An Indirect Solution for Tampering EVM and Provision for Online Vote Casting and Authentication
نویسندگان
چکیده
Election commission of India has marked with many significant changes in the recent time and it is considered to be one of the most responsible organizations. In such a big democratic country like India it is expected to adopt the latest technological options which improves the performance of voting and there of to achieve 100% polling in India by avoiding unauthorized users to cast voting. In the present elections polling system, the data is being maintained manually (Electoral rolls). It is time taking process for authentication of a voter and also it takes time to release the results. It also needs high security for transportation of EVM’s. Another challenge in front of the election commission is EVM tampering. Many people have announced (with proof) that the EVM machine can be tampered. The main objective of our paper is to find a solution for all the above problems. Our project “An indirect solution for tampering EVM and provision for online vote casting and authentication” can be a solution for all the above problems. It will be very useful for Election Commission of India for its future enhancement and updated technology option in near future.
منابع مشابه
Phishing Attack Prevention in Corporate Companies for Internet Voting with Secure Authentication
Corporations and organizations routinely use Internet voting to elect officers and Board members and for other proxy elections. Online voting refers to both the electronic means of casting a vote and the electronic means of tabulating votes. Using just a small sample of reported phishing content, a fairly good picture of which hosting providers may be more vulnerable to compromise or more forgi...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملA Solution for the Allocation of Customers Authentication Methods (The Case of Multimedia Contact Center in Agriculture Bank of Iran)
In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کامل