20M VoteArticle PDF
20M VoteArticle PDF
20M VoteArticle PDF
net/publication/261321411
CITATIONS READS
6 2,320
5 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Adel Khelifi on 02 April 2017.
Abstract — The critical issue in elections is choosing a leader who was made to achieve a high level of integrity, but the risk
will represent his nation and preserve its citizens’ rights with the remained.
threat of a criminal element attempting to influence the outcome
of the election. Unfortunately, such disruptions have occurred at In this paper, we attempt to facilitate, and ensure, the
many paper-based voting stations, and also in some electronic integrity of elections by introducing our M-Vote system, which
voting systems. Manual, or paper-based voting is the most widely is capable of performing tasks that can reduce the risk inherent
used voting system, but its integrity can be questioned, since the in the voting process, such as the addition, deletion, and
votes are gathered and counted by hand, which decreases the alteration of votes. Requirements are gathered and composed
likelihood of every vote being counted, either accidentally or based on a list of questions asked of a specific category of
intentionally. Electronic voting systems have emerged to solve people who have participated in elections and election officials,
most of the problems that occur in manual voting. However, the and on other electronic voting systems, in order to acquire
criminal element, with their knowledge of how to exploit precise ideas regarding their experience and to avoid their
technical loopholes, attempts to take advantage of these mistakes. This system is designed to accept only one vote from
problems, thwarting any efforts to hold fair elections. To avoid the voter, check on his/her eligibility, and prevent any attempt
the mistakes made by both manual and electronic voting systems, to manipulate the vote. It is possible to perform all these
we have developed the M-Vote system to try to achieve the operations with nothing more than a mobile phone and an
desired goal, which is to preserve the integrity of elections. M- Internet connection.
Vote is a mobile phone application that uses three level of
security, which are username and password, national ID and This paper is organized as follows. Section II presents a
fingerprint, and a strong dedicated security algorithm. These literature review in which elections are defined and three types
techniques prevent votes from being deleted or changed, enhance of voting systems are presented. Section III presents the M-
integrity and put an end to criminal acts. The results showed that Vote system, as well as its security mechanism, and its
M-Vote is a highly secured mobile application that facilitates the functional and non-functional requirements. Section IV
vote process for most of people, since they only need a mobile presents the M-Vote Graphical User Interfaces, and the last
phone and an Internet connection to participate in the election section provides our conclusions and an outline of future
process.
enhancements.
Keywords: Elections; Voting systems; Mobile application
II. LITERATURE REVIEW
I. INTRODUCTION Elections can occur for variety of reasons, including ending
When we look at the problems that leaders have inflicted on a leader’s oppressive, end a political crisis, or choose a
many nations of the world, we note that those leaders either substantive government. There are many kinds of electoral
came to power illegally or became monarchs by right of system in use around the world. It is a formal decision-making
succession. In fact, both have a negative impact in terms of process for choosing a leader who could hold the public office.
oppression, injustice, and tyranny. To gain the leadership There are also different types of election, such as a general
illegally, all that is needed is to rig the official elections, which election, which is held to choose the nation’s leader and his
has happened in many countries. The aim of those who would aides; primary elections; municipal elections; and special
manipulate the electoral process is to exploit the gaps and elections. Once an election is called, those who wish to be
vulnerabilities they find, so that their candidate will have the nominated must know who to contact, in order to obtain the
opportunity to meet their demands, whether they be political or nomination papers to stand as candidates. After the completion
economic. Specialists are always thinking about ways to of the nomination process, an official list of candidates is
eliminate, or at least reduce, the risk of vote manipulation published. Essentially, they have to present themselves to the
during an election, and about techniques to replace paper-based public through an election campaigns and by presenting
voting to minimize the risk inherent in such a voting process. electoral platform. On election day, it is the voter’s job to cast
Later, electronic voting systems emerged, in which an attempt his/her vote for one of the candidates. When the election is
over, the results are gathered and counted by the election
authorities, and the winning candidate is announced. There are
steps followed in the voting process that are common to all Internet, or interactive television. Some examples of e-voting
election operations, set out by the well-known ACE Electoral systems are the following:
Knowledge Network [1].
The Australian Capital Territory (2000).Polling places
e-voting. Australia.
