secure mobile based voting system

29
mobile Voting Vote at Any Time Any Where Any Mobile SECURE MOBILE BASED VOTING SYSTEM Under The Guidance of: Ningappa.T.P Presented by: Suma.B(2TG07CS045) Veeramma.R.K(2TG07CS053) Vidya.H.B(2TG07CS055) Vijayalakshmi.S(2TG07CS0

Upload: vijju-lakkundi

Post on 31-Oct-2015

62 views

Category:

Documents


1 download

DESCRIPTION

Electronic voting machines are currently used for vote casting. These systems allow the user to cast his vote reducing possible errors like wrong candidate selections and loss of votes, reducing manual work during counting. Still these have the drawbacks.

TRANSCRIPT

Page 1: Secure Mobile Based Voting System

mobile Voting

Vote at Any TimeAny WhereAny Mobile

SECURE MOBILE BASED VOTING SYSTEM

Under The Guidance of:Ningappa.T.P

Presented by:

Suma.B(2TG07CS045)

Veeramma.R.K(2TG07CS053)

Vidya.H.B(2TG07CS055)

Vijayalakshmi.S(2TG07CS058)

Page 2: Secure Mobile Based Voting System

• Introduction

• Overview of Mobile Technology

• VoiceXML Architecture

• VXML Components

• JSP Overview

• System Architecture

• Phases of Mobile Voting Scheme

• Internal Structure of 3-tier Architecture

• Speech Recognition Process in Mobile Voting

• DFD-Vote Casting

• Testing

• Advantages and Disadvantages of Proposed System

• Conclusion and Future Enhancements

• References

OVERVIEW

Page 3: Secure Mobile Based Voting System

EXISTING SYSTEM

2.Electronic voting machine1.Ballot System

Electronic voting machines are currently used for vote casting. These systems

allow the user to cast his vote reducing possible errors like wrong candidate

selections and loss of votes, reducing manual work during counting. Still these

have the drawbacks.

Page 4: Secure Mobile Based Voting System

DRAWBACKS OF EXISTING SYSTEM

1.Queue for Vote 2.Travel to Vote 3.Elederly people

Page 5: Secure Mobile Based Voting System

PROPOSED SYSTEM

• Enabling the voter to vote with absolute confidentiality, nobody will ever know what he/she voted.

• Enabling the voter to vote from anywhere in the globe, wherever he/she will be, and without needing any special Network, nor equipment ,nor a personal computer(PC).

• Enabling only the voter to vote, avoiding the possibility to “sell a vote”.

Vote at •Any Time •Any Where•Any Mobile

Page 6: Secure Mobile Based Voting System

• Uses Speech recognition technique to handle user requests and response.

• The system is designed as such to be interactive and user friendly.

• The voter is allowed to cast their vote or to know the results depending upon their choice of selection.

• The system authenticates the user using security information’s like biometric id, voter id, year of birth, pin code.

FEATUERS OF PROPOSED SYSTEM

Page 7: Secure Mobile Based Voting System

• In India all earlier elections be it state elections or centre elections a voter used to cast his/her vote to his/her favorite candidate by putting the stamp against his/her name and then folding the ballot paper as per a prescribed method before putting it in the Ballot box. This is a long, time-consuming process and very much prone to errors.

• This method wanted voters to be skilled voters to know how to put a stamp, and methodical folding of ballot paper. Millions of paper would be printed and heavy ballot boxes would be loaded and unloaded to and from ballot office to polling station.

• A vote once recorded in an EVM cannot be tampered with, where as in the ballot paper system the votes marked and put into the box can be pulled out and destroyed.

INTRODUCTIONINTRODUCTION

Page 8: Secure Mobile Based Voting System

.

• The followings are requirements that should be considered for secure and trustworthy e-voting.

- The relation between voter and vote content should not be revealed.

- The result of a poll should be retained as a secret before counting the ballot.

- A voter can cast his vote just one time.

- Only an identified person by an e-voting device can participate in e-voting.

- Other people excepting a voter himself should not know the vote content.

- It is not permitted to rig the ballot.

Cont….

Page 9: Secure Mobile Based Voting System

• IVRS: The Interactive Voice Response (IVR) System serves as a bridge between

people and computer databases by connecting the telephone network with the database.

The IVR system uses pre-recorded or computer generated voice responses to provide information in response to an input from a telephone caller.

• VOICEXML: VoiceXML (VXML) is the W3C's standard XML format for specifying

interactive voice dialogues between a human and a computer.

OVERVIEW OF MOBILE TECHNOLOGY

Page 10: Secure Mobile Based Voting System

VoiceXML ARCHITECTURE

Page 11: Secure Mobile Based Voting System

VXML COMPONENTS• PSTN -Public Switched Telephone Network

The network which is used for connecting telephone calls. PSTN is the world's collection of interconnected voice-oriented public telephone networks, both commercial and government-owned.

• TTS-Text To Speech Engine Text to speech is a way of playing dynamic text to user where as the .wav

file will play only static (recorded) message.

For example if you want to play standard greeting message "Welcome to Mobile Voting" then we can play greeting .wav to the customer. If we want to play the current balance of your bank account then it is better to go with TTS. Just pass the text and it will convert that to voice and that will be played to the Voter.

VXML COMPONENTS

Page 12: Secure Mobile Based Voting System

• JSP may be viewed as a high-level abstraction of Java servlets. JSP pages

are loaded in the server and operated from a structured special installed Java server packet called a Java EE Web Application, often packaged as a .war or .ear file archive.

• JSP allows Java code and certain pre-defined actions to be interleaved with static web markup content, with the resulting page being compiled and executed on the server to deliver an HTML or XML document.

