Biometric E-Voting System for Cybersecurity

The manual voting system currently witnessed across Africa elections can now be carried out electronically. History has shown that an E-based voting system provides efficiency, accuracy, compliance, ease, and security. The developed Biometric E-Voting system (BIO-EVS) has the ability to prevent opportunities for fraud and protects voters’ privacy. The voting protocol designed for this system coalesced all the benefits of the existing protocols and techniques while at the same time, removing most of the known deficiencies and harms of the present system. The artificial intelligence (AI) pattern recognition and the cyber security algorithms for encryption and decryption of data where adapted in this research. Specifically, there are two-way approach at design stage of the new system namely the preliminary and detailed design stages. During the preliminary design stage, some important features of the system and the inherent cost of implementation were estimated adequately. This will guide Independent National Electoral Commission (INEC) in appropriating the allocation of resources. There is also provision for capital and content insurance cover against the fear of manipulation by electoral officials. Overall, the impact of BIO-EVS was discovered to be substantial, as the Independent National Electoral Commission, State electoral bodies in charge of local government elections, and Educational Institutions can adopt and promote this system of voting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic €32.70 /Month

Buy Now

Price includes VAT (France)

eBook EUR 213.99 Price includes VAT (France)

Softcover Book EUR 263.74 Price includes VAT (France)

Hardcover Book EUR 263.74 Price includes VAT (France)

Tax calculation will be finalised at checkout

Purchases are for personal use only

Similar content being viewed by others

A Biometric Based Design Pattern for Implementation of a Security Conscious E-Voting System Using Cryptographic Protocols

