0% found this document useful (0 votes)
16 views13 pages

A Blockchain and Iot Coupled Security Mechanism For Voting Systems

This project report presents a decentralized electronic voting system that integrates IoT and blockchain technology to enhance the security and integrity of the voting process. The proposed system aims to eliminate traditional voting challenges, ensuring voter verification and data protection through methods like biometric checks and OTPs. It is designed for both governmental elections and private polls, providing a transparent and efficient voting experience while safeguarding against tampering and fraud.

Uploaded by

Catering SEO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views13 pages

A Blockchain and Iot Coupled Security Mechanism For Voting Systems

This project report presents a decentralized electronic voting system that integrates IoT and blockchain technology to enhance the security and integrity of the voting process. The proposed system aims to eliminate traditional voting challenges, ensuring voter verification and data protection through methods like biometric checks and OTPs. It is designed for both governmental elections and private polls, providing a transparent and efficient voting experience while safeguarding against tampering and fraud.

Uploaded by

Catering SEO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

A BLOCKCHAIN AND IOT COUPLED SECURITY MECHANISM FOR

VOTING SYSTEMS

PROJECT REPORT

Submitted by

Praveen G
Prabhakaran R
Suresh Krishnan R

In partial fulfilment for the award of the degree of

Bachelor of Engineering

in

COMPUTER SCIENCE AND ENGINEERING

BANNARI AMMAN INSTITUTE OF TECHNOLOGY


(An Autonomous Institution Affiliated to Anna University, Chennai)
SATHYAMANGALAM-638401

ANNA UNIVERSITY: CHENNAI 600 025

JANUARY 2022
ABSTRACT

E-voting systems will be beneficial to all people who are involved in


elections. For example, administrators can improve operation of tasks for
elections, and voters can vote in an election anytime and anywhere. In
addition, ideal e-voting systems have transparency, completeness (only
voters have the right to vote and their votes are correctly counted), and
verifiability (voters can check that their vote is correctly counted), and
therefore a better solution is required. The blockchain can be described as
an immutable, cumulative ledger, with consensus protocol working to
maintain this ledger of all valid transactions on every node in the network.
Blockchain technology originates from the underlying architectural design
of the crypto currency bitcoin. It is a form of distributed database where
records take the form of transactions, a block is a collection of these
transactions. With the use of blockchains a secure and robust system for
digital voting can be devised Amongst them, the evaluation and
harmonization of e-voting systems, given different legal and statutory
frameworks, is still an important challenge to overcome. Yet, only a few
works have addressed this topic in the field.

Keywords – E-Voting,Iot,Blockchain.

CHAPTER 1
INTRODUCTION

We have proposed voting system based on IoT and blockchain that aims to
solve the obstacles of traditional voting methods and improve electronic voting
process, adding protective methods that enable the voter to vote comfortably
and ensure that the voting data are correct and there is no tampering or fraud in
votes. The structure of our proposed system is based on two situations, the first
if a citizen votes for governmental elections and the second if casts his vote in a
referendum or questionnaire. The rapid development and astonishing spread of
technology in various areas of life has a great role in facilitating life matters for
all humanity. The voting process is a democratic practice that has been used
over the years as the primary method for individuals to express their opinions on
issues and discussions that concern them. In democratic countries, the election
process is very important because it happens periodically with the participation
of citizens who have reached the legal age and are allowed to vote. That is why
there is an urgent need to ensure the integrity of the elections by offering safety
and security for citizens so that they can cast their votes comfortably. Many
countries have faced authoritarian administrations that are not characterized by
integrity and transparency in the electoral process. Therefore, having an
electoral system based on integrity, safety, preserving votes from tampering,
manipulation, and repetition in addition to obtaining results faster is a solution
for many governments wishing to improve and prove their credibility and
transparency in front of their citizens.

