SlideShare a Scribd company logo
GLOBAL WIRELESS
E-VOTING
BY
RUCHISIKTA DASH 10CS22
LIPSA PANIGRAHI 10CS08
EPARI SHIRIN 10CS25
1
One can shop online –
So what makes
Voting via the Internet
so difficult?
2
Is it legally
possible to vote
via the Internet?
[Law]
How can electronic
voting via the Internet
work technically?
[Technology]
Does e-Voting raise the
voter turnout?
[Sociopolitics]
Law Technogy Sociopolitics
Overview
3
Contents-
i. Introduction
ii. Present System
iii. Disadvantages of the present system
iv. Proposed system
v. Block diagram
vi. Voting machine
vii.Block diagram of the Client Side Circuit
viii.Eye retina scanning
ix. Interface device
x. Hurdles in the path of implementation
xi. Future enhancements
xii. Conclusion
4
Introduction
Now days voting system is replaced by
electronic machine to carry out voting.
In Global Wireless E-Voting , the
machine is made intelligent which can
determine the eligibility of the voter and
also the vote count is not kept into the
same machine itself instead of it ,it is store
in the remote server.
5
Present system-
 In a present system, each
and every section is given
a electronic machine
which stores the votes of
the people.
 Control of present system
is given to the in charge
officer who check the
eligibility of the
candidates for voting.
 Finally we collect all the
voting machine at a place
and go for counting.
6
Disadvantages of the present
system-
 Re-election
 Can not check Eligibility
 Increase the count of voting
 Transportation
 It is cost effective.
 The person from any other region cannot vote
in for a candidate of other region.
 The voting takes place where the machine is
located.
7
Proposed System-
Now considering these all disadvantages of the
present system, we proposed the system
“Global Wireless E-Voting”.
Remote secured system
Transfer of vote
Check eligibility
No need for Re-election
Internet
We can vote from anywhere
8
Block Diagram-
9
Explanation-
1. Radio waves representing scanned retina
pattern and vote to Mobile tower.
2. Radio waves representing scanned retina
pattern and vote to remote server.
3. Acknowledgement (+ve or –ve) from the server
to mobile tower.
4. Acknowledgement (+ve or –ve) from mobile
tower to Interface device.
5. Ready signal if retina is scanned properly to
voting machine. And if –ve signal then alert
alarm will be activated.
6. Accepted vote is made to flow to the interface
device.
10
Voting Machine-
 The voting machine is actually a device
which generates the different voltages for
different votes these voltages are fed to the
(ADC) which is then converted to digital
bits then can be converted to radio waves.
11
Block Diagram Of The
Client Side Circuit-
12
Eye Retina Scanning-
 The eye retina machine be a simple web
cam or device which can capture the images
effectively .the captured image will be
represented in the form of a matrix where
each pixel represents 24-bit (RGB, 8+8+8
format)
13
Interface device -
 This is an electronic kit which converts the
input digital signals such as (retina pattern
+ votes+ secure bits) to radio waves.
14
Working of whole system-
 Whenever voters enter to voting booth then he
will be instructed to directly look at retina
scanning machine and the machine scans the
retina after that voter is made to vote.
 Now the whole data including the retina
pattern is sent to interfacing device which
converts it into radio waves and these radio
waves are sent to mobile tower.
 And then to the remote server, where the
authentication and voters identification is
stored into a secured database.
15
Continued…
 The received data is first converted into
digital format from the radio waves through
the interface device kept at the server
side, and then retina pattern and vote
separated.
 Next the retina pattern is matched against
the existing database .
 If match is found then flag is check which
indicates its voting status i.e. +ve ack.
 This ack is recognized by the receiver kept
at the voter side and machine is made to
scan next retina pattern and vote, otherwise
if –ve ack then alert alarm is made to ring. 16
Hurdles In The Path Of
Implementation-
 Security
 Efficiency
 Geographical Problems
17
Security-
 Uses Key Complex Encryption algorithm
 First it finds the length of the string.
