SlideShare a Scribd company logo
1 of 6
Download to read offline
PushkarZagade
A
Seminar Synopsis
On
“Global Wireless E-Voting”
Submitted to
JSPM’s
JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING
PUNE 28
SavitribaiPhule Pune University, Pune
In Partial Fulfillment of
T.E. Computer Engineering
T.E. Semester II
Submitted by
Mrs. Pushkar Girish Zagade
Under the Guidance of
Prof. Ishwar Kalbandi
Department Of Computer Engineering
JSPM’s
JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING
Academic Year 2014-15
1
PushkarZagade
Abstract
With significant U.S. federal funds now available to replace outdated
punch-card and mechanical voting systems, municipalities and states through-
out the U.S. are adopting paperless electronic voting. systems from a number
of different vendors. We present a security analysis of the source code to one
such machine used in a significant share of the market. Our analysis shows
that this voting system is far below even the most minimal security stan-
dards applicable in other contexts. We identify several problems including
unauthorized privilege escalation, incorrect use of cryptography, vulnerabil-
ities to network threats, and poor software development processes. We show
that voters, without any insider privileges, can cast unlimited votes without
being detected by any mechanisms within the voting terminal software. Fur-
thermore, we show that even the most serious of our outsider attacks could
have been discovered and executed without access to the source code. In
the face of such attacks, the usual worries about insider threats are not the
only concerns; outsiders can do the damage. That said, we demonstrate
that the insider threat is also quite considerable, showing that not only can
an insider, such as a poll worker, modify the votes, but that insiders can
also violate voter privacy and match votes with the voters who cast them.
We conclude that this voting system is unsuitable for use in a general elec-
tion. Any paperless electronic voting system might suffer similar flaws, de-
spite any certification it could have otherwise received. We suggest that the
best solutions are voting systems having a voter-verifiable audit trail,where
a computerized voting system might print a paper ballot that can be read and
verified by the voter.
2
PushkarZagade
1 Introduction
In the era of technology, the voting machine, which is present today, is highly
unsecured. Being in the age of Computers we are compromising the security
by opting for Electronic voting machine because in the present electronic vot-
ing machine is not intelligent that is it cannot determine the person came for the
voting is eligible or not . That mean the whole control is kept in the hand of vot-
ing in charge officer. One more risk with the present voting machine is that any
body can increase the vote count, since the count is present in the machine itself.
In proposed machine that is Global Wireless E-Voting , the machine is made
intelligent which can determine the eligibility of the voter by scanning the eye
pattern and also the vote count is not kept into the same machine itself instead of
it it is store in the remote server by converting it into radio waves. Here there is no
chance of increasing the vote count of machine. Even in case of damage to voting
machine there will not be harm to continuity of the election process.
2 Working Of Whole System
Whenever voters enter to voting booth then he will be instructed to directly
look at retina scanning machine at this time the machine scans the retina. once
retina scanning properly confirmed then it sent signal to the voting machine as to
accept the vote it will be powered on .then voter is made to vote. Now the whole
data including the retina pattern is sent to interfacing device which convert into
radio waves of mobile frequency range and these radio waves are sent to mobile
tower and then to the remote server, where the authentication and voters identi-
fication is stored into a secured database.This will helpfull for us.The received
data is first converted into digital format from the radio waves through the in-
terface device kept at the server side, and then retina pattern and vote separated.
Next the retina pattern is matched against the existing database .If match is
found then flag is check which indicates its voting status i.e. if the voter is not
voted yet then +veack is send to the mobile tower and then to the corresponding
voting machine. This ack is recognized by the receiver kept at the voter side and
machine is made to scan next retina pattern and vote, otherwise if -veack then alert
alarm is made to ring.So this is working of whole global wireless e-voting system.
3
PushkarZagade
3 Application
• We can use big data to collect large set of informations and use it for data ware
house purpose.
• Using this technique we can predict the weather information of next 2,3 month
in advance . Using this we can avoid the delays as well as cancellation of
flight due to bad weather.
• Big data can also use for data mining purpose.
• By using big data we can analyse the large set of information.
4 Conclusion
Thus this machine can be used for any level voting purpose. The machine pro-
vides high level of security, authentication, reliability, and corruption -free mech-
anism. By this we can get result with in minute after a completion of voting..
Minimum manpower Utilization, hence mechanism is error free.
4
PushkarZagade
References
[1]C. Lambrinoudakis, S. Kokolakis, M. Karyda, V. Tsoumas,
D. Gritzalis, and S. Katsikas, Electronic Voting Systems:
Security Implications of the Administrative Workflow, in
DEXA 03: Proceedings of the 14th International Work-
shop on Database and Expert Systems Applications. Wash-
ington, DC, USA: IEEE Computer Society, 2003, p. 467.
[2] M. Volkamer and M. McGaley, Requirements and
Evaluation Procedures for eVoting, in ARES 07: Pro-
ceedings of the The Second International Conference
on Availability, Reliability and Security. Washington,
DC, USA: IEEE Computer Society, 2007, pp. 895902.
[3] T. Kohno, A. Stubblefield, A. Rubin, and D.
Wallach, Analysis of an Electronic Voting System,
in IEEE Symposium on Security and Privacy, 2004.
[4]K. Weldemariam and A. Villafiorita, Formal Procedural
Security Modeling and Analysis, in CRiSIS 08: Third Inter-
national Conference on Risks and Security of Internet and
Systems. Washington, DC, USA: IEEE, October 2008, pp. 249254.
[5] T. Kohno, A. Stubblefield, A. D. Rubin, and D. S.
Wallach, Analysis of an Electronic Voting System, Secu-
rity and Privacy, IEEE Symposium on, vol. 0, p. 27, 2004.
[6]M. Bellare, R. Canetti, and H. Krawczyk. Key-
ing hash functions for message authentication. In N.
Koblitz, editor, Advances in Cryptology CRYPTO 96,
volume 1109 of Lecture Notes in Computer Science,
pages 115. Springer-Verlag, Berlin Germany, Aug. 1996.
[7] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway.A con-
crete security treatment of symmetric encryption. In Proceedings
of the 38th Annual Symposium on Foundations of Computer
Science, pages 394403. IEEE Computer Society Press, 1997.
[8] M. Bellare and C. Namprempre. Authenticated encryption:
5
PushkarZagade
Relations among notions and analysis of the generic composition
paradigm. In T. Okamoto, editor, Advances in Cryptology ASI-
ACRYPT 2000, volume 1976 of Lecture Notes in Computer Sci-
ence, pages 531545. Springer-Verlag, Berlin Germany, Dec. 2000.
[9]California Internet Voting Task Force. A Re-
port on the Feasibility of Internet Voting,
Jan. 2000.http: //www.ss.ca.gov/executive/ivote/.
[10] Voting: What Is; What Could Be,
July 2001. http://www.vote.caltech.edu/Reports/.
6

