This document is a seminar synopsis on global wireless e-voting submitted by Pushkar Zagade. It proposes a system where voter eligibility is determined by retina scanning and votes are transmitted via radio waves to a remote server for storage, preventing manipulation of vote counts at individual voting machines. The system aims to provide high security, authentication, reliability and prevent corruption through minimizing human involvement. Key features described include retina scanning, radio wave transmission of votes to a server, matching scans to a voter database, and generating acknowledgments to allow voting.
1. PushkarZagade
A
Seminar Synopsis
On
“Global Wireless E-Voting”
Submitted to
JSPM’s
JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING
PUNE 28
SavitribaiPhule Pune University, Pune
In Partial Fulfillment of
T.E. Computer Engineering
T.E. Semester II
Submitted by
Mrs. Pushkar Girish Zagade
Under the Guidance of
Prof. Ishwar Kalbandi
Department Of Computer Engineering
JSPM’s
JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING
Academic Year 2014-15
1
2. PushkarZagade
Abstract
With significant U.S. federal funds now available to replace outdated
punch-card and mechanical voting systems, municipalities and states through-
out the U.S. are adopting paperless electronic voting. systems from a number
of different vendors. We present a security analysis of the source code to one
such machine used in a significant share of the market. Our analysis shows
that this voting system is far below even the most minimal security stan-
dards applicable in other contexts. We identify several problems including
unauthorized privilege escalation, incorrect use of cryptography, vulnerabil-
ities to network threats, and poor software development processes. We show
that voters, without any insider privileges, can cast unlimited votes without
being detected by any mechanisms within the voting terminal software. Fur-
thermore, we show that even the most serious of our outsider attacks could
have been discovered and executed without access to the source code. In
the face of such attacks, the usual worries about insider threats are not the
only concerns; outsiders can do the damage. That said, we demonstrate
that the insider threat is also quite considerable, showing that not only can
an insider, such as a poll worker, modify the votes, but that insiders can
also violate voter privacy and match votes with the voters who cast them.
We conclude that this voting system is unsuitable for use in a general elec-
tion. Any paperless electronic voting system might suffer similar flaws, de-
spite any certification it could have otherwise received. We suggest that the
best solutions are voting systems having a voter-verifiable audit trail,where
a computerized voting system might print a paper ballot that can be read and
verified by the voter.
2
3. PushkarZagade
1 Introduction
In the era of technology, the voting machine, which is present today, is highly
unsecured. Being in the age of Computers we are compromising the security
by opting for Electronic voting machine because in the present electronic vot-
ing machine is not intelligent that is it cannot determine the person came for the
voting is eligible or not . That mean the whole control is kept in the hand of vot-
ing in charge officer. One more risk with the present voting machine is that any
body can increase the vote count, since the count is present in the machine itself.
In proposed machine that is Global Wireless E-Voting , the machine is made
intelligent which can determine the eligibility of the voter by scanning the eye
pattern and also the vote count is not kept into the same machine itself instead of
it it is store in the remote server by converting it into radio waves. Here there is no
chance of increasing the vote count of machine. Even in case of damage to voting
machine there will not be harm to continuity of the election process.
2 Working Of Whole System
Whenever voters enter to voting booth then he will be instructed to directly
look at retina scanning machine at this time the machine scans the retina. once
retina scanning properly confirmed then it sent signal to the voting machine as to
accept the vote it will be powered on .then voter is made to vote. Now the whole
data including the retina pattern is sent to interfacing device which convert into
radio waves of mobile frequency range and these radio waves are sent to mobile
tower and then to the remote server, where the authentication and voters identi-
fication is stored into a secured database.This will helpfull for us.The received
data is first converted into digital format from the radio waves through the in-
terface device kept at the server side, and then retina pattern and vote separated.
Next the retina pattern is matched against the existing database .If match is
found then flag is check which indicates its voting status i.e. if the voter is not
voted yet then +veack is send to the mobile tower and then to the corresponding
voting machine. This ack is recognized by the receiver kept at the voter side and
machine is made to scan next retina pattern and vote, otherwise if -veack then alert
alarm is made to ring.So this is working of whole global wireless e-voting system.
3
4. PushkarZagade
3 Application
• We can use big data to collect large set of informations and use it for data ware
house purpose.
• Using this technique we can predict the weather information of next 2,3 month
in advance . Using this we can avoid the delays as well as cancellation of
flight due to bad weather.
• Big data can also use for data mining purpose.
• By using big data we can analyse the large set of information.
4 Conclusion
Thus this machine can be used for any level voting purpose. The machine pro-
vides high level of security, authentication, reliability, and corruption -free mech-
anism. By this we can get result with in minute after a completion of voting..
Minimum manpower Utilization, hence mechanism is error free.
4
5. PushkarZagade
References
[1]C. Lambrinoudakis, S. Kokolakis, M. Karyda, V. Tsoumas,
D. Gritzalis, and S. Katsikas, Electronic Voting Systems:
Security Implications of the Administrative Workflow, in
DEXA 03: Proceedings of the 14th International Work-
shop on Database and Expert Systems Applications. Wash-
ington, DC, USA: IEEE Computer Society, 2003, p. 467.
[2] M. Volkamer and M. McGaley, Requirements and
Evaluation Procedures for eVoting, in ARES 07: Pro-
ceedings of the The Second International Conference
on Availability, Reliability and Security. Washington,
DC, USA: IEEE Computer Society, 2007, pp. 895902.
[3] T. Kohno, A. Stubblefield, A. Rubin, and D.
Wallach, Analysis of an Electronic Voting System,
in IEEE Symposium on Security and Privacy, 2004.
[4]K. Weldemariam and A. Villafiorita, Formal Procedural
Security Modeling and Analysis, in CRiSIS 08: Third Inter-
national Conference on Risks and Security of Internet and
Systems. Washington, DC, USA: IEEE, October 2008, pp. 249254.
[5] T. Kohno, A. Stubblefield, A. D. Rubin, and D. S.
Wallach, Analysis of an Electronic Voting System, Secu-
rity and Privacy, IEEE Symposium on, vol. 0, p. 27, 2004.
[6]M. Bellare, R. Canetti, and H. Krawczyk. Key-
ing hash functions for message authentication. In N.
Koblitz, editor, Advances in Cryptology CRYPTO 96,
volume 1109 of Lecture Notes in Computer Science,
pages 115. Springer-Verlag, Berlin Germany, Aug. 1996.
[7] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway.A con-
crete security treatment of symmetric encryption. In Proceedings
of the 38th Annual Symposium on Foundations of Computer
Science, pages 394403. IEEE Computer Society Press, 1997.
[8] M. Bellare and C. Namprempre. Authenticated encryption:
5
6. PushkarZagade
Relations among notions and analysis of the generic composition
paradigm. In T. Okamoto, editor, Advances in Cryptology ASI-
ACRYPT 2000, volume 1976 of Lecture Notes in Computer Sci-
ence, pages 531545. Springer-Verlag, Berlin Germany, Dec. 2000.
[9]California Internet Voting Task Force. A Re-
port on the Feasibility of Internet Voting,
Jan. 2000.http: //www.ss.ca.gov/executive/ivote/.
[10] Voting: What Is; What Could Be,
July 2001. http://www.vote.caltech.edu/Reports/.
6