SlideShare a Scribd company logo
1 of 8
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. I (Sep. – Oct. 2015), PP 31-38
www.iosrjournals.org
DOI: 10.9790/0661-17513138 www.iosrjournals.org 31 | Page
Performance Improvement using Pseudorandom One Time
Password (OTP) in Online Voting System
Preeti Ahlawat1,
Rainu Nandal1*
1
University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak, India (124001)
Abstract: In today’s world of growing advanced mobile technologies, the traditional voting method
can be changed to a newer and effective approach termed as mobile voting. The Mobile voting system
provides a convenient, easy and efficient way to vote eliminating the shortcomings oftraditional approach. In
this paper we propose to build an E-Voting system which is basically an online voting system through
which people can cast their vote through their smart phones or by using an e-voting website. To
achieve the required security we are using OTP (one time password)approach , which is most commonly
on the web to tell the difference between a human using a web service and an automated bot thus
making the website more secure against spam- bot attacks. If the results of the matching algorithm are
three point match then checks whether this person own voter ID after that it will check with AADHAAR ID,
If he has the right to vote then a voting form is presented to him, and the third level of authentication is
carried out by using One Time Password (OTP) principle. The OTP principle emphasizes that each time the
user tries to log on, the algorithm produces pseudorandom output thus improving the security. The
result shows that the proposed algorithm capable of finding over 90% of the faces in database and allows
their voter to vote in approximately 58 seconds. choices regarding exact issues, pieces of rule, citizen
initiatives, constitutional amendments, recalls and/or to select their government and political
representatives. [19] Nowadays Technology is being used more and more as a tool to contribution voters
to cast their votes. To allow the use of this right, almost all voting systems around the world contain the
following steps:
Voter identification and authentication, voting and recording of votes cast, vote counting, publication of
election results. [16]
Voter identification is required during of the electoral process:
1. first for voter registration in direction to establish the right to vote and then, at voting time, to allow
a citizen to use their right to vote by authenticating if the person satisfies all the requirement
sneeded to vote (authentication). [14]
2. Security is important of the e-voting process. Therefore the necessity of designing a secure e-
voting system is very important. Generally, mechanisms that ensure the security and privacy of
an election can be time consuming, expensive for election administrators, and inconvenient for
voters.[12]
Keywords: mobile; voting; digital voting; one time password (OTP), Pseudo-random number
I. Introduction
The aim of this research is to project an appropriate application for real time online electronic voting
systems for polling commission.[17]The voting is to permit voters to use their right to prompt their
3. There are different stages of e-voting security. Therefore serious actions must be occupied to
keep it out of public domain. Also, security must be practical to hide votes from publicity. [9]
4. There is no capacity or measurement for acceptable security level, because the level depends on
type of the information. An acceptable security level is a constant cooperation between usability
and power of security method.[7]
II. Literature Review
In [1], the author Kohno T., Stubblefield A., Rubin A. and Wallach D. S, (2004), describes the
security features of the electronic voting system and e-voting system is better than manual voting system.
Also, the author shows that voters, without any insider privileges can cast unlimited votes without
being detected by any mechanisms within the voting terminal software.
In [2], the author CiprianStănică- Ezeanu (2008) reviewed e-voting procedure by
describing its advantages and disadvantages. His work wasmajorly on the security measures such as
firewalls or SSL communications which are necessary but not sufficient to guarantee
the specificsecurity requirements of e-voting. Also, the author describes the additional layer of
Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System
DOI: 10.9790/0661-17513138 www.iosrjournals.org 32 | Page
specialize dsecurity technology to address the specific risks posed by electronic voting and guarantee
critical security requirements such as voters’ privacy, vote integrity and voter-verifiability. The author
equally suggested the use of Biometrics and smartcard for authenticating users. One major
issue the author stressed out is the difference between biometric and “classic” authentication like smart
cards. The e-voting system proposed in [2] does not interact in any way with the biometric characteristics of
the actual users, but still authenticates the user with the help of the user’s authentication certificate on the
smart card. In [3],Manish K, Suresh K.T, Hanumanthappa. M, Evangelin G.D (2005) the author
specified mainly on securing the voting system, by comparing the insecurities that exist in the manual voting
system to that of the electronic voting system.
