a case study on secured embedded voting system using biometric · interesting project which uses...
TRANSCRIPT
http://www.iaeme.com/IJCIET/index.asp 313 [email protected]
International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 7, July 2017, pp. 313–325, Article ID: IJCIET_08_07_034
Available online at http:// http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=8&IType=7
ISSN Print: 0976-6308 and ISSN Online: 0976-6316
© IAEME Publication Scopus Indexed
A CASE STUDY ON SECURED EMBEDDED
VOTING SYSTEM USING BIOMETRIC
M Srinivasa Rao, A. Venkata Siva Rao
Department of Computer Science and Engineering,
MLR Institute of Technology, Hyderabad, India
P Venkata Hemanth
Department of Computer Science and Engineering,
Vardhaman College of Engineering, Hyderabad, India
ABSTRACT In the Paper, Embedded Voting System using AT89S52 Microcontroller is an
interesting project which uses 89S52 microcontroller as its brain. The paper is designed
for three contestants. Voters can pull their vote to any one of the contestant. A polling
officer switch is provided to avoid multiple polling of a single voter as a reset button.
Every voter should get approval from the polling officer, namely the enrollment. If the
polling officer issues approval with his control switch which is the identification
process, then only a voter can pull his vote. This issuance of approval is indicated by a
16*2 LED display. A switch is provided to count and display the total number of vote’s
polled and individual contestant-vise votes polled. If this switch is pressed, the polling
process cannot continue. A buzzer is provided for audio effect of switch bounce.
Whenever a switch is bounced, the system acknowledges the bounce by a short beep
sound, like whenever there arises the issue like re-voting and also if the fingerprint is
not recognized properly in a correct way. There is primarily a step-down transformer
which converts from 230/5V and supply the voltage evenly across the whole board.
Key words: Microcontroller, Biometric, RFID, Fingerprint
Cite this Article: M Srinivasa Rao, Venkata Siva Rao A and P Dayaker, A Case Study
On Secured Embedded Voting System Using Biometric, International Journal of Civil
Engineering and Technology, 8(7), 2017, pp. 313–325.
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=7
1. INTRODUCTION
India is world's biggest majority rules system. It is seen to be magnetic one as it suits social,
provincial, monetary, social incongruities and still can remain all alone. Principal appropriate
to vote or just voting in decisions frame the premise of Indian majority rules system. In India,
every single prior decision is in state races or focus races a voter used to cast his/her vote to
M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth
http://www.iaeme.com/IJCIET/index.asp 314 [email protected]
his/her most loved competitor by setting the stamp against his/her name and after that collapsing
the ticket paper according to an endorsed technique before placing it in the Ballot box.
This circumstance proceeded till decision scene was totally changed by electronic voting
machine. No more vote paper, voting stations, stamping, and so on this dense into a basic box
called the tally unit of the electronic voting machine. EVM is fit for spring impressive printing
stationery and transport of vast volumes of constituent material. It is anything but difficult to
transport, store, and keep up. It totally precludes the shot of invalid votes. It is likewise Eco-
accommodating. It comprises of one LCD, a unique finger impression module, a vote cast
board, a competitor board, a signal and several switches and so forth. This venture depends on
C dialect programming. The product stage utilized as a part of this venture is KEIL C Compiler
Fingerprint Based Voting Machine
The complete Voting machine consists mainly of two units -
• Control Unit
• Balloting Unit
A Balloting Unit cooks up to 3 applicants. The control unit is kept with the Presiding Officer
and the Balloting Unit is utilized by the voter for surveying. The Balloting Unit of EVM is a
little Box-like gadget, on top of which every hopeful and his/her decision image are recorded
like a major ticket paper. Against every competitor's name, a catch is given. The voter surveys
his vote by squeezing the catch against the name of his coveted applicant.
