECS Press
IJIEEB Vol.4, No.3, Jul. 2012
Application of Biometric Security in Agent based Hotel Booking System - Android Environment
Full Text (PDF, 1037KB), PP.64-75
The process of finding the finest hotel in central location is time consuming, information overload and overwhelming and in some cases poses a security risk to the client. Some of the more advanced web sites allow for a search of the destination via a map for example hotelguidge.com and jamaica.hotels.hu. Booking of hotels is secured by the standard Secure Sockets Layer (SSL) to confirm the identity of a website or server, encrypt data during transmission, and ensure the integrity of transmitted data. Even with this in place, hackers have broken the Secure Sockets Layer (SSL) by targeting weaknesses in the MD5 algorithm.
Recently good amount of work been carried in the use of Intelligent agents towards hotel search on J2ME based mobile handset which still has some weakness. So taking the weakness in the current agent based system, smart software agents been developed that overcomes the weakness in the previous system In addition to smart agent based system been developed and published elsewhere, we here propose to extend the system with the booking capability that allows the user to book a hotel of choice where the authenticity of the client may be determined securely using biometric security and information transmitted using Secure Sockets Layer (SSL) (Server-Gated Cryptography (SGC)) on the internet which is novel and unique. This will be facilitated on Android 2.2-enabled mobile phone using JADE-LEAP Agent development kit.
Cite This Paper
Wayne Lawrence,Suresh Sankaranarayanan,"Application of Biometric Security in Agent based Hotel Booking System - Android Environment", IJIEEB, vol.4, no.3, pp.64-75, 2012.
Baleleng, T (2011). Hotel Reservation Techniques Retrieved from http://artificialintelligenceseo.info/2011/09/hotel-reservation-techniques
Baloch, H (1999). Online Intelligent Hotel Reservation (IHR) using WAP Enable Mobile Phones. Retrieved from http://www.pardis.ir/articles/pdf/p06139.pdf
SSLGUARD (2010). Server-Gated Cryptography .Retrieved from http://www.sslguard.com/datasheets/Thawte-sgc.pdf
SearchSecurity (2001). MD5. Retrieved from http://searchsecurity.techtarget.com/definition/MD5
Bailey, L S and Suresh, S(2009). Intelligent Agent based Mobile Tour Planner. Proceedings of First Caribbean Conference on Information and Communication Technology, Kingston, Jamaica. Pp 8-13.
McTavish, C A and Suresh, S (2010). Intelligent Agent based Hotel Search & Booking System. Proceedings of 2010 IEEE International conference on Electro/Information Technology, Chicago, USA, May 20-22, 2010.pp.331-336
Lawrence, W (2011). Application of Agents in Hotel Search and Secured Booking System. M.sc computer Science Dissertation, Department of Computing, University of WestIndies, Jamaica
Lawrence, W and Suresh, S (2012)" Smart Agent Learning Hotel Search System- Android Environment", Accepted in International Journal of Information Technology and Computer Science , MECS Publishers.
Ding et al, (2003), "On Programming Information Agent Systems - An Integrated Hotel Reservation Service as Case Study". Proceedings of First German Conference on Multiagent System Technologies, MATES 2003, Erfurt, Germany.
Gobin, B A and Subramanian R K (2007). Knowledge Modeling for a Hotel Recommendation System, World Academy of Science, Engineering and Technology, Vol.25. pp 244-248.
Franklin, S. and Graesser, A. (1996). Is it an Agent, or just a Program? A Taxonomy for Autonomous Agents. Retrieved from http://www.msci.memphis.edu/~franklin/AgentProg.html
Jennings, N. R., and Wooldridge, M. (1998). Applications of Intelligent Agents. Retrieved from http://agents.umbc.edu/introduction/jennings98.pdf
Poole et al. (1998). Computational Intelligence. New York: Oxford University
Reilly, D. (1998). Mobile Agents - Process migration and its implications. Retrieved from http://www.davidreilly.com/topics/software_agents/mobile-agents
Naraine, R (2008). SSL broken! Hackers create rogue CA certificate using MD5 collisions. Retrieved from http://www.zdnet.com/blog/security/ssl-broken-hackers-create-rogue-ca-certificate-using-md5-collisions/2339
Russell, K (2005). "QuickStudy: Biometric authentication." Computer World. Retrieved from http://www.computerworld.com/s/article/print/100772/Biometric_Authentication?taxonomyName=Security&taxonomyId=17
Kumar, D and Ryu, Y (2009). A Brief Introduction of Biometrics and Fingerprint Payment Technology Retrieved from http://www.sersc.org/journals/IJAST/vol4/4.pdf
Motorola (2011). Answers – Fingerprint Smart Sensor Retrieved from http://motorola-global-portal.custhelp.com
Lynn, T (2006). Citibank S'pore launches biometric payment service. Retrieved from http://www.zdnetasia.com/citibank-spore-launches-biometric-payment-service_print-61965886.htm
Ziemba, J (2004). Credit Card Processing: Biometrics Retrieved from http://business.lovetoknow.com/wiki/Credit_Card_Processing:_Biometrics
Bocoum, M. (1999). Acceptance Threshold's Adaptability in Fingerprint-Based Authentication Methods. Master of Science Thesis, School of Computer Science, McGill University, Montreal, Canada.
VeriSign (2011a). Beginner's Guide to Digital SSL Certificates. Retrieved fromhttp://www.verisign.com/ssl/ssl-information-center/ssl- resources/guide-ssl-beginner.pdf
VeriSign (2011b). Secure Sockets Layer (SSL): How It Works. Retrieved from https://www.verisign.com/ssl/ssl- information-center/how-ssl- security-works/index.html
VeriSign (2011c). SGC: True 128-Bit SSL Encryption Retrieved from http://www.verisign.com/ssl/sslinformation center/strongest-ssl-encryption/
Microsoft (2007). Microsoft SQL Server 2008 Top New Features. Retrieved from www.microsoft.com/sqlserver/en/us/editions.aspx
Google (2011). What is Android. Retrieved from http://code.google.com/android/what-is-android.html
Bellifemine, F et al (2006). Developing Multi-Agent Systems with JADE. Wiley Publishing