Sie sind auf Seite 1von 5

International Journal of Emerging Technology and Advanced Engineering

Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015)

Mobile Voting System


Dipali More1, Mehzabin Shaikh2, Meera Awaskar3, Supriya Ghongde4, Sampada Wattamwar5, Divya Tadpelliwar6
Department of Information Technology, Savitribai Phule Pune University
Without eliminating these security threats like buying a
vote and Coercion, online registration, secrecy of ballot,
anonymity of voter and double voting this latest technology
cant be allowed. An efficient and reliable system is
essential for the trustworthy and successful implementation
of this technology. In our system we design mobile
application for e-voting (electronic voting) process. The
proposed system uses mobile phone device having: small in
size, low power, low-price as compared to computers and
Direct Recording Electronic voting System, Electronic
Voting Machines, provide mobility feature and security.
Proposed system uses Global System for Mobile
Communication technology which is a secure and globally
used mobile technology in the current situation. Mobile
phone also uses Subscriber Identity Module technology
which provides user identity privacy, user identity
verification and subscriber data secrecy providing more
security to the proposed system.
The key features of our proposed Mobile Phone Voting
System is:
1. Eligibility: only authorized voter can cast their vote.
2. Uniqueness: Each user can cast their only one vote.
3. Integrity: Valid vote should not be modified or
deleted.
4. Fairness: The election result should not be accessible
before the official time ended.
5. Secrecy: No one should be able to find how voter cast
their vote.
6. Cost-effectiveness: Election system should be
efficient and affordable.

Abstract Mobile voting system is very secure, efficient


and easy way to casting of vote. In this paper we will use RSA
algorithm for security purpose. Our proposed system provide
a new e-voting system which fulfills the security requirements
of voting process. In our project total three steps are required:
Online Registration of voter, vote casting of voter and result
display. Proposed system provides secure and efficient online
vote casting and also paper ballot system if online voting fail.
In Proposed system there is no need of internet for voting, it is
required at the time of online registration only. All process
will be done through SMS messaging without requirement of
internet connection.
KeywordsNIC, SIM, Symmetric key, mobile voting,
Public key, private key.

I. INTRODUCTION
As democracies across the globe fight challenges related
to electronic voting systems, here a mobile phone-based
voting system that incorporated into the current large-scale
election process, gives the promising research.
Traditionally, voting process is organized in centralized or
distributed manner called voting booths. The earlier process
of election is quite complex and time consuming. People
were waiting in queue for long time. To reduce these
problem mobile voting system is introduced. This mobile
voting system provide many benefits like we dont need to
goto polling booths, no need to use paper ballots and we
have time and cost efficiency and it also avoid tiredness
and violence . In our system there is no expensive hardware
is used. For the different reasons, voters may not able to
come to the voting booths physically, but now with the use
of this new system he can vote remotely. For example, he
can vote from home or while travelling abroad or sitting in
the Office. Thats why there is more demand for remote
voting. In this system procedures are easy, transparent and
most secure. To day the most common way for remote
voting is postal voting, where voters cast their votes by cell
Phones...Internet voting was introduced to provide more
flexibility. Because of the inherited security vulnerabilities
Of the Internet and computerized systems. In general,
Phone Voting System (MPVS) provides mobility feature.
Internet voting there is awide range of criticism. Mobile
However this technology accesses certain security threats
for its successful implementation in election.

II. LITERATURE REVIEW


Voting through the mobile phone it is the new and
advanced area of research. We take the review of some
IEEE papers which presented in past.
1] Proposes mobile phone voting system developed on
modular square root and blind signature system. System
uses confidentiality of voter, secrecy of ballot, voter
anonymity and no computation cost and communication
overhead. CA (certificate authority) involve as third party,
that is distribution of certificates to voters is the
responsibility of CA for authentication purposes, delayed
occurred which make the process slow
478

International Journal of Emerging Technology and Advanced Engineering


Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015)
Mobile Phone,
Election Commission Server (ECS);
Election Commission Databases (ECD);
Vote Collecting and Result Phase Server (VCRPS)and
Election Commission Office (ECO).

