I. J. Computer Network and Information Security, 2012, 7, 57-68 Published Online July 2012 in MECS (http://www.mecs-press.org/)
Application of Biometrics in Mobile Voting
Donovan Gentles1, Suresh Sankaranarayanan 2, 3
1Mona Institute of Applied Sciences, University of WestIndies, Jamaica firstname.lastname@example.org
2Computing & Information Systems, Institut Teknologi Brunei, Brunei 3Department of Computing, University of WestIndies, Jamaica
Abstract — Voting process in today’s era is behind its time in respect of the usage of modern ICT. The voting process is being seen mostly as a manual and paper based one. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. Over the years technology related systems were being developed to resolve some of the issues like electoral fraud, impersonation, double voting etc. One such system is Electronic based voting that has been actively used for voting in countries like India. However, these systems seem to be prone to electoral frauds and voters have to make tremendous effort to cast their ballots. There are still a few very important areas which have to be identified and addressed viz., the Security which involves a person be able to vote in a secure manner, the time spent for voting by voters, the efficiency in counting of votes and the cost involved in employing people towards monitoring the voting process. So taking these areas/issues into consideration we have now come with the biometrics authenticated mobile voting system, to start with for a country like Jamaica. The technology being proposed now is novel and the first of its kind proposed at present. It is proposed that using fingerprint supported biometric control information and encryption along with Secure Socket Layer i.e. SSL using VeriSign, would make the software involved in the voting process well secured. In addition tying the credentials to a mobile device will make the system even more robust. We have considered the mobile equipment for the present system development, a smart phone using Android 3.0 (Honeycomb). The details of the proposed development are presented in this paper.
Index Terms — Electronic voting, Mobile Voting, SSL, Android 3.0
The voting process in today’s context is behind its time in respect of the usage of modern ICT as seen by experience. The voting process begins with persons manually going to an election office showing proof of address and then a national identification card (Id) will be issued for getting the authentication during the actual process of voting at the polling both/station. With this, a voters’ list will be generated for each constituency. Each voter will then have to go to a polling station where they
believe that their names are made available and if so after authentication with their Id, they will cast their vote by placing a mark against the political party symbol of their choice. In some cases, on the voter’s right thumb/index finger, an indelible ink mark is made to show that this person has already voted and so the voter cannot vote again. After the voting schedule is complete, booth officials will then take the ballot boxes to a centralized place, then declare the voting results by manually counting the votes polled, and tally the counts. In some cases, there may be some need for a recount of ballot papers polled also due to discrepancies. These processes are often lengthy, tedious, inaccurate, and risky and in some cases the final count may get skewed and end up in court cases also. This manual process leaves scope for errors to creep in, political dishonesty and political fraud, which is seen through the voicing of their feelings by people in the media in many countries using these systems.
In countries that are better developed like in India, electronic voting (e-voting) is made possible and this technique encapsulates both...
References: . Electronic Voting (2009), Available from http://www. hwskioskprinter.com/terminology electronic voting.pdf
. Electoral office of Jamaica (2007), Available from www.jis.gov.jm/special_sections/election_2007/in dex.html
Anonymous fingerprinting. Berlin: Springer-Verlag, 1996.
. Jain, A et al (1997) "On-Line Fingerprint Verification." IEEE Transactions on Pattern Analysis and Machine Intelligence VOL. 19, No. 4, 1997: 302-305
. William, S (2005). Cryptography and Network Security Principles and Practices, Fourth Edition.
Prentice Hall, 2005
. Nechvatal et al. Report on the Development of the Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2000.
Copyright © 2012 MECS I.J. Computer Network and Information Security, 2012, 7, 57-68
Please join StudyMode to read the full document