International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015) Mobile Voting System Dipali More1, Mehzabin Shaikh2, Meera Awaskar3, Supriya Ghongde4, Sampada Wattamwar5, Divya Tadpelliwar6 Department of Information Technology, Savitribai Phule Pune University Without eliminating these security threats like buying a vote and Coercion, online registration, secrecy of ballot, anonymity of voter and double voting this latest technology can’t be allowed. An efficient and reliable system is essential for the trustworthy and successful implementation of this technology. In our system we design mobile application for e-voting (electronic voting) process. The proposed system uses mobile phone device having: small in size, low power, low-price as compared to computers and Direct Recording Electronic voting System, Electronic Voting Machine’s, provide mobility feature and security. Proposed system uses Global System for Mobile Communication technology which is a secure and globally used mobile technology in the current situation. Mobile phone also uses Subscriber Identity Module technology which provides user identity privacy, user identity verification and subscriber data secrecy providing more security to the proposed system. The key features of our proposed Mobile Phone Voting System is: 1. Eligibility: only authorized voter can cast their vote. 2. Uniqueness: Each user can cast their only one vote. 3. Integrity: Valid vote should not be modified or deleted. 4. Fairness: The election result should not be accessible before the official time ended. 5. Secrecy: No one should be able to find how voter cast their vote. 6. Cost-effectiveness: Election system should be efficient and affordable. Abstract— Mobile voting system is very secure, efficient and easy way to casting of vote. In this paper we will use RSA algorithm for security purpose. Our proposed system provide a new e-voting system which fulfills the security requirements of voting process. In our project total three steps are required: Online Registration of voter, vote casting of voter and result display. Proposed system provides secure and efficient online vote casting and also paper ballot system if online voting fail. In Proposed system there is no need of internet for voting, it is required at the time of online registration only. All process will be done through SMS messaging without requirement of internet connection. Keywords—NIC, SIM, Symmetric key, mobile voting, Public key, private key. I. INTRODUCTION As democracies across the globe fight challenges related to electronic voting systems, here a mobile phone-based voting system that incorporated into the current large-scale election process, gives the promising research. Traditionally, voting process is organized in centralized or distributed manner called voting booths. The earlier process of election is quite complex and time consuming. People were waiting in queue for long time. To reduce these problem mobile voting system is introduced. This mobile voting system provide many benefits like we don’t need to goto polling booths, no need to use paper ballots and we have time and cost efficiency and it also avoid tiredness and violence . In our system there is no expensive hardware is used. For the different reasons, voters may not able to come to the voting booths physically, but now with the use of this new system he can vote remotely. For example, he can vote from home or while travelling abroad or sitting in the Office. That’s why there is more demand for remote voting. In this system procedures are easy, transparent and most secure. To day the most common way for remote voting is postal voting, where voters cast their votes by cell Phones...Internet voting was introduced to provide more flexibility. Because of the inherited security vulnerabilities Of the Internet and computerized systems. In general, Phone Voting System (MPVS) provides mobility feature. Internet voting there is awide range of criticism. Mobile However this technology accesses certain security threats for its successful implementation in election. II. LITERATURE REVIEW Voting through the mobile phone it is the new and advanced area of research. We take the review of some IEEE papers which presented in past. 1] Proposes mobile phone voting system developed on modular square root and blind signature system. System uses confidentiality of voter, secrecy of ballot, voter anonymity and no computation cost and communication overhead. CA (certificate authority) involve as third party, that is distribution of certificates to voters is the responsibility of CA for authentication purposes, delayed occurred which make the process slow 478 International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015) Mobile Phone, Election Commission Server (ECS); Election Commission Databases (ECD); Vote Collecting and Result Phase Server (VCRPS)and Election Commission Office (ECO). [2] Proposes mobile phone voting system using Global System for Mobile communication technology. In the system voter authentication is occurred through GSM mobile operator. user validation is