CFP last date
20 December 2024
Reseach Article

E-Voting System based on Mobile using NIC and SIM

by Balaji Ghate, Satish Talewar, Sanket Taware, J. V. Katti
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 8
Year of Publication: 2017
Authors: Balaji Ghate, Satish Talewar, Sanket Taware, J. V. Katti
10.5120/ijca2017913957

Balaji Ghate, Satish Talewar, Sanket Taware, J. V. Katti . E-Voting System based on Mobile using NIC and SIM. International Journal of Computer Applications. 165, 8 ( May 2017), 9-13. DOI=10.5120/ijca2017913957

@article{ 10.5120/ijca2017913957,
author = { Balaji Ghate, Satish Talewar, Sanket Taware, J. V. Katti },
title = { E-Voting System based on Mobile using NIC and SIM },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 8 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number8/27592-2017913957/ },
doi = { 10.5120/ijca2017913957 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:11:52.539653+05:30
%A Balaji Ghate
%A Satish Talewar
%A Sanket Taware
%A J. V. Katti
%T E-Voting System based on Mobile using NIC and SIM
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 8
%P 9-13
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile is emerging technology and center of attraction for worldwide end-user. The proposed system suggest solution called mobile voting application to solve geographical restriction for casting vote and to avoid complexity and standing in a queue for the longer time. The security is an important concern in any voting system. This system provides security by applying the authentication. User’s identity issue is solved by secure authentication strategy. The primary goal of authentication is a prevention of any unauthenticated person from duplicating various users. The proposed system uses encryption technique to store the user's information into the encrypted form to achieve a greater level of security. The application protocol consists of three phases. The first phase is voter registration, the second phase is vote casting and vote collecting and the third phase is result phase. For authentication of authorizing end-user, the application generates 4 digit pin from NIC(National Identification Code) and SIM(Subscriber Identity Module). The purposed protocol provides secure and efficient voting approach. Vote Encryption is done using AES Encryption algorithm.

References
  1. Hayam. A. Annie, “E-Voting Protocol Based On Public-Key Cryptography,” International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011.
  2. Hemlata Sahu, Anupam Choudhary, “Polling System Using GSM Facility”, International Journal of Scientific & Engineering Research Volume 2, Issue 10, Oct-2011.
  3. risha Patel, Maitri Chokshi, Nikhil Shah, “Smart Device Based Election Voting System Endorsed through Face Recognition”, International Journal of Advance Research in Computer Science and Software Engineering, Volume 3, Issue 11, November 2013
  4. K. Kim, and D. Hong, “Electronic Voting System using Mobile Terminal,” World Academy of Science, Engineering and Technology, pp. 33-37, 2007Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. H. Shaun, and A. Choudhary, “Intelligent Polling System Using GSM Technology,” International Journal of Engineering Science, vol. 3, 2011Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption security Authentication NIC SIM.