Problems with the iVote Internet Voting System

نویسندگان

  • Roland Wen
  • Vanessa Teague
چکیده

The Computing Research and Education Association of Australasia (CORE) is an association of university departments of computer science in Australia and New Zealand. This submission has been authorised by the President of CORE. The authors are both Computer Science and Engineering researchers whose main interest is in electronic voting and security. We have previously made submissions to parliamentary inquiries examining the problems with e-voting and IT systems used in Australian elections. At present we are collaborating with the Victorian Electoral Commission on its e-voting system. In the 2011 State Election the NSWEC ran one of the world's most ambitious Internet voting projects with a system called iVote, provided by US vendor Everyone Counts. The main purpose was to enable vision impaired voters to vote without human assistance, but the project was extended to any voter who was outside NSW on election day. This excellent opportunity to use technology to improve the voting experience for voters with disabilities is an important part of modern electoral reform. However, widespread Internet voting is extremely difficult to secure and scrutinise. Many security experts believe that it cannot be trusted for public elections [IAVOSS07; VV08]. In this submission we explain the problems with iVote and identify measures that need to be taken to ensure that future Internet voting systems provide stronger protection of voter rights. We aim to maintain the quality and trustworthiness of NSW elections, and ensure that Internet voting is offered only when it does not reduce vote security, vote secrecy or voter independence. The iVote system had significant security vulnerabilities and reliability failures, one of which is known to have misrecorded votes. The system also experienced failures in authenticating eligible voters. Although the system protected votes in transit across the Internet, there is not enough publicly available information to establish whether vote privacy and anonymity were adequately protected at the Electoral Commission. iVote also had reduced safeguards against general IT security vulnerabilities because the part of the system intended to detect external hacking was " not implemented as per design " [PWC11a]. Although there are well-known measures to mitigate many of these problems, the iVote system does not contain such countermeasures in the design. Moreover it is evident that poor practice was employed in implementing iVote, which resulted in defects (and likely vulnerabilities) being introduced but not being identified until too late. The audit and evaluation processes were given inadequate time and …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election

In the world’s largest-ever deployment of online voting, the iVote Internet voting system was trusted for the return of 280,000 ballots in the 2015 state election in New South Wales, Australia. During the election, we performed an independent security analysis of parts of the live iVote system and uncovered severe vulnerabilities that could be leveraged to manipulate votes, violate ballot priva...

متن کامل

Voting Algorithm Based on Adaptive Neuro Fuzzy Inference System for Fault Tolerant Systems

some applications are critical and must designed Fault Tolerant System. Usually Voting Algorithm is one of the principle elements of a Fault Tolerant System. Two kinds of voting algorithm are used in most applications, they are majority voting algorithm and weighted average algorithm these algorithms have some problems. Majority confronts with the problem of threshold limits and voter of weight...

متن کامل

Voting Algorithm Based on Adaptive Neuro Fuzzy Inference System for Fault Tolerant Systems

some applications are critical and must designed Fault Tolerant System. Usually Voting Algorithm is one of the principle elements of a Fault Tolerant System. Two kinds of voting algorithm are used in most applications, they are majority voting algorithm and weighted average algorithm these algorithms have some problems. Majority confronts with the problem of threshold limits and voter of weight...

متن کامل

Improving the Transparency of Remote E-Voting: The Estonian Experience

Pilot projects in the area of remote e-voting have been carried out in several countries but the number of those projects in which the Internet-cast votes are legally binding remains small. Estonia, indeed, has been the first country to introduce Internet voting in which legitimate results were obtained at the national level. In local government elections in October 2005 and March 2007 parliame...

متن کامل

Electronic Voting Machine Using Internet

Electronic voting system is an important tool which allows voters to vote over the Internet without the geographical restrictions with considers important criteria in evaluating electronic voting schemes such as the mobility, democracy, and privacy. There are a number of voting systems adopted all over the world with each of them having its peculiar problems. The main task of this paper is to i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012