Although there are many e-voting systems present by analysis it is found that they all are vulnerable to privacy risk and weakness of unreliable protocols and denial of service attacks. Here is the need to implement the public key encryption e-voting system. The primary objective of this system is to make ensure reliability, privacy and security of the protocol and voting is convenience to users. As a result of the specification requirements, the system was summarized into three parts: access control process which limit access to a system or to any other resource. Secondly, voting process was done by encrypting voter's electronic ballot before submitting to the server. Finally, the final result was sorted through deciphering the received encrypted information. The System is more efficient than other E-Voting systems, since voters can vote from their devices without extra cost and effort, and encryption ensures the security. A pseudo random number is generated using the OTP principle, is used by the voter for authentication purpose while casting the vote. These techniques provide a secure platform, thus exceeding vulnerabilities of the traditional voting system.
CITATION STYLE
Sahaya Sakila, V., Jose, D., Abhijith, K. P., & Babu, A. R. (2019). Secure online e-voting protocol based on voters authentication. International Journal of Innovative Technology and Exploring Engineering, 9(1), 3268–3270. https://doi.org/10.35940/ijitee.A4653.119119
Mendeley helps you to discover research relevant for your work.