SlideShare a Scribd company logo
PushkarZagade
A
Seminar Synopsis
On
“Global Wireless E-Voting”
Submitted to
JSPM’s
JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING
PUNE 28
SavitribaiPhule Pune University, Pune
In Partial Fulfillment of
T.E. Computer Engineering
T.E. Semester II
Submitted by
Mrs. Pushkar Girish Zagade
Under the Guidance of
Prof. Ishwar Kalbandi
Department Of Computer Engineering
JSPM’s
JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING
Academic Year 2014-15
1
PushkarZagade
Abstract
With significant U.S. federal funds now available to replace outdated
punch-card and mechanical voting systems, municipalities and states through-
out the U.S. are adopting paperless electronic voting. systems from a number
of different vendors. We present a security analysis of the source code to one
such machine used in a significant share of the market. Our analysis shows
that this voting system is far below even the most minimal security stan-
dards applicable in other contexts. We identify several problems including
unauthorized privilege escalation, incorrect use of cryptography, vulnerabil-
ities to network threats, and poor software development processes. We show
that voters, without any insider privileges, can cast unlimited votes without
being detected by any mechanisms within the voting terminal software. Fur-
thermore, we show that even the most serious of our outsider attacks could
have been discovered and executed without access to the source code. In
the face of such attacks, the usual worries about insider threats are not the
only concerns; outsiders can do the damage. That said, we demonstrate
that the insider threat is also quite considerable, showing that not only can
an insider, such as a poll worker, modify the votes, but that insiders can
also violate voter privacy and match votes with the voters who cast them.
We conclude that this voting system is unsuitable for use in a general elec-
tion. Any paperless electronic voting system might suffer similar flaws, de-
spite any certification it could have otherwise received. We suggest that the
best solutions are voting systems having a voter-verifiable audit trail,where
a computerized voting system might print a paper ballot that can be read and
verified by the voter.
2
PushkarZagade
1 Introduction
In the era of technology, the voting machine, which is present today, is highly
unsecured. Being in the age of Computers we are compromising the security
by opting for Electronic voting machine because in the present electronic vot-
ing machine is not intelligent that is it cannot determine the person came for the
voting is eligible or not . That mean the whole control is kept in the hand of vot-
ing in charge officer. One more risk with the present voting machine is that any
body can increase the vote count, since the count is present in the machine itself.
In proposed machine that is Global Wireless E-Voting , the machine is made
intelligent which can determine the eligibility of the voter by scanning the eye
pattern and also the vote count is not kept into the same machine itself instead of
it it is store in the remote server by converting it into radio waves. Here there is no
chance of increasing the vote count of machine. Even in case of damage to voting
machine there will not be harm to continuity of the election process.
2 Working Of Whole System
Whenever voters enter to voting booth then he will be instructed to directly
look at retina scanning machine at this time the machine scans the retina. once
retina scanning properly confirmed then it sent signal to the voting machine as to
accept the vote it will be powered on .then voter is made to vote. Now the whole
data including the retina pattern is sent to interfacing device which convert into
radio waves of mobile frequency range and these radio waves are sent to mobile
tower and then to the remote server, where the authentication and voters identi-
fication is stored into a secured database.This will helpfull for us.The received
data is first converted into digital format from the radio waves through the in-
terface device kept at the server side, and then retina pattern and vote separated.
Next the retina pattern is matched against the existing database .If match is
found then flag is check which indicates its voting status i.e. if the voter is not
voted yet then +veack is send to the mobile tower and then to the corresponding
voting machine. This ack is recognized by the receiver kept at the voter side and
machine is made to scan next retina pattern and vote, otherwise if -veack then alert
alarm is made to ring.So this is working of whole global wireless e-voting system.
3
PushkarZagade
3 Application
• We can use big data to collect large set of informations and use it for data ware
house purpose.
• Using this technique we can predict the weather information of next 2,3 month
in advance . Using this we can avoid the delays as well as cancellation of
flight due to bad weather.
• Big data can also use for data mining purpose.
• By using big data we can analyse the large set of information.
4 Conclusion
Thus this machine can be used for any level voting purpose. The machine pro-
vides high level of security, authentication, reliability, and corruption -free mech-
anism. By this we can get result with in minute after a completion of voting..
Minimum manpower Utilization, hence mechanism is error free.
4
PushkarZagade
References
[1]C. Lambrinoudakis, S. Kokolakis, M. Karyda, V. Tsoumas,
D. Gritzalis, and S. Katsikas, Electronic Voting Systems:
Security Implications of the Administrative Workflow, in
DEXA 03: Proceedings of the 14th International Work-
shop on Database and Expert Systems Applications. Wash-
ington, DC, USA: IEEE Computer Society, 2003, p. 467.
[2] M. Volkamer and M. McGaley, Requirements and
Evaluation Procedures for eVoting, in ARES 07: Pro-
ceedings of the The Second International Conference
on Availability, Reliability and Security. Washington,
DC, USA: IEEE Computer Society, 2007, pp. 895902.
[3] T. Kohno, A. Stubblefield, A. Rubin, and D.
Wallach, Analysis of an Electronic Voting System,
in IEEE Symposium on Security and Privacy, 2004.
[4]K. Weldemariam and A. Villafiorita, Formal Procedural
Security Modeling and Analysis, in CRiSIS 08: Third Inter-
national Conference on Risks and Security of Internet and
Systems. Washington, DC, USA: IEEE, October 2008, pp. 249254.
[5] T. Kohno, A. Stubblefield, A. D. Rubin, and D. S.
Wallach, Analysis of an Electronic Voting System, Secu-
rity and Privacy, IEEE Symposium on, vol. 0, p. 27, 2004.
[6]M. Bellare, R. Canetti, and H. Krawczyk. Key-
ing hash functions for message authentication. In N.
Koblitz, editor, Advances in Cryptology CRYPTO 96,
volume 1109 of Lecture Notes in Computer Science,
pages 115. Springer-Verlag, Berlin Germany, Aug. 1996.
[7] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway.A con-
crete security treatment of symmetric encryption. In Proceedings
of the 38th Annual Symposium on Foundations of Computer
Science, pages 394403. IEEE Computer Society Press, 1997.
[8] M. Bellare and C. Namprempre. Authenticated encryption:
5
PushkarZagade
Relations among notions and analysis of the generic composition
paradigm. In T. Okamoto, editor, Advances in Cryptology ASI-
ACRYPT 2000, volume 1976 of Lecture Notes in Computer Sci-
ence, pages 531545. Springer-Verlag, Berlin Germany, Dec. 2000.
[9]California Internet Voting Task Force. A Re-
port on the Feasibility of Internet Voting,
Jan. 2000.http: //www.ss.ca.gov/executive/ivote/.
[10] Voting: What Is; What Could Be,
July 2001. http://www.vote.caltech.edu/Reports/.
6

