Preview

Electronic Voting Machine

Powerful Essays
Open Document
Open Document
4326 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Electronic Voting Machine
International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013

A Preview on Microcontroller Based Electronic Voting Machine
Diponkar Paul and Sobuj Kumar Ray, Member, IACSIT

Abstract—Voting is most pivotal process of democratic society through which people determine it’s government. Governments around the world are increasingly considering the replacement of traditional paper-based voting schemes with electronic voting systems. Elections of Bangladesh are conducted most exclusively using electronic voting machines developed over the past three years. In this paper we describe the design, construction and operation of a digital voting machine using a microcontroller profoundly. Again we also portray counting system of votes, market survey and cost analysis. Index Terms—Voting system, atmega16l microcontroller, voting analysis, security of EVM.

I. INTRODUCTION Voting is a crucial device to reveal the opinion of a group on an issue that is under consideration. Based on the promise of greater efficiency, better scalability, faster speed, lower cost, and more convenience, voting is currently shifting from manual paper-based processing to automate electronic-based processing. The term “electronic voting” characteristically depicts to the use of some electronic means in voting and ensure the security, reliability, guarantee and transferency[1],[2]. Now a day the wide range of application of voting include its use in reality student body elections, shareholder meetings, and the passing of legislation in parliament. Perhaps the most important, influential, publicised, and widespread use of voting is its use in national elections. Compared to its traditional paper-based counterpart, electronic voting is considered to have many greater potential benefits. These benefits include better accuracy by eliminating the negative factor of human error, better coverage for remote locations, increased speed for tally computation, lower operational cost through



References: D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, R. A. Kemmerer, W. Robertson, F. Valeur, and G. Vigna, “An Experience in Testing the Security of Real-World Electronic Voting Systems,” IEEE Transactions on Software Engineering, vol. 36, no. 4, 2010. [2] A. Villafiorita and K. Weldemariam, and R. Tiella, “Development, Formal Verification, and Evaluation of an E-Voting System with VVPAT,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, 2009. [3] Y. D. Wagner, M. Bishop, T. Baker, B. D. Medeiros, G. Tyson, M. Shamos, and M. Burmester, “Software Review and Security Analysis of the ES&S I Votronic 8.0.1.2 Voting Machine Firmware,” Technical report, Security and Assurance in Information Technology Laboratory, 2007. [4] T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach, “Analysis of an Electronic Voting System,” in Proc. of IEEE Symp. Security and Privacy, pp. 27-40, 2004. [5] E. Proebstel, S. Riddle, F. Hsu, J. Cummins, F. Oakley, T. Stanionis, and M. Bishop, “An Analysis of the Hart Intercivic DAU eSlate,” in Proc. of Usenix/Accurate Electronic Voting Technology Workshop, 2007. [6] D. Molnar, T. Kohno, N. Sastry, and D. Wagner, “Tamper-Evident, History Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract),” in Proc. of IEEE Symp. Security and Privacy, pp. 365-370, 2006. [7] J. Bethencourt, D. Boneh, and B. Waters, “Cryptographic Methods for Storing Ballots on a Voting Machine,” in Proc. of Network and Distributed System Security Symp, 2007. [8] S. Garera and A. Rubin, “An Independent Audit Framework for Software Dependent Voting Systems,” in Proc. of ACM conf. Computer and Comm. Security, pp. 256-265, 2007. [9] J. Hall, “Improving the Security, Transparency and Efficiency of California’s 1 Percent Manual Tally Procedures,” in Proc. of Usenix/ Accurate Electronic Voting Technology Workshop, 2008. [10] K. Weldemariam and A. Villafiorita, “Modeling and Analysis of Procedural Security in (e) Voting: The Trentino’s Approach and Experiences,” in Proc. of Usenix/Accurate Electronic Voting Technology Workshop, 2008. [11] R. Hite, “All Levels of Government are needed to Address Electronic Voting System Challenges,” Technical report, GAO, 2007. [1] Fig. 8. Flowchart of program IV. RESULTS AND ANALYSIS This work contributed to three very basic research questions arising: in the context of verifiable elections. First, we discussed the problem of keeping ballot secrecy to a certain extent in the case of a corrupted doting machine or voting authority. Our contribution to this is an approach where all secret information is encapsulated in the voting machine. Second, we considered the attack of receipt stealing and manipulation of the corresponding votes. Here we proposed a novel approach of linking all receipts by a hash chain such that each single receipt guards the integrity of all receipts issued previously. Together with a display in the polling place this approach shortens the time window in which an adversary can perform the ballot stealing attack without almost zero risk. Third, we discussed in detail the possibility of contesting an election based on the evidence provided by the verifiable election scheme. We compared the situation for Bingo Voting to the evidence provided by paper based schemes. We shortly sketched an approach to prove an error or a manipulation in the voting booth without violating ballot secrecy. However, this was only a proof of concept and for a practical application the usability of this approach needs to be further improved. V. CONCLUSION As part of these exercises, we devised a testing methodology, developed new tools that are specifically tailored to the security analysis of these systems, and learned a number of lessons, all of which should be of use to other 189 International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 [12] M. Gondree, P. Wheeler, and D. D. Figueiredo, “A Critique of the 2002 FEC VSPT E-Voting Standards,” Technical report, Univ. of California, 2005. [13] R. Mercuri. Voting System Guidelines Comments. [Online]. Available: http:// www.wheresthepaper.org/VVSGComment.pdf, 2005. [Online]. Available: [14] Atmel. http://www.atmel.com/Images/doc2466.pdf Mr. Diponkar Paul is currently working as Assistant Professor in the department of Electrical and Electronic engineering at World University of Bangladesh, Dhaka, Bangladesh (www.wub.edu.bd ). After passing his master degree from March 2008 he was serving as Assistant Professor, EEE at Bangladesh University upto July 2010. He is having qualifications: B.Sc. Engg., DISM (software engineering), M.Sc. Engg. His research interests are in the area of energy conversions, power system modeling and advanced control theories covering the application of IT. From 0ct 2004 to July 2006, he was working as Lecturer in department of computer science and engineering at Pundra University of science & technology, Bogra. In Singapore during his master dgree at Nanyang technological university, he was involved in financial service operation integrated to IT system administration jobs from Dec 2006 to February 2008. Mr. Sobuj Kumar Ray was born in 1987, Bogra, Bangladesh. Mr. Ray received his Bachelor degree in Electrical and Electronic Engineering from the Rajshahi University of Engineering and Technology (RUET), Rajshahi, Bangladesh in April 2010. He is now Assistant Manager (Technical) in DESCO. Mr. Ray worked at Internal University of Business Agriculture and Technology in the department of Electrical and Electronic Engineering, Dhaka, Bangladesh (www.iubat.edu) from 12th July 2010 to 1st October, 2012. He is enthusiastic on researcher on control system and Power System. 190

