E Voting
E Voting
E Voting
Subhasish Banerjee(co-author)
Department of Computer Science and Engineering
National Institute of Technology
Arunachal Pradesh, India
[email protected]
AbstractIndia being the largest democracy in the world, Now the voting mechanisms have evolved from leaps and
elections forms the cornerstone of our country. Amongst the bounds of simple hand written ballots to online voting
prominent leaders, a representative is being chosen to run the systems. The proposed design, also have the sui generis
country and to seek and search for the public affairs, pieces of feature of being autonomous during the operational mode,
legislation and constitutional amendments. The onerous task is which helps to diminish and eradicate the issues of hacking
to maintain transparency in the electoral process and shield the
that happened in cases of traditional voting systems and also
integrity of elections to make it equitable and withstand any
fraudulence. Rampage free elections is one of the critical issues has an eagle eye view on the privacy constraint which
in todays state of affairs which is like finding needle in a directly conflicts with the capability to audit the data aptly.
haystack, that needs an eye and lots of money is being spent to
ensure that the elections are fair and unprejudiced. Privacy is In this proposed design, the viability study of the emerging
also important to make elections equitable to prevent voter technology NFC, in conjunction with biometric is done. The
coercion, intimidation and ballot selling. But nowadays it is seen design, suggests the use of a promising technology, i.e. NFC
that, many unwanted forces are indulged in bogus voting and cards for the identification purpose of the voters, which is a
recently also been criticized for election irregularities, that short range radio communication wireless technology, in the
leads to ambiguity between the polling results and the actual
first tier of security level. This technology allows
verdict given by the people. Classical poll-site voting methods
along with many other computer based voting system poise communication between the NFC card and the device
several administrative and logistic challenges in terms of cost, equipped with the reader when they are brought together
voter misinterpretation and tally of votes. This paper proposes within less than five centimeters apart in a very secured and
a new state-of-the-art Electronic Voting Machine design in reliable manner, which ebbed the complicacy and preventing
quest for election legitimacy, to provide an inexpensive solution from the malicious attacks or frauds. NFC is a finely honed
which is based on pragmatic biometric system using fingerprint version of HF-RFID, operating at the frequency of 13.56
detection along with inclusion of Near- Far Communication MHz and transmission of data rate is 424Kbits/sec [1]. Peer-
technology. to-peer communication and auto-coupling are the feature that
sets NFC apart and it also enables slick and intuitive
Key-words: Bio-metric, Electronic Voting Machine,
communication between device and tags. NFC tag store the
Fingerprint, Near-Far Communication.
voters details like name, age, gender and location which are
I. INTRODUCTION used to authenticate, before they cast their votes. The user
places the NFC tag near the device reader, than it scans the
Elections are the fundamental defining characteristics of any
tag and verifies the details with the back-end system. One of
democracy that upholds the very meaning of a system that is
the noteworthy features of NFC is its ingrained guaranteed
being governed by the people expressing their choices or
security, as the transmission of data is initiated by bringing
articulate opinions in the form of voting. The traditional
two devices in proximity range of each other, separating
electoral process vacillates around tallying manually, which
devices over a range limit will terminate the communication.
is time consuming and complicated and more erroneous and
The range of NFC is so short that if any hacker device comes
prone to fraudulency.
in the vicinity, it will be clearly recognized. Once the user is
verified, the person can proceed to the next level of
978-1-4673-6725-7/16/$31.00 2016 IEEE
biometric authentication. To make the system more stringent Application i.e. the first ever mobile technology that
and robust, another layer of security is reinforced through the acknowledged the fingerprint authentication, although still
use of biometric fingerprint identification as every individual believes on biometrics [6][9][15].