More Related Content

What's hot

GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
The federation of lazy jobless people (FLJP)
 
Global Wirelesse Voting Machine
Global Wirelesse Voting MachineGlobal Wirelesse Voting Machine
Global Wirelesse Voting Machine
Ankita Khadatkar
 
Global Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanGlobal Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scan
Shubh Agarwal
 
Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOT
Dr. Amarjeet Singh
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System VisualBee.com
 
silent sound technology final report(17321A0432) (1).pdf
silent sound technology final report(17321A0432) (1).pdfsilent sound technology final report(17321A0432) (1).pdf
silent sound technology final report(17321A0432) (1).pdf
ssuser476810
 
SMART NOTE TAKER REPORT
SMART NOTE TAKER REPORTSMART NOTE TAKER REPORT
SMART NOTE TAKER REPORT
Vivek Jha
 
skinput technology
skinput technologyskinput technology
skinput technology
yamini rayalu
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
kamesh0007
 
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless TouchscreenSeminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
Lovely Professional University
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW
Neha Tyagi
 
Final project report on evm 16.04.2019
Final project report on evm 16.04.2019Final project report on evm 16.04.2019
Final project report on evm 16.04.2019
mhjit
 
14 583
14 58314 583
Touchless Touch screen technology
Touchless Touch screen technologyTouchless Touch screen technology
Touchless Touch screen technology
Anudeep Sharma Ramadugu
 
Smart note taker
Smart note takerSmart note taker
Smart note takercrisane93
 
AUTOMATED INNOVATIVE WHEELCHAIR
AUTOMATED INNOVATIVE WHEELCHAIRAUTOMATED INNOVATIVE WHEELCHAIR
AUTOMATED INNOVATIVE WHEELCHAIR
ijitcs
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
vishal4799
 

What's hot (20)

E voting
E votingE voting
E voting
 
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)
GLOBAL WIRELESS E-VOTING (JAYESH J CUSAT)
 
Global Wirelesse Voting Machine
Global Wirelesse Voting MachineGlobal Wirelesse Voting Machine
Global Wirelesse Voting Machine
 
Global Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scanGlobal Wireless E-voting system with retinal scan
Global Wireless E-voting system with retinal scan
 
Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOT
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
silent sound technology final report(17321A0432) (1).pdf
silent sound technology final report(17321A0432) (1).pdfsilent sound technology final report(17321A0432) (1).pdf
silent sound technology final report(17321A0432) (1).pdf
 
SMART NOTE TAKER REPORT
SMART NOTE TAKER REPORTSMART NOTE TAKER REPORT
SMART NOTE TAKER REPORT
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
skinput technology
skinput technologyskinput technology
skinput technology
 
silent sound technology
silent sound technologysilent sound technology
silent sound technology
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
Seminar report Of Touchless Touchscreen
Seminar report Of Touchless TouchscreenSeminar report Of Touchless Touchscreen
Seminar report Of Touchless Touchscreen
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW
 
Final project report on evm 16.04.2019
Final project report on evm 16.04.2019Final project report on evm 16.04.2019
Final project report on evm 16.04.2019
 
14 583
14 58314 583
14 583
 
Touchless Touch screen technology
Touchless Touch screen technologyTouchless Touch screen technology
Touchless Touch screen technology
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
AUTOMATED INNOVATIVE WHEELCHAIR
AUTOMATED INNOVATIVE WHEELCHAIRAUTOMATED INNOVATIVE WHEELCHAIR
AUTOMATED INNOVATIVE WHEELCHAIR
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 

Viewers also liked

GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)
The federation of lazy jobless people (FLJP)
 
Guggenheim
GuggenheimGuggenheim
Guggenheim
annaguitart
 
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Nadezhda Pchelnikova
 
divorce in bc by reliable divorce
divorce in bc by reliable divorcedivorce in bc by reliable divorce
divorce in bc by reliable divorceDheeraj Chohil
 
stouffl_hyo13rapport
stouffl_hyo13rapportstouffl_hyo13rapport
stouffl_hyo13rapportLoïc Stouff
 
1474595020.pdf ปุ๋ย 9
1474595020.pdf ปุ๋ย 91474595020.pdf ปุ๋ย 9
1474595020.pdf ปุ๋ย 9
Kanchna Jailampang
 
SAP ABAP-Archana Jha
SAP ABAP-Archana JhaSAP ABAP-Archana Jha
SAP ABAP-Archana JhaArchana Jha
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]Anton Kaska
 
Diapo bien utiliser
Diapo bien utiliserDiapo bien utiliser
Diapo bien utiliser
cdironsard
 
Sithen SUM's Profile 2015
Sithen SUM's Profile 2015Sithen SUM's Profile 2015
Sithen SUM's Profile 2015
Chaktomuk Short Film Festival-FilmCampKH
 
OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1ojo olurinde
 
Estructura Client-Servidor
Estructura Client-ServidorEstructura Client-Servidor
Estructura Client-Servidor
AndreaFP99
 
Self Improvement Complete Directory
Self Improvement Complete DirectorySelf Improvement Complete Directory
Self Improvement Complete Directory
kindheartedpred87
 
1Staff attraction and retention RF- Chris Ang
1Staff attraction and retention RF- Chris Ang1Staff attraction and retention RF- Chris Ang
1Staff attraction and retention RF- Chris AngChristopher W. Ang
 

Viewers also liked (17)

GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)GLOBAL WIRELESS E_VOTING(JAYESH J)
GLOBAL WIRELESS E_VOTING(JAYESH J)
 
Guggenheim
GuggenheimGuggenheim
Guggenheim
 
Kraken
KrakenKraken
Kraken
 
Project 2
Project 2Project 2
Project 2
 
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
Презентация ЖКХ: очистка систем отопления, компания "НаноСерв"
 
divorce in bc by reliable divorce
divorce in bc by reliable divorcedivorce in bc by reliable divorce
divorce in bc by reliable divorce
 
stouffl_hyo13rapport
stouffl_hyo13rapportstouffl_hyo13rapport
stouffl_hyo13rapport
 
1474595020.pdf ปุ๋ย 9
1474595020.pdf ปุ๋ย 91474595020.pdf ปุ๋ย 9
1474595020.pdf ปุ๋ย 9
 
SAP ABAP-Archana Jha
SAP ABAP-Archana JhaSAP ABAP-Archana Jha
SAP ABAP-Archana Jha
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]
 
Diapo bien utiliser
Diapo bien utiliserDiapo bien utiliser
Diapo bien utiliser
 
Sithen SUM's Profile 2015
Sithen SUM's Profile 2015Sithen SUM's Profile 2015
Sithen SUM's Profile 2015
 
OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1OJO ELIJAH OLURINDE RESUME 1
OJO ELIJAH OLURINDE RESUME 1
 
Estructura Client-Servidor
Estructura Client-ServidorEstructura Client-Servidor
Estructura Client-Servidor
 