 Generate the random numbers equal to the
length of the string.
 Add the corresponding Characters from the
given string and random values.
18
E.g. KSHITIJ
A) 8 12 34 4 11 9 26
 The ASCII value for KSHITIJ are
K S H I T I J
B) 75 83 72 73 84 73 74
 Add corresponding A) and B) values as
8+75 12+83 34+72 4+73 11+84 9+73 26+74
83 95 106 77 95 82 100
Continued…
19
The corresponding ASCII characters for these
are
S _ j M _ R d
The corresponding characters for random
values
      
Finally encrypted data as
S  _  j  M  _  R  d 
This makes encryption of data in such a way that
decryption becomes easy.
20
Efficiency-
 Applying compression Algorithms
 Using distributed Operating system
environment with multiple servers.
 CDMA technique
21
k1*d1+
k2*d2 +
k3*d3+
k4*d4
Key 1
data 1
Key 3
data 3
Key 4
data 4
Key 2
data 2
22
continued
 key values are orthogonal to each other.
i.e. k1*k2=0 and k*k1=1
 The data will be in the form of d1*k1
i.e. data * key .
 If we try to decode with k2 key then effect will be
as d1*k1*K2=0.
 Hence it is clear that data will be vanished.
 If the correct decoding key k1 is used, then the
decoding will be as represented d1*k1*k1=d1
 This decodes the data correctly.
23
Geographical Problems-
 It occurs where the technical facilities
service is not present.
 In this case will convert the vote and retina
pattern into the electrical information .
 And pass it through the electrical
conductors until we reach the area where
the technical facilities like internet or
mobile tower is available.
 Here the eye scanner will be web cam.
24
Future Enhancements-
25
Continued…
 This project can be enhanced to work over
the mobiles that is voting is made possible
through the mobile through SMS.
 This machine can be made vote through the
INTERNET.
26
Conclusion-
 Provides high level of
security, authentication, reliability, and
corruption-free mechanism.
 By this we can get result with in minute
after a completion of voting.
 Minimum manpower Utilization, hence
mechanism is error free.
27
28
29

More Related Content

Global wireless e voting

  • 1. GLOBAL WIRELESS E-VOTING BY RUCHISIKTA DASH 10CS22 LIPSA PANIGRAHI 10CS08 EPARI SHIRIN 10CS25 1
  • 2. One can shop online – So what makes Voting via the Internet so difficult? 2
  • 3. Is it legally possible to vote via the Internet? [Law] How can electronic voting via the Internet work technically? [Technology] Does e-Voting raise the voter turnout? [Sociopolitics] Law Technogy Sociopolitics Overview 3
  • 4. Contents- i. Introduction ii. Present System iii. Disadvantages of the present system iv. Proposed system v. Block diagram vi. Voting machine vii.Block diagram of the Client Side Circuit viii.Eye retina scanning ix. Interface device x. Hurdles in the path of implementation xi. Future enhancements xii. Conclusion 4
  • 5. Introduction Now days voting system is replaced by electronic machine to carry out voting. In Global Wireless E-Voting , the machine is made intelligent which can determine the eligibility of the voter and also the vote count is not kept into the same machine itself instead of it ,it is store in the remote server. 5
  • 6. Present system-  In a present system, each and every section is given a electronic machine which stores the votes of the people.  Control of present system is given to the in charge officer who check the eligibility of the candidates for voting.  Finally we collect all the voting machine at a place and go for counting. 6
  • 7. Disadvantages of the present system-  Re-election  Can not check Eligibility  Increase the count of voting  Transportation  It is cost effective.  The person from any other region cannot vote in for a candidate of other region.  The voting takes place where the machine is located. 7
  • 8. Proposed System- Now considering these all disadvantages of the present system, we proposed the system “Global Wireless E-Voting”. Remote secured system Transfer of vote Check eligibility No need for Re-election Internet We can vote from anywhere 8
