Development of a Secured E-Voting System With OTP as Second Order Authentication

Habu J. Salami*, O. S. Adebayo**, A. O. Isah***, K. H. Lawal****, John K. Alhassan*****
*Information Technology Services, Federal University of Technology, Minna, Nigeria.
**,***,***** Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria.
**** Department of Computer Science, Federal University of Technology, Minna, Nigeria.
Periodicity:January - March'2019

Abstract

Electronics voting has become the most preferred and generally acceptable voting method in the 21 century. Advanced and developed countries are constantly reviewing their e-voting systems. However, the attendant cyber security problem associated with the e-voting system has been giving concerns to cyber security experts and researchers. The authentication methods employed in the existing e-voting system is for a voter to input a unique identification number that has been assigned after accreditation, this is to enable confirmation of the voter's details in the voter registration data base. This paper seeks to develop a secured e-voting system that integrates a second order authentication in the form of One-Time Password (OTP) to again and finally confirm the voters' details in the registration data base before voting is allowed. Java programming language was employed in coding the OTP algorithm into the existing e-voting system algorithm. The e-voting system is more secure with this work.

Keywords

E-voting, Security, OTP, Authentication, Development.

How to Cite this Article?

Salami, H. J., Adebayo, O. S., Isah, A. O., Lawal, K. H., Alhassan, J. K. (2019). Development of a Secured E-Voting System With OTP as Second Order Authentication, i-manager's Journal on Software Engineering, 13(3), 18-25.

References

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.