You are on page 1of 5

A Report on

A secured biometric voting system using RFID linked with


The Aadhar database

Submitted in the partial fulfilment of


Project assignment
By
Name PRN
Anik Mukherjee 20030241005
Shreya Gandhi 20030241041
Souvik Pyne 20030241044
Subhajit Ghosh 20030241045
Susmita Paul 20030241047

Division A
Batch 2020-22
Subject Internet of Things
Semester II
Date 30th March 2021
Submitted to Dr Hemraj S. L.
Abstract - The only way that people can problems, we need to incorporate secured
affect decision-making in a representative biometric approach for identification and
democracy is by voting. It has always been authorizing purpose. For this we have
a tedious task for the election commission chosen human fingerprint which is
to conduct a fair election. More over huge considered as a very popular identifier that
amount of money is spent to maintain this can provide a fast, simple, cost-effective
whole infrastructure. The problem in the and safe measure to authenticate a person
existing system is that there are no recent with the correct access privileges.
security measures on electronic voting
machines in which voters could check Even research done by computer scientists
their identity before voting as a result at the Commerce Department's National
false voter can cast multiple duplicates Institute of Standards and Technology
and counterfeit votes. Our proposed (NIST)Study Shows Computerized
system could easily mitigate all these Fingerprint Matching is extremely precise
issues by implementing two factor
and Accurate. The performance depends
authentications before an applicant can
cast a vote, one by scanning the RFID tag on the extent to which fingerprints were
which will replace the current voter card matched by a particular person. The best
and by biometric scanning to confirm the system shows that accuracy is 98.6% on
identity which will be mapped with the single finger tests, 99.6% on two-finger
Aadhar database. This will ensure that the tests and 99.9% on tests involving four or
voting rights are accessed by a legitimate more fingers and the precision values were
user and will avoid fake, repeated voting. obtained at a 0.01 percent false positive
In case an unauthorized applicant tries to rate.
cast vote, our system will block that RFID
tag will raise alert for impersonating and Another method of individual
illegal voting. Even all the vote casted will identification is Radio-frequency
be directly tracked into the database identification (RFID) which uses
mapped with the Aadhar number. The electromagnetic fields to automatically
system not only improves the voting identify the stored information. It is quite
counting method but will also provide similar to barcode scanning but it is more
maximum security and reliability as well. secure and reliable. RFID comprised of
three components an RFID tag, RFID
reader and an antenna. The tags have a
Keywords- RFID, Biometrics, Database built-in circuit and an antenna that is often
called an interrogator to relay data to
readers. The reader then transforms the
1. INTRODUCTION radio waves into more functional data
form. The data from the tags is then passed
The chief election commissioner HS on to a host computer system through a
Brahma in 2015 reported that in India communication interface, where the data
roughly 85 million names were either false can be saved in a database and analyzed
or duplicate in the electoral rolls of India. later.
Even there are lot of theories which Our model proposed that during election,
explains that vote has been casted by the for the initial authorization the voter has to
people who are already been dead. All this swipe his/her RFID card. This will check
clearly portrays how inefficient our current the unique identification number (UIN)
system is and how we are misled from our mapped with the Aadhar database and will
basic democratic voting rights to choose activate the system. Followed by this, the
government. In order to address all these user has to provide the thumb impression
as input to the system. If the particular voter, and records it in its memory. An
pattern matches with one of the available instruction of close command is provided
records in the Aadhar database then only by a polling stand officer from the control
access is granted to cast a vote. But in case unit to lock the voting unit in order to
the pattern doesn’t match with the records avoid repeated votes. The procedure is
of the Aadhar database or in case of reversed as the next elector appears before
repetitive votes, access to a vote is denied the polling stand officer with a new ID.
or the vote gets rejected for that particular
number. This will ensure a smooth and
transparent voting process. In addition to 2.1 DRAWBACKS
the immediate election outcome, the total
expense of holding elections would be Some of the drawbacks of the current
reduced. EVM are as follows: -
 Great risk that the wrong imitator
since the identification process of
2. ELECTRONIC VOTING
voters is manual.
SYSTEM  Big chance of illegalizes voting
since External chip is used to store
The Electronic Voting Machine (EVM)
the votes.
can be controlled with the help of
 Continuous power supply is
controllers, machines and computerized
needed.
voting equipment in order to facilitate the
voting process in an election. There are  Requires large amount employing
two modules in EVM, one is the control staffs to manage this whole
unit and one is the voting unit. A five- infrastructure.
meter cable connects the two systems.  Tampering in the control unit of
Voters can vote through the voting unit, EVM is quite easy.
while the control unit controls the voting
units, stores voting numbers and displays
results on seven LED displays. BLOCK DIAGRAM
The Block diagram consists of 4 major
parts
 Fingerprint Module - In order for
each elector to recognize
themselves, the fingerprint sensor
is interfaced to a microcontroller.
The module is composed of
fingerprint optical sensor, DSP
Fig- processor and flash memory. For
The control unit is run by one of the example, finger print module R305
officers at the polling booth, while the has been used for basic prototype.
balloting unit is handled in private by the
voter. The officer checks the ID of the  RFID Module- This module is
voting person and electronically unlocks made up of an RFID reader module
the voting machine for a new vote. Once
the voter enters the vote, the balloting unit interface microcontroller to read
displays the list of voting candidates to the RFID cards. The RFID cards have
a unique ID that can specifically
recognizes each elector which in
turn will be linked with the Aadhar
WORK FLOW OF OUR MODEL
database. For example, RC522 has
been used for building the
prototype which consists of a RFID
reader, RFID card and a key chain.
It operates on frequency range of
13.56MHz which is industrial
(ISM) band and operates at 3.3V.

 Voting Unit- It consist of the


Polling keypad, Buzzer and the
LCD display. This unit is only
activated if the RFID card and
biometric scan have detected an
individual elector after checking
from the database. For example,
LCD module LCD1602 and Buzzer
Module KY-012 is used for
building the prototype.

 Power Supply - Power Supply


consists of a step-down transformer
and diodes connected to form a
bridge rectifier to generate a
constant 5v supply. In case of
emergency 5v batteries can also be
added.

Fig –

We have proposed that that paper voter


card should be replaced with the RDID tag
which contains a UIN mapped with our
Aadhar database. So, when a voter goes to
the polling booth to vote he/she has to
swipe this card to get access. If the UNI
number doesn’t match with our database,
then a alert will be raised and the person
Fig – will not be allowed to enter the polling
booth further. If the UIN number matches,
then the person gets his entry where he has
to give his digital thumb impression. If the
thumb impression doesn’t match then
again, an alert is raised and the UIN
number against that particular RFID card
is blocked

You might also like