has unique fingerprints. Biometrics is the science and
technology that deals with analyzing the biological III. HURDLES OF TRADITIONAL AND EXISTING VOTING
information or data. Biometric logistics operates by SYSTEM
procuring fingerprints from an individual, then decoction of To foster voter enrolment, during 2014 General Elections in
a feature set from the acquired data, and comparing this India, ECI constantly endeavors and motivates to participate
feature set with reference to the template set stored in the by appealing the sense of citizenship. SVEEP campaign has
database[13][14]. Using fingerprint matching is very reliable been started in co-operation with NGOs. The ECI also
and popular biometric technique in personal identification augmented the provision of voting slips and cross-checked
process as it generates solemnity while stressing on building for any malevolent tendencies. Despite of all this efforts,
or cultivating voter confidence. Common challenges during sustaining interest and motivation in a growing populace
capturing of unreadable fingerprints are False Acceptance seems to be a herculean task, especially when voter cynicism
Rates (FAR), where an invalid fingerprint is accepted crawls in. The people criticize ECI for everything from the
because of subterfuge or error and another exception is False code of conduct, to partisanship to inaction after poll
Rejection Ratio (FRR) where a valid fingerprint gets violation. The people want the election to be placid and
rejected. So this should be mediated in order to make it more devoid of any tumult. Due to a result of rampant corruption
accurate. To maintain the transparency of the system, in the in the elections, the people have been raising questioning
third tier of security level -each time a user casts his vote, a eyebrows about it and the general expression has prevailed
tweet will be generated that the specified user has submitted that the democratic system has proved to be a boon only to a
his/her vote and the total no of vote count increases to handful of people having capital. The success of elections
prevent from illegal voting (rigging). The proposed design largely depends on enlightened masses, honest citizens. The
VOT-EL looks into the multiple dimensions to endure the common people relapse into political indolence after the
expectations of the voters for a secured, reliable and elections are over. On Jan 28, 2015, in Chhattisgarh
efficacious voting system. Panchayat polls, 50% of the candidates elected unopposed in
Rebel dominated Bastar. The rebels looted ballot boxes from
II. RELATED WORK around 30 booths. Before in India, conventional voting
India with 834 million registered voters, voting through systems used paper-based ballots for voting, this procedure
electronic means is obligatory. India accomplishes the regrettably allowed coercion, where individuals have to
electoral process using over 0.923 million polling stations queue up to enroll themselves before they cast their votes
along with the EVMs [5] [7].The EVMs which were [2][3]. The traditional voting process was divided into
introduced protruded many computational hurdles and off- different phases
grid challenges such as power constraint, usability and 1) User Authentication: In this part, the person authenticates
access control. Apparently the youth participation is ebbing himself and is verified by the presiding officer at the polling
in elections than other demographic age groups so the site. After verification, the officer provides a ballot paper to
Election Commission needs to advance the EVMs and to set cast the vote.
solutions for all security related threats as new digital 2) Voting: The user casts his vote, puts into the ballot box
technology is hitting the world with thunderbolt speed. It is where all the votes are kept together.
believed that our design will foster youth participation with 3) Vote Tally: As the post poll procedure, the presiding
the e-voting asserting for a democracy to command respect it officer collects the ballot boxes and submits to the center.
must operate in the same way as people are performing Votes are counted and the results are declared.
routine tasks in their lives, and e-voting fits this criteria. 4) Verification: Various cross-checking mechanisms are
Other measures to augment vote count in local government implied in case of frauds.
Gujarat made voting mandatory and are also attempting to 5) Publication of Results: Finally the polling results are
indulge SMS as well as internet based web portal voting [5]. declared after the above steps are completed successfully.
The cognizance of NOTA (None of the above) is an epitome
of innovation that permitted the voters in India the option to As the populace is so high, such a large exercise became
participate while abnegating all candidates (Electoral unwieldy to supervise. This leads to the progression of
Commission of India, 2013) [8] [12] [16]. voting with the introduction of lever machines, punch
cards which protruded new obstacles such as logistics,
A procedure to almost eradicate voter deception through breakdown of device, acquiring technical skills while
malicious tendencies is the reinforcement of biometrics. A discarding transparency [10] [12]. This signaled the advent
study by NCSA (National Cyber Security Alliance) of EVM, to contextualize the challenges and beneficially
revealed that using of biometrics parameters provided more introduce speed, automatic ballot tally, and strained voter
security and reliability as this phrase is indeed used your monitoring, resolve any voting violation. The idea was
body is the new password. Roger hacked the Apple 5S mooted by Chief Election Commissioner in late 1970s in
collaboration with two government com mpanies- ECIL explicit manner, in the diagram beelow the main blocks of the
(Electronics Corporation of India) and BEL (Bharat project is discussed. Followed byy the flowchart of VOT-EL
Electronics Limited). in a nutshell.
IV. ARCHITECTURE OF THE PROPOSED
D SYSTEM
Once the voter cast his vote, he wont be aallowed to vote FIGURE 1 : BLOCK- DIAGRAM OF THE PROPOSED SYSTEM
again and if multiple votes are tried by the saame person this
will be reported to the screen. The fingerpriint of the voter
will be taken by the scanner and is beinng sent to the
microcontroller. The processed image of thee fingerprint is
transferred to match with the sample tem mplates in the
database. If the persons identity matches, hhe can cast his
vote in real time only once, choosing the caandidate as per
choice and if invalid user, then the buzzer willl be raised and
a message will be displayed as unauthorized uuser.