A. Manual Voting
Manual voting was the first voting method, and is the The Austrian Federal Council of Ministers (2003).
oldest, having been used for many centuries. In spite of its Remote e-voting. Austria.
shortcomings, it was considered the only way to vote, as there Russell, P., Dundas, S. & Counties, G. (2003). Remote
was no successful alternative. Basically, this system relies on e-voting. Canada.
the voter, whose main role is casting his/her vote for one
candidate, either by selecting his/her name on a preprinted The National Electoral Committee (2003). Remote e-
ballot containing the candidates’ names, or by writing the voting. Estonia.
selected candidate’s name on a blank ballot and placing it in a
sealed envelope. After voting is finished, a committee at the The European Commission (2000). Polling place e-
polling station, composed of more than one person, opens the voting, remote e-voting. EU.
envelopes and places them in piles, one for each candidate. France government (2003). Polling place e-voting,
Then, the counting process begins for all the candidates and the remote e-voting. France.
result is recorded. The tabulation process is repeated to ensure
that the results are identical. If they are not the same, they have The Research group of Internet Voting (1999). Remote
to be tabulated a third time, and so on, until there are no e-voting. Germany.
discrepancies. Eventually, the results are certified and
Election Commission (2003). Polling place e-voting.
transmitted to the tabulation center for the announcement of the
India.
final result. However, the traditional methods, with all their
diversity in terms of the means of voting, are still problematic. The European Parliament and Local Elections (2004).
As mentioned before, since the votes are gathered and counted Polling place e-voting. Ireland.
by hand, there is a strong likelihood of the occurrence of errors.
Ministry of Local Government and Regional
B. Electronic Voting Systems Development (2003). Polling place e-voting. Norway.
Elections permit the population to select their Portuguese government (2004). Polling place e-voting.
representatives and convey their preference for who will Portugal.
govern them. Obviously, the honesty of the election process is
Norwegian Ministry of Local Government and
essential to the truthfulness of democracy itself. The voting
Regional Development (2011). E-voting system.
system should be reliable enough to resist to many suspicious
behaviors, and at the same time adequately translucent and OKOH, C. (2010, APRIL 20). ITAN Adopts E-Voting.
lucid that citizens and nominees can accept the results of an Nigeria.
election. Not surprisingly, history is cluttered with cases of
elections being misused to control their result. For this reason E-Voting system (2007-2011). Estonia.
many researchers, professors, and developers began to think E-voting polls (2012). USA.
about ways to enhance the integrity of the election process.
They established working teams to study many instances of Bismark, D. (2010). E-voting without fraud.
traditional elections and the results of those elections, and came TEDGlobal.
up with the concept of e-voting, which is an electronic
technology and not necessarily related to traditional methods. Lootah. (2007 April, 3). Lootah reviews success of e-
E-voting is a common type of polling, whereby electronic voting system. UAE.
systems multiple mechanisms are used, such as optical vote 1) Benefits of Electronic Voting systems
scanning systems and voting kiosks, as well as punched cards,
and involve the transmission of ballots and votes via telephone, Electronic voting technology can:
the Internet, or private computer networks.
Speed up the process of counting votes,
The first country that introduced the concept of e-voting on
a broad scale was the United States, and is based on voters Offer accessibility for voters in remote locations and
casting their votes electronically at polling stations. Then, most for disabled voters,
countries around the world followed their lead, and began to
develop and implement this technique. Most have succeeded in Increase the security and reliability of elections.
doing so. A few countries have gone further, and started to 2) Failed E-Voting Projects
think about a new approach to facilitating voting that does not
involve direct communication with polling stations. This new Notable failures are the following: In the 2004 American
concept is known as remote voting, and has been introduced by presidential election in 2004, e-voting machines were in the
France and United States. With remote voting, voters simply news, as they both lost votes and doubled votes. In Fairfax
cast their votes electronically, using a personal computer, the County, VA, in 2003, votes were subtracted instead of added.
In San Bernardino County, CA, in 2001, a programming error Basically, the lock process is carried out through a fingerprint
caused the computer to look for votes in the wrong portion of screen that pops up, and the user has to touch that screen for
the ballot in 33 local elections, which meant that no votes were identity authentication. At that time, a vibration is felt and a
registered on those ballots for those elections [2]. beep is heard which persist to the end of scanning process. The
unlock process is different, in that it is based on the user
Finally, in 2012, the electoral commission in Ghana touching the screen until the fingerprint is authenticated, rather
abandoned the concept of e-voting, which was soon to be than on scanning or storing the data. It is important to mention
introduced. The reason given for doing so is that the country’s that this software doesn’t constitute a true biometric
technocrats realized that there were not enough skilled application, which does scan the fingerprint, but is an imitation
individuals to operate the system [3]. of that software.