[2] Proposes mobile phone voting system using Global


System for Mobile communication technology. In the
system voter authentication is occurred through GSM
mobile operator. user validation is done through GSM
challenge-response protocol. System contain of four parts:
mobile phone; authentication server; verification server and
result counting server. Proposed system contain three
levels: pre voting level; voting level and post voting level.
For kepping Voter secrecy using blind signature system.
Because of GSM authentication setup publickey overhead
is mostly decresed. More work is required to deal with the
trust retained on authentication server, enduser device (ME)
and application security.
[3] Proposes mobile phone intermediate evoting system
uses the extended Paillers encryptions system. This system
is used to enforce the cut-of-the choose method to exclude
the computational zero knowledge evidences and show the
effectiveness of the system. Proposed system is provably
safe in simulation-based prototype.
[4] Propose GSM based mobile phone voting system is
used to cast vote without registering for voting in advance
and going to polling booths. System prevents reptition
voting but It has big disadvantage to security, proposes
system does not used any cryptographic algorithm.
[5] Proposed mobile phone voting system Based on public
key encryption algorithm RSA. Proposed system contain
three parts: access control; voting and election
administrator server. First part holds validation and
identification for the voters. Voting part done by ciphering
voter data using RSA algorithm And last part is the election
administrator server classifies ending result using
decryption RSA private key for received encrypted data.
System has disadvantages like there is no any online
registration and more expensive computational cost and
communication overhead due to RSA algorithm.

Proposed system consists of three steps:


A. Online registration phase
B. Voting phase
C. Vote collecting and result phase
A. Online Registration Phase
In this phase we will provide the one highly secured
website for registration purpose. After that user have to
SIGN IN there and fill its whole information including NIC
and SIM card number. After pressing submit button, server
send one public key to them which encrypt the whole
information and send over the server. And then server
sends one secret symmetric key to user. User must have to
keep this key secret. Because this key is required on day of
election. Election commission server should keep two
updated databases. First database consists of public NICs
and second database contained SIM cards from the concern
authorities for user verification and authentication purposes
at the registration time. Short Message Services (SMS) is
used throughout voting process without the need of
internet. ECS will create two key, first one is a public key
and second one is a private key. The ECS will keep only
private key secret and will put public key on its server.

III. PROPOSED SYSTEM


Our propose system provide online registration of voter
and also offline registration is available for voter in case of
failure of online registration. After registration voter will
cast their vote and result will display. For proposed system
it required five elements

Fig.1. Online Registration phase

479

International Journal of Emerging Technology and Advanced Engineering


Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015)
9) When the genuine user registering his/herself with
election commission server, ECS will send
registration problem message of cant be register
through online registration phase and will requested
his/her to come to ECO for correction of their
registration as someone already register his/herself on
genuine user credentials.
10) In this case user should go to election commission
Office. The previous registration will be canceled and
genuine user will be register.
11) Election commission office (ECO).
B. Voting Phase
1) In this phase, ECS will send candidate list to
authenticated voter according to their constituency via
SMS encrypted with voter symmetric key. This will
ensure that the candidate list message only send to the
authenticated voter list. This method also prevents
unauthorized voter to cast their vote...
2) After that voter will receive the SMS of candidate list on
voting day.
3) In this step voter will select their candidate from the
candidate list. After selecting their candidate voter will
then send the message to ECS with public key, candidate
PIN encrypt both with user symmetric key and again
concatenate NIC number and send to ECS via SMS.
4) ECS will find user symmetric key using NIC number.
Then it will decrypt the remaining SMS part with user
symmetric key. ECS will mark only the PIN part of the
message for the record purposes and to avoid double
voting. The remaining encrypted candidate list message
will be forwarded to the vote collecting and result phase
server.

Fig.2.Flowchart for Registration phase

1) In the first step user will send their National Identity


Card No + SIM Card No + Symmetric Key which
encrypt with public key of ECS to ECS server.
2) When ECS receiving data they will decrypt this data
with his private key.
3) ECS will verify the users NIC and SIM card number
with its two latest databases, one consist public NIC
numbers and other database consist SIM card
numbers.
4) If ECS verified that user is authentic then,
5) ECS will send PIN encrypted with user symmetric
key to the user. This PIN will be used for the
authenticity of the voter in the latter stages of the
election process.
6) Receiving this user will decrypt the PIN with his/her
symmetric key. User should securely keep their PIN
from disclosing to others because its disclosing will
compromised confidentiality.
7) When Mobile phone user got PIN then Mobile phone
user will send acknowledgement message to election
commission server .Mobile phone user will become
certified as mobile phone voter. Here online
registration phase will be completed.
8) This is offline registration phase which will be used in
case someone registers his/herself on genuine user
credentials.

