global wireless e-voting (jayesh j cusat)

Download GLOBAL WIRELESS E-VOTING (JAYESH J    CUSAT)

If you can't read please download the document

Upload: the-federation-of-lazy-jobless-people-fljp

Post on 16-Apr-2017

12.193 views

Category:

Education


2 download

TRANSCRIPT

Under the guidance ofDr. Shena Mathew

GLOBAL WIRELESS E-VOTING SYSYTEMPRESENTED By,JAYESH J12110031S7 CS-ASOE,CUSAT

7/22/13

CONTENTS

INTRODUCTION

PRESENT SYSTEM

PROPOSED SYDTEM

VOTING MACHINE

EYE RETINA SCANNING

INTERFACE DEVICE

CONTENTS

WORKING OF WHOLE SYSTEM

HURDLES IN PATH OF IMPLEMENTATION

FUTURE ENHANCEMENT

CONCLUSION

REFERENCE

INTRODUCTION

Global Wireless E-Voting is an intelligent voting system which can determine the eligibility of the voter by scanning the eye pattern .

Vote count is not kept into the same machine itself instead of it is stored in the remote server by converting it into radio waves.

More secure than conventional voting system

PRESENT SYSTEM

In present system each and every booth is given an electronic machine which stores the votes of the people.

Control of present system is given to the incharge officer who checks the eligibility of the candidates for voting.

Finally incharge collect all the voting machine at a place and go for counting

G.L ABHISHEK RGIT,BANGALORE

DISADVANTAGES OF PRESENT SYSTEM

The machine is not able to recognize the eligibility of a candidate, so the corrupted officers may misguide the people

The corrupted officers may increase the count of the voting.

After voting if any technical problems or damage occurs with the machines it may leads to the re election

CONTINUED

During transportation of the machines, the person in charge can change the status of machines and even may destroy.

This system is not a cost effective one. Since we need security, in charge officers, secured place for counting and election place.

The voting take place where the machine is located.

PROPOSED SYSTEM

In this system we trying to keep counting of votes in to a remote secured system.

Our machine can check the eligibility of the candidate by itself, so there is no question of corruption.

In this system we are using an electronic circuit which enable the voter to vote and transfer this vote to the remote system using mobile tower.

CONTINUED..

A error in a vote does not affect the remaining system, there by reducing the risk of re-election.

Cost for an election is comparatively less than current system

A person even can vote from a mobile system and also from Internet

EXPLANATION

Radio waves representing scanned retina pattern and vote to Mobile tower.

Radio waves representing scanned retina pattern and vote to remote server.

Acknowledgement (+ve or ve) from the server to mobile tower.

CONTINUED..

Acknowledgement (+ve or ve) from mobile tower to Interface device.

Ready signal if retina is scanned properly to voting machine. And if ve signal then alert alarm will be activated.

Accepted vote is made to flow to the interface device.

VOTING MACHINE

The voting machine is actually a device which generates the different voltages for different votes.

These voltages are fed to the (ADC) which is then converted to digital bits then can be converted to radio waves.

BLOCK DIAGRAM OF CLIENT SIDE CIRCUIT

EYE RETINA SCANNING

A biometric identifier known as a retinal scan is used to map the unique patterns of a person's retina.

These eye retina machine can be a high quality web cam or device which can capture the images effectively.

A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a persons eye as they look through the scanner's eyepiece.

CONTINUED

This beam of light traces a standardized path on the retina. Because retinal blood vessels are more absorbent of this light than the rest of the eye, the amount of reflection varies during the scan. The pattern of variations is converted to computer code and stored in a database

INTERFACE DEVICE

This is an electronic kit which converts the input digital signals such as (retina pattern + votes+ secure bits) to radio waves.

Working of the whole system

Whenever voters enter to voting booth then he will be instructed to directly look at retina scanning machine and the machine scans the retina.

Once retina scanning properly confirmed then voter is made to vote

Now the whole data including the retina pattern is sent to interfacing device which converts it into radio waves and these radio waves are sent to mobile tower

And then to the remote server, where the authentication and voters identification is stored into a secured database.

CONTINUED

The received data is first converted into digital format from the radio waves through the interface device kept at the server side, and from the encrypted data retina pattern and vote separated.

Next the retina pattern is matched against the existing database .

If match is found then flag is checked which indicates its voting status i.e. +ve ack.

This ack is recognized by the receiver kept at the voter side and machine is made to scan next retina pattern and vote, otherwise if ve ack then alert alarm is made to ring

HURDLES IN THE PATH OF IMPLEMENTATION

Security

Efficiency

Geographical problem

Security

Uses Key Complex Encryption algorithm

First it finds the length of the string

Generate the random numbers equal to the length of the string

Add the corresponding Characters from the given string and random values

EXPLANATION

E.g. KSHITIJ

8 12 34 4 11 9 26

The ASCII value for KSHITIJ are

75 83 72 73 84 73 74

Add corresponding A) and B) values as

8+75 12+83 34+72 4+73 11+84 9+73 26+74

CONTINUED.

The corresponding ASCII characters for these are

S _ j M _ R d

The corresponding characters for random values

J q y

Finally encrypted data as

S _J jq M _ R dy

EFFICIENCY

Applying compression Algorithms

Using distributed Operating system environment with multiple servers.

CDMA technique

CONTINUED..

Example of CDMA

GEOGRAPHICAL PROBLEMS

It occurs where the technical facilities like mobile tower or Internet service is not present.

In this case will convert the vote and retina pattern into the electrical information.

And pass it when we reach the area where the technical facilities like internet or mobile tower is available.

Here the eye scanner will be web cam.

FUTURE ENHANCEMENTS

CONCLUSION

Provides high level of security, authentication, reliability, and corruption-free mechanism.

By this we can get result with in minute after the completion of voting.

Minimum manpower Utilization, hence mechanism is error free.

REFERENCE

Boylestead Electronic Devices and Circuit Theory 10/e Pearson Education, June 2012

Herbert Taub and Donald Schilling Digital Integrated Electronics McGraw-Hill Internatinoal Editions,01-Jan-1977

9/21/2012

G.L ABHISHEK RGIT,BANGALORE

Click to edit the title text formatClick to edit Master title style

Click to edit the outline text formatSecond Outline LevelThird Outline LevelFourth Outline LevelFifth Outline LevelSixth Outline LevelSeventh Outline LevelEighth Outline Level

Ninth Outline LevelClick to edit Master text styles

Second level

Third level

Fourth level

Fifth level

9/21/2012

G.L ABHISHEK RGIT,BANGALORE

Click to edit the title text formatClick to edit Master title style

Click to edit the outline text formatSecond Outline LevelThird Outline LevelFourth Outline LevelFifth Outline LevelSixth Outline LevelSeventh Outline LevelEighth Outline Level

Ninth Outline LevelClick to edit Master text styles

9/21/2012

G.L ABHISHEK RGIT,BANGALORE

Click icon to add picture