About 85% of electronic voting projects in developing Android devices have taken the lead in the development of
countries have failed in some respect [4], according to the biometric scanning applications. The Android device
World Bank, and of those, 35% failed completely. The competitor, Apple, is in the process of patenting its biometric
statistics in the United States and Europe are just as grim. scanning products, which may include a voice recognition
According to Mercuri [5], "Europe appears to be rushing system, a retinal scanner that uses the iPhone's camera, or,
ahead to deploy computer voting technologies with serious most likely, a screen to scan fingerprints. According to
sociological and technological downsides, such as lack of Robinson [7], “Motorola has been heavily marketing the
auditability, and increased opportunities for vote selling, security benefits of using biometrics (fingerprint sensor) to
monitoring, coercion, and denial of service attacks" [5]. protect its latest Android smart phone, the Atrix. It is even
being called the ‘James Bond’ smart phone”.
C. Mobile Voting Systems According to Goode Intelligence [8], the key drivers behind
Today, mobile smart phones, connected to Internet, are market growth and the adoption of mobile phone biometric
considered one of the necessities of life and are highly reliable security include:
as an alternative to hard-wired phones and to computers,
because they are small size and easy to own. Previously, Device security: Protecting the device against
password protection was difficult to break, and was a highly unauthorized access is the biggest driver for mobile
reliable means of safeguarding online accounts. However, but phone biometric security.
now there are numerous free programs that can be downloaded Mobile commerce: The growth of mCommerce and the
and used to break passwords, which do not require need to effectively secure the ecosystem on the mobile.
sophisticated technical skills, so that anyone with a modicum
of experience can run them to steal online account information. Near Field Communication (NFC): Contactless
To find solutions to such problems, biometrics are developed to technology is reaching a tipping point, and could well
determine and examine uniqueness of the human being body, be a major driver.
such as fingerprints, eye retinas and irises, DNA, voice
Convenience: Swiping a finger on a phone or
patterns, facial patterns, and hand measurements. This
providing a verbal ‘voiceprint’ can be an easier and far
approach can provide optimal reliability, in terms of
more convenient way to verify identity than
determining the identities of users for authentication purposes,
conventional PINs and passwords.
as it is impossible for two any individuals, even twins, to have
the same body structure. Biometrics are a vast improvement The need for a multifactorial authentication solution:
over passwords, the principal weakness of which is that they With the recent attack on the security firm RSA, which
can be forgotten. Moreover, many people use the same led to the exposure of vulnerabilities in its SecureID
password for all their accounts, and so when an attacker gains token technology, there is an urgent requirement for
access to one account, he/she can very often succeed in strong and agile authentication solutions – mobile
accessing the rest with the same password. phone-based biometric security can play an important
However, according to Microsoft, “Biometrics are often role in such solutions.
computationally intensive to compute, inaccurate, and unable Military and law enforcement applications: This
to scale to identify an individual among a large set of known technology can provide a cost-effective method for
individuals.” “Therefore,” argues Microsoft, “the biometric capturing biometric data and verifying identity in the
identification of an individual may be supplemented by field.
identifying one or more devices associated with the individual.
When an individual is registered for identification, various According to the Joint EC-UNDP Task Force, there is
device identifiers of devices associated with the individual may strong interest on the part of African countries such as Benin,
be stored along with the biometrics of the individual. Malawi, Zambia, Tanzania, Togo, Mauritania, Ivory Coast,
Individuals may then be identified using both biometrics and DRC, and Nigeria in the procurement of high-tech biometric
detected device identifiers, thereby improving the efficiency, voter registration systems, which need to gather data via what
speed, accuracy, and scalability of the identification.” [6] are referred to as “mobile biometric or ID registration kits” [1].
There are a great many fingerprint scanning applications Clarke and Furnell [9] have compared various biometric
that permit the user to lock and unlock his/her device. techniques for mobile phones. They found that fingerprint
recognition is the most suitable authentication technique for “Mobile Voting was No. 1 in a list of five mobile messaging
mobile phone users. predictions newly released by VeriSign Inc.'s messaging and
mobile media division. The success of the Obama presidential
TABLE I. COMPARISON OF VARIOUS BIOMETRIC TECHNIQUES FOR
campaign last year using a combination of television,
MOBILE PHONES grassroots, and the Internet with last-mile support from mobile
technology is proof of the channel's potential.” He added:
Biometric technique User preference Accuracy “There has been a new movement toward the acceptability of
Facial recognition Medium High the mobile.” [13] This method is based on exchanging SMS
messages and has been developed to be used in several fields,
Fingerprint recognition High Very high such as elections, banking, and many other services.
