SlideShare a Scribd company logo
1 of 16
Internet of Things based Electronic Voting Machine
(ICICI 88)
Presented by:
Sushil Kumar Singh, National Institute of Technology Mizoram
2nd
International Conference on Intelligent Data Communication Technologies
and Internet of Things
(12 – 13 September 2019)
12 Sept 2019 Sushil Kumar Singh 1 /15
12 Sept 2019 Sushil Kumar Singh 2 / 15
Outline
 Introduction
 Objective
 Methodology
 Proposed Prototype
 Results and Discussion
 Conclusions
 Future Scope
12 Sept 2019 Sushil Kumar Singh 3 / 15
Introduction
• It is a smart Electronic Voting Machine(EVM) based on IoT
mechanism. IoT is the heart of this system.
• Now a days fair Election in rural and urban area is a challenging
task for Election Commission. A lot of man power is needed to
perform an Election.
• This system can solve not only these problems of Election
Commission but it also removed the various limitations of
previous research papers on EVM.
• It uses Twitter, Webpage and other modern techniques to make
the system user friendly and highly secure.
12 Sept 2019 Sushil Kumar Singh 4 / 15
Objective
The main Objective of this smart system is:
• To perform a fair Election.
• To reduce the man power.
• To avoid the attempts of proxy votes by complaining to the
nearest Police Station and News Editor against the voter’s Id.
• To aware the common people and live forecast the Voting
Result, corrupted party name, winning party name and total
votes.
12 Sept 2019 Sushil Kumar Singh 5 / 15
Methodology
• Before starting the voting process, enrolled the voter’s
fingerprint in the Data Base of Fingerprint Module (R305).
• Established the Internet connection with the NodeMCU by
calling the connection prototype of NodeMCU along with
providing the User name and Password of Wi-fi Network.
• The ThingSpeak which is an IoT platform worked as a mediator
between the Twitter and the NodeMCU .
• The API Key of Twitter is use to established the connection
between the ThingSpeak and Twitter.
12 Sept 2019 Sushil Kumar Singh 6 / 15
Methodology (cont.)
• The NodeMCU trigger the “REACT ” of ThingSpeak according to
the attempts of proxy votes and ThingSpeak Tweet the
corrupted party name on Twitter.
• By calling the Webserver, NodeMCU sent the data on the
Webpage of Election Commission, Police and News Editor.
• The system compared the received votes of one party with
remaining parties and finally obtained the party name of higher
votes.
12 Sept 2019 Sushil Kumar Singh 7 / 3
Methodology (cont.)
Fig.1. Snapshot of Developed Prototype
12 Sept 2019 Sushil Kumar Singh 8 / 15
Proposed Prototype
Fig.2. Snapshot of Developed Prototype
12 Sept 2019 Sushil Kumar Singh 9 / 15
Proposed Prototype (cont.)
• The fingerprint Module took the fingerprint of user as an
input signal and it compared with its database and
accordingly it sent matched Id of voter to the NodeMCU.
• With this voter Id NodeMCU analyzed the voter attempts and
accordingly took suitable action.
• When an invalid user tried to access the voting process
buzzer activated to indicate an error message.
• With the help of ESP8266 wi-fi embedded module the
NodeMCU sent data on the assigned platform.
• NodeMCU display messages with the help of I2C module.
• I2C module sent the data serially in 16x2 LCD.
12 Sept 2019 Sushil Kumar Singh 10 / 15
Result and Discussion
Fig. 3. Snapshot of Initial Connection of the proposed EVM to cloud Fig. 4. Snapshot of verification of a Vote
12 Sept 2019 Sushil Kumar Singh 11 / 15
Result and Discussion (cont.)
Fig.5.Snapshot of alert sent to nearest Police station and News Editor on the third attempt of voter Id=8.
12 Sept 2019 Sushil Kumar Singh 12 /15
Result and Discussion (cont.)
Fig.6. Snapshot of final voting result Fig. 7. Snapshot of Final Count
12 Sept 2019 Sushil Kumar Singh 13 / 15
Result and Discussion (cont.)
Fig.8. Internal mechanism to tweet the corrupted party name on twitter Fig. 9. Snapshot of Corrupted party name on Twitter
Party
Name
Attempt 2
(Attempt of
Proxy Vote)
Tweet on Twitter
A ID: 5
ID:3
ID:8
A is a corrupted
party
B
C ID: 9
12 Sept 2019 Sushil Kumar Singh 14 / 15
Conclusions
• The developed prototype solved the problem of proxy votes, It
takes into account the spot counting of the votes and displaying it
to Election Commission.
• The system raised complain on the multiple attempts of voter and
reduced the man power of Election Commission.
• People came to know the corrupted political party who tried to
capture the booth and also tried to make delay in election process
through their workers.
• The deployment of this prototype in actual use can be a
challenging task.
12 Sept 2019 Sushil Kumar Singh 15 / 15
Future Scope
• More details about the voter can be incorporated, such as
retina scan. It will enhance the security of the election process.
• The database of the eligible voter(s) can be made online
(Cloud-based), which will enable a voter to cast his/her vote at
any booth in India.
12 Sept 2019 Sushil Kumar Singh