Chapter © 2013

Biometric Voting System

Chapter © 2020

A Review of Smart Electronic Voting Machine

Chapter © 2022

References

  1. Downs, Anthony. (1957). An economic theory of democracy. New York: Harper Collins Publishers. Google Scholar
  2. Enelow, J., & Hinich, M. (1990). Advances in the spatial theory of voting. New York: Cambridge University Press. BookGoogle Scholar
  3. Brody, R., & Page, B. (1972). Comment: The assessment of policy voting. American Political Science Review,66(2), 450–458. ArticleGoogle Scholar
  4. Carmines, E., & Stimson, J. (1980). The two faces of issue voting. American Political Science Review,74(1), 78–91. ArticleGoogle Scholar
  5. Granberg, D., & Holmberg, S. (1988). The political system matters: Social psychology and voting behavior in Sweden and the United States. Cambridge: Cambridge University Press. Google Scholar
  6. Merrill, S., & Grofman, B. (1999). A unified theory of voting: Directional and proximity spatial models. Cambridge: Cambridge University Press. BookGoogle Scholar
  7. INEC Nigeria. (2019). Voting guidelines for general elections. Accessed/retrieved from www.inecnigeria.org on 02-05-2019.
  8. Nation Newspapers. (2016). Voting fraud as former Petroleum Minister bribes INEC Commissioners with N23.3B for 2016 elections. Accessed/retrieved from www.thenationonlineng.net on 28-04-2016.
  9. Eli, B. (2018). A fast new DES implementation in software. In Cracking DES: Secrets of encryption research, wiretap politics, and chip design (p. 234). Electronic Frontier Foundation. Google Scholar
  10. Abayomi-Zannu, T. P., Odun-Ayo, I., Tatama, B. F., & Misra, S. (2020). Implementing a mobile voting system utilizing blockchain technology and two-factor authentication in Nigeria. In P. Singh, W. Pawłowski, S. Tanwar, N. Kumar, J. Rodrigues, & M. Obaidat, (Eds.) Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). Lecture notes in networks and systems (Vol. 121). Springer. https://doi.org/10.1007/978-981-15-3369-3_63.
  11. Assibong, P. A., Wogu, I. A. P., Misra, S., & Makplang, D. (2020). The utilization of the biometric technology in the 2013 Manyu division legislative and municipal elections in cameroon: an appraisal. In T. Sengodan, M. Murugappan, & S. Misra, (Eds.) Advances in electrical and computer technologies. Lecture notes in electrical engineering (Vol. 672). Springer. https://doi.org/10.1007/978-981-15-5558-9_32.
  12. Yavuz, E., Koc, A. K., Cabuk, U. C., & Dalkilic, G. (2018). Towards secure e-voting using Ethereum blockchain. In 6th International Symposium on Digital Forensic and Security (ISDFS) (pp. 1–7). IEEE. Google Scholar
  13. Purandare, H. V., Saini, A. R., Pereira, F. D., Mathew, B., & Patil, P. S. (2018). Application for online voting system using android device. In International Conference on Smart City and Emerging Technology (ICSCET) (pp. 1–5). IEEE. Google Scholar
  14. Olanrewaju, L., Oyebiyi, O., Misra, S., Maskeliunas, R., & Damasevicius, R. (2020). Secure ear biometrics using circular kernel principal component analysis, Chebyshev transform hashing and Bose–Chaudhuri–Hocquenghem error-correcting codes. Signal, Image and Video Processing, 1–9. Google Scholar
  15. Donald. (2016). Uncommon criteria of computer application (Vol. 45(1)). Inside Risks Communications of the Association for Computing Machinery. Google Scholar
  16. Alfred, J., Menezes, C., & Scott, A. (2017). Handbook of applied cryptography (p. 23P). Boca Raton: CRC Press. Google Scholar
  17. Don, C. (2018). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38(3), 243–250. Google Scholar
  18. Eli, B., & Alex, B. (1996). An improvement of davies’ attack on DES. J. Cryptology, 10(3), 195–206. Google Scholar
  19. Miles, E., Smid, T., & Dennis, K. (2018). The data encryption standard: Past and future, the science of information integrity (Vol. 8(5)). IEEE Press. Google Scholar
  20. Scharch, G., Carthy, C. H., & Quisquater, L. (2018). Multiple module testing approximations of crypto algorithms (p. 244P). Texas: Global Publishers. Google Scholar
  21. Pascal, J. (2001). On the complexity of Matsui’s attack. Selected Areas in Cryptography, 199–211. Google Scholar
  22. Biham, E. (1997). A fast new DES implementation in software, FSE ’97, LNCS (Vol. 1267, pp. 280–272). Springer. Google Scholar
  23. Rebecca, M. (2016). The business of elections. In 3rd Conference on Computers, Freedom and Privacy (Vol. 14(8), p. 122). Google Scholar
  24. Rebecca, M. (2017). Threats to suffrage security. In 16th National Computer Security Conference (p. 34). Google Scholar
  25. Rebecca M., & Peter N. (2017). Internet and electronic voting. In The risks digest, ACM committee on computers and public policy (Vol. 21(14)). Google Scholar
  26. Steven, L. (2018). Crypto: How the code rebels beat the government saving privacy in the digital age. ISBN 0-14-024432-8.9. Google Scholar
  27. Eli, B., & Adi, S. (2018). Differential cryptanalysis of the data encryption standard. Springer. ISBN 0-387-97930-1, ISBN 3-540-97930-1. Google Scholar
  28. John, B. (2017). Cryptographic algorithms for protection of computer data during transmission and dormant storage. Federal Register, 38(93). Google Scholar
  29. Burton, S., & Matthew, J. B. (2017). Linear cryptanalysis using multiple approximations (pp. 26–39). Gilly Press. Google Scholar
  30. Davis, W., & Prince, W. (2017). Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer (2nd ed., p. 90). Wiley. Google Scholar
  31. Carl, H., & Stephen, M. (2018). Cryptography: A new dimension in computer data security (p. 22). Wiley. Google Scholar
  32. Bruce, A., Canniere, C. D., & Quisquater, M. (2018). On multiple linear approximations of Crypto algorithms (p. 244P). Texas: Global Publishers. Google Scholar
  33. Rebecca, M. (2016). The FEC proposed voting systems standard update: a detailed comment submitted to the Federal Election Commission on in accordance with Federal Register FEC Notice 2016-9 (Vol. 66(132)). Google Scholar
  34. Rebecca, M. (2016). Computer security: Quality rather than quantity. Communications of the Association for Computing Machinery, 45(10). Google Scholar
  35. Mitsuru, M. (2018). The first experimental cryptanalysis of the data encryption standard (pp. 1–11). CRYPTO. Google Scholar
  36. Rebecca, M. (2016). Corrupted polling: Inside risks. Communications of the Association for Computing Machinery, 36(11). Google Scholar
  37. Douglas, R. (2017). Cryptography: Theory and practice (p. 153). CRC Press. Google Scholar
  38. Rebecca, M. (2016). A better ballot box. Institute of Electrical and Electronics Engineers Spectrum, 39(10). Google Scholar
  39. Rebecca, M. (2016). Explanation of voter-verified ballot systems. ACM Software Engineering Notes, 27(5). Also published in The risks digest, ACM committee on computers and public policy, 24 July 2016 (Vol. 22(17). Archived at http://catless.ncl.ac.uk/Risks/22.17.html.
  40. Paul, C., & Stephen, W. (2018). Critical election or frozen cleavages? How voters chose parties in the 2014 Ukrainian Parliamentary election. 56, 158–169. Google Scholar

Author information

Authors and Affiliations

  1. University of Lagos, Akoka, Lagos, Nigeria Chijioke Aniche & Chika Yinka-Banjo
  2. Alex Ekwueme Federal University of Ndufu-Alike, Abakaliki, Ebonyi State, Nigeria Precious Ohalete
  3. Coevnant University, Ota, Nigeria Sanjay Misra
  1. Chijioke Aniche