These use unique mark acknowledgment innovation to enable access to just those
fingerprints you pick. It contains all the fundamental gadgets to enable you to store, erase, and
check finger [1,6,7] prints with simply the touch of a catch. Put away fingerprints are held even
in the case of finish control disappointment or battery deplete. These dispense with the
requirement for monitoring keys or recollecting a mix secret key, or PIN. It must be opened
when an approved client is available since there are no keys or blends to be duplicated or stolen
or bolts that can be picked. The principle point in outlining this item is to give the idea of the
individual personality of every person. This venture analyzes strategy in regards to the
electronic methodologies and advancements towards electronic information stockpiling and the
transmission. The client needs to demonstrate his voter ID card at whatever point he goes to the
surveying stall to survey his vote. Accordingly, to stay away from this sort of issues, we have
planned a finger print[1] based voting machine where the individual no compelling reason to
convey his ID which contains his whole subtle elements. This Fingerprint per user peruses the
subtle elements from the tag. This information is passed to the controlling unit for the
confirmation. The controller peruses the information from the per user and contrasts this
information and the effectively existing information. In the event that the information matches
with the as of now put away data, the individual is permitted to survey his vote. If not, a message
is shown on LCD and the individual is not permitted to survey his vote. The surveying
component does physically utilize the switches. LCD is utilized to show the related messages.
The venture requests the client to present his Fingerprint at the surveying stall. The venture
utilizes the Fingerprint innovation and Embedded Systems to outline this application. The
primary target of this venture is to plan a framework that requests that the client demonstrates
his Fingerprint as personality evidence. The Fingerprint based electronic voting machine
framework peruses the information from the Fingerprint and confirms this information with the
as of now put away information in its database. On the off chance that the subtle elements show
in the information base it matches with the put away information, the framework enables the
individual to go into and survey his vote. In the event that the points of interest of the Finger
don't coordinate with the put away information, the framework instantly actuates the show and
A Case Study On Secured Embedded Voting System Using Biometric
http://www.iaeme.com/IJCIET/index.asp 315 [email protected]
the security specialists can come and make the further move. This venture is a gadget that
gathers information from the tag and codes the information into an arrangement that can be
comprehended by the controlling segment. This framework additionally gathers data from the
race gadget and actualizes summons that is coordinated by the ace. The goal of the venture is
to build up a microcontroller based security and ready framework. It comprises of a Fingerprint
per user, microcontroller, the interfacing unit to permit the correspondence between the
microcontroller and Fingerprint module [8], and the LCD.
2. BACKGROUND SURVEY
This system is being developed for use by everyone with a simple and self-explanatory GUI.
This is software that can be used by people to vote in an election. All the user must do login
according to their regional languages and click on his favorable candidates to register his vote.
The development and testing is done on Ethernet. While online voting system[9] has been an
active area of research in recent years, the use of insecure Internet, well documented cases of
incorrect implementations reported recently. These challenges are to be resolved so that public
should cast their vote in secure and convenient way. People can cast their votes efficiently,
faster and also maintain confidentiality at the same time. Proposed online voting system is a
system by which any Voter can use his/her voting right from anywhere in country, online voting
[2, 10] system contains.
• Voter’s Names with ID and password.
• Voter’s information in database.
• Voter’s language information.
• Voter’s e-mail address.
• Voter’s telephone number.
• Voter’s vote in a database.
• Calculation of total number of votes.
2.1. Existing Methodology
The existing system of voting is highly manual. The election commission has laid out data
capture form that is used to register residents in their areas. A Period for registration is set to
start and end on a particular day, such a period is announced to the public using the various
mass communication medium including newspapers, TV and radio. During such a period
potential voters are expected to report to these officers in order to be registered using paper and
pen. Every potential voter fills out a form with details such as location, date of birth among
others; such an individual must be verified to be residents of that particular area. At the end of
this process, voters are registration cards are produced to be issued to voters.
