GLOBAL WIRELESS E-VOTING
SUBMITTED BY: GUIDED BY:
DIBYA DARSHAN DAS ER.SAREETA MOHANTY
REGD NO -1001211636 ASSISTANT PROFESSOR
ROLL NO -110318
BRANCH – I T(A)
1
ONE CAN SHOP ONLINE –
So what makes
Voting via the Internet
so difficult?
2
Is it legally
possible to vote
via the Internet?
[Law]
How can electronic
voting via the Internet
work technically?
[Technology]
Does e-Voting raise
the voter turnout?
[Sociopolitics]
Law Technogy Sociopolitics
Overview
3
Contents-
i. Introduction
ii. Present System
iii. Disadvantages of the present system
iv. Proposed system
v. Block diagram
vi. Voting machine
vii.Block diagram of the Client Side Circuit
viii.Eye retina scanning
ix. Interface device
x. Hurdles in the path of implementation
xi. Future enhancements
xii. Conclusion 4
INTRODUCTION
5
Now days voting system is replaced by
electronic machine to carry out voting.
In Global Wireless E-Voting , the
machine is made intelligent which can
determine the eligibility of the voter and
also the vote count is not kept into the
same machine itself instead of it ,it is store
in the remote server.
PRESENT SYSTEM-
 In a present system, each and every
section is given a electronic machine
which stores the votes of the people.
 Control of present system is given to
the in charge officer who check the
eligibility of the candidates for
voting.
 Finally we collect all the voting
machine at a place and go for
counting.
6
DISADVANTAGES OF THE
PRESENT SYSTEM-
 Re-election
 Can not check Eligibility
 Increase the count of voting
 Transportation
 It is cost effective.
 The person from any other region cannot vote
in for a candidate of other region.
 The voting takes place where the machine is
located. 7
PROPOSED SYSTEM-
Now considering these all disadvantages of the
present system, we proposed the system “Global
Wireless E-Voting”.
Remote secured system
Transfer of vote
Check eligibility
No need for Re-election
Internet
We can vote from anywhere
8
BLOCK DIAGRAM-
9
EXPLANATION-
1. Radio waves representing scanned retina pattern and vote to
Mobile tower.
2. Radio waves representing scanned retina pattern and vote to
remote server.
3. Acknowledgement (+ve or –ve) from the server to mobile tower.
4. Acknowledgement (+ve or –ve) from mobile tower to Interface
device.
5. Ready signal if retina is scanned properly to voting machine. And
if –ve signal then alert alarm will be activated.
6. Accepted vote is made to flow to the interface device.
10
VOTING MACHINE-
 The voting machine is actually a device
which generates the different voltages for
different votes these voltages are fed to the
(ADC) which is then converted to digital
bits then can be converted to radio waves.
11
BLOCK DIAGRAM OF THE
CLIENT SIDE CIRCUIT-
12
EYE RETINA SCANNING-
 The eye retina machine be a simple web
cam or device which can capture the images
effectively .the captured image will be
represented in the form of a matrix where
each pixel represents 24-bit (RGB, 8+8+8
format)
13
INTERFACE DEVICE -
 This is an electronic kit which converts the
input digital signals such as (retina pattern +
votes+ secure bits) to radio waves.
14
WORKING OF WHOLE SYSTEM-
 Whenever voters enter to voting booth then he
will be instructed to directly look at retina
scanning machine and the machine scans the
retina after that voter is made to vote.
 Now the whole data including the retina pattern
is sent to interfacing device which converts it
into radio waves and these radio waves are sent
to mobile tower.
 And then to the remote server, where the
authentication and voters identification is stored
into a secured database. 15
CONTINUED…
The received data is first converted into
digital format from the radio waves through
the interface device kept at the server side,
and then retina pattern and vote separated.
Next the retina pattern is matched against
the existing database .
If match is found then flag is check which
indicates its voting status i.e. +ve ack.
This ack is recognized by the receiver kept
at the voter side and machine is made to
scan next retina pattern and vote, otherwise
if –ve ack then alert alarm is made to ring.16
HURDLES IN THE PATH OF
IMPLEMENTATION-
 Security
 Efficiency
 Geographical Problems
17
SECURITY-
 Uses Key Complex Encryption
algorithm
 First it finds the length of the string.
 Generate the random numbers equal
to the length of the string.