You May Also Find These Documents Helpful

  • Good Essays

    As computer systems have become more and more sophisticated over the time, it has become less and less credible to ensure security by inspection and intuition alone. However, standard methods of analyzing different aspects of the area have been developed to identify and apply key principles of the area, but the area of Security Analysis is constantly developing as new secure designs are invented and so are the new ways of breaking them. In many cases, systems are so complex that it is impossible find a secure solution. In situations like such, instead improvement measures, one should focus towards counter-measures.…

    • 484 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Discussion Paper

    • 1216 Words
    • 4 Pages

    Computers play an important role in politics. In developed countries like the United States of America, computers have been utilized in politics and they have greatly changed the…

    • 1216 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Recount

    • 329 Words
    • 2 Pages

    Unfortunately, the voting procedure that was used in the 2000 Presidential race in Florida was obviously inadequate. Using paper ballot sheets that the voter had to punch a hole in that left small chads, may have lost the race for Vice-President Gore. However, with today’s computer technology a better procedure would avoid these types of voting problems. Instead of using paper ballots, computers would allow the voter to absolutely make sure their vote was counted.…

    • 329 Words
    • 2 Pages
    Good Essays
  • Better Essays

    In newly emerging democracies around the world, corruption takes place at different levels of government. One of these key levels of government is the electoral system of the state. Abuse of the electoral systems is far too common. A recent example can be found at the 2008 Zimbabwe national level elections, when President Robert Mugabe was sworn in for his sixth consecutive term as head of state (Aljazeera). There is widespread allegation of vote rigging from observers and even blatant video evidence (Aljazeera). It is especially hard for newly emerging democracies to put in place regulations and anti-corruption systems. Corruption in these newly emerging democracies can often take many years to eradicate, however it does disintegrate with every year of uninterrupted democracy (un). Corruption is also harder to find in open…

    • 1389 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Evm Research Paper

    • 388 Words
    • 2 Pages

    Voting as an American citizen is being taken into the 21st. Century with Electronic Voting Machines (EVMs). Some view it as an untrustworthy way to vote. These EVMs have been controversial in some ways when it comes to the voting process. EVMs can provide many different Americans with many different backgrounds something that paper ballots cannot, and that is the many different languages it can provide, but that is where the positives end. EVMs seem like an alternative into the future, But are plagued with issues.…

    • 388 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security is another issue with voting. On one hand voting with the machine can be safer because they are not connected to internet, but they can stll be messed with before use. In 2007 an article explaining how, with the right tools, a michine could be tampered with, was published in a national magazine. Although this may be true, 2007 was 10 years ago, and technological advancements have most likely been…