More Related Content

What's hot

Global Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanGlobal Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanShubh Agarwal
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting systemAbhishek Abhi
 
Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-votingashujain55
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communicationNitish Tanwar
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkSrija Kumar
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
IoT and its Applications
IoT and its ApplicationsIoT and its Applications
IoT and its ApplicationsAbdulla Shaheen
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxNShravani1
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-winsAakashkumar276
 
Fingerprint based voting machine ppt
Fingerprint based voting machine pptFingerprint based voting machine ppt
Fingerprint based voting machine pptitzmemidhu
 
Smart Camera as Embedded System
Smart Camera as Embedded SystemSmart Camera as Embedded System
Smart Camera as Embedded SystemPunnam Chandar
 
soldier tracking and health monitoring system
soldier tracking and health monitoring systemsoldier tracking and health monitoring system
soldier tracking and health monitoring systemJoshpin Bala.B
 
IoT Based Intelligent Bin For Smart Cities
IoT Based Intelligent Bin For Smart CitiesIoT Based Intelligent Bin For Smart Cities
IoT Based Intelligent Bin For Smart CitiesAbhisek Sahoo
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksNaveen Kumar
 

What's hot (20)

Global Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanGlobal Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scan
 
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
 
Global wireless e voting system
Global wireless e voting systemGlobal wireless e voting system
Global wireless e voting system
 
Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-voting
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communication
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
IoT and its Applications
IoT and its ApplicationsIoT and its Applications
IoT and its Applications
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptx
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-wins
 
Body Area Network
Body Area NetworkBody Area Network
Body Area Network
 
Fingerprint based voting machine ppt
Fingerprint based voting machine pptFingerprint based voting machine ppt
Fingerprint based voting machine ppt
 
Smart Camera as Embedded System
Smart Camera as Embedded SystemSmart Camera as Embedded System
Smart Camera as Embedded System
 
soldier tracking and health monitoring system
soldier tracking and health monitoring systemsoldier tracking and health monitoring system
soldier tracking and health monitoring system
 
IoT Based Intelligent Bin For Smart Cities
IoT Based Intelligent Bin For Smart CitiesIoT Based Intelligent Bin For Smart Cities
IoT Based Intelligent Bin For Smart Cities
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 

Viewers also liked

Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"Nadezhda Pchelnikova
 
divorce in bc by reliable divorce
divorce in bc by reliable divorcedivorce in bc by reliable divorce
divorce in bc by reliable divorceDheeraj Chohil
 
stouffl_hyo13rapport
stouffl_hyo13rapportstouffl_hyo13rapport
stouffl_hyo13rapportLoïc Stouff
 