Authors Rossler T.G (2011) in [4] suggested the use of Remote Internet Voting, with a view to
enhance voter convenience, increase voter confidence and voter turnout. In the survey, authors suggested
remote poll-site electronic voting as the best step forward as it provides better voter convenience, but at the
same time, does not compromise security.
In [5], the author Avi Rubin (2001) review the security measures needed for remote online
voting system by focusing on two cases where voters cast their ballots over the Internet – the 2000
Arizona Democratic Primary and the University of Virginia Student Council Elections. The author claims
that a secure voting system must thoroughly satisfy four major requirements: authentication,
availability, confidentiality and integrity.
III. Problem Statement
Making the electronic voting system has an obligation of security and of acquiring user
confidence , usually user can access to the electronic voting system and voting on the text without security
system, that any user can access to the electronic voting system through the ID number for another
user and he/she can vote more than one time at the same text, The users could know the result of voting
during the process of voting which make the system dicey and mistrust, The user can dominate the result of
voting by the access that he or she has of the result before the end of election day.[8]
IV. System Model
Electric Election systems are capable to mark the voting system more controlled, secure and
speedy. E-Election system helps public to elect their representatives more securely and express their
preferences for how they want to be governed. [6]
Election development has very strong media coverage mainly, if something goes wrong [10]. This
system will increase the level of security and make the trust and confidence in voters.
The origin of Maoist violence and presented that public need a more secure method of casting their
vote. [16] To make the voting system trust well-meaning is very hard just because it needs high security
requirements: privacy and integrity. Confidentiality means all voters developconfident about the privacy
of votes and prevent export of votes. Integrity means declaration of perfect results of elections and the
correct including of votes. Integrity is easy to become through a public show of hands, but this dissipates
confidentiality and confidentiality comes from the secret ballots, but this fails the integrity. The full E-
Election system provides people to vote in a secure way without any fear. The online voting system also
providing the security to the voter’s by storing the vote in a secure digital form, if the voter votes beside
spiteful applicant. This system also guarantees not to leak the vote in obverse of anyone.
Figure 1: Diagram of analyzing voters section
Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System
DOI: 10.9790/0661-17513138 www.iosrjournals.org 33 | Page
V. Proposed Implementation
The Online Voting should:
• Be able to display all registered voters in the database to the SYSTEM ADMIN(s) as per their
access rights and privileges.
• Have a user-friendly interface and user guides understandable by people of average computer skills.
• Be robust enough so that users do not corrupt it in the event of voting.
• Be able to handle multiple users at the same time and with the same efficiency, this will cater for the
large and ever growing population of voters.
OTP
The Main Security implementation of our project is the concept of One Time Password i.e. every
time a new password is generated and sent to the user on his mobile phone. One Time Password is a
Random 6 Digit Number that changes every time, whenever user logs on to the system and
performs some transaction.
User gets OTP User Client Servervia server
The Concept has been implemented in such a way that it adds high level of security to our
banking Application.
Figure 2: proposed Flow chart
The Flow chart of the mobile voting shows the sequential flow of how the data passes from
one activity to another. It starts from Registration, Login and Forgot password .The Fig 2 shows the
initial screen when the application starts. It has the login form, registration and forgot password and
then continues
Registration: - This option is used when the user is first registering through the application. It will take
them to a registration screen.
Login:This option allows us to log us in for voting.
Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System
DOI: 10.9790/0661-17513138 www.iosrjournals.org 34 | Page
Result Activity: The task of voter registration is strictly preserved for the system administrator.
Therefore if you are logged in as a mere user/voter, you don’t have this privilege, therefore, the
registration page link is disabled for you.
OTP Activity: The task of OTP (one time password) is to send a mobile phone on the registered mobile
after logging in theaccount, so that we can cast vote only after we are authorized to do so by the OTP sends
us a random message on our mobile an random number and then wecan insert the number to vote.
Voting Activity: - After voting, a voter is allowed tocheck the results by visiting the results page.
VI. Result
The proposed Online Voting System with OTP scheme is described in this section. In this
proposed method we will commence the work with database creation. In order to create the database we
