Global wireless e voting
- 2. One can shop online –
So what makes
Voting via the Internet
so difficult?
2
- 3. Is it legally
possible to vote
via the Internet?
[Law]
How can electronic
voting via the Internet
work technically?
[Technology]
Does e-Voting raise the
voter turnout?
[Sociopolitics]
Law Technogy Sociopolitics
Overview
3
- 4. Contents-
i. Introduction
ii. Present System
iii. Disadvantages of the present system
iv. Proposed system
v. Block diagram
vi. Voting machine
vii.Block diagram of the Client Side Circuit
viii.Eye retina scanning
ix. Interface device
x. Hurdles in the path of implementation
xi. Future enhancements
xii. Conclusion
4
- 5. Introduction
Now days voting system is replaced by
electronic machine to carry out voting.
In Global Wireless E-Voting , the
machine is made intelligent which can
determine the eligibility of the voter and
also the vote count is not kept into the
same machine itself instead of it ,it is store
in the remote server.
5
- 6. Present system-
In a present system, each
and every section is given
a electronic machine
which stores the votes of
the people.
Control of present system
is given to the in charge
officer who check the
eligibility of the
candidates for voting.
Finally we collect all the
voting machine at a place
and go for counting.
6
- 7. Disadvantages of the present
system-
Re-election
Can not check Eligibility
Increase the count of voting
Transportation
It is cost effective.
The person from any other region cannot vote
in for a candidate of other region.
The voting takes place where the machine is
located.
7
- 8. Proposed System-
Now considering these all disadvantages of the
present system, we proposed the system
“Global Wireless E-Voting”.
Remote secured system
Transfer of vote
Check eligibility
No need for Re-election
Internet
We can vote from anywhere
8
- 10. Explanation-
1. Radio waves representing scanned retina
pattern and vote to Mobile tower.
2. Radio waves representing scanned retina
pattern and vote to remote server.
3. Acknowledgement (+ve or –ve) from the server
to mobile tower.
4. Acknowledgement (+ve or –ve) from mobile
tower to Interface device.
5. Ready signal if retina is scanned properly to
voting machine. And if –ve signal then alert
alarm will be activated.
6. Accepted vote is made to flow to the interface
device.
10
- 11. Voting Machine-
The voting machine is actually a device
which generates the different voltages for
different votes these voltages are fed to the
(ADC) which is then converted to digital
bits then can be converted to radio waves.
11
- 13. Eye Retina Scanning-
The eye retina machine be a simple web
cam or device which can capture the images
effectively .the captured image will be
represented in the form of a matrix where
each pixel represents 24-bit (RGB, 8+8+8
format)
13
- 14. Interface device -
This is an electronic kit which converts the
input digital signals such as (retina pattern
+ votes+ secure bits) to radio waves.
14
- 15. Working of whole system-
Whenever voters enter to voting booth then he
will be instructed to directly look at retina
scanning machine and the machine scans the
retina after that voter is made to vote.
Now the whole data including the retina
pattern is sent to interfacing device which
converts it into radio waves and these radio
waves are sent to mobile tower.
And then to the remote server, where the
authentication and voters identification is
stored into a secured database.
15
- 16. Continued…
The received data is first converted into
digital format from the radio waves through
the interface device kept at the server
side, and then retina pattern and vote
separated.
Next the retina pattern is matched against
the existing database .
If match is found then flag is check which
indicates its voting status i.e. +ve ack.
This ack is recognized by the receiver kept
at the voter side and machine is made to
scan next retina pattern and vote, otherwise
if –ve ack then alert alarm is made to ring. 16
- 17. Hurdles In The Path Of
Implementation-
Security
Efficiency
Geographical Problems
17
- 18. Security-
Uses Key Complex Encryption algorithm
First it finds the length of the string.
Generate the random numbers equal to the
length of the string.
Add the corresponding Characters from the
given string and random values.
18
- 19. E.g. KSHITIJ
A) 8 12 34 4 11 9 26
The ASCII value for KSHITIJ are
K S H I T I J
B) 75 83 72 73 84 73 74
Add corresponding A) and B) values as
8+75 12+83 34+72 4+73 11+84 9+73 26+74
83 95 106 77 95 82 100
Continued…
19
- 20. The corresponding ASCII characters for these
are
S _ j M _ R d
The corresponding characters for random
values
Finally encrypted data as
S _ j M _ R d
This makes encryption of data in such a way that
decryption becomes easy.
20
- 23. continued
key values are orthogonal to each other.
i.e. k1*k2=0 and k*k1=1
The data will be in the form of d1*k1
i.e. data * key .
If we try to decode with k2 key then effect will be
as d1*k1*K2=0.
Hence it is clear that data will be vanished.
If the correct decoding key k1 is used, then the
decoding will be as represented d1*k1*k1=d1
This decodes the data correctly.
23
- 24. Geographical Problems-
It occurs where the technical facilities
service is not present.
In this case will convert the vote and retina
pattern into the electrical information .
And pass it through the electrical
conductors until we reach the area where
the technical facilities like internet or
mobile tower is available.
Here the eye scanner will be web cam.
24
- 26. Continued…
This project can be enhanced to work over
the mobiles that is voting is made possible
through the mobile through SMS.
This machine can be made vote through the
INTERNET.
26
- 27. Conclusion-
Provides high level of
security, authentication, reliability, and
corruption-free mechanism.
By this we can get result with in minute
after a completion of voting.
Minimum manpower Utilization, hence
mechanism is error free.
27