Security Challenges of Electronic Voting

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In electron-voting system, different attacks and threats may be carried out depending on the operational environment in which the system is used. Voting systems can be easily exposed to attack from different serious threats of denial of service and a Man-in the-Middle attack. Cryptographic techniques like fingerprint sensor and digital signature scheme can be used in electronic voting. Combining two techniques like digital signature and blind signature or fingerprint may be the best solution for a secured electronic voting system. The purpose of this paper address the scope of electronic voting system, and examine the main security problems in electronic voting systems, particularly security threats related to electronic voting systems, the criteria of using electronic voting systems, and solutions to security threats.

     

     


  • Keywords


    Electronic Voting System, E-Voting Security, Cryptography, Threats, and Attacks

  • References


      [1] Abdullahi Lawal Abba , Mohammad Awad, Zakaria Al-Qudah, and Abdul Halim Jallad, "Security Analysis of Voting Systems", IEEE International conference on electrical and computing techniques and applications, 2017.

      [2] Kareem M. Abosamra, Ahmed A. Abdelhafez, Ghazy M.R. Assassa, Monan F.M. Mursi, "Practical, Secure, and Auditable e-voting system", Journal of Information Security and Applications, Vol. 36, pp. 69-89, Elsevier, 2017.

      [3] Hiaijun Pan, Edwin Hou and Nirwan Ansari, "Enhanced name and vote separated E-voting: an E-voting system that ensures voter confidentiality and candidate privacy", Security and communication networks, vol. 7, pp.2335-2344, Wiley, 2014.

      [4] S.Nisha, Neela Madheswari, "Prevention of Phishing Attacks in Voting System using Visual Cryptography", International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), pp. 3-35, 2016

      [5] Craig Burton, Chris Culname, Steve Schneider, "vvote: Verifiable Electronic Voting in Practice", Security Smorgasbord, IEE computer and reliability societies, 2016

      [6] Abdelwahab alsammak, Alaa abdelrahman, Tarek elshaistawy and aboubakr Elewa, “Cahllenges of Electronic Voting- A Survey”, ACSU Advances in Computer Science: An International Journal, Vol.4, issue 6, B0. 18, pp. 98-108,November 2015.

      [7] Pankaj Kumar Malviya, “E-Voting System Using Cloud in Indian Scenario”, International Journal of Engineering Science & Advanced Technology, Vol. 3, Issue 3, pp-171-176, 2014.

      [8] Modelling Tools - IPO diagrams URL: https://sdd-hsc-online.wikispaces.com/Modelling+Tools+-+IPO+diagrams

      [9] Nwogu Emeka Reginald, “Mobile, Secure E-Voting Architecture for the Nigerian Electoral System”, IOSR Journal of Computer Engineering, Vol. 17, Issue 2, pp. 27-36, 2015.

      [10] M. Nandha Kishore, A. Sridhar, S. Divakara,, “Advanced Security Strategy in Smart E-Voting System”, SSRG International Journal of Computer Science and Engineering, vol. 2, issue 6, pp.54-60. 2015.

      [11] Rohan Patel, Vaibhav Ghorpade, Viny Jain and Mani Kambli, “Fingerprint Based e-voting System using Aadhar Database”, International Journal for Research in Emerging Science and Technology, Vol. 2, Issue 3, pp. 86-90, 2015.

      [12] Olayemi M, Olaniyi, Taiha A. Foloruni, “Design of Secture Electronics Voting System using Finger Biometrics and Crypto-watermarking Approach”, I.J. Information Engineering and Electronics Business, Vol. 5, Issue 9, pp. 9-17, 2016.

      [13] atchaya arivalagam, nage nikitha peddi, wajdi bazuhair, elt, “study of wireless security attacks on medical devices”, international journal of multidisciplinary in cryptology and information security, vol.6 no. 6, November-December, 2017, pp. 2320-2610.


 

View

Download

Article ID: 27843
 
DOI: 10.14419/ijet.v7i4.16.27843




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.