collect the voter detail from different voters as shown in the figures.
Figure 1: Voter registration form
Figure 2: Admin Login form
Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System
DOI: 10.9790/0661-17513138 www.iosrjournals.org 35 | Page
Figure 3: Activate to voter by Admin permission
Figure 4: New Politician form
Figure 5: New voter login form with authorized voter id, AADHAAR id and password
Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System
DOI: 10.9790/0661-17513138 www.iosrjournals.org 36 | Page
Figure 6: Access OTP on registered mobile for vote
Figure 7: Now validate OTP
Figure 8: voter get successfully vote
Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System
DOI: 10.9790/0661-17513138 www.iosrjournals.org 37 | Page
Figure 9: Final result
VII. Conclusion
Genuine voter
In Present time, OTP (one time password) applications are increased. Security is an important issue
for handling such services. Current system provide security card based facility to authenticate user but
this is not secure enough and may not be available on any time or situation. To overcome such type of
issues we propose online e-Voting authentication system using OTP with aadhaar id and pseudorandom
number generator that identification is too complex which is improving the security for brute force attack.
The practicable future scope of the project includes the improvement in the security level of the
system. In annexation to that it would be interesting to meet some other confidential primitives to improve
the security level of online voting system.
References
[1]. Kohno T., Stubblefield A., Rubin A. and Wallach D. S, (2004), “Analysis of an Electronic Voting System”, In Proceedings of IEEE
Symposium on Security and Privacy 2004, pp. 1-23
[2]. CiprianStănică-Ezeanu (2008), “e-Voting Security”, Buletinul Universităţii Petrol – Gaze din Ploieşti, Vol. LX (2), pp 93-97
[3]. Manish K, Suresh K.T, Hanumanthappa. M Evangelin G.D (2005), “Secure Mobile Based Voting System”, Retrieved online at
http:// www.iceg.net/2008/books/2/35_324_350.pdf on November 17th 2012.
[4]. Rossler T.G (2011),”E-voting: A survey and Introduction”,Availableathttp://wiki.agoraciudadana.
org/images/5/56/An%2BIntroduction%2Bto%2BElec tronic%2BVoting%2BSchemes.pdf Retrieved on 15th June 2012.
[5]. Avi Rubin (2001),”Security Considerations for Remote Electronic Voting over the Internet”, AT&T Labs – Research Florham Park,
NJ. Available at http://avirubin.com/evoting.security.html, (date accessed 7th July, 2012).
[6]. Dr. Aree Ali Mohammed, Ramyar Abdolrahman Timour, “Efficient E-Voting Android Based System”, Volume 3, Issue 11,
November 2013, ISSN: 2277,128X
[7]. JaideepMurkute, HemantNagpure, HarshalKuthe, NehaMohadikar, ChaitaliDevade, “Online Banking AuthenticationSystem Using
QR-Code and Mobile OTP”,Vol.3, Issue 2, March-April 2013, ISSN: 2248-9622.
[8]. Kim, K and Hong, D (2007), “Electronic Voting System using Mobile Terminal. World Academy of Science, Engineering and
Technology, Vol .3(2), pp.33-37
[9]. ] A. Chefranov, “One–Time Password Authentication with Infinite Hash Chains. Novel Algorithms and Techniques”, In
Telecommunications, Automation and Industrial Electronics, 2008, pp. 283-286
[10]. Noha E. El-Sayad, Rabab Farouk Abdel-Kader, Mahmoud Ibraheem Marie” Face Recognition as an Authentication Technique in
Electronic Voting” -(IJACSA).
[11]. SKINNER, C. “75% of young adults want to vote by sms in the election. 89% expect text voting to be introduced soon”. PC
ADVISOR. February18,2010.
[12]. Mohamed HamdyEldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, “OTP- Based Two-Factor Authentication
Using Mobile Phones”,Eighth International Conference On Information Technology: New Generations, 2011.
[13]. W. Smith, “New cryptographic election protocol with best-known theoretical properties,” in Proc. Of Workshop on Frontiers in
Electronic Elections, 2005.
[14]. S. G. Weber, R. Araujo, and J. Buchmann, “On coercion-resistant electronic elections with lineawork,” in The Second
International Conference on Availability, Reliability and Security (ARES2007), april 2007, pp. 908–916.
[15]. R. Araujo, S. Foulle, and J. Traore, “A practical and secure coercionresistant scheme for remote elections,” Frontiers of Electronic
Voting, vol. 7311, 2007.
[16]. Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai “A Verifiable Electronic Voting Scheme Over the Internet”, 2009 Sixth International
Conference on Information Technology: New Generations
[17]. G.O. Ofori-Dwumfuo and E. Paatey , “The Design of an Electronic Voting System“, Research Journal of Information Technology
3(2): 91-98, 2011 ISSN: 2041-3114
Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System
DOI: 10.9790/0661-17513138 www.iosrjournals.org 38 | Page
[18]. Tai-Pang Wu, , Sai-Kit, Yeung,JiayaJia, Chi- Keung Tang, AndGe´ RardMedioni Closed-Form Solution To Tensor
Voting:TheoryAndApplicationsTransactions On Pattern Analysis And Machine Intelligence, Vol. 34, No. 8, August 2012
[19]. Scott Wolchok, Eric Wustrow, Dawn Isabel, and J. Alex Halderman Attacking the Washington, D.C. Internet Voting System In
Proc. 16th Conference on Financial Cryptography & Data Security, Feb. 2012
[20]. Jossy P. George Saleem S TevaramaniAnd K B RajaPerformance Comparison Of Face Recognition
[21]. Using Transform Domain Techniques World Of Computer Science And Information Technology Journal (WCSIT) ISSN: 2221-
0741 Vol. 2, No. 3, 82-89, 2012

