Published Online July 2012 in MECS (http://www.mecs-press.org/)
DOI: 10.5815/ijcnis.2012.07.07
Application of Biometrics in Mobile Voting
Donovan Gentles1, Suresh Sankaranarayanan 2, 3
1Mona Institute of Applied Sciences, University of WestIndies, Jamaica dongen02@gmail.com 2Computing & Information Systems, Institut Teknologi Brunei, Brunei
3Department of Computing, University of WestIndies, Jamaica pessuresh@hotmail.com Abstract — Voting process in today’s era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were being developed to resolve some of the issues like electoral fraud, impersonation, double voting etc. One such system is Electronic based voting that has been actively used for voting in countries like India. However, these systems seem to be prone to electoral frauds and voters have to make tremendous effort to cast their ballots. There are still a few very important areas which have to be identified and addressed viz., the Security which involves a person be able to vote in a secure manner, the time spent for voting by voters, the efficiency in counting of votes and the cost involved in employing people towards monitoring the voting process. So taking these areas/issues into consideration we have now come with the biometrics authenticated mobile voting system, to start with for a country like Jamaica. The technology being proposed now is novel and the first of its kind proposed at present. It is proposed that using fingerprint supported biometric control information and encryption along with Secure Socket Layer i.e. SSL using VeriSign, would make the software involved in the voting process well secured. In addition tying the credentials to a
References: [1]. Electronic Voting (2009), Available from http://www. hwskioskprinter.com/terminology electronic voting.pdf [2] [4]. Electoral office of Jamaica (2007), Available from www.jis.gov.jm/special_sections/election_2007/in dex.html [5] Anonymous fingerprinting. Berlin: Springer-Verlag, 1996. [7]. Jain, A et al (1997) "On-Line Fingerprint Verification." IEEE Transactions on Pattern Analysis and Machine Intelligence VOL. 19, No. 4, 1997: 302-305 [8] [9]. William, S (2005). Cryptography and Network Security Principles and Practices, Fourth Edition. Prentice Hall, 2005 [10]. Nechvatal et al. Report on the Development of the Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2000. [11] Copyright © 2012 MECS I.J. Computer Network and Information Security, 2012, 7, 57-68