You are on page 1of 7

Proceedings of the International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT 2023)

IEEE Xplore Part Number: CFP23CV1-ART; ISBN: 978-1-6654-7451-1

Blockchain and Internet of Things (IoT) Enabled


2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) | 978-1-6654-7451-1/23/$31.00 ©2023 IEEE | DOI: 10.1109/IDCIoT56793.2023.10053462

Smart E-Voting System


Durgesh Kumar Rajendra Kumar Dwivedi
Dept. of Information Technology and Computer Application Dept. of Information Technology and Computer Application
Madan Mohan Malaviya University of Technology Madan Mohan Malaviya University of Technology
Gorakhpur, India Gorakhpur, India
ydurgesh120@gmail.com rajendra.gkp@gmail.com

Abstract— In the present situation, most people are not Blockchain use in public key cryptography to encrypt and
satisfied with the final result of the voting system. This is decrypt the transaction over the peer-to-peer network. The
because the current system for voting is centralized and fully blocks in the b lockchain have several fields: Merkle root,
controlled by the election commission. So, there is a chance
the previous block hash, time stamp, and the actual
that the central body can be compromised or hacked and the
final result can be tempered. In this direction, a decentralized, transaction. The structure of blocks is divided into two parts:
Blockchain and IoT based methodology for voting system is headers and bodies. The headers consist of the hash of the
devised and presented in this paper. Blockchain is totally previous block, time stamp, nonce, and Merkle tree. The
transparent, secured and immutable technique because it uses body consists of all t ransactional data. The block header 80 -
concept like encryption, decryption, hash function, consensus byte field contains that metadata – the data about the blocks.
and Merkle tree etc. which make Blockchain Technology an
appropriate platform for storing and sharing the data in a  Ti me Stamp. It’s the digitally recorded mo ment of time
secured and anonymous manner. IoT makes use of biometric when the block has been mined. It is used to validate the
sensors using which people can cast their votes in not only transactions.
physical mode but also in digital mode. As a response, a  Previous Bl ock Hash. It is a 32-byte field that carries a
message is received to the owner for casting his vote to ensure
the authentication. In this way, the present voting system is 256-b it hash of the preceding block that was generated
more secure and trust-worthy by using the properties of both using the SHA-256 cryptographic hashing algorithm.
Blockchain and IoT, and therefore, election process in the This aids in building a block chain that is linear.
democratic countries is valued more. The proposed method  Nonce. Its root nu mber is contained in the 4-byte-long
ensures security as well as reduces the computational time as field. These are the only elements in a block of
compared to the existing approaches.
transactions that can be changed. Miners in PoW change
Keywords—Secu rity, Blockchain, Consensus, Smart their announcements until they locate the correct block
Contract, Merkle Tree, Hash, Nonce, IoT. hash.
 Merkle Root. A 32-bytes field containing a 256-bit root
I. INT RODUCT ION hash. It is built hierarchically by merg ing the hashes of
These days, Blockchain has been used in several each transaction into a block.
applications viz., healthcare information system, smart  Transacti onal Data. The list of all transactions in the
agriculture system, and s mart city to enhance the security block is contained in a variable-size field. Just so you
[6-8]. It is also widely used in the areas of vehicular area know, there are roughly 2000 transactions in each b itcoin
networks, social networks, and e voting systems to provide block. Each block is roughly 1 M B in size. Blockchains
the secure and efficient models [9-12]. Currently, two ways have different limits on block size and the quantity of
for voting system are used in Indian constituency system. transactions. A decision is made based on communication
The paper ballot system is the first, and the electronic voting overhead and network congestion.
mach ine is the second (EVM ). The ballot paper system is
not a secure voting system because anyone can change their A. Motivation
ballot papers. In this case, fair election is not performed. Use of blockchain technology can make the process of
Apart fro m the ballot paper the second method is using elections very easy and convenient [13-16]. In the present
EVM (electronic voting machine) which is a digital form o f situation, voters leave their homes and go to the election
voting this method is also not secure because people may center to cast their votes, which is not very voter-friendly
think that EVM can be hacked and vote can be tempered.
[17-22]. Therefore, we are to imp lement our work so that
So, dig ital voting system is placed that is entirely based on
users do not need to go to election center for casting their
blockchain technology. Introduction to Blockchain
vote and they can cast their vote fro m ho me by just using a
Technology – It is a decentralized distributed ledger system
in which t ransactions are stored in b locks and the blocks are simple web application or mobile application.
connected together with the help of hashes. In a blockchain
network, all blocks have the same authority to check and
verify the transaction details across the whole network.