done through GSM challenge-response protocol. System contain of four parts: mobile phone; authentication server; verification server and result counting server. Proposed system contain three levels: pre voting level; voting level and post voting level. For kepping Voter secrecy using blind signature system. Because of GSM authentication setup publickey overhead is mostly decresed. More work is required to deal with the trust retained on authentication server, enduser device (ME) and application security. [3] Proposes mobile phone intermediate evoting system uses the extended Pailler’s encryptions system. This system is used to enforce the cut-of-the choose method to exclude the computational zero knowledge evidences and show the effectiveness of the system. Proposed system is provably safe in simulation-based prototype. [4] Propose GSM based mobile phone voting system is used to cast vote without registering for voting in advance and going to polling booths. System prevents reptition voting but It has big disadvantage to security, proposes system does not used any cryptographic algorithm. [5] Proposed mobile phone voting system Based on public key encryption algorithm RSA. Proposed system contain three parts: access control; voting and election administrator server. First part holds validation and identification for the voters. Voting part done by ciphering voter data using RSA algorithm And last part is the election administrator server classifies ending result using decryption RSA private key for received encrypted data. System has disadvantages like there is no any online registration and more expensive computational cost and communication overhead due to RSA algorithm. Proposed system consists of three steps: A. Online registration phase B. Voting phase C. Vote collecting and result phase A. Online Registration Phase In this phase we will provide the one highly secured website for registration purpose. After that user have to SIGN IN there and fill its whole information including NIC and SIM card number. After pressing submit button, server send one public key to them which encrypt the whole information and send over the server. And then server sends one secret symmetric key to user. User must have to keep this key secret. Because this key is required on day of election. Election commission server should keep two updated databases. First database consists of public NIC’s and second database contained SIM cards from the concern authorities for user verification and authentication purposes at the registration time. Short Message Services (SMS) is used throughout voting process without the need of internet. ECS will create two key, first one is a public key and second one is a private key. The ECS will keep only private key secret and will put public key on its server. III. PROPOSED SYSTEM Our propose system provide online registration of voter and also offline registration is available for voter in case of failure of online registration. After registration voter will cast their vote and result will display. For proposed system it required five elements Fig.1. Online Registration phase 479 International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015) 9) When the genuine user registering his/herself with election commission server, ECS will send registration problem message of can’t be register through online registration phase and will requested his/her to come to ECO for correction of their registration as someone already register his/herself on genuine user credentials. 10) In this case user should go to election commission Office. The previous registration will be canceled and genuine user will be register. 11) Election commission office (ECO). B. Voting Phase 1) In this phase, ECS will send candidate list to authenticated voter according to their constituency via SMS encrypted with voter symmetric key. This will ensure that the candidate list message only send to the authenticated voter list. This method also prevents unauthorized voter to cast their vote... 2) After that voter will receive the SMS of candidate list on voting day. 3) In this step voter will select their candidate from the candidate list. After selecting their candidate voter will then send the message to ECS with public key, candidate PIN encrypt both with user symmetric key and again concatenate NIC number and send to ECS via SMS. 4) ECS will find user symmetric key using NIC number. Then it will decrypt the remaining SMS part with user symmetric key. ECS will mark only the PIN part of the message for the record purposes and to avoid double voting. The remaining encrypted candidate list message will be forwarded to the vote collecting and result phase server. Fig.2.Flowchart for Registration phase 1) In the first step user will send their National Identity Card No + SIM Card No + Symmetric Key which encrypt with public key of ECS to ECS server. 2) When ECS receiving data they will decrypt this data with his private key. 3) ECS will verify the user’s NIC and SIM card number with its two latest databases, one consist public NIC numbers and other database consist SIM card numbers. 