PROPOSITION OF A SECURE SYSTEM OF VOTING USING UIDAI DATA VIA IOT

Author(s):  
Shakya Chakrabarti ◽  
Neelanjan Acharya

Purpose of the study: The paper proposes a secure system of voting using UIDAI Data and implementing IoT to save a copy of the voting statistics via VMAC encryption. Methodology: The paper proposes a secure system which will utilize the Aadhar database along with the Electronic Voting Machine units, to authenticate voters by bio-metric means which will be synchronized by Internet of Things. After successful casting of vote, two sets of voting statistics will be stored in the local polling station as well as a centralized register respectively; through a cascade of servers. These will be secured from virtual third-party vulnerability by VMAC encryption. Finally, an impenetrable system of voting can be established by the above method. Applications of this study: If the proposed system of voting is practically implemented, then a proper consensus can be obtained by avoiding poll-day violence. Furthermore, if UIDAI data is used then the voter’s authenticity is also verified. Novelty/Originality of this study: The use of biometric data, as well as storage of a second set of data using VMAC encryption to a secondary storage site.

2019 ◽  
Vol 1 (3) ◽  
pp. 6
Author(s):  
CASIS Vancouver

Electoral voting systems have been the subject of several cybersecurity reviews, and speculation about them being vulnerable. In 2017, Communications Security Establishment noted that electronic voting tabulation may be vulnerable to third party cyberattacks (CSE, 2017). In March 2018, a report from Brazil demonstrated it was possible to attack the voting machine (Aranha et. al., 2018). Moreover, a 2018 report by Elections BC includes reference to the requirement that voting machines must maintain an internet connection, thus creating a vulnerability for a potential cyber-attack (Archer, 2018).


2021 ◽  
Vol 297 ◽  
pp. 01076
Author(s):  
Ahmed Yacoubi ◽  
Brahim Erraha ◽  
Hiba Asri

This article offers an E-voting (Electronic Voting) approach that ensures security, privacy, and transparency. We have decided to use the blockchain system. Blockchain technology lowers the cost of centralized Clouds, Datacenters, and Networking Equipment, decreases the need for middlemen, and provides data privacy and transparency; all of which are critical for a fair election.An Architecture and Algorithm are suggested for the blockchain-based voting system. An internet of things (IoT) based system is designed to exchange data from the electronic voting machine and the nodes. Furthermore, we introduced its features, and we concluded with some future investigations.


Author(s):  
Lihua Song ◽  
Xinran Ju ◽  
Zongke Zhu ◽  
Mengchen Li

AbstractInformation security has become a hot topic in Internet of Things (IoT), and traditional centralized access control models are faced with threats such as single point failure, internal attack, and central leak. In this paper, we propose a model to improve the access control security of the IoT, which is based on zero-knowledge proof and smart contract technology in the blockchain. Firstly, we deploy attribute information of access control in the blockchain, which relieves the pressure and credibility problem brought by the third-party information concentration. Secondly, encrypted access control token is used to gain the access permission of the resources, which makes the user's identity invisible and effectively avoids attribute ownership exposure problem. Besides, the use of smart contracts solves the problem of low computing efficiency of IoT devices and the waste of blockchain computing power resources. Finally, a prototype of IoT access control system based on blockchain and zero-knowledge proof technology is implemented. The test analysis results show that the model achieves effective attribute privacy protection, compared with the Attribute-Based Access Control model of the same security level, the access efficiency increases linearly with the increase of access scale.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


The structure of Electronic Voting Machine (EVM) is an interconnected network of discrete components that record and count the votes of voters. The EVM system consists of four main subsystems which are Mother board of computer, Voting keys, Database storage system, power supply (AC and DC) along with various conditions of functioning as well as deficiency. The deficiency or failure of system is due to its components (hardware), software and human mismanagement. It is essential to reduce complexity of interconnected components and increase system reliability. Reliability analysis helps to identify technical situations that may affect the system and to predict the life of the system in future. The aim of this research paper is to analyze the reliability parameters of an EVM system using one of the approaches of computational intelligence, the neural network (NN). The probabilistic equations of system states and other reliability parameters are established for the proposed EVM model using neural network approach. It is useful for predicting various reliability parameters and improves the accuracy and consistency of parameters. To guarantee the reliability of the system, Back Propagation Neural Network (BPNN) architecture is used to learn a mechanism that can update the weights which produce optimal parameters values. Numerical examples are considered to authenticate the results of reliability, unreliability and profit function. To minimize the error and optimize the output in the form of reliability using gradient descent method, authors iterate repeatedly till the precision of 0.0001 error using MATLAB code. These parameters are of immense help in real time applications of Electronic Voting Machine during elections.


2011 ◽  
pp. 1234-1239 ◽  
Author(s):  
Paulo Roberto Santhias ◽  
Regis Cabral

Electronic voting, as well as Internet voting, is in the process of being incorporated into most democracies in the world. The literature on the topic is abundant as well as the technologies offered. Most of the work, nevertheless, seems to bypass the actual origins of the modern (and current) electronic voting systems (Oudenhove et al., 2001).


Sign in / Sign up

Export Citation Format

Share Document