Você está na página 1de 4

T Hemalatha* et al.

[IJESAT] [International Journal of Engineering Science & Ad vanced Technology]

ISSN: 2250-3676
Volume-4, Issue-2, 237-240

AADHAR BASED ELECTRONIC VOTING SYSTEM AND PROVIDING


AUTHENTICATION
D.Krishna1
1

T.Hemalatha2

G.Dhana Mani Shankar3

K.Bala Krishna4

V.Bala Subhramanyam5

Assistant professor, Department of Electronics and Communication Engineering, Lingayas Institute of Management and
Technology, madalavarigudem, Andhra Pradesh, India, krishnadharavath4u@gmail.com
2
Student(M.Tech), Department of Electronics and Communication Engineering, Lingayas Institute of Management and
Technology, madalavarigudem, Andhra Pradesh, India, tankala.hema455@gmail.com
3
Student(B.Tech), Department of Electronics and Communication Engineering, Lingayas Institute of Management and
Technology, madalavarigudem, Andhra Pradesh, India, gdmshankar@gmail.com
4
Student(B.Tech), Department of Electronics and Communication Engineering, Lingayas Institute of Management and
Technology, madalavarigudem, Andhra Pradesh, India, kbk1480194@gmail.com
5
Student(B.Tech), Department of Electronics and Communication Engineering, Lingayas Institute of Management and
Technology, madalavarigudem, Andhra Pradesh, India, balu0414@gmail.com
ABSTRACT

The main thesis of this project is to develop a secure Electronic voting machine using Finger print identification method, for finger
print accessing we use AADHAR card database. At the time of voting in the elections, the e -voting process authentication can be
done using finger vein sensing, w hich enables the electronic ballot reset for allowing voters to cast t heir votes. Also the voted data
and voters details can be sent to the nearby Database Administration unit in a timely manner using Zigbee System with
cryptography technique.

Index Terms: AADHAR card database, Zigbee wireless technology, Authentication, Electronic voting mach ine.
--------------------------------------------------------------------- *** -----------------------------------------------------------------------security level, because the level depends on type of the
1. INTRODUCTION
The objective of voting is to allow voters to exercise their
right to express their choices regarding specific issues, pieces
of leg islation, citizen init iatives, constitutional amend ments,
recalls and/or to choose their government and political
representatives. Technology is being used more and more as a
tool to assist voters to cast their votes. To allow the exercise of
this right, almost all voting systems around the world include
the following steps: voter identification and authentication,
voting and recording of votes cast, vote counting, publication
of election results. Voter identification is required during two
phases of the electoral process: first for voter registration in
order to establish the right to vote and afterwards, at voting
time, to allow a citizen to exercise their right to vote by
verify ing if the person satisfies all the requirements needed to
vote (authentication). Security is a heart of e-voting process.
Therefore the necessity of designing a secure e-voting system
is very impo rtant. Usually, mechanis ms that ensure the
security and privacy of an election can be time consuming,
expensive for election administrators, and inconvenient for
voters. There are d ifferent levels of e-voting security.
Therefore serious measures must be taken to keep it out of
public do main. Also, security must be applied to hide votes
fro m publicity. There is no measurement for acceptable

IJESAT | Mar-Apr 2014


Available online @ http://www.ijesat.org

informat ion. An acceptable security level is always a


compro mise between usability and strength of security
method.

2. EXISTING METHODOLOGY
An electronic voting system is a voting system in which the
election data is recorded, stored and processed primarily as
digital informat ion. E-voting is referred as electronic voting
and defined as any voting process where an electronic means
is used for votes casting and results counting. E-voting is an
election system that allows a voter to record their ballots in an
electrically secured method. A number of electronic voting
systems are used in large applications like optical scanners
which read manually marked ballots to entirely electronic
touch screen voting systems. Specialized voting systems like
DRE (direct recording electronic) voting systems, RFID,
national IDs, the Internet, computer networks, and cellular
systems are also used in voting process

3. PROPOSED METHODOLOGY
Fig: Transmitter

237

T Hemalatha* et al.
[IJESAT] [International Journal of Engineering Science & Ad vanced Technology]

ISSN: 2250-3676
Volume-4, Issue-2, 237-240

person will be valid for polling section and if condition is


satisfied automatically, E-voting mach ine buttons will be
activate otherwise deactivate buttons After the E-voting
mach ine buttons are activated, the voter cast his/her vote.
After co mplet ion of h is/her voting process, a voting process
completed message will be displayed on the screen. The
number of votes is counted by the E-Vot ing machine and the
informat ion will be sent to the local electrical ad ministrator by
using Zigbee wireless communication technology.