More Related Content

What's hot

Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system securityAdeel Javaid
 
Online e voting
Online e votingOnline e voting
Online e votingMerbinJose
 
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHYE-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHYIJNSA Journal
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higherMorine Gakii
 
A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM
A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEMA CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM
A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEMIJNSA Journal
 
Secure Verifiable Mobile Voting Based On Kerberos Mechanism
Secure Verifiable Mobile Voting Based On Kerberos MechanismSecure Verifiable Mobile Voting Based On Kerberos Mechanism
Secure Verifiable Mobile Voting Based On Kerberos MechanismIJSRED
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile smseSAT Journals
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral Systemiosrjce
 
Report on online voting system
Report on online voting systemReport on online voting system
Report on online voting systemRajatMohanty12
 
Report online voting system
Report online voting systemReport online voting system
Report online voting systemDeepak tandan
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET Journal
 
IVRS and DTMF based Voting System
IVRS and DTMF based Voting System IVRS and DTMF based Voting System
IVRS and DTMF based Voting System iosrjce
 

What's hot (16)

Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
Online e voting
Online e votingOnline e voting
Online e voting
 
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHYE-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
E-VOTING PROTOCOL BASED ON PUBLIC-KEY CRYPTOGRAPHY
 
Bu25425429
Bu25425429Bu25425429
Bu25425429
 
Mobile e voting system using android application for higher
Mobile e voting  system using android application for higherMobile e voting  system using android application for higher
Mobile e voting system using android application for higher
 
A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM
A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEMA CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM
A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM
 
Secure Verifiable Mobile Voting Based On Kerberos Mechanism
Secure Verifiable Mobile Voting Based On Kerberos MechanismSecure Verifiable Mobile Voting Based On Kerberos Mechanism
Secure Verifiable Mobile Voting Based On Kerberos Mechanism
 
E voting system using mobile sms
E voting system using mobile smsE voting system using mobile sms
E voting system using mobile sms
 
H1802025259
H1802025259H1802025259
H1802025259
 
E voting app
E voting appE voting app
E voting app
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral SystemMobile, Secure E - Voting Architecture for the Nigerian Electoral System
Mobile, Secure E - Voting Architecture for the Nigerian Electoral System
 
Report on online voting system
Report on online voting systemReport on online voting system
Report on online voting system
 
Report online voting system
Report online voting systemReport online voting system
Report online voting system
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
IVRS and DTMF based Voting System
IVRS and DTMF based Voting System IVRS and DTMF based Voting System
IVRS and DTMF based Voting System
 

Viewers also liked

A study of selected biomechanical variables as a factor of hitting performanc...
A study of selected biomechanical variables as a factor of hitting performanc...A study of selected biomechanical variables as a factor of hitting performanc...
A study of selected biomechanical variables as a factor of hitting performanc...IOSR Journals
 
Geostatistical approach to the estimation of the uncertainty and spatial vari...
Geostatistical approach to the estimation of the uncertainty and spatial vari...Geostatistical approach to the estimation of the uncertainty and spatial vari...
Geostatistical approach to the estimation of the uncertainty and spatial vari...IOSR Journals
 
