13
http://www.iaeme.com/IJCIET/index.asp 313 [email protected] International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 7, July 2017, pp. 313–325, Article ID: IJCIET_08_07_034 Available online at http:// http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=8&IType=7 ISSN Print: 0976-6308 and ISSN Online: 0976-6316 © IAEME Publication Scopus Indexed A CASE STUDY ON SECURED EMBEDDED VOTING SYSTEM USING BIOMETRIC M Srinivasa Rao, A. Venkata Siva Rao Department of Computer Science and Engineering, MLR Institute of Technology, Hyderabad, India P Venkata Hemanth Department of Computer Science and Engineering, Vardhaman College of Engineering, Hyderabad, India ABSTRACT In the Paper, Embedded Voting System using AT89S52 Microcontroller is an interesting project which uses 89S52 microcontroller as its brain. The paper is designed for three contestants. Voters can pull their vote to any one of the contestant. A polling officer switch is provided to avoid multiple polling of a single voter as a reset button. Every voter should get approval from the polling officer, namely the enrollment. If the polling officer issues approval with his control switch which is the identification process, then only a voter can pull his vote. This issuance of approval is indicated by a 16*2 LED display. A switch is provided to count and display the total number of vote’s polled and individual contestant-vise votes polled. If this switch is pressed, the polling process cannot continue. A buzzer is provided for audio effect of switch bounce. Whenever a switch is bounced, the system acknowledges the bounce by a short beep sound, like whenever there arises the issue like re-voting and also if the fingerprint is not recognized properly in a correct way. There is primarily a step-down transformer which converts from 230/5V and supply the voltage evenly across the whole board. Key words: Microcontroller, Biometric, RFID, Fingerprint Cite this Article: M Srinivasa Rao, Venkata Siva Rao A and P Dayaker, A Case Study On Secured Embedded Voting System Using Biometric, International Journal of Civil Engineering and Technology, 8(7), 2017, pp. 313–325. http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=7 1. INTRODUCTION India is world's biggest majority rules system. It is seen to be magnetic one as it suits social, provincial, monetary, social incongruities and still can remain all alone. Principal appropriate to vote or just voting in decisions frame the premise of Indian majority rules system. In India, every single prior decision is in state races or focus races a voter used to cast his/her vote to

A CASE STUDY ON SECURED EMBEDDED VOTING SYSTEM USING BIOMETRIC · interesting project which uses 89S52 microcontroller as its brain. ... On Secured Embedded Voting System Using Biometric,

  • Upload
    doliem

  • View
    222

  • Download
    1

Embed Size (px)

Citation preview

http://www.iaeme.com/IJCIET/index.asp 313 [email protected]

International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 7, July 2017, pp. 313–325, Article ID: IJCIET_08_07_034

Available online at http:// http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=8&IType=7

ISSN Print: 0976-6308 and ISSN Online: 0976-6316

© IAEME Publication Scopus Indexed

A CASE STUDY ON SECURED EMBEDDED

VOTING SYSTEM USING BIOMETRIC

M Srinivasa Rao, A. Venkata Siva Rao

Department of Computer Science and Engineering,

MLR Institute of Technology, Hyderabad, India

P Venkata Hemanth

Department of Computer Science and Engineering,

Vardhaman College of Engineering, Hyderabad, India

ABSTRACT In the Paper, Embedded Voting System using AT89S52 Microcontroller is an

interesting project which uses 89S52 microcontroller as its brain. The paper is designed

for three contestants. Voters can pull their vote to any one of the contestant. A polling

officer switch is provided to avoid multiple polling of a single voter as a reset button.

Every voter should get approval from the polling officer, namely the enrollment. If the

polling officer issues approval with his control switch which is the identification

process, then only a voter can pull his vote. This issuance of approval is indicated by a

16*2 LED display. A switch is provided to count and display the total number of vote’s

polled and individual contestant-vise votes polled. If this switch is pressed, the polling

process cannot continue. A buzzer is provided for audio effect of switch bounce.

Whenever a switch is bounced, the system acknowledges the bounce by a short beep

sound, like whenever there arises the issue like re-voting and also if the fingerprint is

not recognized properly in a correct way. There is primarily a step-down transformer

which converts from 230/5V and supply the voltage evenly across the whole board.