Securities of the E-voting systems: The main goal of a

Fig: Receiver

secure e-voting is to ensure the privacy of the voters and of the


votes. A secure e-voting system are satisfies the fo llo wing
requirements, Eligibility: only votes of legit imate voters shall
be taken into account; Unreusability: each voter is allowed to
cast one vote; Anonymity: votes are set secret; Accuracy: cast
ballot cannot be altered. Therefore, it must not be possible to
delete ballots nor to add ballots, once the election has been
closed; Fairness: partial tabulation is impossible; Vote and go:
once a voter has casted their vote, no further action prior to the
end of the election; Public verifiability: anyone should be able
to readily check the valid ity of the whole voting process.

Issues of Present Voting System There have been several

In this method, the details of the voter will get fro m the
AADHAR card database. It was a newly developed database
which is having all the information about the people. By using
this database we took the voters information will be stored in
the Personal Computer. At the time of elections, for finger
print accessing we use finger sensing module.
Fingerprint recognition or fingerprint authentication refers to
the automated method of verifying a match between two
human fingerprints. Fingerprints are one of many fo rms of
biometrics used to identify individuals and verify their
identity. A fingerprint looks at the patterns found on a
fingertip. There are a variety of approaches to fingerprint
verification. So me emu late the traditional police method of
matching pattern; others use straight minutiae matching
devices and still others are a bit more unique, including things
like moir fringe patterns and ultrasonic. A greater variety of
fingerprint devices are available than for any other bio metric.
Fingerprint verification may be a good choice for in e-voting
systems, where you can give users adequate explanation and
training, and where the system operates in a controlled
environment. It is not surprising that the work-station access
application area seems to be based almost exclusively on
fingerprints, due to the relatively low cost, small size, and ease
of integration of fingerprint authentication devices Capture the
finger vein image and co mpare or match to database, capture
finger vein and database finger vein matched means this

IJESAT | Mar-Apr 2014


Available online @ http://www.ijesat.org

studies on using computer technologies to imp rove elections


these studies caution against the risks of mov ing too quickly to
adopt electronic voting system, because of the software
engineering
challenges,
insider
threats,
network
vulnerabilities, and the challenges of auditing. Accuracy: It is
not possible fo r a vote to be altered eliminated the invalid vote
cannot be counted fro m the finally tally . Democracy: It
permits only elig ible voters to vote and, it ensures that eligib le
voters vote only once. Privacy: Neither authority nor anyone
else can lin k any ballot to the voter verifiability:
Independently verificat ion of that all votes have been counted
correctly. Resistance: No electoral entity (any server
participating in the election) or group of entit ies, running the
election can work in a conspiracy to introduce votes or to
prevent voters from voting. Availability: The system works
properly as long as the poll stands and any voter can have
access to it from the beginning to the end of the poll. Resu me
Ability: The system allows any voter to interrupt the voting
process to resume it or restart it while the poll stands. The
existing elections were done in tradit ional way, using ballot,
ink and tallying the votes later. But the proposed system
prevents the election from being accurate. Problems
encountered during the usual elections are as follows: It
requires human participation, in tallying the votes that makes
the elections time consuming and prone to human error. The
voter finds the event boring resulting to a small nu mber of
voters. Deceitfu l election mechanis m. Constant spending
funds for the elections staff are provided

238

T Hemalatha* et al.
[IJESAT] [International Journal of Engineering Science & Ad vanced Technology]
4. CONCLUSION AND FUTURE
ENHANCEMENT
AADHAR based Electronic voting systems have many
advantages over the traditional way of voting. So me of these
advantages are lesser cost, faster tabulation of results,
improved accessibility, greater accuracy, and lower risk o f
human and mechanical errors. It is very difficult to design
ideal e-voting system wh ich can allow security and privacy on
the high level with no co mp ro mise. Future enhancements
focused to design a system which can be easy to use and will
provide security and privacy of votes on acceptable level by
concentrating the authentication and processing section.