Hand geometry Medium Very high
4. The WeVote program, which uses exchangeable SMS
Handwriting recognition NA Medium messages and send the results to the Web server. This method
Iris scanning Medium Very high
requires a GSM modem and a driver, JDK 6, or the latest
version, in addition to the WeVote program. The registration
Keystroke analysis Low Medium process is conducted via SMS, and includes basic information
Service utilization NA Low about the voter, such as age/birthday and gender, which would
be stored in the database [14].
Voiceprint verification High High
Consequently, with M-Vote, we concentrate on one
dimension of biometric technology, which is fingerprint
“The user preference is investigated in a survey. The authentication. VeriFinger Embedded is used in this project to
assigned accuracy category is based upon reports by the prove the effectiveness of using such a tool in this application.
International Biometric Group and National Physical Neurotechnology, the Biotech specialist, has developed and
Laboratory.” [10] released applications that support fingerprint or facial
recognition, or both. These three releases are called VeriFinger
1) Most Prominent Mobile Voting Systems Embedded, VeriLook Embedded, and MegaMatcher
Embedded respectively. They can be downloaded and run on
The mobile-based voting system is a solution to increase mobile devices that support the Android OS, such as smart
voters’ participation in the election operation since the mobile phones, tablets, and handheld computers. VeriFinger
phone acts as the polling booth. However, the mobile phone is Embedded is also supported by a range of popular fingerprint
not designed to accommodate large computation schemes. This scanners and readers, ensuring fingerprint capture in less than 1
is why the GSM mobile voting scheme was developed, based second in a device with a 1 GHz processor or better.
on the blind signature, the digital signature, and bit For the proof of concept, we developed our own database,
commitment. This method has the ability to handle large scale and then, during the implementation phase, we produced a
elections, as well as the largest possible number of voters. demo to test the application for efficiency and errors. A small
Among the many achievements in this field, the most number of university staff members and students participated
prominent are the following: in the test process. They registered in the system by providing
the necessary information, such as their national ID number
1. In 2011, the Mobile Voting System was introduced by and their fingerprint, which read and stored in the database.
Radovan Murin [11]. This is an open source android Then, if the voter wishes to elect a candidate he/she has to log
application developed for election purposes. This system uses in to the system by providing his/her number and fingerprint,
two methods: which compared to those in the database. If they are identical,
Method 1 “requires a computer and either a data cable access will be granted. Otherwise an error message is
from your device or the ability to read micro SD displayed, stating that no such information exists in the
cards.” [12] database.
The whole process is performed via SMS. The voter can The most common Mobile voting system problems
register and answer the election questions by sending and encountered can be grouped into 2 categories:
receiving SMS messages.
1. Environmental factors: These may be internal or
2. The Mobile Voting System application won the USA external to the organization:
Challenge in 2010. “It was developed by New York City
entrepreneur Elliot Klein who has identified a variety of uses a) Internal: Perhaps the most common problems are the
for his innovation, ranging from government elections to lack of skill in administrating biometric voter registration and
stockholder proxies and other authorized response-based staff resistance to change.
processes.” [12] b) External: Political leaders may not be interested in the
3. According to Michael Campbell, senior vice president of registration process and its accuracy and integrity. Vendors
sales and marketing for VeriSign Messaging and Mobile Media may gain access to a system and corrupt its ability to correctly
tally votes or to manipulate the electorate, motivated by money AFIS can be integrated in a suite of applications that work
or power. together to provide comprehensive fingerprint and palm print
identification solutions to accommodate the needs of voter
2. Technical factors: Many machines have been registration systems, as well as voter authentication and voter
developed recently with as variety of speeds and levels of identification systems used at voting time.” [1]
efficiency and reliability that can cause delays and failures.
Changes in biometric characteristics, such as voices altering
with age and fingerprints altering due to skin scratches or the
kind of work carried by individuals, can affect the mobile
voting process.
A. Requirements analysis
The analysis phase was conducted based on three methods
of gathering requirements for our M-Vote system. We called
on the knowledge of people who had already participated in the
election process. We also elicited requirements elicited from
qualified people in this domain who are election officers who
manage the voting process. In addition, because of the
widespread use of many different electronic voting systems, we
were able to gather information based on the methodology and
requirements implemented by those systems. As a result, we
benefited from the experience of their users, both positive and
negative. This information also helps us to avoid mistakes that
have been made in the past.
The use case diagram below (Figure 1) illustrates the
functionality of M-Vote in terms how the system performs, and
includes stakeholders involved, such as the voter and the
administrators. M-Vote’s most important non functional
requirements are: security, performance, usability, availability,
and reliability.