PRIVACY
e> 16*2 LCD Display
The LCD display is connected to thee 80C51 micro- USABILITY
controller, and microcontroller providdes the data will (Any
be shown in the display. demographic
age group)
ECONOMIC
Indelible ink Cost
C is too
and papers high
h
required. So
high cost
ENCAPSULA
FIGURE 3 : BLOCK- DIAGRAM OF THE REGULLATED POWER TION
SUPPLY
SPOOFING
g> Piezo Electric Buzzer
DISPLAY Stamps on paper Touch
T screen Web Based
The piezo buzzer generates sound baased on reverse OUTPUT beside the with
w GUI Portal
of piezo-electric effect. The underlyiing principle is preferred in
nterface
the production of pressure or sstrain by the candidate
application of electric potential acrosss a piezoelectric
material. Here, the buzzer is used as aan alert for any
AUDITING The
T tally is
invalid credentials or unauthorised useer. TRAIL Manual The EVM is
done
d in a
digital
d connected to
procedure. the internet to REFERENCES
But EVMs provide a 3-tier [1] K. Ok, V. Coskun, M. N. Aydin, Usability of Mobile Voting with
are still prone voting system. NFC Technology, Proceedings of the Publications IASTED ,
to software Innsbruck, Austria, 16-18 February 2010, pp- 151-158
mal- [2] S. Wolchok, Hari K. Prasad, Rop Gonggrijp, Security Analysis of
functioning Indias Electronic Voting Machines, CCS10, October 4-8, 2010,
Chicago, Illinois, USA.
[3] R. Gonggrijp and W.-J. Hengeveld. Studying the Nedap/Groenendaal
VIII. ADVANTAGES AND FUTURE APPLICATIONS Es3B voting computer: A computer security perspective. In Proc.
EVT, Boston, MA, Aug. 2007
[4] UNICEF. India statistics.
1) The voters during voting cannot perform any sort of http://www.unicef.org/infobycountry/india_statistics.html
tampering as he/she is not authorised to scroll any other [5] R. Kofler, R. Krimmer, A. Prosser, Electronic Voting: Algorithmic
screen. and Implementation Issues, Proceedings of the 36th Hawaii
2) The voter cannot be indulged in any bogus voting as International Conference on System Science (HICSS03)
his fingerprint should match with the stored template in the [6] S. Thakur, O.O. Olugbara, R. Millham, H. W. Wesso, M. Sharif and P.
Singh Transforming the Voting Paradigm- the shift from inline, to
database. online to mobile votingJ. Doe, Proceedings IEEE Symposium.
3) The proposed design provides additional security due [7] T. Kohno, A. Stubblefield, A. D. Rubin and D. S. Wallach , Analysis
to reinforcement of RFID tags. of an electronic voting system, Security and Privacy Proceedings
2004 IEEE Symposium on (pp. 27-40), IEEE.
4) The main advantage is that fingerprints of every
[8] India Votes, (2013). NOTA: Impact Assessment. Blog. 13 December
person are unique and hence the design completely 2013.
diminishes the chance of illegal voting. [9] B. Rogers. (2013 , sept 23). Why I Hacked Apples TouchID, and Still
5) The proposed design is economically viable and Think It Is Awesome, Lookout.Retrieved February 2, 2013, from
cheap. http://www.lookout.com.
This can be further used for online ticketing system for buses [10] .J Bannet, D. W Price., .A Rudys, Justin Singer and Dan S. Wallach,
2004 Security Issues with Electronic Voting Systems, IEEE
and trains, vehicle tracking system, automation of parking lot Computer Society, pp. 1540-7993.
IX. CONCLUSION [11] S. Yadav and A. Singh, A Biometric Traits based Authentication
System for Indian Voting System International Journal of Computer
The best solution to diminish corruption is to augment voting Application, vol. 65(15), pp. 28-32, 2013
machines with a proper auditing trail. Auditing is one of [12] India Votes, (2013). NOTA: Impact Assessment. Blog. 13 December
ways to discover patch security holes to uncover specific 2013.
vulnerabilities. This model guarantees that the voter is not a [13] D. A. Kumar, U. S. Begum, Electronic Voting Machine- A Review.
deceitful rogue. This designed proposal is ubiquitous for [14] R. Udupa, G. Garg and P. Sharma, Fast and Accurate fingerprint
Verification, International Conference on Audio- and Video-Based
biometric capture and using NFC tag which adds security Biometric Person Authentication, pp. 192-97, 2001.
and privacy, is a small contribution towards conducting an [15] M. Khan, Fingerprint biometric based self-authentication and
unprejudiced and fair election. This model satisfies the deniable authentication schemes for the electronic world, IETE
democracy, anonymity (privacy), reliability, accuracy and Technical Review, vol. 26(3) pp. 191, 2009.
usability criterion. This model shows potential to re-engage [16] R. Haenni, E. Dubuis and U. Ultes-Nitsche, Research on E-Voting
Technologies, Bern University of Applied Science , Technical Report
all demographic age groups to participate in elections and 5, 2008
cast their votes.