Design And Implementation Of An Electronic Voting System

2y ago
21 Views
3 Downloads
234.94 KB
9 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Kamden Hassan
Transcription

Design and Implementation of an Electronic Voting Systemwith Contactless IC CardsJung-Ying LaiGraduate Institute ofInformation andComputer Education,National KaohsiungNormal Universitybukokoro@gmail.comChun-Fang LinGraduate Institute ofInformation andComputer Education,National KaohsiungNormal Universityveronica@ice.nknu.edu.twChung-Huang YangGraduate Institute ofInformation andComputer Education,National KaohsiungNormal Universitychyang@computer.orgAbstractIn the past, people go to polling place and take the blank ballots, then punch a hole or append theseal. If the seal is not clear enough, or the vote is damaged by soiling, it may bring some debate on theresult. In order to resolve these situations, the technology of electronic voting (e-voting) comes intoexistence. By using information technology, E-voting system can cast and count votes with higherconvenience and efficiency, even make the electoral procedures simple and reduce the mistake rate ofballot examination. Due to construct an E-voting system with practical utility, at first, we compareforeign E-voting system by literature review to clarify the existing problem. Furthermore, we designand implement an E-voting system with contactless IC card. Our system can not only make sure voter’sidentity but also ensure the validity of IC card.Keyword: Electronic voting, contactless IC card, information security

Design and Implementation of an Electronic Voting Systemwith Contactless IC CardsAbstractdirections. The former one is electronic voting(E-voting), which is voting on the particular machineIn the past, people go to polling place and takein the fixed position; the latter is internet votingthe blank ballots, then punch a hole or append the(I-voting), which is voting on the internet withoutseal. If the seal is not clear enough, or the vote islimiting people in the polling station but needs higherdamaged by soiling, it may bring some debate on thelevel of security. Over the years, the scholars areresult. In order to resolve these situations, theaddressed their concept of e-voting, they integratedtechnology of electronic voting (e-voting) comes intoinformation technology to satisfy the characteristic ofexistence. By using information technology, E-votingelection such as uniqueness, accuracy, completeness,system can cast and count votes with higherverifiability, auditibility, privacy, and uncoercibility.convenience and efficiency, even make the electoralBut most of these researches focused on designingprocedures simple and reduce the mistake rate ofencryption algorithm, a usable and applicableballot examination. Due to construct an E-votingimplementation is rarely.system with practical utility, at first, we compareforeign E-voting system by literature review toIn our research, we design and implement aclarify the existing problem. Furthermore, we designfeasible system with contactless IC card forand implement an E-voting system with contactlessidentification. Because of contactless IC card can beIC card. Our system can not only make sure voter’srecycled, we can use this feature for the effectiveidentity but also ensure the validity of IC gy, we can simplify the traditional electoralKeyword: Electronic voting, contactless IC card,procedures and saving the cost of human resourceinformation securityand time. In addition, we use the touchscreen panel tobe the input interface with accessibility, and it can1. Introductiondecrease the learning difficulty when the voters areinstructed in how to use the new system.In a true democracy, elections are the basis forthe nation functions healthy. As the elections are hold2. Literature Reviewfrequently, the costs of voting are increasinggeometrically. In order to save human resource andDavid Chaum [2] addressed the concepts oftime, the current trend is using informationuntraceable electronic mail and digital pseudonyms,technology on elections.which can apply for electronic voting for anonymity.In order to reduce the cost of human and material,Recent years the issues of combining votingmoreover, to enhance the convenience in the task ofwith information technology have developed into twopolling, E-voting has taken the place of traditional