CHAPTER 2
LITERATURE REVIEW

South Korea directed its important for tests connected with Blockchain
electronic democratic. It was first carried out in March 2018 by Gyeonggi-do
Province. Albeit this was tried in a limited scale with the quantity of members
around 9,000 just, however authorities trust this shows the capability of
involving Blockchain innovation in web-based casting a ballot
Vishal, Rishabh and Vibha have proposed the internet casting a ballot
framework utilizing Aadhar. This study helps in the utilization of exceptional
recognizable proof of an individual in the democratic system. The investigation
of decentralization and elector security upgrades the decentralized instrument of
putting away the information that works on the straightforwardness. The square
chain profoundly helps in keeping the protection of the citizens

The review proposed by fridrik , hjalmarsson, gunnlaugur helps in assessing the


contrast between the current democratic framework and the square chain casting
a ballot framework. The different execution of square chain in piece coins like
ethereum will likewise be utilized to assemble the shrewd agreements
empowering secure political decision

The component for checking the elector by the Aadhar number isn't totally
protected, and different variables should be added, for example, confirmation by
strategies for biometric validation and a confirmation code One Time Password
(OTP). In another work[2] they improve and foster electronic democratic and
increment its effectiveness in Ethereum Blockchain. A decentralized and
dependable technique has been proposed to guarantee honesty and
straightforwardness of information through the elector's cell phone number
utilizing the OTP confirmation instrument that sends a code to the citizen's
telephone number.

Part 3
Strategy

we introduced the proposed casting a ballot framework in light of IoT and


blockchain that means to address the impediments of conventional democratic
techniques and further develop electronic democratic interaction by working
with the most common way of getting to the framework, adding defensive
strategies that empower the citizen to cast a ballot serenely and guarantee that
the democratic information are right and there is no altering or
misrepresentation in votes. Our proposed framework contains a site associated
with the legislative data set of residents records to confirm residents'
information. The design of our proposed framework depends on two
circumstances, the first on the off chance that a resident decisions in favor of
administrative races and the second if makes his choice in a mandate or survey.
Both the survey and the mandate are for government organizations or private
enterprises. The framework utilizes blockchain innovation that secures and
saves the democratic interaction and the information it contains. Blockchain is
an information base and organization simultaneously, it comprises of a
gathering of hubs that are connected to one another in a shared organization.
This organization comprises of PCs which considers the connection inside the
whole organization so it shares information or advanced occasions inside that
organization. At the point when another PC associates inside a blockchain
network, it turns into a hub inside that network that can convey and impart
information to different hubs on a similar organization. At the point when a hub
sends new information in the blockchain network, the information will be
confirmed and supported by most of different hubs associated with this
organization, so it is truly challenging for a misleading hub to distribute or
repost information due to the blockchain foundation.

If we see that in the image shows that the which candidate get how many
votes and which candidate party is leading is also shown in the image.

If we press the button in the prototype the changes are made in the website
so we can see the what happened in the voting system
If we entered the data in the prototype it is stored in the peer-to-peer
network. Its just like the linked list type so if we can change the one data it
will be freezed the voting system it will be corrupted

If the data is corrupted so we can downloaded the data and check the data
which is corrupted

CHAPTER 4
RESULTS AND DISCUSSION

we make sense of the aftereffects of the assignments that the framework


performs, and the chance of casting a ballot in administrative decisions or
surveys and surveys for government and private enterprises. The public
authority area incorporates its public and administration establishments,
residents can include in decisions or mandates effectively through the web
framework connected to the IoT gadgets, and admittance to all individuals
easily to take their viewpoints and acquire the aftereffects of races or mandates
rapidly, precisely and forestall the reiteration of votes. Residents' information
are managed, so the framework gives insurance and security to it through the
blockchain. Whenever sign in to cast a ballot, after a resident enters his own
expected information and his constituent card number, the entered information
are checked and contrasted and the administrative data set of residents records,
just grown-ups or any individual who is qualified to cast a ballot can cast a
ballot. In casting a ballot of legislative races, after the democratic interaction is
finished on the site, the elector should go to one of the democratic machines that
are broad in a few spots to affirm the vote through his finger impression and be
coordinated with his recently recorded information in view of the administrative
data set of residents records, this affirmation cycle by finger impression is
expected for legislative decisions as it were. In legislative surveys or mandates,
it is similar course of casting a ballot in administrative decisions except for
check by unique finger impression to work with the democratic interaction,
since it isn't quite so significant as races. The confirmation of the elector's
information is finished by contrasting the entered information and the
administrative data set of residents records. Then again, the private area which
remembers foundations or that's employers society field and wish to lead a
mandate or make polls to get the assessments of residents, they can set up
mandates, and the framework helps in taking residents' viewpoints rapidly and
precisely. Residents can enter straightforwardly to the site to finish up the poll
and decision on it without the requirement for the check and affirmation process
as in casting a ballot of government area, since it is an ordinary cycle and
doesn't have to check and affirm the personality of the individual.
In this image we shown the if the tamper occurs the website will be freezed
so the others voters cannot poll their votes