SAP ABAP-Archana Jha
SAP ABAP-Archana JhaSAP ABAP-Archana Jha
SAP ABAP-Archana JhaArchana Jha
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]Anton Kaska
 
Diapo bien utiliser
Diapo bien utiliserDiapo bien utiliser
Diapo bien utilisercdironsard
 
OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1ojo olurinde
 
Estructura Client-Servidor
Estructura Client-ServidorEstructura Client-Servidor
Estructura Client-ServidorAndreaFP99
 
Self Improvement Complete Directory
Self Improvement Complete DirectorySelf Improvement Complete Directory
Self Improvement Complete Directorykindheartedpred87
 
1Staff attraction and retention RF- Chris Ang
1Staff attraction and retention RF- Chris Ang1Staff attraction and retention RF- Chris Ang
1Staff attraction and retention RF- Chris AngChristopher W. Ang
 

Viewers also liked (17)

GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)
 
Guggenheim
GuggenheimGuggenheim
Guggenheim
 
Kraken
KrakenKraken
Kraken
 
Project 2
Project 2Project 2
Project 2
 
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
 
divorce in bc by reliable divorce
divorce in bc by reliable divorcedivorce in bc by reliable divorce
divorce in bc by reliable divorce
 
stouffl_hyo13rapport
stouffl_hyo13rapportstouffl_hyo13rapport
stouffl_hyo13rapport
 
1474595020.pdf ปุ๋ย 9
1474595020.pdf ปุ๋ย 91474595020.pdf ปุ๋ย 9
1474595020.pdf ปุ๋ย 9
 
SAP ABAP-Archana Jha
SAP ABAP-Archana JhaSAP ABAP-Archana Jha
SAP ABAP-Archana Jha
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]
 
Diapo bien utiliser
Diapo bien utiliserDiapo bien utiliser
Diapo bien utiliser
 
Sithen SUM's Profile 2015
Sithen SUM's Profile 2015Sithen SUM's Profile 2015
Sithen SUM's Profile 2015
 
OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1
 
Estructura Client-Servidor
Estructura Client-ServidorEstructura Client-Servidor
Estructura Client-Servidor
 
Self Improvement Complete Directory
Self Improvement Complete DirectorySelf Improvement Complete Directory
Self Improvement Complete Directory
 
Curriculum_Vitae
Curriculum_VitaeCurriculum_Vitae
Curriculum_Vitae
 
1Staff attraction and retention RF- Chris Ang
1Staff attraction and retention RF- Chris Ang1Staff attraction and retention RF- Chris Ang
1Staff attraction and retention RF- Chris Ang
 

Similar to GLOBAL WIRELESS E-VOTING

A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...SIR SUCCESS PRINCE DUAH DUAH
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainIRJET Journal
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET Journal
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...Mohamed Fomagha Tatou
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET Journal
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET Journal
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET Journal
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS cscpconf
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java ServletsIRJET Journal
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...IRJET Journal
 
Embedded Based Electronic Voting Machine Using Password
Embedded Based Electronic Voting Machine Using PasswordEmbedded Based Electronic Voting Machine Using Password
Embedded Based Electronic Voting Machine Using PasswordIJERA Editor
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 

Similar to GLOBAL WIRELESS E-VOTING (20)

A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
F017513138
F017513138F017513138
F017513138
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
 
Bu25425429
Bu25425429Bu25425429
Bu25425429
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
Embedded Based Electronic Voting Machine Using Password
Embedded Based Electronic Voting Machine Using PasswordEmbedded Based Electronic Voting Machine Using Password
Embedded Based Electronic Voting Machine Using Password
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 

