Está en la página 1de 5

2014 17th International Conference on Computer and Information Technology (ICCIT)

Development of Electronic Voting Machine with the


Inclusion of Near Field Communication ID Cards and
Biometric Fingerprint Identifier
Syed Mahmud Hasan, Arafa Mohd. Anis, Hamidur Rahman, Jennifer Sherry Alam, Sohel Islam Nabil and
Md. Khalilur Rhaman
School of Engineering and Computer Science
BRAC University
Dhaka, Bangladesh
syed.mahmud777@gmail.com, anis.arafa@gmail.com, hrlml92@gmail.com, alam.jennifers@gmail.com,
sohel.islam619@gmail.com, khalilur@bracu.ac.bd

Abstract—The basis of this project is to create an electronic integrate the following features [4]. The voting system should
voting machine that will help to eradicate defrauding of the maintain the privacy of voters, and should maintain that only
manual voting systems by multiple votes cast by the same user. enrolled voters are allowed to cast their vote. Only one vote
With the inclusion of a Near Field Communication ID card per voter should be maintained, there should not be an
reader and biometric fingerprint device, each voter will be opportunity for authorities to swindle the vote counts or
entered into the system through a swift process only after being choice, and there should not be any receipt of the voting
recognized and checked to the given database of enlisted voters. account. The system should also display transparency but be
Once the corresponding fingerprint is matched with the discrete in the procedure, and finally it should be an accurate
information provided by the identification card, the voter will be
system that can withstand the usage of multiple voters.
allowed to vote for their preferred candidate through a panel of
However, these are requirements that can be related to the
buttons. The respective card will then be marked for further
referencing, and the voter will not be allowed to take part in sustenance of a voting system in any environment as
multiple votes. The proposed project also carries the unique suggested in [3]. An election system should be able to
feature of being autonomous during the course of operation, withstand a variety of fraudulent behaviors and should be
which helps to diminish the issue of hacking occurring in sufficiently transparent and comprehensible that voters and
previous attempts of electronic voting machines. candidates can accept the result of an election.
The major issue of traditional voting systems oscillates
Keywords—EVM; NFC; fingerprinter; vote
around the system of tallying. The main problem of this
I. INTRODUCTION system is dependable on manual procedure and for this reason
has raised many questions. Following the US presidential
Voting is the fundamental right in any democracy. It elections in 2000, questions rose on the ballot counting
expresses the choice of the people and upholds the very procedure [5]. During the counting of tally, ballots may be
meaning of a system governed by the people’s choice. displaced and often marks on ballots are hard to identify and
However, the methods used to represent these votes have distinguish [5][6]. Therefore we would like to simplify the
become a debatable issue. Throughout history different tedious job of tally counting with the help of modern
techniques of voting have evolved from simple hand written technology. Keeping count of the tallies should be digitalized,
paper ballots to internet voting systems that only require the to save time and of course increase reliability. To eliminate the
voter to log in from the comfort of their home to cast their confusion of distinguishing between improperly marked
choice from their personal computers [1][2]. Different ballots we plan on using digital buttons systems. The
mechanisms have been introduced in various nations around advantage being that pressing on the button means a vote has
the world to help accommodate the needs to progress into the been casted and no chance is left to human error.
best possible voting system. For the purpose of a fair and
unprejudiced arrangement to take place it is important to look As suggested by research, an election system should be
into multiple dimensions and thus many innovations have yet able to withstand fraudulent behaviors [3][4]. This includes
to meet the standards expected by voters [3]. In this section we the familiar issue of multiple votes cast by a single voter.
will further look into the different techniques available and the When a voter is admitted into the system to cast their vote, it
drawbacks and advantages they present to the voting process is essential that they are properly identified and allowed to
and what we would like to incorporate and improve in our vote only once. Keeping this in mind, the paper suggests the
device compared to the standards expected from an ideal use of Near Field Communication (NFC) cards as each voter’s
electronic voting system. identification tag. NFC technology allows for communication
between the users ID card and the device in a very fast and
Research found on ways an electronic voting system could uncomplicated manner and increases the usability [8].
be sustainable for Bangladesh suggests that the system should However, only NFC cards as the main entry system of a

