scholarly journals Security, usability, and biometric authentication scheme for electronic voting using multiple keys

2020 ◽  
Vol 16 (7) ◽  
pp. 155014772094402
Author(s):  
Masood Ahmad ◽  
Ateeq Ur Rehman ◽  
Nighat Ayub ◽  
MD Alshehri ◽  
Muazzam A Khan ◽  
...  

We propose electronic voting authentication scheme, which is a key management mechanism for electronic voting system intended to limit the number of attacks on a polling station and strengthen the security control. The motivation is to diversify security requirements of messages exchanged between polling stations. There are different types of messages exchanged between polling stations and each type of message has different security needs. A security mechanism developed on the basis of a single key is not enough to ensure the diverse security needs of voting network. In electronic voting authentication scheme, every polling station is responsible to support three different types of keys. These are global key, pairwise key, and individual key. The global keys are public keys shared with all polling stations in the voting network. The pairwise key can be used for communication with polling stations. Individual keys will be used for communication with the server. To ensure authentication of local broadcast, electronic voting authentication scheme uses one-way key chains in a well-organized way. The support of source authentication is a visible advantage of this scheme. We examine the authentication of electronic voting authentication scheme on numerous attack models. The measurement demonstrates that electronic voting authentication scheme is very operative in protecting against numerous elegant attacks such as wormhole attack, Sybil attack, and HELLO Flood attack. The proposed system is evaluated and the results demonstrate that the proposed system is practical and secure as compared to the direct recording electronic and manual systems.

A blockchain is decentralized immutable ledger technology maintaining integrity. So to conduct tamperproof election it’s one of the approach towards it. Smart contracts are Self executed code that is written on Ethereum platform in blockchain. An E-voting system should be completely secure and does not allow voting twice that is double spending in blockchain. So it should be completely transparent. In research work electronic voting application is implemented and tested using smart contract on Ethereum platform with the help of metamask wallet. The results of ballots and votes will be stored on Ethereum blockchain with the help of consensus algorithm proof of stake. This consensus is used in validating a transaction with concept of majority approval. Current electronic voting system requires a centralized authority to control the procedure from ballot input to result output and for monitoring of election. While blockchain technology provide decentralized system which is open across connected nodes. Blockchain assets provide increased level of system security from hacking and fraud. Every transaction in blockchain is time-stamped and signed digitally with the help of cryptographic algorithms, and it assigns unique hash value to every block so it can be trace easily. Blockchain technology is one of solutions because it embraces a decentralized system and the entire databases are owned by many users. The blockchain technology also has much vulnerability due to which many attacks like 51% attack, Double Spending attack, DDOS attack, Sybil attack, Eclipse attack and Routing attack can be performed on it.


2013 ◽  
Vol 7 (2) ◽  
pp. 1-28
Author(s):  
Katharina Bräunlich ◽  
Rüdiger Grimm

Trust that an electronic voting system realizes the security requirements in an adequate manner is an essential premise for electronic elections. Trust in a system can be achieved by controlling the system security. There are two ways to assure system security. One way is the evaluation and certification of the implementation’s security by neutral experts. Another way is the verification of the outcome by the users. Both approaches, verification and certification, should be combined to reasonably justify the voter’s trust in the electronic voting system. In this paper a formal security model with respect to the requirements of Fairness, Eligibility, Secrecy and Receipt-Freeness, Verifiability and Protection against Precipitation is given. This formal model helps to clarify and truly understand these requirements. Furthermore, it can be used for the evaluation and certification of online voting products according to the Common Criteria.