Key words: Microcontroller, Biometric, RFID, Fingerprint

Cite this Article: M Srinivasa Rao, Venkata Siva Rao A and P Dayaker, A Case Study

On Secured Embedded Voting System Using Biometric, International Journal of Civil

Engineering and Technology, 8(7), 2017, pp. 313–325.

http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=8&IType=7

1. INTRODUCTION

India is world's biggest majority rules system. It is seen to be magnetic one as it suits social,

provincial, monetary, social incongruities and still can remain all alone. Principal appropriate

to vote or just voting in decisions frame the premise of Indian majority rules system. In India,

every single prior decision is in state races or focus races a voter used to cast his/her vote to

M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth

http://www.iaeme.com/IJCIET/index.asp 314 [email protected]

his/her most loved competitor by setting the stamp against his/her name and after that collapsing

the ticket paper according to an endorsed technique before placing it in the Ballot box.

This circumstance proceeded till decision scene was totally changed by electronic voting

machine. No more vote paper, voting stations, stamping, and so on this dense into a basic box

called the tally unit of the electronic voting machine. EVM is fit for spring impressive printing

stationery and transport of vast volumes of constituent material. It is anything but difficult to

transport, store, and keep up. It totally precludes the shot of invalid votes. It is likewise Eco-

accommodating. It comprises of one LCD, a unique finger impression module, a vote cast

board, a competitor board, a signal and several switches and so forth. This venture depends on

C dialect programming. The product stage utilized as a part of this venture is KEIL C Compiler

Fingerprint Based Voting Machine

The complete Voting machine consists mainly of two units -

• Control Unit

• Balloting Unit

A Balloting Unit cooks up to 3 applicants. The control unit is kept with the Presiding Officer

and the Balloting Unit is utilized by the voter for surveying. The Balloting Unit of EVM is a

little Box-like gadget, on top of which every hopeful and his/her decision image are recorded

like a major ticket paper. Against every competitor's name, a catch is given. The voter surveys

his vote by squeezing the catch against the name of his coveted applicant.

These use unique mark acknowledgment innovation to enable access to just those

fingerprints you pick. It contains all the fundamental gadgets to enable you to store, erase, and

check finger [1,6,7] prints with simply the touch of a catch. Put away fingerprints are held even

in the case of finish control disappointment or battery deplete. These dispense with the

requirement for monitoring keys or recollecting a mix secret key, or PIN. It must be opened

when an approved client is available since there are no keys or blends to be duplicated or stolen

or bolts that can be picked. The principle point in outlining this item is to give the idea of the

individual personality of every person. This venture analyzes strategy in regards to the

electronic methodologies and advancements towards electronic information stockpiling and the

transmission. The client needs to demonstrate his voter ID card at whatever point he goes to the

surveying stall to survey his vote. Accordingly, to stay away from this sort of issues, we have

planned a finger print[1] based voting machine where the individual no compelling reason to

convey his ID which contains his whole subtle elements. This Fingerprint per user peruses the

subtle elements from the tag. This information is passed to the controlling unit for the

confirmation. The controller peruses the information from the per user and contrasts this

information and the effectively existing information. In the event that the information matches

with the as of now put away data, the individual is permitted to survey his vote. If not, a message

is shown on LCD and the individual is not permitted to survey his vote. The surveying

component does physically utilize the switches. LCD is utilized to show the related messages.

The venture requests the client to present his Fingerprint at the surveying stall. The venture

utilizes the Fingerprint innovation and Embedded Systems to outline this application. The

primary target of this venture is to plan a framework that requests that the client demonstrates

his Fingerprint as personality evidence. The Fingerprint based electronic voting machine

framework peruses the information from the Fingerprint and confirms this information with the

as of now put away information in its database. On the off chance that the subtle elements show

in the information base it matches with the put away information, the framework enables the

individual to go into and survey his vote. In the event that the points of interest of the Finger

don't coordinate with the put away information, the framework instantly actuates the show and

A Case Study On Secured Embedded Voting System Using Biometric

http://www.iaeme.com/IJCIET/index.asp 315 [email protected]

the security specialists can come and make the further move. This venture is a gadget that

gathers information from the tag and codes the information into an arrangement that can be

comprehended by the controlling segment. This framework additionally gathers data from the

race gadget and actualizes summons that is coordinated by the ace. The goal of the venture is

to build up a microcontroller based security and ready framework. It comprises of a Fingerprint

per user, microcontroller, the interfacing unit to permit the correspondence between the

microcontroller and Fingerprint module [8], and the LCD.

2. BACKGROUND SURVEY

This system is being developed for use by everyone with a simple and self-explanatory GUI.

