Você está na página 1de 29

SECURE MOBILE BASED VOTING SYSTEM mobile Voting

Vote at
Any Time Any Where Any Mobile

Presented by:
Under The Guidance of:
Ningappa.T.P Suma.B(2TG07CS045) Veeramma.R.K(2TG07CS053) Vidya.H.B(2TG07CS055)

Vijayalakshmi.S(2TG07CS058)

OVERVIEW
Introduction Overview of Mobile Technology VoiceXML Architecture VXML Components JSP Overview System Architecture Phases of Mobile Voting Scheme Internal Structure of 3-tier Architecture Speech Recognition Process in Mobile Voting DFD-Vote Casting Testing Advantages and Disadvantages of Proposed System Conclusion and Future Enhancements References

EXISTING SYSTEM

1.Ballot System

2.Electronic voting machine

Electronic voting machines are currently used for vote casting. These systems allow the user to cast his vote reducing possible errors like wrong candidate selections and loss of votes, reducing manual work during counting. Still these have the drawbacks.

DRAWBACKS OF EXISTING SYSTEM

1.Queue for Vote

2.Travel to Vote

3.Elederly people

PROPOSED SYSTEM
Vote at
Any Time Any Where Any Mobile

Enabling the voter to vote with absolute confidentiality, nobody will ever know what he/she voted. Enabling the voter to vote from anywhere in the globe, wherever he/she will be, and without needing any special Network, nor equipment ,nor a personal computer(PC). Enabling only the voter to vote, avoiding the possibility to sell a vote.

FEATUERS OF PROPOSED SYSTEM


Uses Speech recognition technique to handle user requests and response.
The system is designed as such to be interactive and user friendly.

The voter is allowed to cast their vote or to know the results depending upon their choice of selection.
The system authenticates the user using security informations like biometric id, voter id, year of birth, pin code.

INTRODUCTION
In India all earlier elections be it state elections or centre elections a voter used to cast his/her vote to his/her favorite candidate by putting the stamp against his/her name and then folding the ballot paper as per a prescribed method before putting it in the Ballot box. This is a long, time-consuming process and very much prone to errors. This method wanted voters to be skilled voters to know how to put a stamp, and methodical folding of ballot paper. Millions of paper would be printed and heavy ballot boxes would be loaded and unloaded to and from ballot office to polling station. A vote once recorded in an EVM cannot be tampered with, where as in the ballot paper system the votes marked and put into the box can be pulled out and destroyed.

Cont. .
The followings are requirements that should be considered for secure and trustworthy e-voting. - The relation between voter and vote content should not be revealed. - The result of a poll should be retained as a secret before counting the ballot. - A voter can cast his vote just one time. - Only an identified person by an e-voting device can participate in e-voting. - Other people excepting a voter himself should not know the vote content. - It is not permitted to rig the ballot.

OVERVIEW OF MOBILE TECHNOLOGY


IVRS:
The Interactive Voice Response (IVR) System serves as a bridge between people and computer databases by connecting the telephone network with the database. The IVR system uses pre-recorded or computer generated voice responses to provide information in response to an input from a telephone caller.

VOICEXML:
VoiceXML (VXML) is the W3C's standard XML format for specifying interactive voice dialogues between a human and a computer.

VoiceXML ARCHITECTURE

VXMLCOMPONENTS COMPONENTS VXML


PSTN -Public Switched Telephone Network
The network which is used for connecting telephone calls. PSTN is the world's collection of interconnected voice-oriented public telephone networks, both commercial and government-owned.

TTS-Text To Speech Engine


Text to speech is a way of playing dynamic text to user where as the .wav file will play only static (recorded) message. For example if you want to play standard greeting message "Welcome to Mobile Voting" then we can play greeting .wav to the customer. If we want to play the current balance of your bank account then it is better to go with TTS. Just pass the text and it will convert that to voice and that will be played to the Voter.

JSP OVERVIEW
JSP may be viewed as a high-level abstraction of Java servlets. JSP pages are loaded in the server and operated from a structured special installed Java server packet called a Java EE Web Application, often packaged as a .war or .ear file archive. JSP allows Java code and certain pre-defined actions to be interleaved with static web markup content, with the resulting page being compiled and executed on the server to deliver an HTML or XML document. JSP syntax is a fluid mix of two basic content forms: scriptlet elements and markup. Markup is typically standard HTML or XML, while scriptlet elements are delimited blocks of Java code which may be intermixed with the markup.

