29-08-2017, 10:46 PM
(14-10-2016, 04:24 PM)mkaasees Wrote: ABSTRACT
With the advancement of electronics and computer science, mobile communication technology leads us to a fast moving entirely different world. In this scenario, we have lot of responsibilities, one of it is voting for our country, but even we don't have time for it, and also our votes may not useful to our nation, because of fake votes and cheating process happened during the election. This problem is rectified by the latest voting system as “Mobile Voting System” which is discussed in this paper. The mobile voting system uses the efficient techniques, iris recognition and cryptography for the secured voting process. The iris recognition and cryptography avoids the fake votes and cheating process. The election commission spends lot of money, for each election unnecessarily, which will be minimized by this system. This system enables the voter to vote to the Nation from his place itself.
1. INTRODUCTION:
Mobile voting system use the iris recognition and cryptography techniques, for voting purpose, the encryption algorithm is uploaded in the mobile phone. As like the eye scanner which scans the iris is fixed in the mobile, so the mobile phone having camera is preferred for that. To obtain the voting the voters eye iris is recognized. During the transmission from the source (mobile) to destination (election database system) the data is encrypted using the encryption algorithm. The data sending and receiving is doing with the help of the mobile networks.
As democracies across the globe fight challenges related to electronic voting systems, here a mobile phone-based voting system that incorporated into the current large-scale election process, gives the promising research. Traditionally, voting process is organized in centralized or distributed manner called voting booths. The earlier process of election is quite complex and time consuming. People were waiting in queue for long time. To reduce this problem mobile voting system is introduced. This mobile voting system provide many benefits like we don’t need to go to polling booths, no need to use paper ballots and we have time and cost efficiency and it also avoid tiredness and violence . In our system there is no expensive hardware is used. For the different reasons, voters may not able to come to the voting booths physically, but now with the use of this new system he can vote remotely. For example, he can vote from home or while travelling abroad or sitting in the Office. That’s why there is more demand for remote voting. In this system procedures are easy, transparent and most secure.
Today the most common way for remote voting is postal voting, where voters cast their votes by cell Phones...Internet voting was introduced to provide more flexibility. Because of the inherited security vulnerabilities Of the Internet and computerized systems. In general, Phone Voting System (MPVS) provides mobility feature. Internet voting there is awide range of criticism. Mobile However this technology accesses certain security threats for its successful implementation in election. Without eliminating these security threats like buying a vote and Coercion, online registration, secrecy of ballot, anonymity of voter and double voting this latest technology can’t be allowed. An efficient and reliable system is essential for the trustworthy and successful implementation of this technology. In our system we design mobile application for e-voting (electronic voting) process. The proposed system uses mobile phone device having: small in size, low power, low-price as compared to computers and Direct Recording Electronic voting System, Electronic Voting Machine’s, provide mobility feature and security. Proposed system uses Global System for Mobile Communication technology which is a secure and globally used mobile technology in the current situation. Mobile phone also uses Subscriber Identity Module technology which provides user identity privacy, user identity verification and subscriber data secrecy providing more security to the proposed system.
The key features of our proposed Mobile Phone Voting System is:
1. Eligibility: only authorized voter can cast their vote.
2. Uniqueness: Each user can cast their only one vote.
3. Integrity: Valid vote should not be modified or deleted.
4. Fairness: The election result should not be accessible before the official time ended.
5. Secrecy: No one should be able to find how voter cast their vote.
6. Cost-effectiveness: Election system should be efficient and affordable.
2. LITERATURE REVIEW:
Voting through the mobile phone it is the new and advanced area of research. We take the review of some IEEE papers which presented in past.
[1] Proposes mobile phone voting system developed on modular square root and blind signature system. System uses confidentiality of voter, secrecy of ballot, voter anonymity and no computation cost and communication overhead. CA (certificate authority) involves as third party that is distribution of certificates to voters is the responsibility of CA for authentication purposes, delayed occurred which make the process slow.
[2] Proposes mobile phone voting system using Global System for Mobile communication technology. In the system voter authentication is occurred through GSM mobile operator. user validation is done through GSM challenge-response protocol. System contain of four parts: mobile phone; authentication server; verification server and result counting server. Proposed system contain three levels: pre voting level; voting level and post voting level. For keeping Voter secrecy using blind signature system. Because of GSM authentication setup public key overhead is mostly decreased. More work is required to deal with the trust retained on authentication server, end user device (ME) and application security.
[3] Proposes mobile phone intermediate e-voting system uses the extended Pillar’s encryptions system. This system is used to enforce the cut-of-the choose method to exclude the computational zero knowledge evidences and show the effectiveness of the system. Proposed system is probably safe in simulation-based prototype.
[4] Propose GSM based mobile phone voting system is used to cast vote without registering for voting in advance and going to polling booths. System prevents repetition voting but It has big disadvantage to security, proposes system does not used any cryptographic algorithm.