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...IOSR Journals
 
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...IOSR Journals
 
“A Comparative Study on Balance and Flexibility between National Level Artist...
“A Comparative Study on Balance and Flexibility between National Level Artist...“A Comparative Study on Balance and Flexibility between National Level Artist...
“A Comparative Study on Balance and Flexibility between National Level Artist...IOSR Journals
 
Simulation of Signals with Field Signal Simulator
Simulation of Signals with Field Signal SimulatorSimulation of Signals with Field Signal Simulator
Simulation of Signals with Field Signal SimulatorIOSR Journals
 

Viewers also liked (20)

C1803011419
C1803011419C1803011419
C1803011419
 
A017350106
A017350106A017350106
A017350106
 
H011124050
H011124050H011124050
H011124050
 
N010417991
N010417991N010417991
N010417991
 
I012646171
I012646171I012646171
I012646171
 
J012626269
J012626269J012626269
J012626269
 
J013118591
J013118591J013118591
J013118591
 
A study of selected biomechanical variables as a factor of hitting performanc...
A study of selected biomechanical variables as a factor of hitting performanc...A study of selected biomechanical variables as a factor of hitting performanc...
A study of selected biomechanical variables as a factor of hitting performanc...
 
Geostatistical approach to the estimation of the uncertainty and spatial vari...
Geostatistical approach to the estimation of the uncertainty and spatial vari...Geostatistical approach to the estimation of the uncertainty and spatial vari...
Geostatistical approach to the estimation of the uncertainty and spatial vari...
 
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
CFD Simulation of Swirling Effect in S-Shaped Diffusing Duct by Swirl Angle o...
 
H010414651
H010414651H010414651
H010414651
 
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
Performance Analysis and Comparative Study of Cognitive Radio Spectrum Sensin...
 
“A Comparative Study on Balance and Flexibility between National Level Artist...
“A Comparative Study on Balance and Flexibility between National Level Artist...“A Comparative Study on Balance and Flexibility between National Level Artist...
“A Comparative Study on Balance and Flexibility between National Level Artist...
 
G010433745
G010433745G010433745
G010433745
 
C013141723
C013141723C013141723
C013141723
 
D017111619
D017111619D017111619
D017111619
 
Simulation of Signals with Field Signal Simulator
Simulation of Signals with Field Signal SimulatorSimulation of Signals with Field Signal Simulator
Simulation of Signals with Field Signal Simulator
 
D1802051622
D1802051622D1802051622
D1802051622
 
I011125866
I011125866I011125866
I011125866
 
A010420106
A010420106A010420106
A010420106
 

Similar to Improving Online Voting Security with OTPs

Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainIRJET Journal
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java ServletsIRJET Journal
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting systemMonira Monir
 
IRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET Journal
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaCSITiaesprime
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET Journal
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting systemLhakpa Yangji
 

Similar to Improving Online Voting Security with OTPs (20)

Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Network
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
O017658697
O017658697O017658697
O017658697
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
 
Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
 
IRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting System
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for Libya
 
eVoting.pptx
eVoting.pptxeVoting.pptx
eVoting.pptx
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
EVM.pptx
EVM.pptxEVM.pptx
EVM.pptx
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
 
Project synopsis on online voting system
Project synopsis on online voting systemProject synopsis on online voting system
Project synopsis on online voting system
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