VoiceXML USING JSP

Using Java for outputting VXML offers you several advantages.


Flexibility. Reactivity Extensibility.

For creating a dynamic VoiceXML, you include two types of files:


Static VoiceXML page Dynamic JavaServer Page

SYSTEM ARCHITECTURE

SERVER MODULE DISCREPTION


Voting Device (Mobile/Land Phone):
In our scheme, the voting device corresponds to the mobile equipment (ME), which consists of a SIM card.

Authentication Centre (AC):


AC is an entity within the GSM network.AC generates the authentication parameters and authenticates the mobile equipment. Apart from authenticating the mobile equipment, AC is also an important information distribution server in the proposed scheme. AC needs to be trusted to transfer the messages as required.

Cont
Verification Server (VS):
VS belong to the voting authority, who organizes the voting event. It verifies the legitimacy of the voter and issues a voting token to the voter. VS also publish a list of voter information.

Collecting and Counting Server (CS):


CS is the server that collects and counts the votes to give the final result. CSs action need to be audited by all candidate parties.

PHAGES OF MOBILE VOTING SCHEMES


In this section, we outline our mobile voting scheme.

Voters Authentication Phase:


In this phase Election commission is responsible to verify the authenticity of the voters. If the voter is authentic then only he will be allowed to participate in the next steps of voting.

Voting Phase:

In this phase, the voter dial a designated phone number and follow the instructions using a password already provided. The voter selects the appropriate option to vote the particular party. The voter checks the signature and retrieves the VS- signed voter, voter ID.

Cont
Counting Phase:
Counting Phase At the scheduled time of counting CS decrypts the ballot and checks whether the voting token is valid or not. If it is valid it will be counted else it will be rejected.
Security Analysis Authentication only the authorized voters can vote. Privacy all votes remain secret while the voting takes place and each individual vote cannot be linked to the voter who casts it.

INTERNAL STRUCTURE OF 3TIER ARCHITECTURE

SPEECH RECOGNITION PROCESS IN MOBILE VOTING

DATA FLOW DIAGRAM-VOTE CASTING


Cast Vote

Prompt User For DTMF or Voice Input Mode


DTMF Input Voice Input

Recognize Touch Tone Input

Recognize Voice Input

Party_Details

Generate Ballot to Cast Vote

Validate User Vote Unsuccessful Validation

Successful Validation

Accept Vote Casting


No Match End User Session

Check Election ID
Election Details

Match Reject Vote

TESTING
White Box Testing:
By using this technique it was tested that all the individual logical paths were executed at least once. All the logical decisions were tested on both their true and false sides

UNIT TESTING:
This is the first and the most important level of testing. As soon as the programmer develops a unit of code the unit is tested for various scenarios. As the application is built it is much more economical to find and eliminate the bugs early on. Hence Unit Testing is the most important of all the testing levels.

Cont
INTEGRATION TESTING:
Since Integration Testing focuses on Integration of components and components can be built by different developers and even different development teams, it is important the right versions of components are tested.

SYSTEM TESTING(Black Box Testing):


By the use of this technique the missing functions were identified and placed in their positions. The errors in the interfaces were identified and corrected. This technique was also used to identify the initialization and termination errors and correct them.

ADVANTAGES OF PROPOSED SYSTEM


Improve accessibility to elderly people, disabled and blind peoples. Increased participation rate. Improve accessibility to people living abroad or travelling at voting time. Reduces voting costs.

DISADVANTAGES OF PROPOSED SYSTEM


Electronic failures might occur with such a system.
Other generation may not be comfortable in using the system.

CONCLUSION
This system allows the user to cast his vote with high level of confidentiality and keep voters away from the possible threats like booth capturing and it may increase the voter turnouts in remote areas and even in urban areas. Since the system operates on IVR platform the voter session will be interactive and user friendly which makes the user to feel in a very comfortable zone. The system provides security features like checking the unique identification number of the voter.

FUTURE ENHANCEMENT
As a measure of security features mobile devices allows the user to make use of biometric informations which are unique to individuals. For example voice biometrics can be used with voiceXML to authenticate a user. Similarly finger prints can also be used with mobiles that provide those options.

REFERENCES
Creating VoiceXML pages within a Java Web developer framework
http://www.ibm.com/developerworks/web/library/wa-voicexml

VoiceXML Tutorials
http://www.vxml.org

JSP and Servlets Tutorial


http://java.sun.com/javaee/reference/tutorials

Thank you

Você também pode gostar