978-1-6654-7451-1/23/$31.00 ©2023 IEEE 28


Authorized licensed use limited to: Australian National University. Downloaded on November 15,2023 at 23:27:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT 2023)
IEEE Xplore Part Number: CFP23CV1-ART; ISBN: 978-1-6654-7451-1

B. Contibution
This paper contributes to improve the election process in Keerthi et al. [3] The Writer's Discussion in this article
the democratic countries by proposing a blockchain based contains numerous suggestions for an entirely online-based
methodology for the security enhancement in the voting voting system. The majo rity of nations continue to use paper
system. This technique ensures the trust among various ballots for voting. Over the past ten years, electronic voting
political part ies and the people as well as prevents the systems have grown widely, yet there are still a lot of
debate over vote tampering. Apart fro m this, it will also problems. The main issues with electronic voting are safety,
make the election process much easier for the voters and legality, reliability, openness, transparency, and usability.
will maintain the security, privacy, transparency, and The choices are constrained for blockchain, though. With
anonymity of the users . the use of blockchain technology, which also provides
advantages like immutability and decentralization, it is
C. Organization possible to overcome all the problems outlined. The lack o f
Rest of the paper is organized as follows. Section 2 testing and comparison, as well as the emphasis on a single
presents the literature review of the related work. The theme, are the key problems with blockchain technology as
electronic voting system is illustrated in Section 3. Section 4 it relates to electronic voting.
describes the current electronic voting system technology.
The experimental results are reported in Section 5. Th is study presents a general-purpose electronic voting
system based on blockchain. The blockchain allo ws for the
II. RELAT ED W ORK complet ion of all processes. Once voting has started,
Bajpai et al.[1] proposed In this paper, the author focuses decentralization makes sure that the platform is totally
on providing the best digital voting system for voters and independent and cannot affect the results of the vote. Voters'
identities are protected thanks to homomorphic encryption.
organizers in democratic countries. It has long been
On three different blockchains, our solution was examined
challenging to develop a safe electronic voting system that
and compared. The results demonstrate that both public and
maintains current voting techniques, fairness and anonymity
private blockchains are accessible at very modest speeds.
while offering the flexib ility and transparency that come Due to the homomorphic encryption employed to safeguard
with electronic systems. voter data, we have created a novel method that completely
decentralizes the management of the e-voting platform.
As a result, by incorporating the qualit ies of an ideal
voting system into the digital realm, the effectiveness of the Patil et al.[4] The authors of this paper largely concentrate
voting system is strengthened. As a result, election expenses on the electronic voting mechanism. Dig ital technology has
and inspector labor have co me down significantly. As recently benefited the lives of many people. This is unlike
described in this paper, we propose the architecture of a new the voting process, which mostly relies on conventional
electronic voting system using open-source blockchain paper for imp lementation. The issues of security and
technology. Blockchain is offering new potential to develop transparency are threatened by the growing use of the
new categories of digital services. Blockchain technology conventional (offline) electoral process. General elections
has changed many aspects of our lives, including the ability are still conducted using a centralized system, wh ich is
to secure digital t ransactions made over the Internet, to supervised by a single organization. Tradit ional electoral
validate their validity, to license them, and to offer the systems have problems with the ability of the entity to
highest level of security and encryption. To store data, this completely control the database and the system's tampering
system provides a distributed architecture that spreads the with the database of the crucial opportunity, among other
data between mult iple servers. This technology not only things. Blockchain is one of the technological answers since
protects voter identity outside of the voting process but also it is based on a decentralized system in which various
makes the voting process visible. people own the complete database. The blockchain is
emp loyed by the bitcoin system, co mmon ly referred to as
Mani et al.[2] exp lained in this paper, blockchain is a the decentralized banking system. One of the primary
distributed system that validates security and dependability. methods for manipulat ing databases Blockchain technology
A new era of a reliab le and consensus -based system has can be used to spread datasets on the electronic voting
begun as a result. Since blockchain places a strong emphasis system, thereby reducing this risk. Th is study looks at how
on security, many other activ ities and processes are vote results from each election site are recorded using
following its lead. The offered dig ital Ethereu m network blockchain algorith ms. This thesis proposed a technology
currently encourages almost all activit ies and operations to that relied on each node in the underly ing blockchain taking
be carried out electronically. We have seen how the current a specific turn on the system, as opposed to Bitcoin's proof-
COVID-19 pandemic situation has changed as a result of the of-work.
election process. The suggested solution implements the
college voting mechanism utilizing the Aadhaar API and the Rathee et al.[5] In this art icle, the author discusses
Ethereu m network on a blockchain platfo rm. E-voting will blockchain and IoT -based voting systems. A smart city is an
contribute to increased transparency and voter trust, which intelligent environ ment created by the coordinated and
will help to eliminate fraud and corruption in the voting intelligent deployment of all available resources and cutting -
process. As a result of the usage of blockchain technology, edge technologies. When 5G technology and intelligent
this method will enable voters to cast their ballots fro m sensors (Internet-of-things (IoT) devices) operate together,
home with total security and dependability. users' needs are met mo re efficiently and with greater ease.