• JSP syntax is a fluid mix of two basic content forms: scriptlet elements and markup. Markup is typically standard HTML or XML, while scriptlet elements are delimited blocks of Java code which may be intermixed with the markup.

JSP OVERVIEW

Page 13: Secure Mobile Based Voting System

• Using Java for outputting VXML offers you several advantages.

Flexibility. Reactivity Extensibility.

• For creating a dynamic VoiceXML, you include two types of files:

Static VoiceXML page Dynamic JavaServer Page

VoiceXML USING JSP

Page 14: Secure Mobile Based Voting System

SYSTEM ARCHITECTURE

Page 15: Secure Mobile Based Voting System

• Voting Device (Mobile/Land Phone):

In our scheme, the voting device corresponds to the mobile equipment (ME), which consists of a SIM card.

• Authentication Centre (AC):

AC is an entity within the GSM network.AC generates the authentication parameters and authenticates the mobile equipment. Apart from authenticating the mobile equipment, AC is also an important information distribution server in the proposed scheme. AC needs to be trusted to transfer the messages as required.

SERVER MODULE DISCREPTION

Page 16: Secure Mobile Based Voting System

• Verification Server (VS): VS belong to the voting authority, who organizes the voting event. It

verifies the legitimacy of the voter and issues a voting token to the voter. VS also publish a list of voter information.

• Collecting and Counting Server (CS): CS is the server that collects and counts the votes to give the final

result. CS’s action need to be audited by all candidate parties.

Cont…

Page 17: Secure Mobile Based Voting System

In this section, we outline our mobile voting scheme.

• Voters Authentication Phase:

In this phase Election commission is responsible to verify the authenticity of the voters. If the voter is authentic then only he will be allowed to participate in the next steps of voting.

• Voting Phase: In this phase, the voter dial a designated phone number and follow the

instructions using a password already provided. The voter selects the appropriate option to vote the particular party. The voter checks the signature and retrieves the VS- signed voter, voter

ID.

PHAGES OF MOBILE VOTING SCHEMES

Page 18: Secure Mobile Based Voting System

• Counting Phase: Counting Phase At the scheduled time of counting CS decrypts the ballot

and checks whether the voting token is valid or not. If it is valid it will be counted else it will be rejected.

• Security Analysis Authentication only the authorized voters can vote. Privacy all votes remain secret while the voting takes place and each

individual vote cannot be linked to the voter who casts it.

Cont…

Page 19: Secure Mobile Based Voting System

INTERNAL STRUCTURE OF 3-TIER ARCHITECTURE

Page 20: Secure Mobile Based Voting System

SPEECH RECOGNITION PROCESS IN MOBILE VOTING

Page 21: Secure Mobile Based Voting System

Cast Vote

Prompt User For DTMF or Voice Input Mode

Recognize Touch Tone

Input

Recognize

Voice Input

Generate

Ballot to Cast Vote Validate User

Vote

Party_Details

Voice InputDTMF Input

SuccessfulValidation

Unsuccessful Validation

Check Election

ID

Reject Vote

No Match

MatchElection Details

End User Session

Accept VoteCasting

DATA FLOW DIAGRAM-VOTE CASTING

Page 22: Secure Mobile Based Voting System

• White Box Testing:  By using this technique it was tested that all the individual logical paths

were executed at least once. All the logical decisions were tested on both their true and false sides

• UNIT TESTING: This is the first and the most important level of testing. As soon as the

programmer develops a unit of code the unit is tested for various scenarios. As the application is built it is much more economical to find and eliminate

the bugs early on. Hence Unit Testing is the most important of all the testing levels.

TESTING

Page 23: Secure Mobile Based Voting System

• INTEGRATION TESTING: Since Integration Testing focuses on Integration of components and

components can be built by different developers and even different development teams, it is important the right versions of components are tested.

• SYSTEM TESTING(Black Box Testing): By the use of this technique the missing functions were identified and

placed in their positions. The errors in the interfaces were identified and corrected. This technique was also used to identify the initialization and termination

errors and correct them.

Cont…

Page 24: Secure Mobile Based Voting System

ADVANTAGES OF PROPOSED SYSTEM

• Improve accessibility to elderly people, disabled and blind peoples.

• Increased participation rate.

• Improve accessibility to people living abroad or travelling at voting time.

• Reduces voting costs.

Page 25: Secure Mobile Based Voting System

• Electronic failures might occur with such a system. 

• Other generation may not be comfortable in using the system.

DISADVANTAGES OF PROPOSED SYSTEM

Page 26: Secure Mobile Based Voting System

• This system allows the user to cast his vote with high level of confidentiality and keep voters away from the possible threats like booth capturing and it may increase the voter turnouts in remote areas and even in urban areas.

• Since the system operates on IVR platform the voter session will be interactive and user friendly which makes the user to feel in a very comfortable zone. The system provides security features like checking the unique identification number of the voter.

CONCLUSION

Page 27: Secure Mobile Based Voting System

• As a measure of security features mobile devices allows the user to make use of biometric information’s which are unique to individuals.

For example voice biometrics can be used with voiceXML to authenticate a user. Similarly finger prints can also be used with mobiles that provide those options.

FUTURE ENHANCEMENT

Page 28: Secure Mobile Based Voting System

• Creating VoiceXML pages within a Java Web developer frameworkhttp://www.ibm.com/developerworks/web/library/wa-voicexml

• VoiceXML Tutorialshttp://www.vxml.org

• JSP and Servlets Tutorial http://java.sun.com/javaee/reference/tutorials

REFERENCES

Page 29: Secure Mobile Based Voting System

Thank you