2 .2. Proposed Methodology
“E-VOTING SYSTEM” is an online voting technique. In this system people who have
citizenship of India and whose age is above 18 years of age and any sex can give his\her vote
through finger print physical polling station. We have Aadhaar card for every Indian who can
legally have their all finger printts and retina scans in the database of the Indian government.
This is a database which is maintained by the Indian Government which can be linked up with
the Election Commission of India in which all the names of voters with complete information
is stored.
M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth
http://www.iaeme.com/IJCIET/index.asp 316 [email protected]
The software application and the hardware implementation help the microcontroller read
the data from the Finger print verify the data with the already stored data and take the next
action. The system is totally signed using the Finger print module and the embedded systems
technology. The Controlling unit has an application program to allow themicrocontroller
interface with the Finger print module, the reader reads the data from the tag, passes the data to
the microcontroller and the controller verifies this data with the already existing data in the
controller’s memory and then implement the commands directed by the controller section. The
performance of the design is maintained by controlling unit.
3. APPLICATIONS ON IOT
Enabling the objects in our everyday working or living environment to possibly communicate
with each other and elaborate the information collected from the surroundings will make a lot
of applications possible. The applications of IoT technologies, which are either directly
applicable or closer to our current living habituates, might be grouped into the following
domains such as –
3.1. Supply chain management
With lower cost and lower power requirement, real-time information processing technology
based on RFID and NFC in IoT will be widely used in supply chain. Accordingly, accurate and
real-time information relating to inventory of finished goods, work-in-progress, and in-transit
stages with reliable due dates would be obtained.
3.2. Transportation
Cars, buses and taxis as well as roads intersections are becoming more instrumented with
sensors, actuators, and processing power. Important information could be collected to realize
traffic control and guidance, help in the management of the depots, and provide tourists with
appropriate transportation information. One of the successful applications of IoT in
transportation is the Traffic Information Grid (TIG) implemented on Shanghai.
3.3. Health Care
TIG shields all the complexities in information collection, storage, aggregation and analysis. It
utilizes Grid technology to ingrate traffic information collected by sensors and actuators, share
traffic data and traffic resources, provide better [3].
Therefore emphasize investigation users have for a new or modified one. A system uses
simple a set of components that interactive accomplish some purpose. Systems are of two types.
4. IMPLEMENTATION
4.1. Infrastructure Requirement
� Power supply - fixed positive voltage regulator
� Fingerprint recognition module
� RS232 Communications
� Microcontroller unit
� Step-down Transformer
� Buzzer
A Case Study On Secured Embedded Voting System Using Biometric
http://www.iaeme.com/IJCIET/index.asp 317 [email protected]
� 16x2 LCD display
� EEPROM
� Switches
� Relay
4.2 Design Process
The most creative and challenging phase of the life cycle is system design. The term design
describes a final system and the process by which it is developed. It refers to the technical
specifications that will be applied in implementations the candidate system. The design may be
defined as the process of applying various techniques and principles for the purpose of defining
a device, a process or a system in sufficient details to permit its physical realization‖. The
designer’s goal is how the output is to be produced and in what format samples of the output
and input are also presented. Second input data and database files have to be designed to meet
the requirements of the proposed output. The processing phases are handled through the
program Construction and Testing. Finally, details related to justification of the system and an
estimate of the impact of the candidate system on the user and the organization are documented
and evaluated by management as a step toward implementation. The importance of software
design can be stated in a single word quality. Design [5] provides us with representations of
software that can be assessed for quality. Design is the only way that we can accurately translate
a customer’s requirements into a finished software product or system without design we risk
building an unstable system, that might fail it small changes are made or may be difficult to
test, or one who’s quality can’t be tested. So it is an essential phase in the development of a
software product.
4.2.1 Language Implementation
Embedded C Technology
The microcontroller programming will differ for each type of operating system. Even though
there are many operating systems exist such as Linux, Windows and RTOS and so on. However,
RTOS has several advantages for embedded system development. This article discusses about
basic embedded C programming to develop embedded C programming using 8051
microcontroller.