  • 10. Explanation- 1. Radio waves representing scanned retina pattern and vote to Mobile tower. 2. Radio waves representing scanned retina pattern and vote to remote server. 3. Acknowledgement (+ve or –ve) from the server to mobile tower. 4. Acknowledgement (+ve or –ve) from mobile tower to Interface device. 5. Ready signal if retina is scanned properly to voting machine. And if –ve signal then alert alarm will be activated. 6. Accepted vote is made to flow to the interface device. 10
  • 11. Voting Machine-  The voting machine is actually a device which generates the different voltages for different votes these voltages are fed to the (ADC) which is then converted to digital bits then can be converted to radio waves. 11
  • 12. Block Diagram Of The Client Side Circuit- 12
  • 13. Eye Retina Scanning-  The eye retina machine be a simple web cam or device which can capture the images effectively .the captured image will be represented in the form of a matrix where each pixel represents 24-bit (RGB, 8+8+8 format) 13
  • 14. Interface device -  This is an electronic kit which converts the input digital signals such as (retina pattern + votes+ secure bits) to radio waves. 14
  • 15. Working of whole system-  Whenever voters enter to voting booth then he will be instructed to directly look at retina scanning machine and the machine scans the retina after that voter is made to vote.  Now the whole data including the retina pattern is sent to interfacing device which converts it into radio waves and these radio waves are sent to mobile tower.  And then to the remote server, where the authentication and voters identification is stored into a secured database. 15
  • 16. Continued…  The received data is first converted into digital format from the radio waves through the interface device kept at the server side, and then retina pattern and vote separated.  Next the retina pattern is matched against the existing database .  If match is found then flag is check which indicates its voting status i.e. +ve ack.  This ack is recognized by the receiver kept at the voter side and machine is made to scan next retina pattern and vote, otherwise if –ve ack then alert alarm is made to ring. 16
  • 17. Hurdles In The Path Of Implementation-  Security  Efficiency  Geographical Problems 17
  • 18. Security-  Uses Key Complex Encryption algorithm  First it finds the length of the string.  Generate the random numbers equal to the length of the string.  Add the corresponding Characters from the given string and random values. 18
  • 19. E.g. KSHITIJ A) 8 12 34 4 11 9 26  The ASCII value for KSHITIJ are K S H I T I J B) 75 83 72 73 84 73 74  Add corresponding A) and B) values as 8+75 12+83 34+72 4+73 11+84 9+73 26+74 83 95 106 77 95 82 100 Continued… 19
  • 20. The corresponding ASCII characters for these are S _ j M _ R d The corresponding characters for random values        Finally encrypted data as S  _  j  M  _  R  d  This makes encryption of data in such a way that decryption becomes easy. 20
  • 21. Efficiency-  Applying compression Algorithms  Using distributed Operating system environment with multiple servers.  CDMA technique 21
  • 22. k1*d1+ k2*d2 + k3*d3+ k4*d4 Key 1 data 1 Key 3 data 3 Key 4 data 4 Key 2 data 2 22
  • 23. continued  key values are orthogonal to each other. i.e. k1*k2=0 and k*k1=1  The data will be in the form of d1*k1 i.e. data * key .  If we try to decode with k2 key then effect will be as d1*k1*K2=0.  Hence it is clear that data will be vanished.  If the correct decoding key k1 is used, then the decoding will be as represented d1*k1*k1=d1  This decodes the data correctly. 23
  • 24. Geographical Problems-  It occurs where the technical facilities service is not present.  In this case will convert the vote and retina pattern into the electrical information .  And pass it through the electrical conductors until we reach the area where the technical facilities like internet or mobile tower is available.  Here the eye scanner will be web cam. 24
  • 26. Continued…  This project can be enhanced to work over the mobiles that is voting is made possible through the mobile through SMS.  This machine can be made vote through the INTERNET. 26
  • 27. Conclusion-  Provides high level of security, authentication, reliability, and corruption-free mechanism.  By this we can get result with in minute after a completion of voting.  Minimum manpower Utilization, hence mechanism is error free. 27
  • 28. 28
  • 29. 29