Global wireless electronic voting system

GunturiPrasanna1 107 views 18 slides May 17, 2024
Slide 1
Slide 1 of 18
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18

About This Presentation

Global wireless electronic voting system


Slide Content

Department of Computer science and Engineering
SRKR Engineering College, Bhimavaram, AP-534204
Presented by: G.Prasanna(17B91A0567)
Under the guidance of
Smt.M.JeevanaSujitha, Assistant professor
Seminar topic on

CONTENTS :-
➢Introduction
➢Literature review
➢Existing system
➢Proposed system
➢Block diagrams
➢Working of wholesystem
➢Challenges
➢Futureenhancementsand Conclusion

➢Indemocraticcountries,votingplaysavitalrole.Hence
weshouldadoptaperfectvotingsystem,whichshouldbe
efficientandsecured.
➢GlobalWirelessE-Voting,isanintelligentvotingsystem
whichcandeterminetheeligibilityofthevoterbyscanning
theeyepattern.
➢votecountisnotkeptintothesamemachineitselfinsteadof
it,itisstoredintheremoteserver.
➢Itismoresecurethanconventionalvotingsystem

→Neumann[1]givesalistofsuggestionsfor"genericvotingcriteria"which
suggeststhatvotingsystemshouldbesohardtotamperwithandsoresistant
tofailurethatnocommercialsystemislikelytoevermeettherequirements,
anddevelopingasuitablecustomsystemwouldbeextremelydifficultand
prohibitivelyexpensive.
→RebeccaMercuri[2]inventedthe“Mercurimethod”forelectronicvoting.
AcriticalcomponentofthismethodisverysimilartotheCaltech/MIT
proposal:avotingmachinemustproducehuman-readablehardcopypaper
results,whichcanbeverifiedbythevoterbeforethevoteiscast,and
manuallyrecountedlaterifnecessary.

→DavidChaumpresentsaveryinterestingscheme[3],wherebyvoterscould
getreceiptsfortheirvotes.Thisreceiptwouldallowthemtoknowiftheir
voteswereincludedinthefinaltallyornot,andtoprovethattheyvoted
withoutrevealinganyinformationabouthowtheyvoted.Thesecurityofthis
schemedependsonvisualcryptography.
→TheMIT/Caltechresearchers[4]“seeapromisingfutureforelectronic
voting,despiteitsproblemstoday”(underafewconditions).Theyadvocate
usingthemethodscurrentlyinusewhichresultinthelowestaverage
numbersof“uncounted,unmarked,andspoiledballots,”likein-precinct
opticalscanning.Theirreportevenproposesaframeworkforanewvoting
systemwithadecentralized,modulardesign.

EXISTING SYSTEMS
BALLOT VOTING SYSTEM ELECTRONIC VOTING MACHINE

Themachineisnotabletorecognisetheeligibilityofa
candidate,sothecorruptedofficersmaymisguidethepeople.
Thecorruptedofficersmayincreasethecountofvoting.
Anytechnicalproblemsordamagetothemachineaftervoting
mayleadtoreelection.
Duringtransportationofmachine,thepersoninchargecan
changethestatusofthemachineandevenmaydestroy.
Thissystemisnotancostefficientone.
Thevotercan’tvotefromtheplacewhereheis.

Inthissystem,votescastedwillbestoredinremotesecured
system.
Itcanchecktheeligibilityofthecandidatebyscanningtheeye
retinapattern.
Anerrorinavotedoesn’teffecttheremainingsystem,thereby
reducingtheriskofre-election.
Costforanelectioniscomparativelylessthanthecurrent
system.

➢Thevotingmachineisactuallyadevicewhichgeneratesthe
differentvoltagesfordifferentvotes.
➢thesevoltagesarefedtothe(ADC)whichisthenconvertedto
digitalbitsthencanbeconvertedtoradiowaves.

➢Theeyeretinamachinebeasimplewebcamordevicewhichcan
capturetheimageseffectively.
➢thecapturedimagewillberepresentedintheformofamatrix
whereeachpixelrepresents24-bit(RGB,8+8+8format)
➢Thisisanelectronicdevicewhichconvertstheinputdigitalsignals
suchas(retinapattern+votes+securebits)toradiowaves.

➢Whenevervotersentertovotingbooththenhewillbeinstructedtodirectlylookat
retinascanningmachineandthemachinescanstheretina.
➢Onceretinascanningproperlyconfirmedthenvoterismadetovote.
➢Nowthewholedataincludingretinapatternissenttointerfacingdevicewhich
convertsitintoradiowavesandthesearesenttomobiletower.
➢Andthentotheremoteserver,wheretheauthenticationandvotersidentificationis
storedintoasecureddatabase.
➢Thereceiveddataisfirstconvertedintodigitalformatfromtheradiowaves
throughtheinterfacedevicekeptattheserverside,andthenretinapatternand
voteseparated.
➢Nexttheretinapatternismatchedagainsttheexistingdatabase.
➢Ifmatchisfoundthenflagischeckwhichindicatesitsvotingstatusi.e.+veack.
➢Thisackisrecognizedbythereceiverkeptatthevotersideandmachineismade
toscannextretinapatternandvote,otherwiseif–veackthenalertalarmismade
toring.

➢Security,Efficiency,GeographicalProblems
➢Uses Key Complex Encryptionalgorithm
➢First it finds the length of thestring.
➢Generate the random numbers equal to the length of the
string.
➢Add the corresponding Characters from the given string
and randomvalues.
SECURITY

Example:
Let the given word be: MAHEN
The given string has a length of 5. Hence generate 5 random numbers. The
numbers are:
A) 33 35 37 40 43
The ASCII values for MAHEN are
M A H E N B) 77 65 72 69 78
Add equivalent A) and B) values as
33+77, 35+65, 37+72, 40+69, 43+78
110 100 109 109 121
The parallel ASCII characters for the above are:
n d m m y
The below are the ASCII characters for those respective random values:
! # % ( +
Finally encrypted data as n ! d # m % m ( y +

➢ApplyingcompressionAlgorithms
➢UsingdistributedOperatingsystemenvironmentwithmultiple
servers.
➢CDMATechnique.
-Herethekeyvaluesareorthogonalto
eachotheri.e.-k1*k2=0andk1*k1=1
-d1*k1
-d1*k1*k2=0.
-d1*k1*k1=d1.
-k1*d1+k2*d2+k3*d3+k4*d4.
-(k1*d1+K2*d2+k3*d3+k4*d4)*K2=d2
EFFICIENCY

➢Itoccurswherethetechnicalfacilitiesserviceisnotpresent.
➢Inthiscasewillconvertthevoteandretinapatternintotheelectrical
information.
➢Andpassitthroughtheelectricalconductorsuntilwereachthearea
wherethetechnicalfacilitieslikeinternetormobiletowerisavailable.
➢Heretheeyescannerwillbewebcam.
GEOGRAPHICAL PROBLEMS

➢Thisprojectcanbeenhancedtoworkoverthemobilesthatis
votingismadepossiblethroughthemobilethroughSMS.
➢ThismachinecanbemadevotethroughtheINTERNET.
➢Provideshighlevelofsecurity,authentication,reliability,and
corruption-freemechanism.
➢Bythiswecangetresultwithinminuteafteracompletionof
voting.
➢MinimummanpowerUtilization,hencemechanismiserrorfree.
Tags