Secure Hajj Permission Based on Identifiable Pilgrim’s Information

Full Text (PDF, 358KB), PP.67-76

Views: 0 Downloads: 0

Author(s)

Ebtehal Alsaggaf 1,* Omar Batarfi 1 Nahla Aljojo 1 Carl Adams 2

1. Faculty of Computing and Information Technology, King Abdul Aziz University, P.O. Box, 80200, Jeddah, 21589, KSA

2. School of Computing , University of Portsmouth, Portsmouth, UK, Buckingham Building, Lion Terrace, Portsmouth PO1 3HE

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2015.05.10

Received: 2 Aug. 2014 / Revised: 16 Dec. 2014 / Accepted: 20 Jan. 2015 / Published: 8 Apr. 2015

Index Terms

Biometric, Cryptosystem, Hajj permission, IWPH, RFID Wristband

Abstract

Event management of large international events is attracting interest from researchers, not least due to the potential use of technology to provide support throughout the different stages of the event. Some events, such as major sports or religious events, can involve millions of people from different countries, and require active management to control access (e.g. many popular events can be oversubscribed) and to reduce risks for the participants, local communities and environment. This paper explores the context of a large event - the Hajj pilgrims in Saudi Arabia - which involves up to three million pilgrims, many of whom are international. The paper presents a novel identification system - the Identification Wristband Hajj Permission (IWHP) - which uses encryption technologies and biometric attributes to identify pilgrims, whilst remaining sensitive to the context of the Hajj. The suggested solution has many attributes of relevance that could support its use in other large-crowd events.

Cite This Paper

Ebtehal Alsaggaf, Omar Batarfi, Nahla Aljojo, Carl Adams, "Secure Hajj Permission Based on Identifiable Pilgrim’s Information", International Journal of Information Technology and Computer Science(IJITCS), vol.7, no.5, pp.67-76, 2015. DOI:10.5815/ijitcs.2015.05.10

Reference

[1]Goldblatt, J. : The roots and wings of celebration (5th ed.). John Wiley & Sons (2007). 

[2]Horne, J., & Manzenreiter, W. : Sports mega-events: social scientific analyses of a global phenomenon. Sociological Review, 54 (Suppl. 2), 1-187 (2006).

[3]Bahurmoz, A. M. : A strategic model for safety during the Hajj pilgrimage: an ANP application. Journal of Systems Science and Systems Engineering, 15(2), 201-216 (2006).

[4]Li, S. : Large Sporting Events and Economic Growth: Evidence from Economic Consequences of Event Infrastructure and Venues. Event Management, 17(4), 425-438 (2013).

[5]Economist. : Why would anyone want to host the Olympics?. Retrieved 12/04/2014, from http://www.economist.com/blogs/economist-explains/2013/09/economist-explains-0 (2013)

[6]Goldblatt, J. J. : Twenty-first century global event management (3rd ed.). Wiley (2002).

[7]Bowdin, G., Allen, J., O'Toole, W., Harris, R., & McDonnell, I. : Events management (3rd ed.). Routledge (2010).

[8]Memish, Z. A., Stephens, G. M., Steffen, R., & Ahmed, Q. A.: Emergence of medicine for mass gatherings: lessons from the Hajj. The Lancet infectious diseases, 12(1), 56-65 (2012).

[9]Yamin, M., & Ades, Y.: Crowd management with RFID and wireless technologies. Paper presented at the First International Conference on Networks and Communications, 2009. NETCOM'09 (2009).

[10]Tarlow, P. E. : Event risk management and safety. John Wiley & Sons (2002).

[11]ITV. : India to host the largest religious event in the world. Retrieved 12/04/2014, from http://www.itv.com/news/2013-01-13/india-to-host-the-largest-religious-event-in-the-world/ (2013)

[12]Ministry of Hajj. : Instructions Regulating Agreements Between Hajj Missions and the Ministry (2010).

[13]Eid, R.: Towards high-quality religious tourism marketing: the case of hajj service in Saudi Arabia. Tourism Analysis, 17(4), 509-522 (2012).

[14]Silvers, J. R., Bowdin, G. A., O'Toole, W. J., & Nelson, K. B. : Towards an international event management body of knowledge (EMBOK). Event Management, 9(4), 185-198 (2005).

[15]Henderson, J. C.: Religious tourism and its management: The hajj in Saudi Arabia. International Journal of Tourism Research, 13(6), 541-552 (2011).

[16]Jafari, J., & Scott, N. : Muslim world and its tourisms. Annals of Tourism Research, 44, 1–19 (2014).