Figure 4.1 Problem solving
• LED blinking using with 8051 microcontroller
• Number Displaying on 7-segment display using 8051 microcontroller
• Timer/Counter calculations and program using 8051 microcontroller
• Serial Communication calculations and program using 8051 microcontroller
M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth
http://www.iaeme.com/IJCIET/index.asp 318 [email protected]
• Interrupt Programs using 8051 microcontroller
• Keypad Programming using 8051 microcontroller
• LCD Programming with 8051 microcontroller
Html web-page creation
Write the code in the required language for a web page in a notepad and then run in the local
host or any server to view the design.
Figure 4.2 Html code in notepad
4.2.2 Architecture
Figure 4.3 Server
A Case Study On Secured Embedded Voting System Using Biometric
http://www.iaeme.com/IJCIET/index.asp 319 [email protected]
Figure 4.4 Pin Description
Figure 4.5 Blok diagram
M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth
http://www.iaeme.com/IJCIET/index.asp 320 [email protected]
5. RESULTS
Figure 5.1 complete circuit
Figure 5.2 WELCOME message
Figure 5.3 SELECT OPTION message
The complete project kit would be
appearing in this way. Where we
can see there is a Micro-controller,
16*2 LCD display, GSM module,
Finger print module, Relay
switches, step-down transformer
and a buzzer
After the “WELCOME”
message on the display we will
have “Select Option” apllearing
on the screen indicating to choose
any one of the 3 switches provided
for enrolling, identifying and
getting the appropriate result of
the whole system.
Once we plug in the power supply,
we will get a “WELCOME”
message on the 16*2 LCD display
indicating the power is plugged-in
successfully.
A Case Study On Secured Embedded Voting System Using Biometric
http://www.iaeme.com/IJCIET/index.asp 321 [email protected]
Figure 5.4 Finger print recognizing module
Figure 5.5 ENROLLING message
Figure 5.6 IDENTIFYING message
Figure 5.7 SELECT PARTY message
Figure 5.8 Choosing the switch
By, keeping the finger on the
finger print module it reads all the
prints available by sending the
response to the LCD again for next
commands.
By, clicking the first switch we
can enroll the individual
fingerprint by showing
“Enrolling” message.
By, clicking the second switch we
can identify the fingerprint by
comparing with the enrolled prints
by showing “Identifying”
message.
Once it is identified, it displays the
“WELCOME USER: id
Select Party” Through which user is
allowed to select a party.
By, pressing the switch we are
voting one among three parties.
M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth
http://www.iaeme.com/IJCIET/index.asp 322 [email protected]
Figure 5.9 VOTE REGISTERED message
Figure 5.10 ALREADY VOTED message
Figure 5.11 ENROLL FAILED message
Figure 5.12 IDENTIFIED UNAUTHORISED message
Figure 5.13 RESULTS
We are shown with the message
for the confirmation.
“Vote Registered”
If any-one try to re-vote, by
identifying the individual’s finger
print the kit beeps with a buzzer by
showing the message.
“Already voted”
If anyone hasn’t keep their print properly
then it displays the message.
“ENROLL FAILED”
If any person tries to vote without enrolling,
then this message gets displayed.
“Identifying Unauthorized”
When we want to know the total
result count of the voters who have
polled by switch the result.
A Case Study On Secured Embedded Voting System Using Biometric
http://www.iaeme.com/IJCIET/index.asp 323 [email protected]
Figure 5.14 LCD, BUZZER, SWITCHES
Figure 5.15 STEP-DOWN TRANSFORMER
Figure 5.16 RELAY SWITCH
Figure 5.17 GSM/GPRS MODULE
The LCD display is placed in this
way along with the buzzer and the
switches.
Step-Down transformer to
decrease the voltage from 230V to
5V and supplies evenly to the
whole circuit board.
Relay helps the switches to take
own time for each and every
processing from the input to the
output.
