International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013
A Preview on Microcontroller Based Electronic Voting Machine Diponkar Paul and Sobuj Kumar Ray, Member, IACSIT
Abstract—Voting is most pivotal process of democratic society through which people determine it’s government. Governments around the world are increasingly considering the replacement of traditional paper-based voting schemes with electronic voting systems. Elections of Bangladesh are conducted most exclusively using electronic voting machines developed over the past three years. In this paper we describe the design, construction and operation of a digital voting machine using a microcontroller profoundly. Again we also portray counting system of votes, market survey and cost analysis. Index Terms—Voting system, atmega16l microcontroller, voting analysis, security of EVM.
I. INTRODUCTION Voting is a crucial device to reveal the opinion of a group on an issue that is under consideration. Based on the promise of greater eﬃciency, better scalability, faster speed, lower cost, and more convenience, voting is currently shifting from manual paper-based processing to automate electronic-based processing. The term “electronic voting” characteristically depicts to the use of some electronic means in voting and ensure the security, reliability, guarantee and transferency,. Now a day the wide range of application of voting include its use in reality student body elections, shareholder meetings, and the passing of legislation in parliament. Perhaps the most important, inﬂuential, publicised, and widespread use of voting is its use in national elections. Compared to its traditional paper-based counterpart, electronic voting is considered to have many greater potential beneﬁts. These beneﬁts include better accuracy by eliminating the negative factor of human error, better coverage for remote locations, increased speed for tally computation, lower operational cost through automated means, and the convenience of voting from any location Whether or not electronic voting is a necessary replacement for the traditional paper-based method, it is irrefutable that the conduct of voting has been shifting to the use of electronic medium. To date, electronic databases are used to record voter information, computers are used to count the votes and produce voting results, mobile devices are used for voting in interactive television shows, and electronic voting machines have been used in some national elections. Generally, the term “electronic voting” refers to the deﬁnition, collection, and dissemination of people’s opinions with the help of some machinery that is more or less computer supported. Despite Manuscript received August 15, 2012; revised October 12, 2012. The authors are with the Department Electrical and Electronic Engineering, World University of Bangladesh, Dhaka, Bangladesh (e-mail: email@example.com, firstname.lastname@example.org)
the transition from traditional paper-based systems to electronic medium, the purpose and requirements for voting remain. Voting is a decision making mechanism in a consensus-based society and security is indeed an essential part of voting. The critical role in determining the outcome of an election, electronic voting systems should be designed and developed with the greatest care. However, a number of recent studies have shown that most of the electronic voting systems being used today are fatally defective , ,  and that their quality does not match the importance of the task that they are supposed to carry out. Flaws in current voting systems, which were discovered through testing and other analysis techniques, have stimulated a number of research efforts to mitigate the problems in deployed voting systems. These efforts focused on ameliorating security primitives, such as the storage of votes ,  and auditing , and on formally assessing and making procedures more effective...
References: D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, R. A. Kemmerer, W. Robertson, F. Valeur, and G. Vigna, “An Experience in Testing the Security of Real-World Electronic Voting Systems,” IEEE Transactions on Software Engineering, vol. 36, no. 4, 2010.  A. Villaﬁorita and K. Weldemariam, and R. Tiella, “Development, Formal Veriﬁcation, and Evaluation of an E-Voting System with VVPAT,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, 2009.  Y. D. Wagner, M. Bishop, T. Baker, B. D. Medeiros, G. Tyson, M. Shamos, and M. Burmester, “Software Review and Security Analysis of the ES&S I Votronic 126.96.36.199 Voting Machine Firmware,” Technical report, Security and Assurance in Information Technology Laboratory, 2007.  T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach, “Analysis of an Electronic Voting System,” in Proc. of IEEE Symp. Security and Privacy, pp. 27-40, 2004.  E. Proebstel, S. Riddle, F. Hsu, J. Cummins, F. Oakley, T. Stanionis, and M. Bishop, “An Analysis of the Hart Intercivic DAU eSlate,” in Proc. of Usenix/Accurate Electronic Voting Technology Workshop, 2007.  D. Molnar, T. Kohno, N. Sastry, and D. Wagner, “Tamper-Evident, History Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract),” in Proc. of IEEE Symp. Security and Privacy, pp. 365-370, 2006.  J. Bethencourt, D. Boneh, and B. Waters, “Cryptographic Methods for Storing Ballots on a Voting Machine,” in Proc. of Network and Distributed System Security Symp, 2007.  S. Garera and A. Rubin, “An Independent Audit Framework for Software Dependent Voting Systems,” in Proc. of ACM conf. Computer and Comm. Security, pp. 256-265, 2007.  J. Hall, “Improving the Security, Transparency and Efficiency of California’s 1 Percent Manual Tally Procedures,” in Proc. of Usenix/ Accurate Electronic Voting Technology Workshop, 2008.  K. Weldemariam and A. Villafiorita, “Modeling and Analysis of Procedural Security in (e) Voting: The Trentino’s Approach and Experiences,” in Proc. of Usenix/Accurate Electronic Voting Technology Workshop, 2008.  R. Hite, “All Levels of Government are needed to Address Electronic Voting System Challenges,” Technical report, GAO, 2007. 