voting in a considerable number of countries over theballot. It can count votes automatically, butpast few years. In this section, we aim to reviewif the voter’s perforation is incomplete, theliterature we consider relevant to E-voting.result is probably determined wrongfully.2.1 Evaluation of Voting Equipment(5) Optical voting machine: After each voterfills a circle correspond to their favoriteIn the recent years, voting equipments whichcandidate on the blank ballot, this machinewere widely adopted may be divided into five typesselects the darkest mark on each ballot for[10]:the vote then computes the total result. Thiskind of machine counts up ballots rapidly.(1) Paper-based voting: The voter gets a blankballot and use a pen or a marker to indicateHowever, if the voter fills over the circle, itwill lead to the error result of optical-scan.he want to vote for which candidate.Hand-counted ballots is a time and laborconsuming process, but it is easy to2.2 Effectiveness of E-voting Among DifferentCountriesmanufacture paper ballots and the ballotscan be retained for verifying, this type isstill the most common way to vote.Recentyears,aconsiderablenumberofcountries has adopted E-voting for their officialelections. In this section, four empirical examples are(2) Lever voting machine: Lever machine isenumerated as following.peculiar equipment, and each lever isassigned for a corresponding candidate. The(1) America: Government of the United Statesvoter pulls the lever to poll for his favoritehold election collaterally in several ways, incandidate. This kind of voting machine canother words, each state can choose thecount up the ballots automatically. Becausesuitable way to hold elections independently.its interface is not user-friendly enough,Because there are some debates aboutgiving some training to voters is necessary.E-voting, such as some vote casts were notcounted, or election system crashed during(3) Direct recording electronic voting machine:the Election Day. Secretary of State KevinThis type, which is abbreviated to DRE,Shelley established an “Ad Hoc Touchintegrates with keyboard, touchscreen, orScreen Task Force” to research the debatesbuttons for the voter press to poll. Some ofon DRE in February 2003 [1]. Shellythem lay in voting records and counting theadvanced that DRE should include votervotes is very quickly. But the other DREverifiable paper audit trails (VVPAT) towithout keep voting records are doubtedsolve electoral debates.about its accuracy.(2) Japan: Japan adopted E-voting for local(4) Punch card: The voter uses metallicelection in 2002, such as mayor andhole-punch to punch a hole on the blankcouncilor election of Niimi city in Okayama

prefecture in June 23, 2002; mayor election2.3 Comparison of E-voting Systemof Hiroshima city in February 02, 2003; andmayor election of Kyoto city in February 08,Besides many vendors to develop and sell2004. Take mayor and councilor election ofcommercial electronic election machines, there areNiimi city for example, electoral centervarious open source E-voting systems. We cite somesurveyed the voters’ reliability when theexamples as following [4,8]:election finished. There are 83% of votersconsidered that E-voting system is trusted.(1) AccuVote-TS: AccuVote-TS’s vendor is56% of them considered that the results ofDiebold Election Systems. This systemE-voting and paper-based voting are theincludes touchscreen, card reader, keyboard,same therefore E-voting is sufficient forheadphone, and paper tape printer. Thereliable. The reasons why voters can’t trustvoter selects his favorite candidate onthe E-voting system are voters worriedtouchscreen, and the vote will be printed onabout the abuses in E-voting system, andthe paper tape. Its design balances the policy,they can not make sure their ballot areelectoral procedure and technology. But allrecorded correctly.the electoral information (including identityauthentication, audit, or counting of votes)Federalare stored in Microsoft Access databaseParliament is held in May 18, 2003. In orderwithout setting password so there are highto assist voters in being familiar withrisks of attack.(3) Belgium:ElectionfortheE-voting system, electoral center heldshort-term training. Counting efficiency in(2) iVotronic: The vendor of iVotronic isthe election with E-voting system was fasterElection Systems and Software (ES&S).then convention. Belgium’s compulsoryiVotronic provides multi-language, and usesvoting system and E-voting complementflash memory to save voting records.each other, voters’ satisfaction and attendingElectoralwillingness of join voting are improvedElectronic Ballot, a device which is similarobviously.to disk) to start polling machine up. WhenworkersusePEB(Personalthe election is finished, the workers use(4) Brazil: Brazil used E-voting in 1998. WhenPEB to access voting records in the pollingthe voter reaches the polling place, hemachine, then delivers PEB to electoralshows his identity card for authenticating; ifcenter or transmits data from network.he is an eligible voter, he can get the ballotBecause the PEB’s password is only threefor E-voting. Brazil’s E-voting systemcharacters, the risk of password breakingtransmitscenterexists. This system have made mistake inimmediately, so that the count of votes canthe past elections, such as the number ofannounce rapidly while the voting finished.voters is not corresponding between mastervotestoelectoralserver and backup server, the candidateselected on the ballot is not the voter’s