ACKNOWLEDGEMENT
We are greatly indebted to our college LINGA YA S
INSTITUTE OF MANA GEM ENT AND TECHNOLOGY
that provided a healthy environ ment to drive us to achieve our
amb itions and goals. We would like to express our sincere
thanks to our beloved guide Mr.D. Krishna for the guidance,
support and assistance he has provided in completing the
paper.
We are perspicuous to divulge our sincere gratefulness to our
Honourable Dignitary Smt .G.Chenchamma.,Ph.D Head of the
Depart ment of Electron ics and Co mmun ication for her
encouragement and assistance to us, which contribute to the
successful comp letion of this paper.

REFERENCES
1. D. Ashok Ku mar, T. Ummal Sariba Begum A Novel design
of Electronic Voting System Using Fingerprint International
Journal of Innovative Technology & Creative Eng ineering
(Issn: 2045-8711) Vo l.1 No.1 January 2011
2. KashifHussainMemon, Dileep Ku mar and Syed Muhammad
Usman, Next Generation A Secure E-Voting System Based
On Bio metric Fingerprint Method 2011 International
Conference On Information And Intelligent Co mputing
IPCSIT Vo l.18 (2011)
3. Dav ide Balzarotti, Greg Ban ks, Marco Cova, Viktoria
Felmetsger, Richard A. Kemmerer, W illiam Robertson,
Fredrik Valeur, And Giovanni Vigna, An Experience In
Testing The Security Of Real-World Electronic Voting
Systems Ieee Transactions On Software Engineering, Vol. 36,
No. 4, July/August 2010

IJESAT | Mar-Apr 2014


Available online @ http://www.ijesat.org

ISSN: 2250-3676
Volume-4, Issue-2, 237-240

4. Barbara Ondrisek E-Voting System Security Optimizat ion


Proceedings of The42nd Hawaii International Conference on
System Sciences 2009
5.Hari K. Prasad Arun Kankipati Sai Krishna Sakhamuri
Vasavya Yagati Netindia, Security Analysis of Indias
Electronic Vot ing Machines Scott Wolchok Eric Wustrow J.
Alex Halderman The University of M ichigan Hyderabad
6.HristinaMihajloska, Vesna Dimitrova and Ljupcho Antovski
Security Aspects of Electronic Voting Systems Cyril and
Methodius University Faculty of Natural Sciences and
Informatics Institute of Informat ics, Skopje, Macedonia
7.Xuejun Tan, Bir Bhanu Fingerprint matching by genetic
algorith ms Center for Research in Intelligent System,
University of Califo rnia, Riverside, CA 92521, USA Received
24 February 2004; accepted 6 September 2005 8.Bernd
Heisele,a,b, Purdy Ho,c Jane Wu,b and TomasoPoggiobFace
recognition: co mponent-based versus global approaches
Received 15 February 2002; accepted 11 February 2003

BIOGRAPHIES
Krishna Dharavathu currently
working as a Assistant Professor
in department of ECE for the
LIMAT, was born on 1st Aug
1984.He received graduated with
a Bachelor Degree in Electronics
Engineering
fro m R.V.R.&
J.C,Guntur in 2007,and his
Master studies in Electronics
Engineering with VLSI System
Design specialization fro m S C E T,Narasapur in 2012. He is
qualified in CSIR-JRF NET EXAM,,got 320 rank. Since his
keen interest in industries matters and strong support from the
university, the author is involved in the develop ment of the
industrial based application such as monitoring systems,
automation for industries and control base applications.

Hemalatha
Tankala
pursuing
M.Tech in LIMAT in the stream of
Embedded Systems, was born on
2nd December,1991. She received
graduation with a Bachelor Degree
in Electronics and Co mmunication
Engineering fro m Vijaya Institute
of Technology for Women,
En ikepadu in 2013.

239

T Hemalatha* et al.
[IJESAT] [International Journal of Engineering Science & Ad vanced Technology]
Dhana Mani Shankar .Guraka
pursuing B.Tech in Lingayas
Institute of Management and
Technology
in the stream of
Electronics and Communication
Engineering , was born on 26th
May 1993
Bala
Krishna.katta
pursuing B.Tech in Lingayas
Institute of Management and
Technology
in the stream of
Electronics and Communication
Engineering , was born on 14th
June 1993

IJESAT | Mar-Apr 2014


Available online @ http://www.ijesat.org

ISSN: 2250-3676
Volume-4, Issue-2, 237-240

Bala
Subrah manyam.Vemu ri
pursuing B.Tech in Lingayas
Institute of Management and
Technology
in the stream of
Electronics and Communication
Engineering , was born on 22nd
May 1993

240

Você também pode gostar