This is software that can be used by people to vote in an election. All the user must do login

according to their regional languages and click on his favorable candidates to register his vote.

The development and testing is done on Ethernet. While online voting system[9] has been an

active area of research in recent years, the use of insecure Internet, well documented cases of

incorrect implementations reported recently. These challenges are to be resolved so that public

should cast their vote in secure and convenient way. People can cast their votes efficiently,

faster and also maintain confidentiality at the same time. Proposed online voting system is a

system by which any Voter can use his/her voting right from anywhere in country, online voting

[2, 10] system contains.

• Voter’s Names with ID and password.

• Voter’s information in database.

• Voter’s language information.

• Voter’s e-mail address.

• Voter’s telephone number.

• Voter’s vote in a database.

• Calculation of total number of votes.

2.1. Existing Methodology

The existing system of voting is highly manual. The election commission has laid out data

capture form that is used to register residents in their areas. A Period for registration is set to

start and end on a particular day, such a period is announced to the public using the various

mass communication medium including newspapers, TV and radio. During such a period

potential voters are expected to report to these officers in order to be registered using paper and

pen. Every potential voter fills out a form with details such as location, date of birth among

others; such an individual must be verified to be residents of that particular area. At the end of

this process, voters are registration cards are produced to be issued to voters.

2 .2. Proposed Methodology

“E-VOTING SYSTEM” is an online voting technique. In this system people who have

citizenship of India and whose age is above 18 years of age and any sex can give his\her vote

through finger print physical polling station. We have Aadhaar card for every Indian who can

legally have their all finger printts and retina scans in the database of the Indian government.

This is a database which is maintained by the Indian Government which can be linked up with

the Election Commission of India in which all the names of voters with complete information

is stored.

M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth

http://www.iaeme.com/IJCIET/index.asp 316 [email protected]

The software application and the hardware implementation help the microcontroller read

the data from the Finger print verify the data with the already stored data and take the next

action. The system is totally signed using the Finger print module and the embedded systems

technology. The Controlling unit has an application program to allow themicrocontroller

interface with the Finger print module, the reader reads the data from the tag, passes the data to

the microcontroller and the controller verifies this data with the already existing data in the

controller’s memory and then implement the commands directed by the controller section. The

performance of the design is maintained by controlling unit.

3. APPLICATIONS ON IOT

Enabling the objects in our everyday working or living environment to possibly communicate

with each other and elaborate the information collected from the surroundings will make a lot

of applications possible. The applications of IoT technologies, which are either directly

applicable or closer to our current living habituates, might be grouped into the following

domains such as –

3.1. Supply chain management

With lower cost and lower power requirement, real-time information processing technology

based on RFID and NFC in IoT will be widely used in supply chain. Accordingly, accurate and

real-time information relating to inventory of finished goods, work-in-progress, and in-transit

stages with reliable due dates would be obtained.

3.2. Transportation

Cars, buses and taxis as well as roads intersections are becoming more instrumented with

sensors, actuators, and processing power. Important information could be collected to realize

traffic control and guidance, help in the management of the depots, and provide tourists with

appropriate transportation information. One of the successful applications of IoT in

transportation is the Traffic Information Grid (TIG) implemented on Shanghai.

3.3. Health Care

TIG shields all the complexities in information collection, storage, aggregation and analysis. It

utilizes Grid technology to ingrate traffic information collected by sensors and actuators, share

traffic data and traffic resources, provide better [3].

Therefore emphasize investigation users have for a new or modified one. A system uses

simple a set of components that interactive accomplish some purpose. Systems are of two types.

4. IMPLEMENTATION

4.1. Infrastructure Requirement

� Power supply - fixed positive voltage regulator

� Fingerprint recognition module

� RS232 Communications

� Microcontroller unit

� Step-down Transformer

� Buzzer

A Case Study On Secured Embedded Voting System Using Biometric

http://www.iaeme.com/IJCIET/index.asp 317 [email protected]

� 16x2 LCD display

� EEPROM

� Switches

� Relay

4.2 Design Process

The most creative and challenging phase of the life cycle is system design. The term design

describes a final system and the process by which it is developed. It refers to the technical

specifications that will be applied in implementations the candidate system. The design may be

defined as the process of applying various techniques and principles for the purpose of defining

a device, a process or a system in sufficient details to permit its physical realization‖. The

designer’s goal is how the output is to be produced and in what format samples of the output

and input are also presented. Second input data and database files have to be designed to meet

the requirements of the proposed output. The processing phases are handled through the

program Construction and Testing. Finally, details related to justification of the system and an

estimate of the impact of the candidate system on the user and the organization are documented

and evaluated by management as a step toward implementation. The importance of software

design can be stated in a single word quality. Design [5] provides us with representations of

software that can be assessed for quality. Design is the only way that we can accurately translate

a customer’s requirements into a finished software product or system without design we risk

building an unstable system, that might fail it small changes are made or may be difficult to

test, or one who’s quality can’t be tested. So it is an essential phase in the development of a

software product.