Improving Online Voting Security with OTPs

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. I (Sep. – Oct. 2015), PP 31-38 www.iosrjournals.org DOI: 10.9790/0661-17513138 www.iosrjournals.org 31 | Page Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System Preeti Ahlawat1, Rainu Nandal1* 1 University Institute of Engineering and Technology, Maharshi Dayanand University, Rohtak, India (124001) Abstract: In today’s world of growing advanced mobile technologies, the traditional voting method can be changed to a newer and effective approach termed as mobile voting. The Mobile voting system provides a convenient, easy and efficient way to vote eliminating the shortcomings oftraditional approach. In this paper we propose to build an E-Voting system which is basically an online voting system through which people can cast their vote through their smart phones or by using an e-voting website. To achieve the required security we are using OTP (one time password)approach , which is most commonly on the web to tell the difference between a human using a web service and an automated bot thus making the website more secure against spam- bot attacks. If the results of the matching algorithm are three point match then checks whether this person own voter ID after that it will check with AADHAAR ID, If he has the right to vote then a voting form is presented to him, and the third level of authentication is carried out by using One Time Password (OTP) principle. The OTP principle emphasizes that each time the user tries to log on, the algorithm produces pseudorandom output thus improving the security. The result shows that the proposed algorithm capable of finding over 90% of the faces in database and allows their voter to vote in approximately 58 seconds. choices regarding exact issues, pieces of rule, citizen initiatives, constitutional amendments, recalls and/or to select their government and political representatives. [19] Nowadays Technology is being used more and more as a tool to contribution voters to cast their votes. To allow the use of this right, almost all voting systems around the world contain the following steps: Voter identification and authentication, voting and recording of votes cast, vote counting, publication of election results. [16] Voter identification is required during of the electoral process: 1. first for voter registration in direction to establish the right to vote and then, at voting time, to allow a citizen to use their right to vote by authenticating if the person satisfies all the requirement sneeded to vote (authentication). [14] 2. Security is important of the e-voting process. Therefore the necessity of designing a secure e- voting system is very important. Generally, mechanisms that ensure the security and privacy of an election can be time consuming, expensive for election administrators, and inconvenient for voters.[12] Keywords: mobile; voting; digital voting; one time password (OTP), Pseudo-random number I. Introduction The aim of this research is to project an appropriate application for real time online electronic voting systems for polling commission.[17]The voting is to permit voters to use their right to prompt their 3. There are different stages of e-voting security. Therefore serious actions must be occupied to keep it out of public domain. Also, security must be practical to hide votes from publicity. [9] 4. There is no capacity or measurement for acceptable security level, because the level depends on type of the information. An acceptable security level is a constant cooperation between usability and power of security method.[7] II. Literature Review In [1], the author Kohno T., Stubblefield A., Rubin A. and Wallach D. S, (2004), describes the security features of the electronic voting system and e-voting system is better than manual voting system. Also, the author shows that voters, without any insider privileges can cast unlimited votes without being detected by any mechanisms within the voting terminal software. In [2], the author CiprianStănică- Ezeanu (2008) reviewed e-voting procedure by describing its advantages and disadvantages. His work wasmajorly on the security measures such as firewalls or SSL communications which are necessary but not sufficient to guarantee the specificsecurity requirements of e-voting. Also, the author describes the additional layer of
  • 2. Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System DOI: 10.9790/0661-17513138 www.iosrjournals.org 32 | Page specialize dsecurity technology to address the specific risks posed by electronic voting and guarantee critical security requirements such as voters’ privacy, vote integrity and voter-verifiability. The author equally suggested the use of Biometrics and smartcard for authenticating users. One major issue the author stressed out is the difference between biometric and “classic” authentication like smart cards. The e-voting system proposed in [2] does not interact in any way with the biometric characteristics of the actual users, but still authenticates the user with the help of the user’s authentication certificate on the smart card. In [3],Manish K, Suresh K.T, Hanumanthappa. M, Evangelin G.D (2005) the author specified mainly on securing the voting system, by comparing the insecurities that exist in the manual voting system to that of the electronic voting system. Authors Rossler T.G (2011) in [4] suggested the