FreeDOS. This system operates from disk,selection, and so forth.so hard disk is not necessary and the(3) eSlate 3000: Hart InterCivic invented eSlatediscarded computer is enough. This system3000. The voter gets a personal identityis not connected to any networks and mostnumber (PIN) as four digits from electoralof keys on the keyboard are disabled,workers, then goes to the booth to input theattackers can’t find the way to invade.PIN into polling machine to login. He canSAVIOC’srotate selector wheel to select the candidatedisposition and low cost, but on the otherwhom he want to poll for. Each terminalhand, there are short of GUI and ease of useconnects to the server which is named JBCon SAVIOC.advantagesareitssimple(Judges Booth Controller). Counting ofvotes will send to JBC from every terminal2.4 Contactless IC cardby network, then save it in MBB (MobileBallot Box). This system doesn’t encryptWe can distinguish IC card into contact card andvoting data, so there are some risks of datacontactless card [11]. Contact card has to contact withsecurity.electoralcard reader for transmitting data, but contactless cardfunctions are not protected with password,can transmit data from remote retrieval by coil. Thereanyone, even the voter, can finish theare 16 sectors in the contactless IC card, and there areelection.4 blocks in every sector. Each sector is individual. WeFurthermore,thecan find the application of contactless card in daily(4) AVC Edge: AVC Edge is a multi-languagelife, such as Easy Card, entrance guard card, and sopolling machine which is manufacturedforth. Because of Mifare card’s low cost andfrom Sequoia Voting Systems. This machineapplicability, our research choose Mifare card forincludes touchscreen and flash memory forstorage.saving voting recorded, and its electoralprocedure is similar to a foregoing E-voting2.5 The Security Issues of E-votingmachine, Accu Vote-TS. There were somestumbles when this machine operated in theForeign experience [9] revealed that they areelections. For example, the E-voting systemoften confronted by security issues while thecrashes when the user chose language; theelectronic voting system is running. The origin of thecounting of votes is not correct; and thesecurity issues happened was due to not only outsiderballot became blank because of the system(such as voters and attackers) but also insider (suchbreakdown.as system developers and administrators), even justbecause the inheritance of some objects in the source(5) SAVIOC: SAVIOC is an open sourceE-voting system and all the source code andcode are unsuitable. These errors caused the votingsystem crashed.software can download from its officialwebsite [5,6]. This system is written in CThe proposed solutions were correspondinglylanguage, and it can be saved in disk withoutlined to hold back these attacks [5]. For example,

VoteBallot card issuingTouchscreen andcontactless card readerGet the ballotAuthorized voterElectoral centerVoting boothFigure 1. System Architectureto avoid hacker making incursion into the votingto avoid the ballot being from counting twice, thesystem via network, we can design our system toballot card verifying will execute when countingtransmit data without network. Another example is tomachine counts the votes. The complete systemlimit voter to input particular data, so that preventingarchitecture is shown as Figure 1.the command injection from running.3.1 Ballot Card Issuing3. System ArchitectureThe ballot card issuing machine (shown asOur implementation uses Borland C Builder 6Figure 2) sets ballot cards with specific votingfor user interface and accesses contactless IC cardinformation to ensure theirs integrity. The specificwith contactless IC card reader. Furthermore, wevoting information includes electoral district code,utilize touchscreen for user to use this system byverification of polling machine, and so forth. Totouch. The E-voting system can divide into threeprotect privacy, it is noteworthy that the voter’sparts: ballot card issuing machine, polling machine,personal identification isn’t written to the ballot card.and counting machine. Ballot card issuing machinewrites specific voting information into Mifare card,so that polling machine can verify that each Mifarecard is the ballot card for this election or not.If the Mifare card is issued from our ballot cardissuing, polling machine will check the ballot card isvoted or not. For the criterion of uniqueness, thevoted ballot card can’t poll again. Therefore, thepolling machine will reject the voted card. In anotherFigure 2. Card issuing center3.2 Electoral Proceduressituation, polling machine will reject the Mifare cardwhich is not issued from ballot card issuing machine;it is possible that the voter uses his own card. In orderThe electoral procedures (shown as Figure 3)can represent as follows:

