st century. Advanced and developed countries are constantly reviewing their e-voting systems. However, the cyber security problem associated with the e-voting system has been giving concerns to cyber security experts and researchers. The authentication methods employed in existing e-voting system is for a voter to input a unique identification number that has been assigned after accreditation. This is to confirm of the voter's details in the voter registration data base. This paper seeks to develop a secured e-voting system that integrates a second order authentication in the form of One-Time Password to again confirm the voters' details in the registration data base before voting is allowed. Java programming language was employed in coding the OTP algorithm into the existing e-voting system algorithm. The e-voting system is more secure with this work.

">

Development of a Secured E-Voting System With OTP as Second Order Authentication

Habu J. Salami*, O. S. Adebayo**, A. O. Isah***, K. H. Lawal****, John K. Alhassan*****
*Information Technology Services, Federal University of Technology, Minna, Nigeria.
**,***,***** Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria.
**** Department of Computer Science, Federal University of Technology, Minna, Nigeria.
Periodicity:January - March'2019
DOI : https://doi.org/10.26634/jse.13.3.15686

Abstract

Electronic voting has become the most preferred and generally acceptable voting method in the 21st century. Advanced and developed countries are constantly reviewing their e-voting systems. However, the cyber security problem associated with the e-voting system has been giving concerns to cyber security experts and researchers. The authentication methods employed in existing e-voting system is for a voter to input a unique identification number that has been assigned after accreditation. This is to confirm of the voter's details in the voter registration data base. This paper seeks to develop a secured e-voting system that integrates a second order authentication in the form of One-Time Password to again confirm the voters' details in the registration data base before voting is allowed. Java programming language was employed in coding the OTP algorithm into the existing e-voting system algorithm. The e-voting system is more secure with this work.

Keywords

E-voting, Security, OTP, Authentication, Development.

How to Cite this Article?

Salami, H. J., Adebayo, O. S., Isah, A. O., Lawal, K. H., Alhassan, J. K. (2019). Development of a Secured E-Voting System With OTP as Second Order Authentication, i-manager's Journal on Software Engineering, 13(3), 7-14. https://doi.org/10.26634/jse.13.3.15686

References

[1]. Abdulhamid, S. Í. M., Adebayo, O. S., Ugiomoh, D. O., & AbdulMalik, M. D. (2013). The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity. International Journal of Computer Network & Information Security, 5(5), 9-18.
[2]. Aggarwal, K. (2016). Issues in implementing of Online Voting System in India. International Journal of Engineering Science and Computing, 6(5), 5285-5288.
[3]. Al-Ameen, A., & Talab, S. A. (2013). E-Voting Systems Security Issues. International Journal of Networked Computing and Advanced Information Management (IJNCM). 3(1), 25-34.
[4]. Brownback, T. (2018). The problems with a paper based voting system, Retrieved from http://www.dcag.com/images/WhitePaper_The_problems _with_a_paper_based_voting_system.pdf
[5]. Falkner S., Kieseberg P., Simos D.E., Traxler C., & Weippl E. (2014). E-voting authentication with QR-codes. In Tryfonas T., Askoxylakis I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, Vol 8533. (pp. 149-159). Springer, Cham.
[6]. Hamid, I. R. A., Radzi, S. N. M., Rahman, N. H. A., Wen, C. C., & Abdullah, N. A. (2017). Preserving anonymity in evoting system using voter non-repudiation oriented scheme. In AIP Conference Proceedings (Vol. 1891, No. 1, p. 020017). AIP Publishing.
[7]. Mutelo, R. (2014). Understanding biometrics: Benefits of electronic voting. Retrieved from https://neweralive.na/posts/understanding-biometricsbenefits- electronic-voting
[8]. Rexha, B., Neziri, V., & Dervishi, R. (2012). Improving authentication and transparency of e-Voting system–Kosovo case. International Journal of Computers and Communications, 6(1), 84-91.
[9]. Sridharan, S. (2013). Implementation of authenticated and secure online voting system. In Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on (pp. 1-7). IEEE.
[10]. Stephan, A. (2012). Voting with the Ancient Greeks, Retrieved from http://blogs.getty.edu/iris/voting-with-theancient- greeks/
[11]. Wasiu, S. 1. A. D., & Luisa, O. A. (2017). Electronic Voting: Challenges and Prospects in Nigeria's Democracy. The International Journal of Engineering and Science (IJES), 6(5), 67-76.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.