Biometric E-Voting System for Cybersecurity
The manual voting system currently witnessed across Africa elections can now be carried out electronically. History has shown that an E-based voting system provides efficiency, accuracy, compliance, ease, and security. The developed Biometric E-Voting system (BIO-EVS) has the ability to prevent opportunities for fraud and protects voters’ privacy. The voting protocol designed for this system coalesced all the benefits of the existing protocols and techniques while at the same time, removing most of the known deficiencies and harms of the present system. The artificial intelligence (AI) pattern recognition and the cyber security algorithms for encryption and decryption of data where adapted in this research. Specifically, there are two-way approach at design stage of the new system namely the preliminary and detailed design stages. During the preliminary design stage, some important features of the system and the inherent cost of implementation were estimated adequately. This will guide Independent National Electoral Commission (INEC) in appropriating the allocation of resources. There is also provision for capital and content insurance cover against the fear of manipulation by electoral officials. Overall, the impact of BIO-EVS was discovered to be substantial, as the Independent National Electoral Commission, State electoral bodies in charge of local government elections, and Educational Institutions can adopt and promote this system of voting.
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
Subscribe and save
Springer+ Basic
€32.70 /Month
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (France)
eBook EUR 213.99 Price includes VAT (France)
Softcover Book EUR 263.74 Price includes VAT (France)
Hardcover Book EUR 263.74 Price includes VAT (France)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
A Biometric Based Design Pattern for Implementation of a Security Conscious E-Voting System Using Cryptographic Protocols
Chapter © 2013
Biometric Voting System
Chapter © 2020
A Review of Smart Electronic Voting Machine
Chapter © 2022
References
- Downs, Anthony. (1957). An economic theory of democracy. New York: Harper Collins Publishers. Google Scholar
- Enelow, J., & Hinich, M. (1990). Advances in the spatial theory of voting. New York: Cambridge University Press. BookGoogle Scholar
- Brody, R., & Page, B. (1972). Comment: The assessment of policy voting. American Political Science Review,66(2), 450–458. ArticleGoogle Scholar
- Carmines, E., & Stimson, J. (1980). The two faces of issue voting. American Political Science Review,74(1), 78–91. ArticleGoogle Scholar
- Granberg, D., & Holmberg, S. (1988). The political system matters: Social psychology and voting behavior in Sweden and the United States. Cambridge: Cambridge University Press. Google Scholar
- Merrill, S., & Grofman, B. (1999). A unified theory of voting: Directional and proximity spatial models. Cambridge: Cambridge University Press. BookGoogle Scholar
- INEC Nigeria. (2019). Voting guidelines for general elections. Accessed/retrieved from www.inecnigeria.org on 02-05-2019.
- Nation Newspapers. (2016). Voting fraud as former Petroleum Minister bribes INEC Commissioners with N23.3B for 2016 elections. Accessed/retrieved from www.thenationonlineng.net on 28-04-2016.
- Eli, B. (2018). A fast new DES implementation in software. In Cracking DES: Secrets of encryption research, wiretap politics, and chip design (p. 234). Electronic Frontier Foundation. Google Scholar
- Abayomi-Zannu, T. P., Odun-Ayo, I., Tatama, B. F., & Misra, S. (2020). Implementing a mobile voting system utilizing blockchain technology and two-factor authentication in Nigeria. In P. Singh, W. Pawłowski, S. Tanwar, N. Kumar, J. Rodrigues, & M. Obaidat, (Eds.) Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). Lecture notes in networks and systems (Vol. 121). Springer. https://doi.org/10.1007/978-981-15-3369-3_63.
- Assibong, P. A., Wogu, I. A. P., Misra, S., & Makplang, D. (2020). The utilization of the biometric technology in the 2013 Manyu division legislative and municipal elections in cameroon: an appraisal. In T. Sengodan, M. Murugappan, & S. Misra, (Eds.) Advances in electrical and computer technologies. Lecture notes in electrical engineering (Vol. 672). Springer. https://doi.org/10.1007/978-981-15-5558-9_32.