Authorized voter getsthe ballot cardPolling system shows message to hint thatthe voter must put ballot card on the sensorCheck failed,return to the startFailedThe voter puts ballot card andenter the voting systemCheck the ballot card is valid or notand the ballot card is voted or notCheck successfully: Begin to pollCheck failed: Show the reasonSuccessPolling finishedShow the candidates listCounting centerSelect the candidatethen finish pollingShow the number of voteseach candidate obtainedPolling system shows message tohint that the voter puts ballot cardinto ballot boxCounting finishedFigure 3. Process flow diagram(1) Before to login polling system, the polling(2) After the voter login, the polling systemmachine verifies the ballot card is legal or not. If theshows the list of elections in this electoral district.ballot card is not issued from ballot card issuingThe voter must complete each election on the electionmachine or it is voted, the polling system will show alist, and the “OK” button for exit will be visible. Thepop-up warning window. When the ballot card isscreenshot is shown as Figure 5.verified successfully, the voted tag will be written inthe ballot card. The screenshot is shown as Figure 4.Figure 5. Main menu of electionsFigure 4. Start of polling system(3) The following serves as an example: thevoter press “the ICE 98th class representative

election” button to show the candidate list (shown as“OK” button for exit will be visible. After pressFigure 6). After selected the favorite candidate, the“OK” to exit and return to the start, the screenshotsvoter should press “Check” button to go to next step;are shown as Figure 9.or press “Back” button to back to Step (2).Figure 9. Verifying the ballot card which has votedFigure 6. Candidates list3.3 Counting of Votes(4) In this step, the polling system shows thecandidate who is selected in previous step forWhen the polls close, the ballot boxes arechecking (shown as Figure 7). Once the voter pressdelivered to electoral center for counting up (shown“Submit” button, he can’t modify his choice. If heas Figure 10). Before counting of votes, in order towants to change his selection, he can press “Cancel”assure the result is fairness and accuracy, the systemto back to Step (3).eliminate invalid card, included improper card, blankballot card, and ballot card which has counted already.Using electronic voting system can avoid the errorswhile calling out the name selected in ballots.Figure 7. The voter’s selectionFigure 10. Counting of votes4. ConclusionsFigure 8. Exit polling systemTo sum up the discussion above, this paper(5) After Step (4) completes, the polling systemis back to the main menu of election as Figure 8shows. The button of the election which is voted willbe disabled, and the voter can't poll for the sameelection twice. If all items of election are finished, theclarifies the requirements and key elements ofE-voting system, and our implementation providesthe following features. To begin with, the accuracy ofvoter’s identity and ballot card are ensured with thisvoting system. Next, voter’s identities are not written