978-1-6654-7451-1/23/$31.00 ©2023 IEEE 29


Authorized licensed use limited to: Australian National University. Downloaded on November 15,2023 at 23:27:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT 2023)
IEEE Xplore Part Number: CFP23CV1-ART; ISBN: 978-1-6654-7451-1

E-voting, among other IoT use cases, is a significant document forgeries allow a single person to cast several
application that advances IoT to the next stage in the ballots. The electronic voting system and this bio metric
development of smart city technology. In traditional system can both be imp lemented in the same application.
applications, it's common to presumptively trust and We would need separate ledgers for voter preferences and
cooperate with every single device. However, in reality, biometric data, and each miner would have to verify the data
intrusions may cause disruptions in devices, causing them to before confirming a voting transaction. In this instance, the
act maliciously and degrade network functions. Because of accounts would be created using your physical data rather
this, there is a serious issue with the privacy and security than documents or emails. The ledgers would also need to
problems in e -voting systems in part icular, where hackers be updated daily with information on the number of deaths
could commit a multitude of frauds to rig the election.
and people reaching 18 (the legal voting age in India), and
III. PROPOSED M ODEL they would need to be in sync with the census. The actual
data entered can be checked using public records, police
The suggested design will be based on a smart contract
records, and, in situations of suspicion, in person at a
made with Ethereu m software to construct an electron ic
procedure that the government has allowed. For a huge
voting application where the user will establish an account
portion of the Indian populace who are not particularly
and appropriate account verification is co mpleted via voter
familiar with the technical comp lexities of technology, such
identification and other biometric techniques. Each action
as the password reset and document update possibilities, it is
taken with this account is a vote that has to be verified by a
also a simpler way.
miner. The miner will assign the vote to a vote pool for that
constituency based on the voter's identity and take into These factors may cause people to forgo the entire voting
account the voter's permanent address. The opportunity to process, which would be detrimental rather than beneficial.
register to vote will be available for a brief period of time. A one-touch option that takes them to the parties of their
Each registered vote will be processed using biometric choice and another single-touch option that allows them to
techniques, and the miner will confirm the validity of each cast their ballots while remaining in the comfort of their
vote. The miner will cancel the request when the homes sounds like a much more practical solution. The
constituency's election date has passed and any additional procedure flowchart for blockchain electronic voting is
votes have been registered. The request will also be shown in Fig. 2.
cancelled by the miner if the user's biometric authentication
fails. Voting in more than one constituency will not be
permitted by the same account holder. As a result, in o rder
to save time and minimize security risks, IoT devices
needed to be protected by projecting an effective and
trustworthy framework.