978-1-4799-6288-4/14/$31.00 ©2014 IEEE 383


2014 17th International Conference on Computer and Information Technology (ICCIT)

voting machine can make it susceptible to attacks [9]. cards and the device we have used a reader/writer shield. This
Furthermore, using only an ID card opens the opportunity for allows the device to both receive and send data to the ID cards
a voter to use different voter ID cards to cast multiple votes. coming into the range of operation [12]. The NFC system is
valid for a 13.56 MHz frequency. The shield is connected to
To overcome these complications and to reinforce the the Arduino UNO, and all data received and sent through the
checking procedure, the paper suggests the use of fingerprint shield are processed by the microcontroller.
identification using reliable biometric technologies. Use of
biometrics in voting systems has been an acclaimed one as b) Optical fingerprint sensor
fingerprints are unique to individuals [10][11].The system
suggested uses the fingerprint of the voter to compare to a The fingerprint sensor is connected to the Arduino Mega.
predetermined database where the information on the voters An integrated DSP chip within the device processes the
NFC ID card must match to their corresponding fingerprint. identification of fingerprints. Packets of data are sent each time
After the verification and matching of the two data, the voter a fingerprint is received, and each fingerprint is given a code
is allowed to proceed to voting. With the automation and use which is stored in the database.
of two layers of identification systems, the procedure removes c) 16X2 LCD display
the chance of any fraudulent entrants.
The 16X2 LCD display is connected to the Arduino Mega
Many electronic voting systems that have been proposed and shows sixteen characters in two lines. The microcontroller
before contain the use of online networking, and the risk of provides the data that will be shown on the screen of the
tampering of information through hacking posed a great threat display.
[5][7]. The machine presented eliminates the use of a live
network altogether, thus causing the vote casted to be safe from d) Arduino UNO and Arduino Mega
any tampering. Through the integration of these features and The Arduino UNO and Arduino Mega are advanced open
the multiple checking mechanism of using NFC cards and source microcontrollers. The main operation programs for the
biometric fingerprint identifier, a more secure and prompt devices connected to them are stored within. The Mega
method of the traditional voting system can be developed contains fifty four digital input and output pins, of which
which complies with the expectations mentioned in [3][4]. certain pins can be used for PWM, analog inputs, and UARTS.
It contains a 16 MHz crystal oscillator, a USB connection, a
II. SYSTEM ARCHITECTURE power jack, an ICSP header and a reset button. The Arduino
The devices used in this EVM are; NFC controller shield microcontrollers can also provide constant supply of 5V and
for Arduino, optical fingerprint sensor, 16X2 LCD display, 3.3V [13].
Arduino UNO, Arduino Mega, and Raspberry Pi. A schematic
diagram of internal devices and connection of EVM is shown e) Raspberry Pi
in Fig.1. The Raspberry Pi is a single board computer. The board
A. Description of Subsystems allows the integration of database and the two Arduino boards
into the system [14]
The different devices used and how they are used
connected to the system is described below B. Brief Description of System
a) NFC controller shield for Arduino The proposed system utilizes the NFC cards as an
identification card for voters. Each voter’s ID card contains a
Near Field Communication (NFC) cards interact with the unique ID number and information on whether they have
NFC controller shield via the use of electromagnetic radio already cast a vote. The voter’s fingerprints are given an ID
fields. To allow two way communications between the ID corresponding to that of the individual’s voter ID number. This
information is stored in the database prior to the voting process.
To vote, the voter must provide their ID card in the proximity
of the NFC shield, and the once the NFC shield identifies the
ID provided, the voter is asked to present their fingerprint. The
fingerprint sensor sends the information about the fingerprint
received to be checked to the corresponding ID card. If the two
match, the voter is allowed to select their choice of candidate
from the buttons in the selection panel. After a vote has been
casted the ID card is marked for future referencing, this
prevents the voter from casting multiple votes. The voter’s
information is also marked in the database of the system. The
voter’s information is also marked in the database of the
system. The tally for each candidate’s vote is stored in the
database, and once the voting process has ended, the results
may be obtained. Figure 2 shows the system flow diagram of
Fig. 1 Internal devices and connection the EVM.

978-1-4799-6288-4/14/$31.00 ©2014 IEEE 384


2014 17th International Conference on Computer and Information Technology (ICCIT)

