SlideShare a Scribd company logo
1 of 7
M –Voting
secureMobile-basedvotingsystem
Presented by:
Raksha Shetty
Existing
System
Basic
Process
User sends his
fingerprint (in
encrypted
form) to the
service
provider
Service
Provider
checks the
mobile no.
and verifies
fingerprint
Sends voter
list through
SMS
User casts his
vote and
sends 2nd
message
Voter being
added for
counting
System
Architectur
e
Corresponds to
the mobile
equipment
(ME), which
consists of a
SIM card
Generates the authentication
parameters and authenticates
the mobile equipment
Verifies the legitimacy of the
voter and issues a voting
token to the voter Collects and counts the votes to
give the final result
Implemente
d Areas
 Recently NIGERIAN elections has gone through this process
with the help of Mobile Election Monitors of EU (European
Union)
 This proved to be a secure system
 Well connected remote areas
 Helped the handicapped people
 Mainly reduced violence, malpractices, huge investment of
government money
 Cost effective for the government
Pros &
Cons
Pros
• Improves Accessibility
• Secure Voting
• Cost Effective
• Time Consumption is less
Cons
• Electronic Failures
• Service provider must have
high-speed equipment
• Citizens should contact
correct SMS number in
order to avoid false voting
M – Voting

More Related Content

What's hot

Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting systemMonira Monir
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting systemSushrut Bhosale
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Votingashevch
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting TechnologyGautam Kumar
 
An Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification TechniquesAn Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification TechniquesAli Al-Shammari
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologytangytangling
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting systemjannatul haque
 
Biometric voting system_by_vinodh
Biometric  voting system_by_vinodhBiometric  voting system_by_vinodh
Biometric voting system_by_vinodhVinodh Kumar
 
online E-voting system
online E-voting systemonline E-voting system
online E-voting systemshubham patil
 
Secure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint techniqueSecure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint techniqueAshutha K
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting Systemapolama
 
Design Considerations for and Electronic Voting System
Design Considerations for and Electronic Voting SystemDesign Considerations for and Electronic Voting System
Design Considerations for and Electronic Voting SystemPosmart Systems Ltd
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
 
Computerized Voting System
Computerized Voting SystemComputerized Voting System
Computerized Voting SystemShirenMae
 

What's hot (20)

Secure e voting system
Secure e voting systemSecure e voting system
Secure e voting system
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting system
 
Estonian E-Voting
Estonian E-VotingEstonian E-Voting
Estonian E-Voting
 
Electronic Voting System
Electronic Voting SystemElectronic Voting System
Electronic Voting System
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
An Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification TechniquesAn Overview of E-Voting Systems and Vote Verification Techniques
An Overview of E-Voting Systems and Vote Verification Techniques
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technology
 
Fingerprint voting system
Fingerprint voting systemFingerprint voting system
Fingerprint voting system
 
Biometric voting system_by_vinodh
Biometric  voting system_by_vinodhBiometric  voting system_by_vinodh
Biometric voting system_by_vinodh
 
New e voting
New e votingNew e voting
New e voting
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
online E-voting system
online E-voting systemonline E-voting system
online E-voting system
 
Secure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint techniqueSecure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint technique
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Design Considerations for and Electronic Voting System
Design Considerations for and Electronic Voting SystemDesign Considerations for and Electronic Voting System
Design Considerations for and Electronic Voting System
 
E voting app
E voting appE voting app
E voting app
 
E voting
E votingE voting
E voting
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 
Computerized Voting System
Computerized Voting SystemComputerized Voting System
Computerized Voting System
 

Similar to M – Voting

A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS cscpconf
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureDr. Michael Agbaje
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java ServletsIRJET Journal
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET Journal
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET Journal
 
Impressive smart card based electronic voting system
Impressive smart card based electronic voting systemImpressive smart card based electronic voting system
Impressive smart card based electronic voting systemeSAT Journals
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMabadmgr
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET Journal
 
Electronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s DemocracyElectronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s Democracytheijes
 
Online Franchise Capturing Using IPv6 through Automated Teller Machines
Online Franchise Capturing Using IPv6 through Automated Teller MachinesOnline Franchise Capturing Using IPv6 through Automated Teller Machines
Online Franchise Capturing Using IPv6 through Automated Teller MachinesKausal Malladi
 

Similar to M – Voting (20)

Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS
 
O017658697
O017658697O017658697
O017658697
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System Architecture
 
F017513138
F017513138F017513138
F017513138
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
 
INNOVATIA
INNOVATIAINNOVATIA
INNOVATIA
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
 
GLOBAL WIRELESS E-VOTING
GLOBAL WIRELESS E-VOTINGGLOBAL WIRELESS E-VOTING
GLOBAL WIRELESS E-VOTING
 
IRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting SystemIRJET- Design and Development of Security based Voting System
IRJET- Design and Development of Security based Voting System
 