If the tampered occurs the voting system will be freezed. Its shown in the
image so we can easily understand

The association or foundation that directed the mandate or survey can come by
the aftereffects of casting a ballot without any problem. Each vote whether in
government or private area casting a ballot, another hub is made for it in the
blockchain by the savvy contract, consequently guaranteeing that the vote is
shielded from altering or misrepresentation, after that the vote is put away in the
information base.
CHAPTER 5
EQUATIONS

For sure, the convention related to bitcoin deals with a Peer-to-Peer (P2P)
organization, so everything hubs can get to a duplicate of the bitcoin blockchain,
however just certain clients can compose on it.

Every information block contains a header and a bunch of exchanges. All the
more explicitly, the header contains the variant of the bitcoin framework, the
hash worth of the past square, the foundation of the Merkle tree that contains
every one of the exchanges of the square, the time stamp with the date of
making of the square, and two different boundaries: the trouble and a nonce (a
number utilized just a single time). These two boundaries assume a vital part in
the bitcoin mining process.

By its own plan, the time passed between the consideration of two sequential
squares in the bitcoin blockchain ought to be around 10 min. This moderate
basis expects to ensure the proliferation of the new square to the whole bitcoin
P2P organization. To ensure this pace of age of new squares, each 2016 squares
the trouble boundary that is remembered for the header of the squares is reset by
the recipe

Dn=Do⋅2016⋅10T,

where Dn addresses the new trouble, Do the old trouble, and T the time spent
mining the last 2016 squares.

Diggers are liable for taking care of the computationally troublesome issue,
which includes finding incomplete crashes of a given hash work. In Section 2,
these capacities are characterized and it is noticed that a crash comprises of
finding two distinct messages m1 and m2, m1≠m2, with the end goal that
h(m1)=h(m2). On account of bitcoin, the chose hash work is SHA-256 [5].

To find an incomplete crash, every excavator thinks about the qualities that
structure a square (header and exchanges), then, at that point, involves the
trouble relating to the second wherein he makes his computations, and attempts
various nonces until the hash esteem acquired is under a given edge. This limit
esteem is identical to the hash esteem having a specific number of driving zeros.
(By and large, around 10 min. Obviously the higher is the quantity of driving
zeros, the more prominent is the trouble of tackling the issue.

This numerical issue of finding fractional impacts, or at least, the PoW (Proof of
Work) (some of the time known as a numerical riddle) ensures that making a
twofold expense is absurd. All in all, when a client pays a measure of money in
return for products, he fails to keep a grip on that cash, which didn't occur in
that frame of mind of Digicash. For this situation, the PoW ensures that once an
installment with bitcoins is made, how much cryptographic money utilized is as
of now not accessible to the client who has paid with it, so it can't be reused.

The PoW idea was initially proposed by Dwork and Naor in 1992 [25], despite
the fact that it was not related to that articulation in those days. Their
proposition portrayed a cycle to decrease the gathering of spam and Distributed
Denial-of-Service (DDoS) assaults. The cycle suggested that shippers of
messages needed to finish a computational work with minimal electrical
expense, so the expense was high assuming the calculation must be done large
number of times, which wouldn't remunerate its imaginable advantage to spam
makers. Hence, Jakobsson [26] named this strategy as Proof of Work.

As a straightforward model, in the event that the substance of the square was the
string "ITEFI-CSIC", the excavator ought to take a stab at, connecting the past
square, various qualities until he accomplishes the objective of acquiring a
foreordained number of driving zeros. The best way to find a decent nonce is to
attempt it haphazardly until tracking down one that meets the necessities.

ITEFI−CSIC46:ITEFI−CSIC2521:ITEFI−CSIC39266:ITEFI−CSIC1014613:00
7f55f8bdd1f4969501b7fba49c23ae4880e28726a832ce001ffd7f99eb5c38,00061
ec240f84662314ec825f84c045d12ee2131f2d5f0a7612e3330c942ea70,0000898
47656f7abffa7d83f7d93da6da6aa9219ee886306eda19e0ad0afc4f8,00000c45ed
bbf730197f8a165f7edc18806e71693da854bb10d978ad951452e1.

The accompanying model relates to bitcoin's square #545,919, extricated at


20:39:15 on 15 October 2018:

0000000000000000000d04b0dd03e95f4c0dbb811f778a31731834e662ce4169.
Using the Fourier equation, we can compute the value,

Eqn 1. Fourier Equation

For ideal Haar features,

The black region value is 1 and the white region value is 0.