    • 435 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Bolivia

    • 3605 Words
    • 15 Pages

    Executive Summary: The establishment of an electronic voting system in a country that is still struggling to plant democracy is more of a political venture than anything else. For it to be successful, will have to rely on professional research and will be driven by the understanding of the parties involved. As such, the voters as well as the candidates of elections will be major factors to consider. In that regard, the technical part of the project is miserably dwarfed in terms of importance and concern by the need to make the whole system acceptable, both politically and socially. This means working along with the parties concerned in order to create the trust and faith that is needed for the system to be successful in all ways. This document is a through consideration of the pros and cons of implementing such a project, with regard to cost, research and all the resources needed in the implementation of the project. User concerns, beliefs and the role of age and presence of democracy are critically analyzed to establish a clear and firm ground in which the project should be established.…

    • 3605 Words
    • 15 Pages
    Best Essays
  • Best Essays

    Fund declared that our country had only been surviving instead of confronting the dreadful reality that our election process could be breached (11). Reform is easy to speak about, but difficult to bring about. For reasons mostly related to ineffectual balloting systems, about two percent of all votes cast nationwide in the 2000 presidential contest weren’t counted (Fund 2). According to a poll done in July 2004 by John Zogby, nearly ten percent of all Americans doubt their votes have been counted accurately (Fund 2). Widely publicizing such information could lower voter participation, already a prevalent problem, which is evidenced by the generally low percentage of participation versus voters registered during elections. New and improving technology should be utilized to upgrade subpar voting methods still operated in rural areas. The enhancements of voting equipment would assist in the accuracy of election results and help eliminate costly lawsuits, appeals, and recounts. Anything that would further discourage voter turnout would be in direct opposition of the intent of any future legislation that would be passed in order to help in the process of determining fraud. Voting irregularities are commonplace, but many prosecutors linger in attempting to intervene because convictions for fraud are almost non-existent (Overton 654). They would be inclined to protect their job since they are politically appointed and it would be easier to downplay the election process incompetence. Legislative committees assigned to study the issue would need better data about documented fraud cases to perform statistical analysis and fully understand whether there would be significant gains with the institution of a photo…

    • 4051 Words
    • 17 Pages
    Best Essays
  • Powerful Essays

    Analyzing Voting Behavior

    • 2013 Words
    • 9 Pages

    Voting is a principal way through which the government is elected democratically. This means people tend to select people they want to run the office, depending on the majority. According to Brennan (2011) voting is a civil duty for every citizen, but people disagree and thus confirming that not every individual votes. Voting faces both abstention and indulgence depending on the situations, interest or priority of the voter. To keep the moral of democracy it is very important to make ‘intelligent voting’ but at the same time very difficult to attain. Voters cannot be forced to vote so voting should be made easy to attract voters.…

    • 2013 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Compulsory Voting

    • 574 Words
    • 3 Pages

    In many countries, at times of national and local elections, often only a small part of the population casts a ballot. In order to address this problematic issue, many governments take the aggressive measure of compulsory voting to constitute more public involvement in politics. Even though the government believes this is going to solve this issue, there are many drawbacks to this approach for example; this method is unconstitutional, citizens lives are jeopardized, and the results of the elections are dangerously compromised.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The American people deserve peace of mind that their choices are going to be represented by their ballots. Software malfunctions are unacceptable in such an important process.…

    • 279 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Electronic voting machine has now replaced the traditional mechanism of voting due to several advantages like security, automatic counting etc. This project presents a way to develop an electronic voting machine which displays the count of votes on a 16x2 LCD interface. A user can get his/her vote register through a set of switches (one for each candidate). After every cast of vote, the subsequent count can be seen on LCD. The circuit uses AT89C51 microcontroller and the code for the project has been written in C.…

    • 528 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lcd Based Voting Machine

    • 665 Words
    • 3 Pages

    Electronic voting machine has now replaced the traditional mechanism of voting due to several advantages like security, automatic counting etc. This project presents a way to develop an electronic voting machine which displays the count of votes on a 16x2 LCD interface. A user can get his/her vote register through a set of switches (one for each candidate). After every cast of vote, the subsequent count can be seen on LCD. The circuit uses AT89C51 microcontroller and the code for the project has been written in C.…

    • 665 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Recent efforts to reform the management of elections in Kenya received a major setback following the malfunctioning of electronic transmission of votes, putting the credibility of the presidential poll on trial. The system, based on the acquisition of one-way phone lines from telecoms operator Safaricom connected to servers at the Independent Electoral and Boundaries Commission’s national tallying centre at the Bomas of Kenya, was a key measure in improving the credibility of the presidential poll, especially the relay and central tallying of the results.…

    • 1161 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Online Voting

    • 6359 Words
    • 26 Pages

    Cranor, L.F., & Cytron, R.K. (1996). Design and Implementation of a Security-Conscious Electronic Polling System. Washington University Computer Science Technical Report (WUCS). Retrieved October 9, 2006 from: http://www.acm.org/crossroads/ords2-4/voting.html…

    • 6359 Words
    • 26 Pages
    Powerful Essays