4) If ECS verified that user is authentic then, 5) ECS will send PIN encrypted with user symmetric key to the user. This PIN will be used for the authenticity of the voter in the latter stages of the election process. 6) Receiving this user will decrypt the PIN with his/her symmetric key. User should securely keep their PIN from disclosing to others because it’s disclosing will compromised confidentiality. 7) When Mobile phone user got PIN then Mobile phone user will send acknowledgement message to election commission server .Mobile phone user will become certified as mobile phone voter. Here online registration phase will be completed. 8) This is offline registration phase which will be used in case someone registers his/herself on genuine user credentials. Fig.3.Voting phase 480 International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015) Fig.4. Flowchart for voting phase C. Vote Collecting and Result Phase Server 1) Before the start of the election, we used time lock mechanism which will not accept vote after time end on VCRPS. It will keep the vote in encrypted form until the official time of the election ended. Implementing this restriction on this server, the decryption of the votes will be started after the end of the election time. The third party will not see the result before the official time ends, thus it prevents to seeing of the election results. 2) After ending of voting phase, vote will be decrypt by using ECS private key. 3) At end of the process, votes will be counted and the results will be officially display to the public. Fig.6.Flowchart for result phase IV. SECURITY ALGORITHAM Security is provided to our proposed system by using RSA algorithm. RSA stands for the names of the three men who made the algorithm public. These men's names are Ron Rivets, Adi Shamir, and Leonard Adleman. A simple explanation of the RSA algorithm is that it was made for public-key cryptography, which is based on factoring large integers, which is the factoring problem. There are three steps to the RSA algorithm. These steps are key generation, encryption, and decryption Working with a public-key encryption system has mainly three phases: A. Key Generation: Whoever wants to receive secret messages creates a public key (which is published) and a private key (kept secret). The keys are generated in a way that conceals their construction and makes it 'difficult' to find the private key by only knowing the public key. B. Encryption: A secret message to any person can be encrypted by his/her public key (that could be officially listed like phone numbers). C. Decryption: Only the person being addressed can easily decrypt the secret message using the private key. Fig.5.Vote Collecting and Result Phase Server 481 International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 5, Issue 1, January 2015) Proposed system is more useful, efficient and reliable in mobile phone voting process. This system does not require any internet facility, thus this proposed system is decreased expensive hardware cost. Proposed mobile phone voting System required mobile phone and SIM card. REFERENCES [1] [2] Fig. 7 Structure of RSA Algorithm Structure V. SCOPE [3] In our proposed system registration process done through website which minimize time, energy and cost. Voting done through the SMS only so it provides mobility option to the voter. Because of RSA security double voting will prevented dandy offer choice to the public to cast their vote through their cell phone. This system used for government election if we used this system in cloud computing then it will give more benefit. It has more scope for small election to government election process. [4] [5] [6] VI. CONCLUSION This paper proposes mobile phone voting system avoid double voting in case of casting ballots first from mobile phone and then from pooling booth. 482 X. Yi, P. Cerone, and Y. Zhang, “Secure Electronic Voting for Mobile Communications,” in Proc. Vehicular Technology Conference, vol. 2, 2006. Y. Feng, S. L. Ng, and S.S. Grosche, “An Electronic Voting System Using GSM Mobile Technology,” Department of Mathematics Royal Holloway, University of London Egham, Surrey TW20 0EX England, England Technical Report RHUL–MA–2006 5http://www.rhul.ac.uk/mathematics/techreports, 26 June 2006. K. Kim, and D. Hong, “Electronic Voting System using Mobile Terminal,” World Academy of Science, Engineering and Technology, pp. 33-37, 2007. Y. Qiu, and H. Zhu, “Somewhat Secure Mobile Electronic-voting Systems Based on the Cut-and-Choose Mechanism,” International Conference on Computational Intelligence and Security, Proc. IEEE International conference on Computational Intelligence and Security (CIS’09), vol. 1, pp. 446-450, July 2009. H. Shaun, and A. Choudhray, “Intelligent Polling System Using GSM Technology,” International Journal of Engineering Science, vol. 3, 201. Mohib Ullah, Arif Iqbal Umar, Noor ul Amin, Nizamuddin, ”An Efficient and Secure Mobile Phone Voting System” Department of Information Technology Hazara University Mansehra Pakistan, ©2013 IEEE
© Copyright 2026 Paperzz