in the ballot card to protect voter’s privacy andof Research, Development and Evaluationconfidentiality. This system will validate whether theCommission, Vol. 28, No. 4, 2004, pp.25-35 (inballot card is authorized or not, to make sure onlyChinese).legal user can vote, and voter’s authorities are limited[4] Compuware Corporation, “Direct Recordingin order to prevent his violation. Furthermore, ourElectronicsystem fits in with the parts of principles proposed byAssessment Report,” Ohio Secretary of State,IPI [7], including secrecy, non-coercibility, integrity,2003.and uniqueness.(DRE)TechnicalSecurity[5] C. A. Gaston, “A Better Way to Vote,”Proceedings of the 38th Annual HawaiiBut because of the limitation of incomplete lawsand regulations, absentee voting can’t be held. It stillneeds to be discussed in legislative systems. In thefuture, to eliminate maladministration and humanInternational Conference on System Sciences,2005, p.117c.[6] C. A. Gaston, SAVIOC Voting Systems, [Online],Available: http://www.savioc.com/, 2007.destruction, setting up a strongly secure E-voting[7] Institute Policy Institute, “Report of thesystem is necessary. It can speed up the electoralNational Workshop on Internet Voting: Issuesprocedures, make ballot counting efficaciously, andand Research Agenda,” Proceedings of the 2000use resource nment Research, 2000, pp.1-59.Acknowledgement[8] A. M. Keller, A. Dechert, K. Auerbach, D.Mertz, A. Pearl, and J. L. Hall, “A PC-basedThis work was supported by National ScienceCouncil grant (NSC dings of the USENIX Annual TechnicalReferencesConference, U.S.A., 2005, p.52.[9] T. Kohno, A. Stubblefield, A. D. Ribin, and D. S.[1] T. M. Carbaugh, “Secretary of State KevinWallach, “Analysis of an Electronic VotingShelley Announces Directives To Ensure VoterSystem,”Confidence in Electronic Systems,” Californiapp.27-40.Secretary of State, 2003.IEEEComputerSociety,2004,[10] R. Mercuri, “A Better Ballot Box?” IEEE[2] D. L. Chaum, “Untraceable Electronic Mail,Spectrum, Vol.39, No.10, 2002, pp.46-50.Return Addresses, and Digital Pseudonyms,”[11] C. H. Yang, Network Security: Theory andCommunications of the ACM, Vol.24, No.2,Practice, Key Hold Information Inc., Taipei,1981, pp.84-88.Taiwan, 2006 (in Chinese).[3] C. T. Chiou, “A Study of Election Reform inTaiwan:AnObservationfrome-VotingExperiences in Developed Countries,” Journal

(4) Punch card: The voter uses metallic hole-punch to punch a hole on the blank ballot. It can count votes automatically, but if the voter’s perforation is incomplete, the result is probably determined wrongfully. (5) Optical voting machine: After each voter fills a circle correspond to t

Related Documents:

during the implementation of CBEST. The data were collected through observation during the implementation of CBEST and interview with teacher and headmaster. The result of this study reveals that the implementation of CBEST has its own benefits and limitations in relation to aspect of economy, implementation and test administration and test design.

Corrective action design and implementation . Petroleum Remediation Program . 1.0 Corrective action design approval process . The CAD approval process is completed in two phases: the design phase and the implementation phase. Figure 1 outlines the general CAD approval process. The design

design, implementation of the database design, implementation of the user interface for the database, and some issues for the migration of data from an existing legacy database to a new design. I will provide examples from the context of natural history collections information. Plan ahead. Good design involves not just solving the task at

Keywords: Design-Based Implementation Research, Design-Implementation Research, Instructional Systems Design, Intelligent Tutoring Systems, Participatory Design, Research Partnerships, Writing Pal INTRODUCTION With each new school year, the list of available educational technologies expands dramatically, along with

Legal Design Service offerings Legal Design - confidential 2 Contract design Litigation design Information design Strategy design Boardroom design Mastering the art of the visual Dashboard design Data visualization Legal Design What is especially interesting in the use of visual design in a p

implementation and sustainability framework to assist and support implementing agencies and communities. The TPI Implementation Framework (the TPI Framework) is adapted from current evidence-based implementation models including RE-AIM (Glasgow, Vogt & Boles, 1999) and the National Implementation Research Network (NIRN) (Fixsen, Blasé et al.,

Implementation Science at a Glance, is intended to help practitioners and policy makers gain familiarity with the building blocks of implementation science. Developed by our team and informed by our ongoing collaborations with practitioners and policy makers, Implementation Science at a Glance introduces core implementation science concepts, tools,

icy [19-26], studying the implementation of enacted public policies is critically important: the degree to which an enacted policy is implemented determines whether and how that policy will affect outcomes. In this study, we focus upon two primary elements of policy implementation: (1) policy implementation rules and (2) policy implementation .