Security Challenges of Electronic Voting

  • Authors

    • Kalim Qureshi
    • Noha Abdallah
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.16.27843
  • Electronic Voting System, E-Voting Security, Cryptography, Threats, and Attacks
  • In electron-voting system, different attacks and threats may be carried out depending on the operational environment in which the system is used. Voting systems can be easily exposed to attack from different serious threats of denial of service and a Man-in the-Middle attack. Cryptographic techniques like fingerprint sensor and digital signature scheme can be used in electronic voting. Combining two techniques like digital signature and blind signature or fingerprint may be the best solution for a secured electronic voting system. The purpose of this paper address the scope of electronic voting system, and examine the main security problems in electronic voting systems, particularly security threats related to electronic voting systems, the criteria of using electronic voting systems, and solutions to security threats.

     

     

  • References

    1. [1] Abdullahi Lawal Abba , Mohammad Awad, Zakaria Al-Qudah, and Abdul Halim Jallad, "Security Analysis of Voting Systems", IEEE International conference on electrical and computing techniques and applications, 2017.

      [2] Kareem M. Abosamra, Ahmed A. Abdelhafez, Ghazy M.R. Assassa, Monan F.M. Mursi, "Practical, Secure, and Auditable e-voting system", Journal of Information Security and Applications, Vol. 36, pp. 69-89, Elsevier, 2017.

      [3] Hiaijun Pan, Edwin Hou and Nirwan Ansari, "Enhanced name and vote separated E-voting: an E-voting system that ensures voter confidentiality and candidate privacy", Security and communication networks, vol. 7, pp.2335-2344, Wiley, 2014.

      [4] S.Nisha, Neela Madheswari, "Prevention of Phishing Attacks in Voting System using Visual Cryptography", International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS), pp. 3-35, 2016[5] Craig Burton, Chris Culname, Steve Schneider, "vvote: Verifiable Electronic Voting in Practice", Security Smorgasbord, IEE computer and reliability societies, 2016[6] Abdelwahab alsammak, Alaa abdelrahman, Tarek elshaistawy and aboubakr Elewa, “Cahllenges of Electronic Voting- A Surveyâ€, ACSU Advances in Computer Science: An International Journal, Vol.4, issue 6, B0. 18, pp. 98-108,November 2015.[7] Pankaj Kumar Malviya, “E-Voting System Using Cloud in Indian Scenarioâ€, International Journal of Engineering Science & Advanced Technology, Vol. 3, Issue 3, pp-171-176, 2014.[8] Modelling Tools - IPO diagrams URL: https://sdd-hsc-online.wikispaces.com/Modelling+Tools+-+IPO+diagrams[9] Nwogu Emeka Reginald, “Mobile, Secure E-Voting Architecture for the Nigerian Electoral Systemâ€, IOSR Journal of Computer Engineering, Vol. 17, Issue 2, pp. 27-36, 2015.[10] M. Nandha Kishore, A. Sridhar, S. Divakara,, “Advanced Security Strategy in Smart E-Voting Systemâ€, SSRG International Journal of Computer Science and Engineering, vol. 2, issue 6, pp.54-60. 2015.[11] Rohan Patel, Vaibhav Ghorpade, Viny Jain and Mani Kambli, “Fingerprint Based e-voting System using Aadhar Databaseâ€, International Journal for Research in Emerging Science and Technology, Vol. 2, Issue 3, pp. 86-90, 2015.[12] Olayemi M, Olaniyi, Taiha A. Foloruni, “Design of Secture Electronics Voting System using Finger Biometrics and Crypto-watermarking Approachâ€, I.J. Information Engineering and Electronics Business, Vol. 5, Issue 9, pp. 9-17, 2016.[13] atchaya arivalagam, nage nikitha peddi, wajdi bazuhair, elt, “study of wireless security attacks on medical devicesâ€, international journal of multidisciplinary in cryptology and information security, vol.6 no. 6, November-December, 2017, pp. 2320-2610.
  • Downloads

  • How to Cite

    Qureshi, K., & Abdallah, N. (2018). Security Challenges of Electronic Voting. International Journal of Engineering & Technology, 7(4.16), 250-254. https://doi.org/10.14419/ijet.v7i4.16.27843