Abstract
Voting is now governed by regulations that specify how a person's choices may be communicated and their desires can be realized. This study proposes an electronic voting machine (EVM) as an alternative for traditional voting methods, which may include the manual utilization of only microcontroller-based circuits. With the identified fingerprint liveness, the proposed technique will make voting considerably easier, more effective, and less likely to result in fraud. The suggested model will support and advance the trustworthiness of all votes and it will also assist in streamlining the counting and verification process. It is difficult to demonstrate that an advanced voting system has been properly designed since several critical criteria must be satisfied. Poll results should be kept private in the database in order to preserve the data. The voting process must also show the votes obtained by the respective candidates. The proposed authenticated voting machine can be applied to the local area elections in order to speed up the process and make the election process more transparent. To maintain its theoretical strength, the proposed research idea needs further study. The model employs radio frequency and fingerprint recognition to maintain the protection.
References
A Jagan, P Akila, and N Nasrin, "QR Code Based E-voting System Using an Android Smart Phones," International Journal of Emerging Technology in Computer Science & Electronics, vol. 13, no. 2, pp. 263-267, March 2015.
Shakya, Subarna. "IoT based F-RAN Architecture using Cloud and Edge Detection System." Journal of ISMAC 3, no. 01 (2021): 31-39.
P.S. Ghatol and N. Mahale, "Biometrics Technology Based Mobile Voting Machine," International Journal of Computer Sciences and Engineering, vol. 2, no. 8, pp. 45-49, August 2014.
Smys, S., and Haoxiang Wang. "Security Enhancement in Smart Vehicle Using Blockchain-based Architectural Framework." Journal of Artificial Intelligence 3, no. 02 (2021): 90-100.
S. Kimbi, Y. Nkansah-Gyekye, and K. Michael, "Towards A Secure Remote Electronic Voting in Tanzania Organizational Challenges," Advances in Computer Science: an International Journal, vol. 3, no. 5, pp. 122-131, September 2014.
Lai, Kong-Long, and Joy Iong Zong Chen. "Development of Smart Cities with Fog Computing and Internet of Things." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 3, no. 01 (2021): 52-60.
M.R. Clarkson, S. Chong, and A.C. Myers, "Civitas: A Secure Remote Voting System," Cornell University, Technical Report 2007.
Adam, Edriss Eisa Babikir. "Evaluation of Fingerprint Liveness Detection by Machine Learning Approach-A Systematic View." Journal of ISMAC 3, no. 01 (2021): 16-30.
Sivaganesan, D. "A Data Driven Trust Mechanism Based on Blockchain in IoT Sensor Networks for Detection and Mitigation of Attacks." Journal of trends in Computer Science and Smart technology (TCSST) 3, no. 01 (2021): 59-69.
Singh, Sushil Kumar, Debjani Dey, and Sushanta Bordoloi. "Internet of Things Based Electronic Voting Machine." In International Conference on Intelligent Data Communication Technologies and Internet of Things, pp. 365-372. Springer, Cham, 2019.
Bagde, Sejal, Pratiksha Ambade, Manasvi Batho, Piyush Duragkar, Prathmesh Dahikar, and Avinash Ikhar. "Internet of Things (IOT) Based Smart Switch." Journal of IoT in Social, Mobile, Analytics, and Cloud 3, no. 2 (2021): 149-162.
Reddy, B. M. M., & Srihari, D, 2015, RFID Based Biometric Voting Machine Linked To Aadhaar For Safe And Secure Voting. International Journal of Science, Engineering and Technology Research (IJSETR). 4(4), 995–1001
Suma, V., and Wang Haoxiang. "Optimal Key Handover Management for Enhancing Security in Mobile Network." Journal of trends in Computer Science and Smart technology (TCSST) 2, no. 04 (2020): 181-187.
Nishant, Potnuru Sai, Bhaskaruni Gopesh Krishna Mohan, Balina Surya Chandra, Yangalasetty Lokesh, Gantakora Devaraju, and Madamala Revanth. "Lexicon-Based Text Analysis for Twitter and Quora." In International Conference on Innovative Data Communication Technologies and Application, pp. 276-283. Springer, Cham, 2019.
Chen, Joy Iong Zong, and P. Hengjinda. "Enhanced Dragonfly Algorithm based K-Medoid Clustering Model for VANET." Journal of ISMAC 3, no. 01 (2021): 50-59.
Sharma, Ruchi, and Kiran Davuluri. "Security Analysis for Machine Learning and Image Processing Related Information Systems." In International Conference on Image Processing and Capsule Networks, pp. 135-147. Springer, Cham, 2020.
Ms. Ashwini Ashok Mandavkar, Prof. Rohini Vijay Agawane,n“Mobile Based Facial Recognition Using OTP Verification for Voting System” 2015 IEEE International Advance Computing Conference (IACC).
Madhuri, B., M. G. Adarsha, K. R. Pradhyumna, and B. M. Prajwal. "Secured smart voting system using aadhar." In 2017 2nd international conference on emerging computation and information technologies (ICECIT), pp. 1-3. IEEE, 2017.
J. Deepika , S. Kalaiselvi , S. Mahalakshmi, S. Agnes Shifani, “Smart Electronic Voting System Based On Biometric Identification-Survey” 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM).
R. Devi, P. Sujatha, “A Study on Biometric and Multi-modal biometric system modules, Applications, Techniques and Challenges” Proc. IEEE Conference on Emerging Devices and Smart Systems (ICEDSS 2017) 3-4March 2017, Mahendra Engineering College, Tamilnadu, India.
Agarwal, Vartika, Sachin Sharma, and Piyush Agarwal. "IoT Based Smart Transport Management and Vehicle-to-Vehicle Communication System." In Computer Networks, Big Data and IoT, pp. 709-716. Springer, Singapore, 2021.
Chatterjee, Runa, Rajdeep Chakraborty, and J. K. Mondal. "Design of Lightweight Cryptographic Model for End-to-End Encryption in IoT Domain." IRO Journal on Sustainable Wireless Systems 1, no. 4 (2019): 215-224.
Nikam, R., Rankhambe, M., Raikwar, D., & Kashyap, A, 2014, Secured E-Voting Using NFC Technology. International Journal of Computer Science and Information Technologies, 5(6), 8325–8327.
Haoxiang, Wang, and S. Smys. "Big Data Analysis and Perturbation using Data Mining Algorithm." Journal of Soft Computing Paradigm (JSCP) 3, no. 01 (2021): 19-28.
Gangrade, Sakshi, and Srinath R. Naidu. "Measurement of Acid Content in Rain Water Using Wireless Sensor Networks and Artificial Neural Networks." In International Conference On Computational Vision and Bio Inspired Computing, pp. 598-605. Springer, Cham, 2019.
Haoxiang, Wang, and S. Smys. "A Survey on Digital Fraud Risk Control Management by Automatic Case Management System." Journal of Electrical Engineering and Automation 3, no. 1 (2021): 1-14
Mugunthan, S. R. "Wireless Rechargeable Sensor Network Fault Modeling and Stability Analysis." Journal of Soft Computing Paradigm (JSCP) 3, no. 01 (2021): 47-54.