of the LCD display which is interfaced with the Arduino


UNO.
Vote is cast through the use of buttons corresponding to
each candidate’s information. The model produced consists of
seven choices. The buttons are connected to the Arduino Mega
board and each line is stored in the database for the candidates
in the election. Once a button is pressed the candidates count
is incremented and the voting process is stopped. No more
votes are accounted for after one vote. If a voter attempts to
press the button multiple times, or try to select any other
Fig. 2 System flow diagram button, an error is given. Subsequently, when a candidate’s
count has been incremented, the voter’s NFC identification
III. SYSTEM IMPLEMENTATION card is encrypted to not allow any further acceptance into the
The integral system utilizes the different characteristics of system. The database in the Raspberry Pi is also marked off.
each device essentially brought together by the use of the During the course of this paper, we plan to incorporate the
microcontrollers, i.e. the Arduino UNO, Arduino Mega and Arduino UNO, Arduino Mega and Raspberry Pi boards using
Raspberry Pi. The process of interfacing each of the devices the I2C method of interface keeping the Raspberry Pi as the
with the microcontrollers is described below. master and the Arduinos as slaves. We also plan to develop a
To evaluate and manipulate the NFC ID cards, the PN532 database within the Raspberry Pi using MySQL.
NCF controller shield from ElecFreaks is used with the In figure 3 the first image shows the NFC ID card being
Arduino UNO. The shield compiles with the Arduino UNO, read by the NFC shield connected to the Arduino UNO, the
and the pins are connected. The PN532 software library second image shows the biometric fingerprint sensor scanning
developed from Adafruits PN532 Library was used to program a fingerprint and the third image shows a vote being casted
the shield. using the buttons and an LED for confirmation.
The NFC cards come with a unique identification number
which was used as the identification number for each voter. IV. RESULTS
Information carried within the card is kept discrete by Once the devices have been connected, it is possible to
encapsulating, and the data can only be manipulated during view the process of the system through the use of the serial
the initial set up procedure. The cards are blank at the primary monitor of the Arduino software. Figure 4 shows the prompt
stage and have to be initialized to be entered into the system. given for the NFC card followed by the message for
Once the card is brought into the range of the shield, through fingerprint.
the use of the serial monitor, the information within it
After the NFC ID card has been recognized, the user is
becomes available. To enroll a voter into the list, the
asked to provide their fingerprint. The received fingerprints ID
corresponding identification number of each card and
is checked to the NFC ID and once the two have matched the
individual is stored into the database.
voter is requested to proceed to vote. The buttons send a signal
Registered voters may proceed to voting only when they to the Arduino, and the corresponding candidates vote count is
have placed their ID cards within the range of the NFC shield. incremented. Figure 5 shows this process occurring.
Once the card has been acknowledged by the device, it
To ensure that a voter cannot vote more than once, the
proceeds to check that the identification number is present in
information in each voters ID card is manipulated once they
the provided database. When this has complied the voter is
have casted their vote. Each voters ID contains a number in
given a signal to move onto the next stage.
which one memory block is used to determine the eligibility of
The fingerprint sensor from Adafruit is interfaced with the the voter. The specific memory block is changed once a voter
Arduino Mega and is connected to the microcontroller using has chosen a candidate and thus if they attempt to vote again,
the TTL serial. Through the utilization of Principal will be denied the option to enter the system as the code has
Component Analysis (PCA) algorithm, the fingerprints changed. The determination of the memory block can be done
obtained are matched in MATLAB. The fingerprint entered
into the system for each voter is given a unique identification
number after which the number is stored into the database to
the corresponding voter’s ID card number.
When a fingerprint match has been found, the enrolled
number for the fingerprint is checked with the database in the
Raspberry Pi. The number obtained from the sensor and the
corresponding fingerprint number of the NFC card entered
earlier is matched by one to one checking. The comparison (a) (b) (c)
then yields a value for success that allows the voter to proceed Fig. 3 (a) NFC card and NFC sensor with arduino (b) Fingerprint (c)Vote
to vote. Instructions and results are displayed through the use selection button

978-1-4799-6288-4/14/$31.00 ©2014 IEEE 385


2014 17th International Conference on Computer and Information Technology (ICCIT)

prior to starting the voting process and thhus does not need
modifying during the course of election.
The fingerprint sensor provides a thhreshold value of
confidence level when it receives a fingerprrint to match. The
values of the confidence levels for the matchhing of fingerprints
from five different people were graphed and a observed. The
average value is high and therefore we can conclude that the
fingerprint sensor is a reliable method of incorporating
biometrics into the system. Figure 6 shoows the graph of
confidence level.
V. DISCUSSION
Fraudulent behaviors during votes havee been a common
issue throughout the globe. Although this t project was
established keeping the voting system of Baangladesh in mind,
Fig. 5 Fingerprint identification, vote casting
c and tallying
the EVM may be able to tackle similar situuations in different
parts of the world. The issue of having baallots mismatched,
counting errors, and voters trying to cast multiple
m votes are 350
tackled in this system. Each card is providedd with a unique id
300
number; however it might be possible to gennerate this number