- Yavuz, E., Koc, A. K., Cabuk, U. C., & Dalkilic, G. (2018). Towards secure e-voting using Ethereum blockchain. In 6th International Symposium on Digital Forensic and Security (ISDFS) (pp. 1–7). IEEE. Google Scholar
- Purandare, H. V., Saini, A. R., Pereira, F. D., Mathew, B., & Patil, P. S. (2018). Application for online voting system using android device. In International Conference on Smart City and Emerging Technology (ICSCET) (pp. 1–5). IEEE. Google Scholar
- Olanrewaju, L., Oyebiyi, O., Misra, S., Maskeliunas, R., & Damasevicius, R. (2020). Secure ear biometrics using circular kernel principal component analysis, Chebyshev transform hashing and Bose–Chaudhuri–Hocquenghem error-correcting codes. Signal, Image and Video Processing, 1–9. Google Scholar
- Donald. (2016). Uncommon criteria of computer application (Vol. 45(1)). Inside Risks Communications of the Association for Computing Machinery. Google Scholar
- Alfred, J., Menezes, C., & Scott, A. (2017). Handbook of applied cryptography (p. 23P). Boca Raton: CRC Press. Google Scholar
- Don, C. (2018). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38(3), 243–250. Google Scholar
- Eli, B., & Alex, B. (1996). An improvement of davies’ attack on DES. J. Cryptology, 10(3), 195–206. Google Scholar
- Miles, E., Smid, T., & Dennis, K. (2018). The data encryption standard: Past and future, the science of information integrity (Vol. 8(5)). IEEE Press. Google Scholar
- Scharch, G., Carthy, C. H., & Quisquater, L. (2018). Multiple module testing approximations of crypto algorithms (p. 244P). Texas: Global Publishers. Google Scholar
- Pascal, J. (2001). On the complexity of Matsui’s attack. Selected Areas in Cryptography, 199–211. Google Scholar
- Biham, E. (1997). A fast new DES implementation in software, FSE ’97, LNCS (Vol. 1267, pp. 280–272). Springer. Google Scholar
- Rebecca, M. (2016). The business of elections. In 3rd Conference on Computers, Freedom and Privacy (Vol. 14(8), p. 122). Google Scholar
- Rebecca, M. (2017). Threats to suffrage security. In 16th National Computer Security Conference (p. 34). Google Scholar
- Rebecca M., & Peter N. (2017). Internet and electronic voting. In The risks digest, ACM committee on computers and public policy (Vol. 21(14)). Google Scholar
- Steven, L. (2018). Crypto: How the code rebels beat the government saving privacy in the digital age. ISBN 0-14-024432-8.9. Google Scholar
- Eli, B., & Adi, S. (2018). Differential cryptanalysis of the data encryption standard. Springer. ISBN 0-387-97930-1, ISBN 3-540-97930-1. Google Scholar
- John, B. (2017). Cryptographic algorithms for protection of computer data during transmission and dormant storage. Federal Register, 38(93). Google Scholar
- Burton, S., & Matthew, J. B. (2017). Linear cryptanalysis using multiple approximations (pp. 26–39). Gilly Press. Google Scholar
- Davis, W., & Prince, W. (2017). Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer (2nd ed., p. 90). Wiley. Google Scholar
- Carl, H., & Stephen, M. (2018). Cryptography: A new dimension in computer data security (p. 22). Wiley. Google Scholar
- Bruce, A., Canniere, C. D., & Quisquater, M. (2018). On multiple linear approximations of Crypto algorithms (p. 244P). Texas: Global Publishers. Google Scholar
- Rebecca, M. (2016). The FEC proposed voting systems standard update: a detailed comment submitted to the Federal Election Commission on in accordance with Federal Register FEC Notice 2016-9 (Vol. 66(132)). Google Scholar
- Rebecca, M. (2016). Computer security: Quality rather than quantity. Communications of the Association for Computing Machinery, 45(10). Google Scholar
- Mitsuru, M. (2018). The first experimental cryptanalysis of the data encryption standard (pp. 1–11). CRYPTO. Google Scholar
- Rebecca, M. (2016). Corrupted polling: Inside risks. Communications of the Association for Computing Machinery, 36(11). Google Scholar
- Douglas, R. (2017). Cryptography: Theory and practice (p. 153). CRC Press. Google Scholar
- Rebecca, M. (2016). A better ballot box. Institute of Electrical and Electronics Engineers Spectrum, 39(10). Google Scholar
- Rebecca, M. (2016). Explanation of voter-verified ballot systems. ACM Software Engineering Notes, 27(5). Also published in The risks digest, ACM committee on computers and public policy, 24 July 2016 (Vol. 22(17). Archived at http://catless.ncl.ac.uk/Risks/22.17.html.
- Paul, C., & Stephen, W. (2018). Critical election or frozen cleavages? How voters chose parties in the 2014 Ukrainian Parliamentary election. 56, 158–169. Google Scholar
Author information
Authors and Affiliations
- University of Lagos, Akoka, Lagos, Nigeria Chijioke Aniche & Chika Yinka-Banjo
- Alex Ekwueme Federal University of Ndufu-Alike, Abakaliki, Ebonyi State, Nigeria Precious Ohalete
- Coevnant University, Ota, Nigeria Sanjay Misra
- Chijioke Aniche