Secure online e-voting protocol based on voters authentication

0Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Although there are many e-voting systems present by analysis it is found that they all are vulnerable to privacy risk and weakness of unreliable protocols and denial of service attacks. Here is the need to implement the public key encryption e-voting system. The primary objective of this system is to make ensure reliability, privacy and security of the protocol and voting is convenience to users. As a result of the specification requirements, the system was summarized into three parts: access control process which limit access to a system or to any other resource. Secondly, voting process was done by encrypting voter's electronic ballot before submitting to the server. Finally, the final result was sorted through deciphering the received encrypted information. The System is more efficient than other E-Voting systems, since voters can vote from their devices without extra cost and effort, and encryption ensures the security. A pseudo random number is generated using the OTP principle, is used by the voter for authentication purpose while casting the vote. These techniques provide a secure platform, thus exceeding vulnerabilities of the traditional voting system.

Cite

CITATION STYLE

APA

Sahaya Sakila, V., Jose, D., Abhijith, K. P., & Babu, A. R. (2019). Secure online e-voting protocol based on voters authentication. International Journal of Innovative Technology and Exploring Engineering, 9(1), 3268–3270. https://doi.org/10.35940/ijitee.A4653.119119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free