 Add the corresponding Characters
from the given string and random
values.
18
E.g. KSHITIJ
A) 8 12 34 4 11 9 26
 The ASCII value for KSHITIJ are
K S H I T I J
B) 75 83 72 73 84 73 74
 Add corresponding A) and B) values as
8+75 12+83 34+72 4+73 11+84 9+73 26+74
83 95 106 77 95 82 100
19
Continued…
The corresponding ASCII characters for these are
S _ j M _ R d
The corresponding characters for random values
      
Finally encrypted data as
S  _  j  M  _  R  d 
This makes encryption of data in such a way that decryption
becomes easy.
20
EFFICIENCY-
 Applying compression Algorithms
 Using distributed Operating system
environment with multiple servers.
 CDMA technique
21
k1*d1+
k2*d2 +
k3*d3+
k4*d4
Key 1
data 1
Key 3
data 3
Key 4
data 4
Key 2
data 2
22
CONTINUED
 key values are orthogonal to each other.
i.e. k1*k2=0 and k*k1=1
 The data will be in the form of d1*k1
i.e. data * key .
 If we try to decode with k2 key then effect will be
as d1*k1*K2=0.
 Hence it is clear that data will be vanished.
 If the correct decoding key k1 is used, then the
decoding will be as represented d1*k1*k1=d1
 This decodes the data correctly.
23
GEOGRAPHICAL PROBLEMS-
 It occurs where the technical facilities
service is not present.
 In this case will convert the vote and retina
pattern into the electrical information .
 And pass it through the electrical
conductors until we reach the area where
the technical facilities like internet or
mobile tower is available.
 Here the eye scanner will be web cam.
24
Future Enhancements-
25
CONTINUED…
 This project can be enhanced to work
over the mobiles that is voting is
made possible through the mobile
through SMS.
 This machine can be made vote
through the INTERNET.
26
CONCLUSION-
 Provides high level of security,
authentication, reliability, and
corruption-free mechanism.
 By this we can get result with in
minute after a completion of voting.
 Minimum manpower Utilization,
hence mechanism is error free.
27
28
29
THANK YOU

Global wireless e voting

  • 1.
    GLOBAL WIRELESS E-VOTING SUBMITTEDBY: GUIDED BY: DIBYA DARSHAN DAS ER.SAREETA MOHANTY REGD NO -1001211636 ASSISTANT PROFESSOR ROLL NO -110318 BRANCH – I T(A) 1
  • 2.
    ONE CAN SHOPONLINE – So what makes Voting via the Internet so difficult? 2
  • 3.
    Is it legally possibleto vote via the Internet? [Law] How can electronic voting via the Internet work technically? [Technology] Does e-Voting raise the voter turnout? [Sociopolitics] Law Technogy Sociopolitics Overview 3
  • 4.
    Contents- i. Introduction ii. PresentSystem iii. Disadvantages of the present system iv. Proposed system v. Block diagram vi. Voting machine vii.Block diagram of the Client Side Circuit viii.Eye retina scanning ix. Interface device x. Hurdles in the path of implementation xi. Future enhancements xii. Conclusion 4
  • 5.
    INTRODUCTION 5 Now days votingsystem is replaced by electronic machine to carry out voting. In Global Wireless E-Voting , the machine is made intelligent which can determine the eligibility of the voter and also the vote count is not kept into the same machine itself instead of it ,it is store in the remote server.
  • 6.
    PRESENT SYSTEM-  Ina present system, each and every section is given a electronic machine which stores the votes of the people.  Control of present system is given to the in charge officer who check the eligibility of the candidates for voting.  Finally we collect all the voting machine at a place and go for counting. 6
  • 7.
    DISADVANTAGES OF THE PRESENTSYSTEM-  Re-election  Can not check Eligibility  Increase the count of voting  Transportation  It is cost effective.  The person from any other region cannot vote in for a candidate of other region.  The voting takes place where the machine is located. 7
  • 8.
    PROPOSED SYSTEM- Now consideringthese all disadvantages of the present system, we proposed the system “Global Wireless E-Voting”. Remote secured system Transfer of vote Check eligibility No need for Re-election Internet We can vote from anywhere 8
  • 9.
  • 10.