More Related Content

Similar to Paper presentation id_icici88_icici2019

Student Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptxStudent Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptx
ShivareddyGangam
 

Similar to Paper presentation id_icici88_icici2019 (20)

ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
IRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android ApplicationIRJET- Aadhaar Based Voting System using Android Application
IRJET- Aadhaar Based Voting System using Android Application
 
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
IRJET - Precaution of Trolling Intrusions in Online Ballot System using Optic...
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
 
voting project mini project .pdf
voting project mini project .pdfvoting project mini project .pdf
voting project mini project .pdf
 
ONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEMONLINE FINGERPRINT VOTING SYSTEM
ONLINE FINGERPRINT VOTING SYSTEM
 
IRJET- Online Voting System using Fingerprint Scanner
IRJET-  	  Online Voting System using Fingerprint ScannerIRJET-  	  Online Voting System using Fingerprint Scanner
IRJET- Online Voting System using Fingerprint Scanner
 
The proposal of giving two receipts for voters to increase the security of el...
The proposal of giving two receipts for voters to increase the security of el...The proposal of giving two receipts for voters to increase the security of el...
The proposal of giving two receipts for voters to increase the security of el...
 
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF EL...
 
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting SystemIRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
IRJET- A Survey on: Aadhar Based Dual Authentication Secured E-Voting System
 
Student Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptxStudent Voting Application for Election – Using SMS (1).pptx
Student Voting Application for Election – Using SMS (1).pptx
 
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
 
IRJET - Secured Smart Voting System using Aadhar
IRJET   - Secured Smart Voting System using AadharIRJET   - Secured Smart Voting System using Aadhar
IRJET - Secured Smart Voting System using Aadhar
 
IRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting System
 
IRJET- Digital Voting System
IRJET-  	  Digital Voting SystemIRJET-  	  Digital Voting System
IRJET- Digital Voting System
 
Indian telecom industry from 1991 2005
Indian telecom industry from 1991 2005Indian telecom industry from 1991 2005
Indian telecom industry from 1991 2005
 
Unified National Electoral System (UNES)
Unified National Electoral System (UNES)Unified National Electoral System (UNES)
Unified National Electoral System (UNES)
 
IRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting SystemIRJET- Advanced Technology in Secured Online Voting System
IRJET- Advanced Technology in Secured Online Voting System
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 