Author(s):  
Greg Vonnahme

In 2001, Wand and colleagues published a paper titled “The Butterfly Did It” (see Wand, et al. 2001, cited under Voting System Neutrality) in which they argue that Palm Beach County’s butterfly ballot caused enough errors to decide the 2000 election for George W. Bush. The butterfly ballot also helped launch significant new research initiatives into voting systems and prompted new federal legislation through the Help America Vote Act of 2002, which served to modernize American voting systems. Along with Internet voting, these developments account for most contemporary research on electronic voting systems. Research on electronic voting systems is now at a crossroads. Much of the research following the 2000 election evaluated technology including lever and punch-card machines that are now largely obsolete (Stewart 2011, cited under History and Development of Voting Systems). Current and future research is moving in the direction of issues of security, Internet voting, ballot design, usability, efficiency, and cost of electronic voting systems. All voting systems in the United States today are electronic to a degree. Ansolabehere and Persily 2010 (cited under Empirical and Legal Evaluation of Voting Systems) identifies three discrete parts to voting systems: voter authentication, vote preparation, and vote management. Electronic voting technology can facilitate any of these steps. The term “electronic voting” is polysemous. Electronic voting (or e-voting) variously describes direct-recording electronic voting, electronic vote tabulation, or Internet voting among others. This document defines electronic voting as any voting system that uses electronic technology at any step in the voting process. Fully electronic voting systems use DREs (direct-recording electronic machines), in which ballots are electronically generated, prepared, and counted. Hybrid types of electronic voting are optically scanned ballots (precinct or centrally counted) or ballot mark devices (BMDs), which the voter completes manually and submits but is electronically counted. Electronic voting systems can also include Internet voting in which voters receive, prepare, and submit ballots online. The 2000 presidential election precipitated the most sweeping changes to voting systems, and we continue to see officials adopt new voting systems and Internet voting pilot programs, such as those in Estonia, Canada, Brazil, and Switzerland. Voting systems, particularly Internet voting, are a source of controversy in the United States and abroad. Debates over security and ease of use involve complex technologies and core democratic principles about the rights and responsibilities of citizens. Elections are also, at least in a narrow sense and especially in the United States, zero-sum. Only one person can hold an office, and any change in voting systems that helps one candidate or party necessarily harms the electoral prospects of others. At best, this leads officials to closely scrutinize new voting systems. At worst, it can lead to irreconcilable and unprincipled polarization over questions of voting technology. E-voting involves issues of technology, democratic participation, and electoral politics. This creates a rich environment for research on voting systems.


2017 ◽  
Vol 2017 ◽  
pp. 1-16
Author(s):  
Shin-Yan Chiou ◽  
Tsung-Ju Wang ◽  
Jiun-Ming Chen

Electronic voting systems can make the voting process much more convenient. However, in such systems, if a server signs blank votes before users vote, it may cause undue multivoting. Furthermore, if users vote before the signing of the server, voting information will be leaked to the server and may be compromised. Blind signatures could be used to prevent leaking voting information from the server; however, malicious users could produce noncandidate signatures for illegal usage at that time or in the future. To overcome these problems, this paper proposes a novel oblivious signature scheme with a proxy signature function to satisfy security requirements such as information protection, personal privacy, and message verification and to ensure that no one can cheat other users (including the server). We propose an electronic voting system based on the proposed oblivious and proxy signature scheme and implement this scheme in a smartphone application to allow users to vote securely and conveniently. Security analyses and performance comparisons are provided to show the capability and efficiency of the proposed scheme.


Author(s):  
Oladotun O. Okediran ◽  
Adeyemi A. Sijuade ◽  
Wajeed B. Wahab

Conventional voting techniques have been employed over the years in most elections. However, each of these techniques has attendant short comings. The existing conventional voting systems have been subjected to gross abuse and irregularities. Electronic voting (e-voting) which is emerging as an alternative to these conventional voting systems, though highly promising, is not also totally free of flaws; information security issues bordering on privacy, integrity and verifiability of the electronic ballots casted are still significant in most implementations of e-voting systems. In this paper, we developed a security scheme that was based on a hybrid Rivest-Sharma-Adleman (RSA) algorithm and Advance Encryption Standard (AES) algorithm with Least Significant Bit (LSB) replacement algorithm for securing ballot information in an e-voting system. An e-voting system with multiple voting channels which includes poll site voting, mobile voting and remote internet voting was developed in the contextual Nigerian scenario. The electronic ballots casted via the system during experimental usage were encrypted using the hybrid RSA-AES algorithm to circumvent the problems of privacy, integrity and verifiability associated with many e-voting systems. The encrypted ballots were then hidden using LSB replacement algorithm to improve their integrity. The image quality of the cover image used and stego image obtained from the security scheme developed was quantitatively assessed using Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Correlation. Furthermore, a performance evaluation based on users' perception of the developed e-voting system showed that the system satisfied most of the generic security requirements for electronic voting.


Author(s):  
VETRI SELVI S ◽  
PURUS HOTHAMAN

Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and management of ad-hoc networks is significantly a challenging one when compared to contemporary networks. Authenticating the multicast session is an important one. To authenticate several factors should be considered, major issue are resource constraints and the wireless links. In addition to being resource efficient and robust, security solution must be provides to large group of receivers and to long multi-hop paths. The authentication must be done without much delay and should independent of the other packets. In existing TAM Tired Authentication scheme for Multicast traffic is proposed for ad-hoc networks. It exposed network clustering to reduce the overhead and to improve the scalability. Its two tired hierarchy combines the time and secret information asymmetry to achieve the resource efficiency and scalability. In the proposed system, a Asynchronous authentication scheme as using shared key management is proposed to resolve the foremost conflicting security requirements like group authentication and conditional privacy. The proposed batch verification scheme as a part of the protocol poses a significant reduction within the message delay, then by using shared key process so requirement of the storage management is extremely less.


2019 ◽  
Author(s):  
Pranith H ◽  
Manoj Kumar M. V. ◽  
Sanjay H A ◽  
Prashanth B S ◽  
Likewin Thomas ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document