So the difference between dark and white is 1-0=1.

Δ for ideal Haar features is 1.

The most successive design of brain networks is layers. Layers are made out of
a few associated hubs, each with an initiation work. The organization gets
designs through the info layer, which cooperates with at least one secret layers,
where genuine handling happens by means of a weighted association strategy.
The strategy of the look acknowledgment framework is partitioned into three
sections. Picture pre-handling incorporates the acknowledgment of
countenances and facial parts utilizing the viola-Jones technique, the extraction
of facial highlights, and the arrangement of elements utilizing CNN.

CHAPTER 6
CONCLUSIONS

This paper proposed a decentralized electronic democratic framework to create


and work with the internet casting a ballot cycle for races and mandates in light
of the IoT with Ethereum blockchain innovation, which thus attempts to
guarantee that clients' information are shielded from altering and assurance
respectability of casting a ballot interaction. The framework chips away at both
administrative and private establishments, and expected to dispose of
conventional strategies and further develop the electronic democratic cycle, to
lessen costs, set aside cash, time and exertion. Framework ensures that the
person who cast the vote is a similar citizen and no other person, through the
constituent card number and the one-time secret phrase check (OTP), as well as
the one-day secret word confirmation (ODP) and furthermore the biometric
check which is a unique finger impression of an elector contrasted and his/her
information in the public authority. Confirmation by finger impression, (OTP)
and (ODP) is required just while deciding on administrative decisions, while in
mandates or polls, whether in legislative or private organizations, the unique
mark check process isn't needed. We try to foster this framework by adding
different devices for check, like the finger impression sensors that exists in
telephones, to make the democratic cycle a lot more straightforward.

REFERENCES

[1] D. Springall et al., “Security Analysis of the Estonian Internet Voting


System,” Proc. 21st ACM Conf. Comput. Commun. Secur., no. May, p. 12,
2019.
[2] U. S. V. Foundation, “The Future of Voting,” The Future of Voting, 2021.
[Online]. Available: https://www.usvotefoundation.org/e2e‐viv/summary.
[3] “The FREAK Attack,” The FREAK Attack, 2020.
[Online]. Available: https://censys.io/blog/freak.
[4] D. Adrian et al., “Imperfect Forward Secrecy: How Diffie‐ Hellman Fails
in Practice,” in Proceedings of the 22Nd ACM SIGSAC Conference on
Computer and Communications Security, 2019, pp. 5–17.
[5] X. Wang and H. Yu, “How to Break MD5 and Other Hash Functions,” Adv.
Cryptol. – EUROCRYPT 2005, pp. 19–35, 2019. PANIZO ET AL.: E-VOTING
SYSTEM EVALUATION BASED ON THE COUNCIL OF EUROPE
RECOMMENDATIONS: HELIOS VOTING 11
[6] S. Goldwasser and Y. Tauman, “On the (In)security of the Fiat‐Shamir
Paradigm,” Focs, 2020.
[7] D. Achenbach, C. Kempka, C. Kempka, B. Löwe, and J. Müller‐Quade,
“Improved Coercion‐Resistant Electronic Elections through Deniable Re‐
Voting,” USENIX J. Elect. Technol. Syst., vol. 3, no. 2, pp. 26–45, 2019.
[8] “Russian Atack Report,” 2020.
Reviewer comments and queries from first review:
 To work more on the literature review
 Methodology and presentation are so good
 To work more on the technical part of the project

Reviewer comments and queries from second review:


 Setting only two default Cascade recognition would be correct or not.
 To add more data that is been stored in the local files.
 To map with as many libraries so the user experience would be better.

Individual contribution of PRAVEEN G:

 I have collected the information about the disadvantages of the electronic


voting machine

 I have designed the e-voting website using the html, css, bootstrap for
front end

 I have used PHP for the backend process.

 In the website we display the how many candidates are there and display
the leading candidate party

Individual contribution of PRABHAKARAN R:

 Researched about blockchain networks


 Implemented the core concept of blockchain using php
 Have done front end HTML, CSS

Individual contribution of SURESH KRISHNAN R:

 Analysed the methods and Algorithms used in the previous paper and
identified the drawbacks from those publications.
 I have collected the information about the hardware
 I have in IoT and Hardware
 I have collected the information about project

You might also like