Self Improvement Complete Directory
Self Improvement Complete DirectorySelf Improvement Complete Directory
Self Improvement Complete Directory
 
Curriculum_Vitae
Curriculum_VitaeCurriculum_Vitae
Curriculum_Vitae
 
1Staff attraction and retention RF- Chris Ang
1Staff attraction and retention RF- Chris Ang1Staff attraction and retention RF- Chris Ang
1Staff attraction and retention RF- Chris Ang
 

Similar to GLOBAL WIRELESS E-VOTING

A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
SIR SUCCESS PRINCE DUAH DUAH
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
IRJET Journal
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
eSAT Publishing House
 
F017513138
F017513138F017513138
F017513138
IOSR Journals
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET Journal
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
IJMTST Journal
 
End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...
Mohamed Fomagha Tatou
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET Journal
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
Associate Professor in VSB Coimbatore
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET Journal
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET Journal
 
Bu25425429
Bu25425429Bu25425429
Bu25425429
IJERA Editor
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS
cscpconf
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
IRJET Journal
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
chandu namani
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
IRJET Journal
 
Embedded Based Electronic Voting Machine Using Password
Embedded Based Electronic Voting Machine Using PasswordEmbedded Based Electronic Voting Machine Using Password
Embedded Based Electronic Voting Machine Using Password
IJERA Editor
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ijcax
 

Similar to GLOBAL WIRELESS E-VOTING (20)

A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
A REPORT ANALYSIS OF A Secure E-Voting System Using RSA and Md5 Algorithms- P...
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
F017513138
F017513138F017513138
F017513138
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...End of year project report on remote sms based voting system by fomagha tatou...
End of year project report on remote sms based voting system by fomagha tatou...
 
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
IRJET- Blockchain-based Secured E-Voting System to Remove the Opacity and Ens...
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
 
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...IRJET-  	  Effctive In-House Voting and Implementation using Block-Chain Veri...
IRJET- Effctive In-House Voting and Implementation using Block-Chain Veri...
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
 
Bu25425429
Bu25425429Bu25425429
Bu25425429
 
A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS A NOVEL VOTING SYSTEM USING SMS
A NOVEL VOTING SYSTEM USING SMS
 
Smart Voting System Using Java Servlets
Smart Voting System Using Java ServletsSmart Voting System Using Java Servlets
Smart Voting System Using Java Servlets
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
Embedded Based Electronic Voting Machine Using Password
Embedded Based Electronic Voting Machine Using PasswordEmbedded Based Electronic Voting Machine Using Password
Embedded Based Electronic Voting Machine Using Password
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 

