Saturday, April 13, 2019
Electronic Voting Systems Essay Example for Free
electronic Voting Systems EssayIn the existing offfine right to vote dash to select a vista in the election much(prenominal) as presidential election , the conclave election, or local election, electorates go to the designated polling rear ends and have to be identified to cast their right to votes, and finally electors cast their ballot. Of course, voters should be in advance registered on a poll book. To do so, a signifi sternt amount of prison term and cost are consumed by suffrage and counting of votes. In the mean time, the most important pledge issue for on-line electronic voting using touch screen or internet is to stock warrant the anonymity of voter and the confidentiality of vote content. An e-voting method using a touch screen which includes a voter to select a gutterdidate or an option displayed on a screen has advantages in that a voter can cast his vote regardless of his assigned polling place, but in this case, a voter is still required to go to a polling booth to vote.As other e-voting method, a voter does not have to go to a polling place if he uses internet and vote is permitted to internetuser. But, internet-accessible terminals are unceasingly required to vote and a voter can cast a vote in the simply limited place which he can access internet. Especially, private info homogeneous personal ID aptitude be leaked in the course of accessing to the internet. This means that anonymity of electronically voting International Symposium on Electronic Commerce and Security over the internet is not satisfied. Also, confidentiality of voting might not be ensured if a candidate selection or a voting content is not encrypted. As to the e-voting post of the world, the unite Kingdom has adopted the organization using a touch screen for the local election and the unlike voting using an internet in 2002. In April 2004. Now in a present outline each and every section is accustomed a electronic car which stores the votes of the p eople how have voted for the crabbed candidate. Control of present system is don to the in charge officer. He only check for the eligibility of the candidates and allow for the voting. Finally we collect all the voting machine at a place and go for counting.DIS ADVANTAGES OF THE turn over SYSTEMAfter voting if all technical problems or damage occurs with the machines it may leads to the re election. The machine is not able to recognize the eligibility of a candidate, so the corrupted officers may misguide the people. The corrupted officers may increase the count of the voting. During transportation of the machines the in charge person can change the status of machines and veritable(a) may destroy. This system is not a cost effective one. Since we pauperism security, in charge officers, secured place for counting and election place. The person from any other region cannot vote in for a candidate of other region. The voting take place where the machine is located.PROPOSED SYSTE MIn our system we trying to declare counting of votes in to a remote secured system. In this system we are using a electronic circuit which enable the voter to vote and transfer this vote to the remote system by transfigureing it to intercommunicate wave through the rambling towers. Our machine can check the eligibility of the candidate by itself, so on that point is no question ofcorruption. Machine itself is automated to check the eligibility of the candidates. Here we need not to go for the re election even if the machine is damaged. A person even can vote from a mobile system and also from Internet. We can vote from any where even though being a voter of another region.1. Radio waves representing glance overned retina pattern and vote to Mobile tower.2. Radio waves representing scanned retina pattern and vote to remote host.3. acknowledgement (+ve or ve) from the server to mobile tower.4. Acknowledgement (+ve or ve) from mobile tower to Interface device.5. Ready channel ise if retina is scanned properly to voting machine. And if ve signal accordingly alert alarm go away be activated.6. Accepted vote is made to flow to the interface device.DETAIL DIAGRAM OF THE VOTING MACHINEThe voting machine is rattling a device which generates the different voltages for different votes these voltages are fed to the (ADC) which is consequently win overed to digital bits accordingly can be converted to radio waves. The detail diagram is overleaf.Block diagram of the Client expression CircuitFinal Out putAntennaEye Retina scanningThe eye retina machine be a simple mesh cam or device which can capture the images effectively .the captured image leave alone be represented in the form of a matrix where each pixel represents 24-bit (RGB, 8+8+8 formatting) let us see and understand Here for e.g.Here the matrix pattern of this causa of picture may be asR G B R G B R G B12 a1 15 11 21 54 25 f4 5c2d 1c 5A 99 85 57 2c fa b31b b1 a2 11 b1 ac 50 b4 5FCA 1f 3c 11 2c d 4 03 ca e5Interface deviceThis is an electronic fit which converts the input digital signals such as (retina pattern votes+ secure bits) to radio waves.Working of whole systemWhenever voters enter to voting booth then he ordain be instructed to directly look at retina scanning machine at this time the machine scans the retina. once retina scanning properly confirmed then it sent signal to the voting machine as to accept the vote it will be power on .then voter is made to vote. Now the whole data including the retina pattern is sent to interfacing device which convert into radio waves of mobile frequency range and these radio waves are sent to mobile tower and then to the remote server, where the authentication and voters identification is