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOTIRJET-Effective and Secure E- Voting Application in GSM Module using IOT
IRJET-Effective and Secure E- Voting Application in GSM Module using IOT
 
Impressive smart card based electronic voting system
Impressive smart card based electronic voting systemImpressive smart card based electronic voting system
Impressive smart card based electronic voting system
 
Bu25425429
Bu25425429Bu25425429
Bu25425429
 
123countryspiders
123countryspiders123countryspiders
123countryspiders
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
 
ADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEMADVANCED ONLINE VOTING SYSTEM
ADVANCED ONLINE VOTING SYSTEM
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
EVM.pptx
EVM.pptxEVM.pptx
EVM.pptx
 
Electronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s DemocracyElectronic Voting: Challenges and Prospects in Nigeria’s Democracy
Electronic Voting: Challenges and Prospects in Nigeria’s Democracy
 
Online Franchise Capturing Using IPv6 through Automated Teller Machines
Online Franchise Capturing Using IPv6 through Automated Teller MachinesOnline Franchise Capturing Using IPv6 through Automated Teller Machines
Online Franchise Capturing Using IPv6 through Automated Teller Machines
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

M – Voting

  • 3. Basic Process User sends his fingerprint (in encrypted form) to the service provider Service Provider checks the mobile no. and verifies fingerprint Sends voter list through SMS User casts his vote and sends 2nd message Voter being added for counting
  • 4. System Architectur e Corresponds to the mobile equipment (ME), which consists of a SIM card Generates the authentication parameters and authenticates the mobile equipment Verifies the legitimacy of the voter and issues a voting token to the voter Collects and counts the votes to give the final result
  • 5. Implemente d Areas  Recently NIGERIAN elections has gone through this process with the help of Mobile Election Monitors of EU (European Union)  This proved to be a secure system  Well connected remote areas  Helped the handicapped people  Mainly reduced violence, malpractices, huge investment of government money  Cost effective for the government
  • 6. Pros & Cons Pros • Improves Accessibility • Secure Voting • Cost Effective • Time Consumption is less Cons • Electronic Failures • Service provider must have high-speed equipment • Citizens should contact correct SMS number in order to avoid false voting

Editor's Notes

  1. Mobile technology has attained heights and the market trend is that every citizens of India will possess a mobile handset by the year 2010 (at cheaper rates of service.) When such a PDA is available why not using it for a time saving, cost effective, secured method of voting.
  2. Electronic voting machines are currently used for vote casting. These systems allow the user to cast his vote reducing possible errors like wrong candidate selections and loss of votes, reducing manual work during counting. Still these have the drawbacks. Enabling the voter to vote with absolute confidentiality, nobody will ever know what he/she voted. Enabling the voter to vote from anywhere in the globe, wherever he/she will be, and without needing any special Network, nor equipment ,nor a personal computer(PC). Enabling only the voter to vote, avoiding the possibility to “sell a vote”. This system allows the user to cast his vote with high level of confidentiality and keep voters away from the possible threats like booth capturing and it may increase the voter turnouts in remote areas and even in urban areas.
  3. Every citizen above the age of 18 years has got the right to vote and hence obtaining their fingerprints and storing in the database along with their birth/death record becomes necessary User sends his finger print (secured print is encrypted and sent as sequence of data in encoded form) to the service provider. Service provider verifies the fingerprint and checks for the validity of voting and sends voter list (a mobile ballot paper) through SMS. User casts his vote and sends 2nd message. Since mobile phone has connectivity with computer systems it is easy to store and access at the service provider and results be published instantly.
  4. Voting Device (Mobile/Land Phone): In our scheme, the voting device corresponds to the mobile equipment (ME), which consists of a SIM card. Authentication Centre (AC): AC is an entity within the GSM network. AC generates the authentication parameters and authenticates the mobile equipment. Apart from authenticating the mobile equipment, AC is also an important information distribution server in the proposed scheme. AC needs to be trusted to transfer the messages as required. Verification Server (VS): VS belong to the voting authority, who organizes the voting event. It verifies the legitimacy of the voter and issues a voting token to the voter. VS also publish a list of voter information. Collecting and Counting Server (CS): CS is the server that collects and counts the votes to give the final result. CS’s action need to be audited by all candidate parties.
  5. Since the system operates on IVR platform the voter session will be interactive and user friendly which makes the user to feel in a very comfortable zone. The system provides security features like checking the unique identification number of the voter. As a measure of security features mobile devices allows the user to make use of biometric information’s which are unique to individuals.