GLOBAL WIRELESS E-VOTING

  • 1. PushkarZagade A Seminar Synopsis On “Global Wireless E-Voting” Submitted to JSPM’s JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING PUNE 28 SavitribaiPhule Pune University, Pune In Partial Fulfillment of T.E. Computer Engineering T.E. Semester II Submitted by Mrs. Pushkar Girish Zagade Under the Guidance of Prof. Ishwar Kalbandi Department Of Computer Engineering JSPM’s JAYAWANTRAO SAWANT COLLEGE OF ENGINEERING Academic Year 2014-15 1
  • 2. PushkarZagade Abstract With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states through- out the U.S. are adopting paperless electronic voting. systems from a number of different vendors. We present a security analysis of the source code to one such machine used in a significant share of the market. Our analysis shows that this voting system is far below even the most minimal security stan- dards applicable in other contexts. We identify several problems including unauthorized privilege escalation, incorrect use of cryptography, vulnerabil- ities to network threats, and poor software development processes. We show that voters, without any insider privileges, can cast unlimited votes without being detected by any mechanisms within the voting terminal software. Fur- thermore, we show that even the most serious of our outsider attacks could have been discovered and executed without access to the source code. In the face of such attacks, the usual worries about insider threats are not the only concerns; outsiders can do the damage. That said, we demonstrate that the insider threat is also quite considerable, showing that not only can an insider, such as a poll worker, modify the votes, but that insiders can also violate voter privacy and match votes with the voters who cast them. We conclude that this voting system is unsuitable for use in a general elec- tion. Any paperless electronic voting system might suffer similar flaws, de- spite any certification it could have otherwise received. We suggest that the best solutions are voting systems having a voter-verifiable audit trail,where a computerized voting system might print a paper ballot that can be read and verified by the voter. 2
  • 3. PushkarZagade 1 Introduction In the era of technology, the voting machine, which is present today, is highly unsecured. Being in the age of Computers we are compromising the security by opting for Electronic voting machine because in the present electronic vot- ing machine is not intelligent that is it cannot determine the person came for the voting is eligible or not . That mean the whole control is kept in the hand of vot- ing in charge officer. One more risk with the present voting machine is that any body can increase the vote count, since the count is present in the machine itself. In proposed machine that is Global Wireless E-Voting , the machine is made intelligent which can determine the eligibility of the voter by scanning the eye pattern and also the vote count is not kept into the same machine itself instead of it it is store in the remote server by converting it into radio waves. Here there is no chance of increasing the vote count of machine. Even in case of damage to voting machine there will not be harm to continuity of the election process. 2 Working Of Whole System Whenever voters enter to voting booth then he will be instructed to directly look at retina scanning machine at this time the machine scans the retina. once retina scanning properly confirmed then it sent signal to the voting machine as to accept the vote it will be powered on .then voter is made to vote. Now the whole data including the retina pattern is sent to interfacing device which convert into radio waves of mobile frequency range and these radio waves are sent to mobile tower and then to the remote server, where the authentication and voters identi- fication is stored into a secured database.This will helpfull for us.The received data is first converted into digital format from the radio waves through the in- terface device kept at the server side, and then retina pattern and vote separated. Next the retina pattern is matched against the existing database .If match is found then flag is check which indicates its voting status i.e. if the voter is not voted yet then +veack is send to the mobile tower and then to the corresponding voting machine. This ack is recognized by the receiver kept at the voter side and machine is made to scan next retina pattern and vote, otherwise if -veack then alert alarm is made to ring.So this is working of whole global wireless e-voting system. 3
  • 4. PushkarZagade 3 Application • We can use big data to collect large set of informations and use it for data ware house purpose. • Using this technique we can predict the weather information of next 2,3 month in advance . Using this we can avoid the delays as well as cancellation of flight due to bad weather. • Big data can also use for data mining purpose. • By using big data we can analyse the large set of information. 4 Conclusion Thus this machine can be used for any level voting purpose. The machine pro- vides high level of security, authentication, reliability, and corruption -free mech- anism. By this we can get result with in minute after a completion of voting.. Minimum manpower Utilization, hence mechanism is error free. 4
  • 5. PushkarZagade References [1]C. Lambrinoudakis, S. Kokolakis, M. Karyda, V. Tsoumas, D. Gritzalis, and S. Katsikas, Electronic Voting Systems: Security Implications of the Administrative Workflow, in DEXA 03: Proceedings of the 14th International Work- shop on Database and Expert Systems Applications. Wash- ington, DC, USA: IEEE Computer Society, 2003, p. 467. [2] M. Volkamer and M. McGaley, Requirements and Evaluation Procedures for eVoting, in ARES 07: Pro- ceedings of the The Second International Conference on Availability, Reliability and Security. Washington, DC, USA: IEEE Computer Society, 2007, pp. 895902. [3] T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach, Analysis of an Electronic Voting System, in IEEE Symposium on Security and Privacy, 2004. [4]K. Weldemariam and A. Villafiorita, Formal Procedural Security Modeling and Analysis, in CRiSIS 08: Third Inter- national Conference on Risks and Security of Internet and Systems. Washington, DC, USA: IEEE, October 2008, pp. 249254. [5] T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach, Analysis of an Electronic Voting System, Secu- rity and Privacy, IEEE Symposium on, vol. 0, p. 27, 2004. [6]M. Bellare, R. Canetti, and H. Krawczyk. Key- ing hash functions for message authentication. In N. Koblitz, editor, Advances in Cryptology CRYPTO 96, volume 1109 of Lecture Notes in Computer Science, pages 115. Springer-Verlag, Berlin Germany, Aug. 1996. [7] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway.A con- crete security treatment of symmetric encryption. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, pages 394403. IEEE Computer Society Press, 1997. [8] M. Bellare and C. Namprempre. Authenticated encryption: 5
  • 6. PushkarZagade Relations among notions and analysis of the generic composition paradigm. In T. Okamoto, editor, Advances in Cryptology ASI- ACRYPT 2000, volume 1976 of Lecture Notes in Computer Sci- ence, pages 531545. Springer-Verlag, Berlin Germany, Dec. 2000. [9]California Internet Voting Task Force. A Re- port on the Feasibility of Internet Voting, Jan. 2000.http: //www.ss.ca.gov/executive/ivote/. [10] Voting: What Is; What Could Be, July 2001. http://www.vote.caltech.edu/Reports/. 6