    EXPLANATION- 1. Radio wavesrepresenting scanned retina pattern and vote to Mobile tower. 2. Radio waves representing scanned retina pattern and vote to remote server. 3. Acknowledgement (+ve or –ve) from the server to mobile tower. 4. Acknowledgement (+ve or –ve) from mobile tower to Interface device. 5. Ready signal if retina is scanned properly to voting machine. And if –ve signal then alert alarm will be activated. 6. Accepted vote is made to flow to the interface device. 10
  • 11.
    VOTING MACHINE-  Thevoting machine is actually a device which generates the different voltages for different votes these voltages are fed to the (ADC) which is then converted to digital bits then can be converted to radio waves. 11
  • 12.
    BLOCK DIAGRAM OFTHE CLIENT SIDE CIRCUIT- 12
  • 13.
    EYE RETINA SCANNING- The eye retina machine be a simple web cam or device which can capture the images effectively .the captured image will be represented in the form of a matrix where each pixel represents 24-bit (RGB, 8+8+8 format) 13
  • 14.
    INTERFACE DEVICE - This is an electronic kit which converts the input digital signals such as (retina pattern + votes+ secure bits) to radio waves. 14
  • 15.
    WORKING OF WHOLESYSTEM-  Whenever voters enter to voting booth then he will be instructed to directly look at retina scanning machine and the machine scans the retina after that voter is made to vote.  Now the whole data including the retina pattern is sent to interfacing device which converts it into radio waves and these radio waves are sent to mobile tower.  And then to the remote server, where the authentication and voters identification is stored into a secured database. 15
  • 16.
    CONTINUED… The received datais first converted into digital format from the radio waves through the interface device kept at the server side, and then retina pattern and vote separated. Next the retina pattern is matched against the existing database . If match is found then flag is check which indicates its voting status i.e. +ve ack. This ack is recognized by the receiver kept at the voter side and machine is made to scan next retina pattern and vote, otherwise if –ve ack then alert alarm is made to ring.16
  • 17.
    HURDLES IN THEPATH OF IMPLEMENTATION-  Security  Efficiency  Geographical Problems 17
  • 18.
    SECURITY-  Uses KeyComplex Encryption algorithm  First it finds the length of the string.  Generate the random numbers equal to the length of the string.  Add the corresponding Characters from the given string and random values. 18
  • 19.
    E.g. KSHITIJ A) 812 34 4 11 9 26  The ASCII value for KSHITIJ are K S H I T I J B) 75 83 72 73 84 73 74  Add corresponding A) and B) values as 8+75 12+83 34+72 4+73 11+84 9+73 26+74 83 95 106 77 95 82 100 19 Continued…
  • 20.
    The corresponding ASCIIcharacters for these are S _ j M _ R d The corresponding characters for random values        Finally encrypted data as S  _  j  M  _  R  d  This makes encryption of data in such a way that decryption becomes easy. 20
  • 21.
    EFFICIENCY-  Applying compressionAlgorithms  Using distributed Operating system environment with multiple servers.  CDMA technique 21
  • 22.
    k1*d1+ k2*d2 + k3*d3+ k4*d4 Key 1 data1 Key 3 data 3 Key 4 data 4 Key 2 data 2 22
  • 23.
    CONTINUED  key valuesare orthogonal to each other. i.e. k1*k2=0 and k*k1=1  The data will be in the form of d1*k1 i.e. data * key .  If we try to decode with k2 key then effect will be as d1*k1*K2=0.  Hence it is clear that data will be vanished.  If the correct decoding key k1 is used, then the decoding will be as represented d1*k1*k1=d1  This decodes the data correctly. 23
  • 24.
    GEOGRAPHICAL PROBLEMS-  Itoccurs where the technical facilities service is not present.  In this case will convert the vote and retina pattern into the electrical information .  And pass it through the electrical conductors until we reach the area where the technical facilities like internet or mobile tower is available.  Here the eye scanner will be web cam. 24
  • 25.
  • 26.
    CONTINUED…  This projectcan be enhanced to work over the mobiles that is voting is made possible through the mobile through SMS.  This machine can be made vote through the INTERNET. 26
  • 27.
    CONCLUSION-  Provides highlevel of security, authentication, reliability, and corruption-free mechanism.  By this we can get result with in minute after a completion of voting.  Minimum manpower Utilization, hence mechanism is error free. 27
  • 28.
  • 29.