Fig. 8. Flowchart of program
IV. RESULTS AND ANALYSIS This work contributed to three very basic research questions arising: in the context of verifiable elections. First, we discussed the problem of keeping ballot secrecy to a certain extent in the case of a corrupted doting machine or voting authority. Our contribution to this is an approach where all secret information is encapsulated in the voting machine. Second, we considered the attack of receipt stealing and manipulation of the corresponding votes. Here we proposed a novel approach of linking all receipts by a hash chain such that each single receipt guards the integrity of all receipts issued previously. Together with a display in the polling place this approach shortens the time window in which an adversary can perform the ballot stealing attack without almost zero risk. Third, we discussed in detail the possibility of contesting an election based on the evidence provided by the verifiable election scheme. We compared the situation for Bingo Voting to the evidence provided by paper based schemes. We shortly sketched an approach to prove an error or a manipulation in the voting booth without violating ballot secrecy. However, this was only a proof of concept and for a practical application the usability of this approach needs to be further improved. V. CONCLUSION As part of these exercises, we devised a testing methodology, developed new tools that are specifically tailored to the security analysis of these systems, and learned a number of lessons, all of which should be of use to other
International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013
 M. Gondree, P. Wheeler, and D. D. Figueiredo, “A Critique of the 2002 FEC VSPT E-Voting Standards,” Technical report, Univ. of California, 2005.  R. Mercuri. Voting System Guidelines Comments. [Online]. Available: http:// www.wheresthepaper.org/VVSGComment.pdf, 2005. [Online]. Available:  Atmel. http://www.atmel.com/Images/doc2466.pdf Mr. Diponkar Paul is currently working as Assistant Professor in the department of Electrical and Electronic engineering at World University of Bangladesh, Dhaka, Bangladesh (www.wub.edu.bd ). After passing his master degree from March 2008 he was serving as Assistant Professor, EEE at Bangladesh University upto July 2010. He is having qualifications: B.Sc. Engg., DISM (software engineering), M.Sc. Engg. His research interests are in the area of energy conversions, power system modeling and advanced control theories covering the application of IT. From 0ct 2004 to July 2006, he was working as Lecturer in department of computer science and engineering at Pundra University of science & technology, Bogra. In Singapore during his master dgree at Nanyang technological university, he was involved in financial service operation integrated to IT system administration jobs from Dec 2006 to February 2008. Mr. Sobuj Kumar Ray was born in 1987, Bogra, Bangladesh. Mr. Ray received his Bachelor degree in Electrical and Electronic Engineering from the Rajshahi University of Engineering and Technology (RUET), Rajshahi, Bangladesh in April 2010. He is now Assistant Manager (Technical) in DESCO. Mr. Ray worked at Internal University of Business Agriculture and Technology in the department of Electrical and Electronic Engineering, Dhaka, Bangladesh (www.iubat.edu) from 12th July 2010 to 1st October, 2012. He is enthusiastic on researcher on control system and Power System.
Please join StudyMode to read the full document