Fig.3.Voting phase

480

International Journal of Emerging Technology and Advanced Engineering


Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015)

Fig.4. Flowchart for voting phase

C. Vote Collecting and Result Phase Server


1) Before the start of the election, we used time lock
mechanism which will not accept vote after time end on
VCRPS. It will keep the vote in encrypted form until the
official time of the election ended. Implementing this
restriction on this server, the decryption of the votes will
be started after the end of the election time. The third
party will not see the result before the official time ends,
thus it prevents to seeing of the election results.
2) After ending of voting phase, vote will be decrypt by
using ECS private key.
3) At end of the process, votes will be counted and the
results will be officially display to the public.

Fig.6.Flowchart for result phase

IV. SECURITY ALGORITHAM


Security is provided to our proposed system by using
RSA algorithm. RSA stands for the names of the three men
who made the algorithm public. These men's names are
Ron Rivets, Adi Shamir, and Leonard Adleman. A
simple explanation of the RSA algorithm is that it was
made for public-key cryptography, which is based on
factoring large integers, which is the factoring problem.
There are three steps to the RSA algorithm. These steps are
key generation, encryption, and decryption Working with a
public-key encryption system has mainly three phases:
A. Key Generation: Whoever wants to receive secret
messages creates a public key (which is published) and a
private key (kept secret). The keys are generated in a
way that conceals their construction and makes it
'difficult' to find the private key by only knowing the
public key.
B. Encryption: A secret message to any person can be
encrypted by his/her public key (that could be officially
listed like phone numbers).
C. Decryption: Only the person being addressed can easily
decrypt the secret message using the private key.

Fig.5.Vote Collecting and Result Phase Server

481

International Journal of Emerging Technology and Advanced Engineering


Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015)
Proposed system is more useful, efficient and reliable in
mobile phone voting process. This system does not require
any internet facility, thus this proposed system is decreased
expensive hardware cost. Proposed mobile phone voting
System required mobile phone and SIM card.
REFERENCES
[1]

[2]
Fig. 7 Structure of RSA Algorithm Structure

V. SCOPE

[3]

In our proposed system registration process done


through website which minimize time, energy and cost.
Voting done through the SMS only so it provides mobility
option to the voter. Because of RSA security double voting
will prevented dandy offer choice to the public to cast their
vote through their cell phone. This system used for
government election if we used this system in cloud
computing then it will give more benefit. It has more scope
for small election to government election process.

[4]

[5]

[6]

VI. CONCLUSION
This paper proposes mobile phone voting system avoid
double voting in case of casting ballots first from mobile
phone and then from pooling booth.

482

X. Yi, P. Cerone, and Y. Zhang, Secure Electronic Voting for


Mobile Communications, in Proc. Vehicular Technology
Conference, vol. 2, 2006.
Y. Feng, S. L. Ng, and S.S. Grosche, An Electronic Voting System
Using GSM Mobile Technology, Department of Mathematics
Royal Holloway, University of London Egham, Surrey TW20 0EX
England,
England
Technical
Report
RHULMA2006
5http://www.rhul.ac.uk/mathematics/techreports, 26 June 2006.
K. Kim, and D. Hong, Electronic Voting System using Mobile
Terminal, World Academy of Science, Engineering and
Technology, pp. 33-37, 2007.
Y. Qiu, and H. Zhu, Somewhat Secure Mobile Electronic-voting
Systems Based on the Cut-and-Choose Mechanism, International
Conference on Computational Intelligence and Security, Proc. IEEE
International conference on Computational Intelligence and Security
(CIS09), vol. 1, pp. 446-450, July 2009.
H. Shaun, and A. Choudhray, Intelligent Polling System Using
GSM Technology, International Journal of Engineering Science,
vol. 3, 201.
Mohib Ullah, Arif Iqbal Umar, Noor ul Amin, Nizamuddin, An
Efficient and Secure Mobile Phone Voting System Department of
Information Technology Hazara University Mansehra Pakistan,
2013 IEEE

Das könnte Ihnen auch gefallen