GLOBAL WIRELESS E-VOTING

  • 1. PushkarZagade A Seminar Synopsis On “Global Wireless E-Voting” Submitted to JSPM’s JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING PUNE 28 SavitribaiPhule Pune University, Pune In Partial Fulfillment of T.E. Computer Engineering T.E. Semester II Submitted by Mrs. Pushkar Girish Zagade Under the Guidance of Prof. Ishwar Kalbandi Department Of Computer Engineering JSPM’s JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING Academic Year 2014-15 1
  • 2. PushkarZagade Abstract With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states through- out the U.S. are adopting paperless electronic voting. systems from a number of different vendors. We present a security analysis of the source code to one such machine used in a significant share of the market. Our analysis shows that this voting system is far below even the most minimal security stan- dards applicable in other contexts. We identify several problems including unauthorized privilege escalation, incorrect use of cryptography, vulnerabil- ities to network threats, and poor software development processes. We show that voters, without any insider privileges, can cast unlimited votes without being detected by any mechanisms within the voting terminal software. Fur- thermore, we show that even the most serious of our outsider attacks could have been discovered and executed without access to the source code. In the face of such attacks, the usual worries about insider threats are not the only concerns; outsiders can do the damage. That said, we demonstrate that the insider threat is also quite considerable, showing that not only can an insider, such as a poll worker, modify the votes, but that insiders can also violate voter privacy and match votes with the voters who cast them. We conclude that this voting system is unsuitable for use in a general elec- tion. Any paperless electronic voting system might suffer similar flaws, de- spite any certification it could have otherwise received. We suggest that the best solutions are voting systems having a voter-verifiable audit trail,where a computerized voting system might print a paper ballot that can be read and verified by the voter. 2
  • 3. PushkarZagade 1 Introduction In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of Computers we are compromising the security by opting for Electronic voting machine because in the present electronic vot- ing machine is not intelligent that is it cannot determine the person came for the voting is eligible or not . That mean the whole control is kept in the hand of vot- ing in charge officer. One more risk with the present voting machine is that any body can increase the vote count, since the count is present in the machine itself. In proposed machine that is Global Wireless E-Voting , the machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. 2 Working Of Whole System Whenever voters enter to voting booth then he will be instructed to directly look at retina scanning machine at this time the machine scans the retina. once retina scanning properly confirmed then it sent signal to the voting machine as to accept the vote it will be powered on .then voter is made to vote. Now the whole data including the retina pattern is sent to interfacing device which convert into radio waves of mobile frequency range and these radio waves are sent to mobile tower and then to the remote server, where the authentication and voters identi- fication is stored into a secured database.This will helpfull for us.The received data is first converted into digital format from the radio waves through the in- terface device kept at the server side, and then retina pattern and vote separated. Next the retina pattern is matched against the existing database .If match is found then flag is check which indicates its voting status i.e. if the voter is not voted yet then +veack is send to the mobile tower and then to the corresponding voting machine. This ack is recognized by the receiver kept at the voter side and machine is made to scan next retina pattern and vote, otherwise if -veack then alert alarm is made to ring.So this is working of whole global wireless e-voting system. 3
  • 4. PushkarZagade 3 Application • We can use big data to collect large set of informations and use it for data ware house purpose. • Using this technique we can predict the weather information of next 2,3 month in advance . Using this we can avoid the delays as well as cancellation of flight due to bad weather. • Big data can also use for data mining purpose. • By using big data we can analyse the large set of information. 4 Conclusion Thus this machine can be used for any level voting purpose. The machine pro- vides high level of security, authentication, reliability, and corruption -free mech- anism. By this we can get result with in minute after a completion of voting.. Minimum manpower Utilization, hence mechanism is error free. 4
  • 5. PushkarZagade References [1]C. Lambrinoudakis, S. Kokolakis, M. Karyda, V. Tsoumas, D. Gritzalis, and S. Katsikas, Electronic Voting Systems: Security Implications of the Administrative Workflow, in DEXA 03: Proceedings of the 14th International Work- shop on Database and Expert Systems Applications. Wash- ington, DC, USA: IEEE Computer Society, 2003, p. 467. [2] M. Volkamer and M. McGaley, Requirements and Evaluation Procedures for eVoting, in ARES 07: Pro- ceedings of the The Second International Conference on Availability, Reliability and Security. Washington, DC, USA: IEEE Computer Society, 2007, pp. 895902. [3] T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach, Analysis of an Electronic Voting System, in IEEE Symposium on Security and Privacy, 2004. [4]K. Weldemariam and A. Villafiorita, Formal Procedural Security Modeling and Analysis, in CRiSIS 08: Third Inter- national Conference on Risks and Security of Internet and Systems. Washington, DC, USA: IEEE, October 2008, pp. 249254. [5] T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach, Analysis of an Electronic Voting System, Secu- rity and Privacy, IEEE Symposium on, vol. 0, p. 27, 2004. [6]M. Bellare, R. Canetti, and H. Krawczyk. Key- ing hash functions for message authentication. In N. Koblitz, editor, Advances in Cryptology CRYPTO 96, volume 1109 of Lecture Notes in Computer Science, pages 115. Springer-Verlag, Berlin Germany, Aug. 1996. [7] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway.A con- crete security treatment of symmetric encryption. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, pages 394403. IEEE Computer Society Press, 1997. [8] M. Bellare and C. Namprempre. Authenticated encryption: 5
  • 6. PushkarZagade Relations among notions and analysis of the generic composition paradigm. In T. Okamoto, editor, Advances in Cryptology ASI- ACRYPT 2000, volume 1976 of Lecture Notes in Computer Sci- ence, pages 531545. Springer-Verlag, Berlin Germany, Dec. 2000. [9]California Internet Voting Task Force. A Re- port on the Feasibility of Internet Voting, Jan. 2000.http: //www.ss.ca.gov/executive/ivote/. [10] Voting: What Is; What Could Be, July 2001. http://www.vote.caltech.edu/Reports/. 6