PROPOSITION OF A SECURE SYSTEM OF VOTING USING UIDAI DATA VIA IOT

Main Article Content

Shakya Chakrabarti
Neelanjan Acharya

Keywords

UIDAI Number, Bio-metric Authentication, VMAC Encryption, Data Server

Abstract

Purpose of the study: The paper proposes a secure system of voting using UIDAI Data and implementing IoT to save a copy of the voting statistics via VMAC encryption. Methodology: The paper proposes a secure system which will utilize the Aadhar database along with the Electronic Voting Machine units, to authenticate voters by bio-metric means which will be synchronized by Internet of Things. After successful casting of vote, two sets of voting statistics will be stored in the local polling station as well as a centralized register respectively; through a cascade of servers. These will be secured from virtual third-party vulnerability by VMAC encryption. Finally, an impenetrable system of voting can be established by the above method. Applications of this study: If the proposed system of voting is practically implemented, then a proper consensus can be obtained by avoiding poll-day violence. Furthermore, if UIDAI data is used then the voter’s authenticity is also verified. Novelty/Originality of this study: The use of biometric data, as well as storage of a second set of data using VMAC encryption to a secondary storage site.

Abstract 254 | PDF Downloads 29

References

1. “Biometric Voting Machine(BVM) using IOT”-K.Dinesh, G.SaiNadha.
2. “Advanced Secure Voting System with IoT”-Ms.Nithya.S, Mr,Ashwin.C, Mr.Karthikeyan.C, Mr. Ajith Kumar.M (IJECS)
3. “Design and development of voting data security for electronic voting (E-Voting)”-SupenoDjanali; Baskoro Adi Pratomo; KarsonoPuguhNindyoCipto; AstandroKoesriputranto; HudanStudiawan, IEEE ICoICT(2016)
4. “ Secured electronic voting machine using biometric”-Anandaraj S; Anish R; Devakumar P. V, IEEE 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
5. “ An electronic voting system based on homomorphic encryption and prime numbers”-Ali Azougaghe; Mustapha Hedabou; Mostafa Belkasmi, IEEE 2015 11th International Conference on Information Assurance and Security (IAS)