[17]Mantoro, T., Jaafar, A. D., Aris, M. F. M., & Ayu, M.: Hajj locator: A hajj pilgrimage tracking framework in crowded ubiquitous environment. Paper presented at the International Conference on Multimedia Computing and Systems (ICMCS), (2011).

[18]Yamin, M.: A Framework For Improved Hajj Management And Research. Paper presented at the International Conference on Wireless Communications and Sensor Networks (2006).

[19]Tareeb News. : Find 554 Hajj permit forged 350 of them in the Asian campaign. Retrieved 12/04/2014, from http://www.tareebnews.com/news.php?action=show&id=13552 (2014)

[20]Symantec. : National PKI: The Foundation of Trust in Government Programs. White Paper (2011).

[21]Binsalleeh, H., Mohammed, N., Sandhu, P. S., Aljumah, F., & Fung, B. C. M.: Using RFID tags t12/04/2014,o improve pilgrimage management. Paper presented at the International Conference on Innovations in Information Technology, IIT'09 (2009).

[22]Mohandes, M .: An RFID-based pilgrim identification system (a pilot study). Paper presented at the 11th International Conference on Optimization of Electrical and Electronic Equipment, OPTIM 2008 (2008).

[23]Ravi, K. S., Aziz, M. A., & Ramana, B. V. : Pilgrims Tracking and Identification Using RFID Technology. Advances in Electrical Engineering Systems, 1(2), 96-105 (2012).

[24]Alliance Smart Card.: Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems: Smart Card Alliance (2002).

[25]Liu, S., & Silverman, M. : A practical guide to biometric security technology. IT Professional, 3(1), 27-32 (2001).

[26]TCMCORE. : Transport and Crowd Management workshop,Center of Research Excellence in Hajj and Omrah ,Park Hyatt Resort - Jeddah, Saudi Arabia (2010).

[27]Al-Khouri, A. M.: PKI in Government Digital Identity Management Systems. European Journal of ePractice, 4, 4-21 (2012).

[28]Bella, G., Bistarelli, S., & Martinelli, F.: Biometrics to enhance smartcard security. Paper presented at the Security Protocols (2005).

[29]Watts, J., Yu, H., & Yuan, X.: Case study: Using smart cards with pki to implement data access control for health information systems. Paper presented at Proceedings of the IEEE SoutheastCon (SoutheastCon), (2010).

[30]DI Management. : RSA Algorithm. Retrieved 9/04/2014 from http://www.di-mgt.com.au/rsa_alg.html (2002)

[31]Vacca, J. R.: Public Key Infrastructure: Building Trusted Applications and Web Services: CRC Press (2004).

[32]Weise, J.: Public key infrastructure overview. Sun Blue Prints OnLine, August (2001).

[33]Shan, L.: The PKI authentication system with the integration of biometric identification and non symmetric key technology'. Paper presented at the International Symposium on Web Information Systems and Applications (WISA'09) (2009).

[34]RSA Data Security: Understanding Public Key Infrastructure (PKI). White Paper (1999).

[35]MacGregor, W., Mehta, K., Cooper, D., & Scarfone, K.: Information Security. (2008).

[36]Mohandes, M. : A Case Study of an RFID-based System for Pilgrims Identification and Tracking. Sustainable Radio Frequency Identification Solutions, InTech, 87-104 (2010).

[37]PRLog. : RFID Wristband and Bracelet Selections. Retrieved 10/04/2014 from http://www.prlog.org/10281756-rfid-wristband-and-bracelet-selections.html (2009).

[38]Beigel, M., Mosher, W., Tuttle, J., & Wang, D.: Wearable identification appliance that communicates with a wireless communications network such as bluetooth. Google Patents (2003).

[39]RSA Laboratories. : RSA Laboratories' Frequently Asked Questions about Today's Cryptography, What is a hash function? Version 4.1, Retrieved 9/04/2014 from http://www.rsasecurity.com/rsalabs/faq/2-1-6.html (2000)

[40]Silva, J. E. : An Overview of Cryptographic Hash Functions and Their Uses. GIAC Security Essentials Practica (2003).

[41]Isode.: Federated Identity, Distributed PKI and Smart Cards (2007).

[42]NCDC. : National Centre for Digital Certification, Retrieved 9/04/2014 from http://www.ncdc.gov.sa/en/ (2013)

[43]Kwon, T., & Moon, H.: Biometric authentication for border control applications. Knowledge and Data Engineering, IEEE Transactions on, 20(8), 1091-1096 (2008).