Confidence Level
by our own means. This would allow us to t create our own 250
unique number system which could be assiggned to each NFC
ID card, permitting us to separate voters according to area of 200
origin, voting district, etc., through the use of common
prefixes. Hence by generating a unique set of identification 150
number, any country could easily adopt thiis technology, and
improve their voting mechanism. Groupinng voters to areas 100
could give the advantage of being able to iddentify voters who
may try to vote in different voting areas. More
M work can also 50
0 5 10 15 20 25
be done to bring the general public’s reliance on the system as
T
Trial
a whole.
The paper ballot system has been an agge old system that Fig. 6 Confidence level versus finggerprint number graph
people have grown accustomed to, and many m do not feel Using NFC cards as the voters ID card allows each
comfortable about their votes being processeed correctly if they individual card to carry informmation that can be used to match
cannot see for themselves that their vote haas been accounted with solely its owner. It is alsoo a simple and quick technology
for. To tackle this, a printer that prints out each
e voter’s ballot which only requires the plaacement of the card in close
may be added in future versions of the EVM. proximity of the sensor. There is no hassle of having to insert
or place in accurate order, this not only increases usability but
VI. CONCLUSION
also makes the process an effficient one. The second step of
The concept of electronic voting systems is i not a new one. verifying the identification of an
a enrolled voter consists of the
However for its use to widely spread it is immportant to aim for fingerprint sensor. The obviouss advantage of biometrics is that
a system that properly is able to fulfill alll the requirements it cannot be altered or copied. Each individuals fingerprint is
expected as well as the standards achievabble by the use of matched and stored in the database
d to their corresponding
technology. The system provided by thiss paper goes the voter ID card. Through thhis process, the window of
lengths to cover the necessities that researrch has deemed a impersonation is nullified. Furrthermore, the NFC cards allow
requirement for a fair, transparent and reliablle election tool. the voters to be marked of electronically once they have casted
a vote, thus removing the riskk of one voter casting multiple
votes. Overall this system can be incorporated into the voting
systems of different areas sinnce it can be a more reliable,
efficient and easy to use alternaative.
ACKNOWLLEDGMENT
The members involved in thiss research would like to thank
Risul Karim and Md. Zahanngir Alam lecturer of CSE at
BRAC University for their ardenta advice and suggestions
during the progress of this worrk. The group would also like to
express their gratitude to theirr peer Ismail Kiron for lending
Fig. 4 NFC ID card recognition his help towards the project.

978-1-4799-6288-4/14/$31.00 ©2014 IEEE 386


2014 17th International Conference on Computer and Information Technology (ICCIT)

REFERENCES
[1] D. Farrell & I. Mcallister, “Electoral systems.”, The Cambridge
Handbook of Social Sciences in Australia, p. 287, 2003.
[2] S. Heiberg, P. Laud & J. Willemson, “The application of i-voting for
Estonian parliamentary elections of 2011.” E-Voting and Identity:
Springer Berlin Heidelberg, Vol.7187, pp. 208–223, 2012.
[3] D.A. Gritzalis, “Secure electronic voting.”, Dordrecht: Kluwer
Academic Publishers., 2003
[4] M.M. Sarker& M.N. Islam, “Management of sustainable, credible and
integrated electronic voting (E-Voting) system for Bangladesh,”
Management of Sustainable Development. Vol. 5, pp. 15–21, 2013.
[5] R. Mercuri, “A better ballot box?” 10th ed., IEEE SPECTRUM, Vol. 39,
2002
[6] “Voting: what is; what could be.”,Available:
http://www.vote.caltech.edu/Reports/, 2001
[7] T. Kohno, A. Stubblefield, A.D. Rubin &D.S. Wallach, “Analysis of an
electronic voting system.” Security and Privacy Proceedings: IEEE
Symposium, Vol., pp. 27–40, 2004.
[8] K. Ok, V. Coskun& M.N. Aydin, “Usability of mobile voting with NFC
technology.” Proceedings of IASTED international conference on
software engineering,, pp. 151–158, 2010.
[9] Y. Oren & A. Wool, “Attacks on {RFID}-Based electronic voting
systems.”, IACR Cryptology ePrint Archive, p. 422, 2009.
[10] D.A. Kumar & T.U. Begum, “A novel design of electronic voting
system using fingerprint.”, International Journal of Innovative
Technology & Creative Engineering, Vol. 1 , pp. 12–19, 2011.
[11] S. Hof, “E-Voting and Biometric Systems?” Electronic Voting in Europe
Technology, Law, Politics and Society., 2004,
[12] I.J. Britz, “Remote monitoring of a coffee percolator with a web-based
platform using sensors and an actuator” (Doctoral dissertation,
University of Stellenbosch)., 2014,
[13] D. Wheat, S. Kelly & J. Munoz, “Arduino internals”,Apress, p. 387,
2011.
[14] C. Edwards, “Not-so-humble raspberry pi gets big ideas.” Engineering
& Technology, Vol. 8, pp. 30–33, 2013.
[15] D.A. Kumar & T.V. Begum, “A comparative study on fingerprint
matching algorithms for EVM.”, Journal of Computer Sciences and
Applications, Vol. 1, pp. 55–60, 2013.

978-1-4799-6288-4/14/$31.00 ©2014 IEEE 387

También podría gustarte