This is the GSM module which
helps to connect to the web. We
insert a sim in it. Through which
it’s connected through the GPRS
and then it gets displayed in the
webpage.
M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth
http://www.iaeme.com/IJCIET/index.asp 324 [email protected]
Once, we are done with supplying the power to the board evenly and inserting a sim in the GSM
port, we can get the connection with the web. Our project web-link is
Figure 5.18 FRONT PAGE FOR THE WEB-LINK FOR THE VOTING SYSTEM [4]
Once we login into the page by providing the details, we will be able to see all the activities
done and the time along with the user-id, date.
We can also see the candidates who have tried rigging also.
Figure 5.19 AFTER OPENING THE WEB-LINK, WE WILL BE ABLE TO ACCESS THE
PREVIOUSLY LOADED DATA
A Case Study On Secured Embedded Voting System Using Biometric
http://www.iaeme.com/IJCIET/index.asp 325 [email protected]
6. CONCLUSION & FUTURE ENAHACEMENT
For over a century, fingerprints have been one of the most highly used methods for human
recognition. Automated biometric systems have only been available in recent years. This work
is successfully implemented and evaluated four different models and PC based electronic voting
system. The arrived results were significant and more comparable. It proves the fact that the
fingerprint image enhancement step will certainly improve the verification performance of the
fingerprint based recognition system.
The best enhancement technique Gabor is used to enhance the fingerprints for electronic
voting and the report of the pilot study for students’ election shown the better accuracy. By the
use of this PC based voting system, the student’s representative is elected in a proper way with
high security. Because fingerprints have a generally broad acceptance with the general public,
law enforcement and the forensic.
REFERENCES
[1] I. F. Akyildiz, O. B. Akan, C. Chen, J. Fang, and W. Su, “Biometrics Internet” State-of-the-
art and research challenges
[2] AH Feras, KH Mutaz, and MA Khairall. New applied e-voting system. Journal of
Theoretical and Applied Information Technology, 25(2):88-97, 2011.
[3] P Dayaker, Y Madan Reddy, M Bhargav Kumar, A Survey on Applications and Security
Issues of Internet of Things (IOT), International Journal of Mechanical Engineering
&Technology, ISSN 0976-6359 (online) , Volume 8, Issue 6, Pg.No 641-648 , July 2017.
[4] GO Ofori-Dwumfuo and E Paatey. The design of an electronic voting system. Research
Journal of Information Technology, 3(2):91-98, 2011.
[5] Peter Gabriel Neumann, On hierarchical design of computer systems for critical
applications. Software Engineering, IEEE Transactions on, (9):905-920, 1986.
[6] Anil K. Jain and David maltoni. , Handbook of Fingerprint Recognition, Springer-verlag
New York, Inc., Secaucus, NJ, USA, 2003
[7] Ashbaugh D. R., Quantitative-Qualitative Friction Ridge Analysis: An Introduction to basic
and advanced Ridgeology. CRC Press, 1999
[8] Bahuguna R., Fingerprint Verification using Hologram matched filterings, Biometric
Consortium Eighth Meeting, San Jose, CA, 1996.
[9] Ashraf Darwish, AliaaYoussif, MagidAlgendy, and Eman Mohamed, A Secure and Robust
Prototype For Electronic Voting System, Volume 3, Issue 3, October - December (2012),
pp. 510-519, International Journal of Computer Engineering and Technology.
[10] Feroz Morab, Sadiya Thazeen, Mohamed Najmus Saqhib and Seema Morab, Efficacious
Electronic Voting Using Biometry, Volume 5, Issue 10, October (2014), pp. 32-40,
International Journal of Computer Engineering and Technology
[11] California Internet Voting Task Force. A Report on the Feasibility of Internet Voting,
Jan.2000. http://www.ss.ca.gov/executive/ivote/
[12] Coetzee L. and Botha E.C., Fingerprint Recognition in low quality images, Pattern
Recognition, Vol.26, No.10, pages. 1441-1460, 1993.