4.2.1 Language Implementation

Embedded C Technology

The microcontroller programming will differ for each type of operating system. Even though

there are many operating systems exist such as Linux, Windows and RTOS and so on. However,

RTOS has several advantages for embedded system development. This article discusses about

basic embedded C programming to develop embedded C programming using 8051

microcontroller.

Figure 4.1 Problem solving

• LED blinking using with 8051 microcontroller

• Number Displaying on 7-segment display using 8051 microcontroller

• Timer/Counter calculations and program using 8051 microcontroller

• Serial Communication calculations and program using 8051 microcontroller

M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth

http://www.iaeme.com/IJCIET/index.asp 318 [email protected]

• Interrupt Programs using 8051 microcontroller

• Keypad Programming using 8051 microcontroller

• LCD Programming with 8051 microcontroller

Html web-page creation

Write the code in the required language for a web page in a notepad and then run in the local

host or any server to view the design.

Figure 4.2 Html code in notepad

4.2.2 Architecture

Figure 4.3 Server

A Case Study On Secured Embedded Voting System Using Biometric

http://www.iaeme.com/IJCIET/index.asp 319 [email protected]

Figure 4.4 Pin Description

Figure 4.5 Blok diagram

M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth

http://www.iaeme.com/IJCIET/index.asp 320 [email protected]

5. RESULTS

Figure 5.1 complete circuit

Figure 5.2 WELCOME message

Figure 5.3 SELECT OPTION message

The complete project kit would be

appearing in this way. Where we

can see there is a Micro-controller,

16*2 LCD display, GSM module,

Finger print module, Relay

switches, step-down transformer

and a buzzer

After the “WELCOME”

message on the display we will

have “Select Option” apllearing

on the screen indicating to choose

any one of the 3 switches provided

for enrolling, identifying and

getting the appropriate result of

the whole system.

Once we plug in the power supply,

we will get a “WELCOME”

message on the 16*2 LCD display

indicating the power is plugged-in

successfully.

A Case Study On Secured Embedded Voting System Using Biometric

http://www.iaeme.com/IJCIET/index.asp 321 [email protected]

Figure 5.4 Finger print recognizing module

Figure 5.5 ENROLLING message

Figure 5.6 IDENTIFYING message

Figure 5.7 SELECT PARTY message

Figure 5.8 Choosing the switch

By, keeping the finger on the

finger print module it reads all the

prints available by sending the

response to the LCD again for next

commands.

By, clicking the first switch we

can enroll the individual

fingerprint by showing

“Enrolling” message.

By, clicking the second switch we

can identify the fingerprint by

comparing with the enrolled prints

by showing “Identifying”

message.

Once it is identified, it displays the

“WELCOME USER: id

Select Party” Through which user is

allowed to select a party.

By, pressing the switch we are

voting one among three parties.

M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth

http://www.iaeme.com/IJCIET/index.asp 322 [email protected]

Figure 5.9 VOTE REGISTERED message

Figure 5.10 ALREADY VOTED message

Figure 5.11 ENROLL FAILED message

Figure 5.12 IDENTIFIED UNAUTHORISED message

Figure 5.13 RESULTS

We are shown with the message

for the confirmation.

“Vote Registered”

If any-one try to re-vote, by

identifying the individual’s finger

print the kit beeps with a buzzer by

showing the message.

“Already voted”

If anyone hasn’t keep their print properly

then it displays the message.

“ENROLL FAILED”

If any person tries to vote without enrolling,

then this message gets displayed.

“Identifying Unauthorized”

When we want to know the total

result count of the voters who have

polled by switch the result.

A Case Study On Secured Embedded Voting System Using Biometric

http://www.iaeme.com/IJCIET/index.asp 323 [email protected]

Figure 5.14 LCD, BUZZER, SWITCHES

Figure 5.15 STEP-DOWN TRANSFORMER

Figure 5.16 RELAY SWITCH

Figure 5.17 GSM/GPRS MODULE

The LCD display is placed in this

way along with the buzzer and the

switches.