use of Remote Internet Voting, with a view to enhance voter convenience, increase voter confidence and voter turnout. In the survey, authors suggested remote poll-site electronic voting as the best step forward as it provides better voter convenience, but at the same time, does not compromise security. In [5], the author Avi Rubin (2001) review the security measures needed for remote online voting system by focusing on two cases where voters cast their ballots over the Internet – the 2000 Arizona Democratic Primary and the University of Virginia Student Council Elections. The author claims that a secure voting system must thoroughly satisfy four major requirements: authentication, availability, confidentiality and integrity. III. Problem Statement Making the electronic voting system has an obligation of security and of acquiring user confidence , usually user can access to the electronic voting system and voting on the text without security system, that any user can access to the electronic voting system through the ID number for another user and he/she can vote more than one time at the same text, The users could know the result of voting during the process of voting which make the system dicey and mistrust, The user can dominate the result of voting by the access that he or she has of the result before the end of election day.[8] IV. System Model Electric Election systems are capable to mark the voting system more controlled, secure and speedy. E-Election system helps public to elect their representatives more securely and express their preferences for how they want to be governed. [6] Election development has very strong media coverage mainly, if something goes wrong [10]. This system will increase the level of security and make the trust and confidence in voters. The origin of Maoist violence and presented that public need a more secure method of casting their vote. [16] To make the voting system trust well-meaning is very hard just because it needs high security requirements: privacy and integrity. Confidentiality means all voters developconfident about the privacy of votes and prevent export of votes. Integrity means declaration of perfect results of elections and the correct including of votes. Integrity is easy to become through a public show of hands, but this dissipates confidentiality and confidentiality comes from the secret ballots, but this fails the integrity. The full E- Election system provides people to vote in a secure way without any fear. The online voting system also providing the security to the voter’s by storing the vote in a secure digital form, if the voter votes beside spiteful applicant. This system also guarantees not to leak the vote in obverse of anyone. Figure 1: Diagram of analyzing voters section
  • 3. Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System DOI: 10.9790/0661-17513138 www.iosrjournals.org 33 | Page V. Proposed Implementation The Online Voting should: • Be able to display all registered voters in the database to the SYSTEM ADMIN(s) as per their access rights and privileges. • Have a user-friendly interface and user guides understandable by people of average computer skills. • Be robust enough so that users do not corrupt it in the event of voting. • Be able to handle multiple users at the same time and with the same efficiency, this will cater for the large and ever growing population of voters. OTP The Main Security implementation of our project is the concept of One Time Password i.e. every time a new password is generated and sent to the user on his mobile phone. One Time Password is a Random 6 Digit Number that changes every time, whenever user logs on to the system and performs some transaction. User gets OTP User Client Servervia server The Concept has been implemented in such a way that it adds high level of security to our banking Application. Figure 2: proposed Flow chart The Flow chart of the mobile voting shows the sequential flow of how the data passes from one activity to another. It starts from Registration, Login and Forgot password .The Fig 2 shows the initial screen when the application starts. It has the login form, registration and forgot password and then continues Registration: - This option is used when the user is first registering through the application. It will take them to a registration screen. Login:This option allows us to log us in for voting.
  • 4. Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System DOI: 10.9790/0661-17513138 www.iosrjournals.org 34 | Page Result Activity: The task of voter registration is strictly preserved for the system administrator. Therefore if you are logged in as a mere user/voter, you don’t have this privilege, therefore, the registration page link is disabled for you. OTP Activity: The task of OTP (one time password) is to send a mobile phone on the registered mobile after logging in theaccount, so that we can cast vote only after we are authorized to do so by the OTP sends us a random message on our mobile an random number and then wecan insert the number to vote. Voting Activity: - After voting, a voter is allowed tocheck the results by visiting the results page. VI. Result The proposed Online Voting System with OTP scheme is described in this section. In this proposed method we will commence the work with database creation. In order to create the database we collect the voter detail from different voters as shown in the figures. Figure 1: Voter registration form Figure 2: Admin Login form