[5] Proposed mobile phone voting system based on public key encryption algorithm RSA. Proposed system contains three parts: access control; voting and election administrator server. First part holds validation and identification for the voters. Voting part done by ciphering voter data using RSA algorithm And last part is the election administrator server classifies ending result using decryption RSA private key for received encrypted data. System has disadvantages like there is no any online registration and more expensive computational cost and communication overhead due to RSA algorithm.
2.1 PROPOSED SYSTEM:
Our propose system provide online registration of voter and also offline registration is available for voter in case of failure of online registration. After registration voter will cast their vote and result will display. For proposed system it required five elements
• Mobile Phone, Election Commission Server (ECS);
• Election Commission Databases (ECD);
• Vote Collecting and Result Phase Server (VCRPS) and
• Election Commission Office (ECO).
Proposed system consists of three steps:
A. Online registration phase
B. Voting phase
C. Vote collecting and result phase
Online Registration Phase:
In this phase we will provide the one highly secured website for registration purpose. After that user have to SIGN IN there and fill its whole information including NIC and SIM card number. After pressing submit button, server send one public key to them which encrypt the whole information and send over the server. And then server sends one secret symmetric key to user. User must have to keep this key secret. Because this key is required on day of election. Election commission server should keep two updated databases. First database consists of public NIC’s and second database contained SIM cards from the concern authorities for user verification and authentication purposes at the registration time. Short Message Services (SMS) is used throughout voting process without the need of internet. ECS will create two key, first one is a public key and second one is a private key. The ECS will keep only private key secret and will put public key on its server.
1) In the first step user will send their National Identity Card No + SIM Card No + Symmetric Key which encrypt with public key of ECS to ECS server.
2) When ECS receiving data they will decrypt this data with his private key.
3) ECS will verify the user’s NIC and SIM card number with its two latest databases, one consist public NIC numbers and other database consist SIM card numbers.
4) If ECS verified that user is authentic then,
5) ECS will send PIN encrypted with user symmetric key to the user. This PIN will be used for the authenticity of the voter in the latter stages of the election process.
6) Receiving this user will decrypt the PIN with his/her symmetric key. User should securely keep their PIN from disclosing to others because it’s disclosing will compromised confidentiality.
7) When Mobile phone user got PIN then Mobile phone user will send acknowledgement message to election commission server .Mobile phone user will become certified as mobile phone voter. Here online registration phase will be completed.
8) This is offline registration phase which will be used in case someone registers his/herself on genuine user credentials.
9) When the genuine user registering his/herself with election commission server, ECS will send registration problem message of can’t be register through online registration phase and will requested his/her to come to ECO for correction of their registration as someone already register his/herself on genuine user credentials.
10) In this case user should go to election commission Office. The previous registration will be canceled and genuine user will be register.
11) Election commission office (ECO).
B. Voting Phase:
1) In this phase, ECS will send candidate list to authenticated voter according to their constituency via SMS encrypted with voter symmetric key. This will ensure that the candidate list message only send to the authenticated voter list. This method also prevents unauthorized voter to cast their vote...
2) After that voter will receive the SMS of candidate list on voting day.
3) In this step voter will select their candidate from the candidate list. After selecting their candidate voter will then send the message to ECS with public key, candidate PIN encrypt both with user symmetric key and again concatenate NIC number and send to ECS via SMS.
4) ECS will find user symmetric key using NIC number. Then it will decrypt the remaining SMS part with user symmetric key. ECS will mark only the PIN part of the message for the record purposes and to avoid double voting. The remaining encrypted candidate list message will be forwarded to the vote collecting and result phase server.
Vote Collecting and Result Phase Server
1) Before the start of the election, we used time lock mechanism which will not accept vote after time end on VCRPS. It will keep the vote in encrypted form until the official time of the election ended. Implementing this restriction on this server, the decryption of the votes will be started after the end of the election time. The third party will not see the result before the official time ends, thus it prevents to seeing of the election results.
2) After ending of voting phase, vote will be decrypt by using ECS private key.
3) At end of the process, votes will be counted and the results will be officially display to the public.
2 SECURITY ALGORITHAM:
Security is provided to our proposed system by using RSA algorithm. RSA stands for the names of the three men who made the algorithm public. These men's names are Ron Rivets, Adi Shamir, and Leonard Adleman. A simple explanation of the RSA algorithm is that it was made for public-key cryptography, which is based on factoring large integers, which is the factoring problem. There are three steps to the RSA algorithm. These steps are key generation, encryption, and decryption working with a public-key encryption system has mainly three phases:
A. Key Generation: Whoever wants to receive secret messages creates a public key (which is published) and a private key (kept secret). The keys are generated in a way that conceals their construction and makes it 'difficult' to find the private key by only knowing the public key.
B. Encryption: A secret message to any person can be encrypted by his/her public key (that could be officially listed like phone numbers).