Step-Down transformer to

decrease the voltage from 230V to

5V and supplies evenly to the

whole circuit board.

Relay helps the switches to take

own time for each and every

processing from the input to the

output.

This is the GSM module which

helps to connect to the web. We

insert a sim in it. Through which

it’s connected through the GPRS

and then it gets displayed in the

webpage.

M Srinivasa Rao, A. Venkata Siva Rao and P Venkata Hemanth

http://www.iaeme.com/IJCIET/index.asp 324 [email protected]

Once, we are done with supplying the power to the board evenly and inserting a sim in the GSM

port, we can get the connection with the web. Our project web-link is

Figure 5.18 FRONT PAGE FOR THE WEB-LINK FOR THE VOTING SYSTEM [4]

Once we login into the page by providing the details, we will be able to see all the activities

done and the time along with the user-id, date.

We can also see the candidates who have tried rigging also.

Figure 5.19 AFTER OPENING THE WEB-LINK, WE WILL BE ABLE TO ACCESS THE

PREVIOUSLY LOADED DATA

A Case Study On Secured Embedded Voting System Using Biometric

http://www.iaeme.com/IJCIET/index.asp 325 [email protected]

6. CONCLUSION & FUTURE ENAHACEMENT

For over a century, fingerprints have been one of the most highly used methods for human

recognition. Automated biometric systems have only been available in recent years. This work

is successfully implemented and evaluated four different models and PC based electronic voting

system. The arrived results were significant and more comparable. It proves the fact that the

fingerprint image enhancement step will certainly improve the verification performance of the

fingerprint based recognition system.

The best enhancement technique Gabor is used to enhance the fingerprints for electronic

voting and the report of the pilot study for students’ election shown the better accuracy. By the

use of this PC based voting system, the student’s representative is elected in a proper way with

high security. Because fingerprints have a generally broad acceptance with the general public,

law enforcement and the forensic.

REFERENCES

[1] I. F. Akyildiz, O. B. Akan, C. Chen, J. Fang, and W. Su, “Biometrics Internet” State-of-the-

art and research challenges

[2] AH Feras, KH Mutaz, and MA Khairall. New applied e-voting system. Journal of

Theoretical and Applied Information Technology, 25(2):88-97, 2011.

[3] P Dayaker, Y Madan Reddy, M Bhargav Kumar, A Survey on Applications and Security

Issues of Internet of Things (IOT), International Journal of Mechanical Engineering

&Technology, ISSN 0976-6359 (online) , Volume 8, Issue 6, Pg.No 641-648 , July 2017.

[4] GO Ofori-Dwumfuo and E Paatey. The design of an electronic voting system. Research

Journal of Information Technology, 3(2):91-98, 2011.

[5] Peter Gabriel Neumann, On hierarchical design of computer systems for critical

applications. Software Engineering, IEEE Transactions on, (9):905-920, 1986.

[6] Anil K. Jain and David maltoni. , Handbook of Fingerprint Recognition, Springer-verlag

New York, Inc., Secaucus, NJ, USA, 2003

[7] Ashbaugh D. R., Quantitative-Qualitative Friction Ridge Analysis: An Introduction to basic

and advanced Ridgeology. CRC Press, 1999

[8] Bahuguna R., Fingerprint Verification using Hologram matched filterings, Biometric

Consortium Eighth Meeting, San Jose, CA, 1996.

[9] Ashraf Darwish, AliaaYoussif, MagidAlgendy, and Eman Mohamed, A Secure and Robust

Prototype For Electronic Voting System, Volume 3, Issue 3, October - December (2012),

pp. 510-519, International Journal of Computer Engineering and Technology.

[10] Feroz Morab, Sadiya Thazeen, Mohamed Najmus Saqhib and Seema Morab, Efficacious

Electronic Voting Using Biometry, Volume 5, Issue 10, October (2014), pp. 32-40,

International Journal of Computer Engineering and Technology

[11] California Internet Voting Task Force. A Report on the Feasibility of Internet Voting,

Jan.2000. http://www.ss.ca.gov/executive/ivote/

[12] Coetzee L. and Botha E.C., Fingerprint Recognition in low quality images, Pattern

Recognition, Vol.26, No.10, pages. 1441-1460, 1993.