Paper presentation id_icici88_icici2019

  • 1. Internet of Things based Electronic Voting Machine (ICICI 88) Presented by: Sushil Kumar Singh, National Institute of Technology Mizoram 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (12 – 13 September 2019) 12 Sept 2019 Sushil Kumar Singh 1 /15
  • 2. 12 Sept 2019 Sushil Kumar Singh 2 / 15 Outline  Introduction  Objective  Methodology  Proposed Prototype  Results and Discussion  Conclusions  Future Scope
  • 3. 12 Sept 2019 Sushil Kumar Singh 3 / 15 Introduction • It is a smart Electronic Voting Machine(EVM) based on IoT mechanism. IoT is the heart of this system. • Now a days fair Election in rural and urban area is a challenging task for Election Commission. A lot of man power is needed to perform an Election. • This system can solve not only these problems of Election Commission but it also removed the various limitations of previous research papers on EVM. • It uses Twitter, Webpage and other modern techniques to make the system user friendly and highly secure.
  • 4. 12 Sept 2019 Sushil Kumar Singh 4 / 15 Objective The main Objective of this smart system is: • To perform a fair Election. • To reduce the man power. • To avoid the attempts of proxy votes by complaining to the nearest Police Station and News Editor against the voter’s Id. • To aware the common people and live forecast the Voting Result, corrupted party name, winning party name and total votes.
  • 5. 12 Sept 2019 Sushil Kumar Singh 5 / 15 Methodology • Before starting the voting process, enrolled the voter’s fingerprint in the Data Base of Fingerprint Module (R305). • Established the Internet connection with the NodeMCU by calling the connection prototype of NodeMCU along with providing the User name and Password of Wi-fi Network. • The ThingSpeak which is an IoT platform worked as a mediator between the Twitter and the NodeMCU . • The API Key of Twitter is use to established the connection between the ThingSpeak and Twitter.
  • 6. 12 Sept 2019 Sushil Kumar Singh 6 / 15 Methodology (cont.) • The NodeMCU trigger the “REACT ” of ThingSpeak according to the attempts of proxy votes and ThingSpeak Tweet the corrupted party name on Twitter. • By calling the Webserver, NodeMCU sent the data on the Webpage of Election Commission, Police and News Editor. • The system compared the received votes of one party with remaining parties and finally obtained the party name of higher votes.
  • 7. 12 Sept 2019 Sushil Kumar Singh 7 / 3 Methodology (cont.) Fig.1. Snapshot of Developed Prototype
  • 8. 12 Sept 2019 Sushil Kumar Singh 8 / 15 Proposed Prototype Fig.2. Snapshot of Developed Prototype
  • 9. 12 Sept 2019 Sushil Kumar Singh 9 / 15 Proposed Prototype (cont.) • The fingerprint Module took the fingerprint of user as an input signal and it compared with its database and accordingly it sent matched Id of voter to the NodeMCU. • With this voter Id NodeMCU analyzed the voter attempts and accordingly took suitable action. • When an invalid user tried to access the voting process buzzer activated to indicate an error message. • With the help of ESP8266 wi-fi embedded module the NodeMCU sent data on the assigned platform. • NodeMCU display messages with the help of I2C module. • I2C module sent the data serially in 16x2 LCD.
  • 10. 12 Sept 2019 Sushil Kumar Singh 10 / 15 Result and Discussion Fig. 3. Snapshot of Initial Connection of the proposed EVM to cloud Fig. 4. Snapshot of verification of a Vote
  • 11. 12 Sept 2019 Sushil Kumar Singh 11 / 15 Result and Discussion (cont.) Fig.5.Snapshot of alert sent to nearest Police station and News Editor on the third attempt of voter Id=8.
  • 12. 12 Sept 2019 Sushil Kumar Singh 12 /15 Result and Discussion (cont.) Fig.6. Snapshot of final voting result Fig. 7. Snapshot of Final Count
  • 13. 12 Sept 2019 Sushil Kumar Singh 13 / 15 Result and Discussion (cont.) Fig.8. Internal mechanism to tweet the corrupted party name on twitter Fig. 9. Snapshot of Corrupted party name on Twitter Party Name Attempt 2 (Attempt of Proxy Vote) Tweet on Twitter A ID: 5 ID:3 ID:8 A is a corrupted party B C ID: 9
  • 14. 12 Sept 2019 Sushil Kumar Singh 14 / 15 Conclusions • The developed prototype solved the problem of proxy votes, It takes into account the spot counting of the votes and displaying it to Election Commission. • The system raised complain on the multiple attempts of voter and reduced the man power of Election Commission. • People came to know the corrupted political party who tried to capture the booth and also tried to make delay in election process through their workers. • The deployment of this prototype in actual use can be a challenging task.
  • 15. 12 Sept 2019 Sushil Kumar Singh 15 / 15 Future Scope • More details about the voter can be incorporated, such as retina scan. It will enhance the security of the election process. • The database of the eligible voter(s) can be made online (Cloud-based), which will enable a voter to cast his/her vote at any booth in India.
  • 16. 12 Sept 2019 Sushil Kumar Singh