ACKNOWLEDGMENT
REFERENCES
[1] Joint EC-UNDP Task Force. (2012, April 17). Biometric Voter
Figure 3. Login Page Registration: Skills required and problems encountered? Retrieved
August 16, 2012, from Aceproject Web site: http://aceproject.org/
[2] Schneier B. (2004, November 10). The Problem with Electronic Voting
Machines. Retrieved from Schneier website:
http://www.schneier.com/blog/archives/2004/11/the_problem_wit.html
[3] Costa K. (2012). Jettisons e-voting for 2012 polls. Retrieved from
Allvoices website: http://www.allvoices.com/news/8863658-ghana-
govt-jettisons-evoting-for-2012-polls
[4] Bismark, D. (2004, November 5). 85% of electronic voting projects
failed in developing countries. Retrieved from Ted website:
http://www.ted.com/talks/david_bismark_e_voting_without_fraud.html
[5] Mercuri R. (2010, September 1). E-voting. Retrieved from
Notablesoftware http://www.notablesoftware.com/evote.html#Statement
[6] Nir N, Veradim K, Eyal K, and Shimshit. (2012, June). Patent of the
Month in the Biometry Field. Retrieved July 28, 2012, from Planet
Biometrics: http://www.planetbiometrics.com/creo_files/upload/article-
files/patent_of_the_month_-_july_2012.pdf
[7] Robinson, R. (2011, October 24). Growth Expected from Mobile Phone
Biometric Security Market. Retrieved August 14, 2012, from Card
Guide International website: http://www.card-guide-
Figure 4. Election Results Home Page international.com/201110241732/Growth-Expected-from-Mobile-
Phone-Biometric-Security-Market.html?print=1&tmpl=component
[8] Goode Intellignece. (2005). Market for mobile phone biometric security
V. CONCLUSION products and services set to grow and will generate over $161 million
Throughout the long history of the democratic process, and revenue by 2015. Retrieved from
http://www.goodeintelligence.com/media/media_centre/1309411147mo
with the progress of time and changes in people’s needs, the bile_phone_biometric_security_final_news_release_300611.pdf
election is a powerful tool for peacefully resolving conflicts,
[9] Clarke, and Furnell. (2005). Biometrics on the mobile phone. Retrieved
whether political, religious, or economic, based on the will of from http://www.intechopen.com/books/recent-application-in-
the majority. As such, an election leads to a period of transition biometrics/biometrics-on-mobile-phone
in any country. Security, integrity, and availability form the [10] Wang, S. and Liu, J. (2010). Biometrics on the mobile phone. Retrieved
cornerstone of any voting process, and the nature of that July 28, 2012, from http://www.intechopen.com/books/recent-
process can affect both the actual and perceived legitimacy of application-in-biometrics/biometrics-on-mobile-phone
electoral outcomes. During the development of our M-Vote [11] Murin, R. (2011). Mobile voting system Quick Start and Tutorial.
system, the previous experience of the participants in the field Retrieved 16-08-2012, from http://code.google.com/p/mobile-voting-
system/downloads/detail?name=Mobile%20voting%20system%20Quick
of manual and electronic voting systems was considered, as %20Start%20-%20EN.pdf
were the vulnerabilities and weaknesses of the manual and e- [12] Gibbons, G. (2010, October 18). Mobile Voting Application Wins USA
voting systems in use today. M-Vote is designed to improve on Challenge. Retrieved August 16, 2012, from Insidegnss website:
current voting processes by allowing voters to cast their ballot http://www.insidegnss.com/node/2343
via mobile phones, streamline the registration process by [13] Khan, M. A. (2009, April 6). Mobile voting could become reality by
requiring simply the voter’s national ID number to check 2012: VeriSign. Retrieved August 16, 2012, from Mobile Marketer Web
his/her eligibility and scanned fingerprint to ensure integrity, site: http://www.mobilemarketer.com/cms/news/messaging/2980.html
eliminate vote tampering, and increase voter confidence in the [14] Pavlo, B. and Ekimov, V. (2010, November 4). wevote - Mobile Voting
System. Retrieved August 16, 2012, from
voting process. The results show that M-Vote is a secured http://code.google.com/p/wevote/
mobile application that increases the accuracy and efficiency of
[15] A Menezesm, P Van Oorschot, and S Vanstone, Handbook of Applied
the voting process. In fact, it accommodates very large Cryptogoraphy, CRC Press 1996.
numbers of voters, since the process doesn't require a great deal
of effort and it can be completed quickly. Finally, with more