  • 5. Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System DOI: 10.9790/0661-17513138 www.iosrjournals.org 35 | Page Figure 3: Activate to voter by Admin permission Figure 4: New Politician form Figure 5: New voter login form with authorized voter id, AADHAAR id and password
  • 6. Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System DOI: 10.9790/0661-17513138 www.iosrjournals.org 36 | Page Figure 6: Access OTP on registered mobile for vote Figure 7: Now validate OTP Figure 8: voter get successfully vote
  • 7. Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System DOI: 10.9790/0661-17513138 www.iosrjournals.org 37 | Page Figure 9: Final result VII. Conclusion Genuine voter In Present time, OTP (one time password) applications are increased. Security is an important issue for handling such services. Current system provide security card based facility to authenticate user but this is not secure enough and may not be available on any time or situation. To overcome such type of issues we propose online e-Voting authentication system using OTP with aadhaar id and pseudorandom number generator that identification is too complex which is improving the security for brute force attack. The practicable future scope of the project includes the improvement in the security level of the system. In annexation to that it would be interesting to meet some other confidential primitives to improve the security level of online voting system. References [1]. Kohno T., Stubblefield A., Rubin A. and Wallach D. S, (2004), “Analysis of an Electronic Voting System”, In Proceedings of IEEE Symposium on Security and Privacy 2004, pp. 1-23 [2]. CiprianStănică-Ezeanu (2008), “e-Voting Security”, Buletinul Universităţii Petrol – Gaze din Ploieşti, Vol. LX (2), pp 93-97 [3]. Manish K, Suresh K.T, Hanumanthappa. M Evangelin G.D (2005), “Secure Mobile Based Voting System”, Retrieved online at http:// www.iceg.net/2008/books/2/35_324_350.pdf on November 17th 2012. [4]. Rossler T.G (2011),”E-voting: A survey and Introduction”,Availableathttp://wiki.agoraciudadana. org/images/5/56/An%2BIntroduction%2Bto%2BElec tronic%2BVoting%2BSchemes.pdf Retrieved on 15th June 2012. [5]. Avi Rubin (2001),”Security Considerations for Remote Electronic Voting over the Internet”, AT&T Labs – Research Florham Park, NJ. Available at http://avirubin.com/evoting.security.html, (date accessed 7th July, 2012). [6]. Dr. Aree Ali Mohammed, Ramyar Abdolrahman Timour, “Efficient E-Voting Android Based System”, Volume 3, Issue 11, November 2013, ISSN: 2277,128X [7]. JaideepMurkute, HemantNagpure, HarshalKuthe, NehaMohadikar, ChaitaliDevade, “Online Banking AuthenticationSystem Using QR-Code and Mobile OTP”,Vol.3, Issue 2, March-April 2013, ISSN: 2248-9622. [8]. Kim, K and Hong, D (2007), “Electronic Voting System using Mobile Terminal. World Academy of Science, Engineering and Technology, Vol .3(2), pp.33-37 [9]. ] A. Chefranov, “One–Time Password Authentication with Infinite Hash Chains. Novel Algorithms and Techniques”, In Telecommunications, Automation and Industrial Electronics, 2008, pp. 283-286 [10]. Noha E. El-Sayad, Rabab Farouk Abdel-Kader, Mahmoud Ibraheem Marie” Face Recognition as an Authentication Technique in Electronic Voting” -(IJACSA). [11]. SKINNER, C. “75% of young adults want to vote by sms in the election. 89% expect text voting to be introduced soon”. PC ADVISOR. February18,2010. [12]. Mohamed HamdyEldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, “OTP- Based Two-Factor Authentication Using Mobile Phones”,Eighth International Conference On Information Technology: New Generations, 2011. [13]. W. Smith, “New cryptographic election protocol with best-known theoretical properties,” in Proc. Of Workshop on Frontiers in Electronic Elections, 2005. [14]. S. G. Weber, R. Araujo, and J. Buchmann, “On coercion-resistant electronic elections with lineawork,” in The Second International Conference on Availability, Reliability and Security (ARES2007), april 2007, pp. 908–916. [15]. R. Araujo, S. Foulle, and J. Traore, “A practical and secure coercionresistant scheme for remote elections,” Frontiers of Electronic Voting, vol. 7311, 2007. [16]. Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai “A Verifiable Electronic Voting Scheme Over the Internet”, 2009 Sixth International Conference on Information Technology: New Generations [17]. G.O. Ofori-Dwumfuo and E. Paatey , “The Design of an Electronic Voting System“, Research Journal of Information Technology 3(2): 91-98, 2011 ISSN: 2041-3114
  • 8. Performance Improvement using Pseudorandom One Time Password (OTP) in Online Voting System DOI: 10.9790/0661-17513138 www.iosrjournals.org 38 | Page [18]. Tai-Pang Wu, , Sai-Kit, Yeung,JiayaJia, Chi- Keung Tang, AndGe´ RardMedioni Closed-Form Solution To Tensor Voting:TheoryAndApplicationsTransactions On Pattern Analysis And Machine Intelligence, Vol. 34, No. 8, August 2012 [19]. Scott Wolchok, Eric Wustrow, Dawn Isabel, and J. Alex Halderman Attacking the Washington, D.C. Internet Voting System In Proc. 16th Conference on Financial Cryptography & Data Security, Feb. 2012 [20]. Jossy P. George Saleem S TevaramaniAnd K B RajaPerformance Comparison Of Face Recognition [21]. Using Transform Domain Techniques World Of Computer Science And Information Technology Journal (WCSIT) ISSN: 2221- 0741 Vol. 2, No. 3, 82-89, 2012