stored into a secured database.The received data is first converted into digital format from the radio waves through the interface device kept at the server side, and then retina pattern and vote separated. Next the retina pattern is matched once morest the existing database .If match is found then flag is check which indicates its voting status i.e. if the voter is not voted yet then +ve ack is send to the mobile tower and then to the corresponding voting machine. This ack is recognized by the receiver kept at the voter side and machine ismade to scan next retina pattern and vote, other unfermented if ve ack then alert alarm is made to ring.HURDLES IN THE elbow room OF IMPLEMENTATIONThere are several more issues that we have to consider along the Implementation such as SecurityEfficiencyGeographical ProblemsSecurityThe radio waves of a mobile frequency live of Retina pattern and vote can be generated by means of external source. Thats why we need to provide some sot of security to avoid this problem. One of the idea to solve this problem is CDMA (which will be explained later ) and another technique is inserting security bits at regular interval of time during the transmission system of radio waves (Ex.2 msec) .At the s erver side after the given interval (2 msec ) security bits are analyze (ex 1001) . In case of positive confirmation we can accept as valid vote, other wise simply rejected.Another problem is that one may trap the radio waves in between and can determine the person and the vote this may disclose the result of the election before the completion of the voting process. To avoid this problem we can go for applying the efficient and complex encryption algorithm so that the transparency of data can be hidden and the server side the encrypted data can be again decrypted and original data can retrieved this make the trapping of wave meaningless .The encryption algorithm can be termed as Key Complex Algorithm, which is as follows,First it finds the length of the string.Generate the random amount equal to the length of the string. Add the corresponding Characters from the given string and random set. E.g. KSHITIJLet this be the given words.EfficiencyWhenever the data which is sent from th e voter (client) side, it is in the large amount, this delays a bit a voting system and the data that is received at server side is in the multiple access mode i.e. more than one client is sending the data. To over come this problem the following 1. Applying compression Algorithms at the Client and server side so those to decrease the data transfer. Compression technique such as JPEG compression or any other Compression. 2. Instead of using single server PC we will go for distributed Operating system environment with multiple servers. This makes the job sharing and processing tumultuouser which leads to fast responds in case of quadruplex Access Environment 3. To solve the concurrency problem in case of Multiple access environment we will use CDMA technique which is as followHere the key values are orthogonal to each other i.e. k1*k2=0 and k1*k1=1 i.e. if any tries to decode the information with any other key the data will be evaporateed as the data will be in the form d1*k1.If y ou try to decode withK2 then effect will be as d1*k1*k2=0. This will vanish the data. And if correct decoding key i.e k1 is used then decoding will be d1*k1*k1=d1. This decodes the data correctly. As per the controlling concurrency for multiple access the data from all the nodes is accepted as k1*d1+k2*d2 +k3*d3+k4*d4.In this case if you want the data corresponding to the second node then simply multiply the whole equation with the k2.This will give d2 as (k1*d1+K2*d2 +k3*d3+k4*d4)*K2=d2. So by this we can show that any numbers of nodes are allowed to send the data, the server will accept all the data and which ever has to be extracted will be just compute with corresponding key. This gets the corresponding data. Hence the concept of Multiple access.Geographical ProblemsThis is the problem regarding the scene of action where technical facilities like mobile tower or Internet service is not present. In this case will convert the vote and retina pattern into the electrical informati on and pass it through the electrical conductors until we can reach the area where the technical facilities like internet or mobile tower is obtainable, and if only internet facility is available is then we can convert this electrical information to digital means and with these data using computers affiliated to internet we can pass the vote and retina pattern. Here the eye scanner will be web cam.FUTURE ENHANCEMENTSThis project can be enhanced to work over the mobiles that is voting is made realizable through the mobile through SMS. This machine can be made vote through the INTERNET. purposeThus this machine can be used for any level voting purpose. The machine provides risque level of security, authentication, reliability, and corruption -free mechanism. By this we can get result with in minuteafter a completion of voting. Minimum manpower Utilization, hence mechanism is error free.REFERENCESBoylestead Electronic Devices and Circuit Theory 10/e Pearson Education, June 2012 Her bert Taub and Donald Schilling Digital Integrated Electronics McGraw-Hill Internatinoal Editions, 01-Jan-1977 B. Var Acker. Remote e-voting and coercion a risk-assessment model and solutions. In the International Workshop on Electronic Voting in Europe, 2004. T. Kohno, A. Stubblefield, A.D. Rubin, and D.S. Wallach. Analysis of an electronic voting system, 2004. IEEE Std.802.15.IEEE timeworn for Information Technology Telecommunications and Information Exchange between Systems
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.