Figure 2. Proposed Methodology for Blockchain Based Voter


Fig.1 Methodology for Blockchain and IoT Based Electronic Voting Authentication .
System .
Before ensuring a secure E-voting process utilizing
By imp lementing a b io metric log in system that will blockchain technology, it is crucial to verify each person's
verify that only one individual is linked with each vote, it credentials, including name, age, date of birth, and address,
using an identification card, such as a passport, voter identity
will be possible to combat the common scenario where
card, ration card, etc. No two people could engage in the

978-1-6654-7451-1/23/$31.00 ©2023 IEEE 30


Authorized licensed use limited to: Australian National University. Downloaded on November 15,2023 at 23:27:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT 2023)
IEEE Xplore Part Number: CFP23CV1-ART; ISBN: 978-1-6654-7451-1

voting process twice or cast two votes since each individual


has a unique Passport. This approach may also be used to
catch bogus users who have stolen someone else's Passport
or those who are voting in someone else's name after they
have passed away. Additionally, thanks to a Blockchain
feature, the remaining ad min authorities would be able to
quickly identify any intrusions made by a single alteration or
other malicious action during the voting process. The
flowchart shown in Fig 3. provides a comprehensive
overview of the whole blockchain-enabled electronic voting
process, with step-by-step instructions for each stage as
follows:

 A smart phone E-voting application would be h ighly


beneficial for minimizing the time and effort wh ile
wait ing in line, which would increase the country's voting
rate.
 Every indiv idual who is qualified to vote may
successfully log in after installing the E-voting
programme by entering their Passport Number or
password. Every individual is identified or confirmed
using this eye scan or finger print identity in a b io metric
password system that ensures security and guards against
fake identities.
Figure 3. Proposed Methodology for Blockchain Based E Voting to Cast a
 A person is only allowed to proceed with the process if Vote.
their Passport Number and associated password
credentials match informat ion that has already been saved Consider a scenario where some of the invaders Breach
in the database; otherwise, they are not authorized to take IoT devices and attempt to vote under false pretenses. Then,
part in any E-voting procedures. when voter identification is done using a biometric
 The peer and miner nodes that make up the blockchain password, these fraudulent identity voters may be easily
network are in charge of voting for or confirming the detected. If attackers manage to bypass the initial phase,
network's participating nodes. they will undoubtedly be found at the subsequent stage,
 If miners have successfully validated a person's where voters are once mo re identified using miner nodes.
identification informat ion, including their date of birth, The full person's identification is maintained on a database
Passport number, residence, and voting status, they are that is connected through Blockchain, and miner nodes
then permitted to cast ballots. further verify each person to ensure a valid vote. The next
 Else stage in electronic voting is to begin counting the votes
 The voter will be identified as a false user. when the voting procedure is comp leted. Blockchain
 Additionally, the voting record is compared with a technology is crucial at the stage where it tru ly protects the
database to avoid single people from repeating their vote. electronic voting process against fraud or tampering
throughout the counting phase. There may be a strong
possibility that both internal and external organizations may
modify the provided record during the vote counting. By
retaining user transparency, the blockchain technology
would be very helpfu l in preventing these security problems.
The remain ing polling authority can promptly identify or
discover any modification or alteration of a single vote or
record and take the appropriate measures for that station.
The blockchain technology offers a h igh degree of security
in the E-voting process, whereas smart based E-voting apps
are regarded to be s mart devices where users are identified
or authorized to co mplete their votes using the application.
Let's suppose a situation as shown in Fig. 4 in order to
comprehend the advantages of blockchain throughout the
voting or counting procedure.

978-1-6654-7451-1/23/$31.00 ©2023 IEEE 31


Authorized licensed use limited to: Australian National University. Downloaded on November 15,2023 at 23:27:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT 2023)
IEEE Xplore Part Number: CFP23CV1-ART; ISBN: 978-1-6654-7451-1

B. Metamask
You may explore the scattered web of the present in your
browser with Metamask. Additionally, it enables you to run
Ethereu m on your browser without having to run a full
Ethereu m node. It contains a secure identification b lock that
gives users an interface to maintain their identities across
many websites and sign blockchain transactions.
C. NodeJS
NodeJS is an open-source, cross-platform environment
for creating networking and server-side
applications. Applications created using NodeJS can be used
on Linu x, OS X, and Microsoft Windows and are written in
Figure 4. Blockchain Based Complete E Voting Process for All Voters. JavaScript. Additionally, it offers a variety of JavaScript
modules, greatly facilitating the creation of web applications
The blockchain hashes are highly useful when someone using NodeJS.
wants to identify or spot any changes in the current blocks. A
single modification to any recorded data, such as vote totals D. ReactJS
or individual identities within the block, will, according to a A JavaScript package called ReactJS is used to create a
blockchain feature, affect the current hash. Each block variety of reusable UI co mponents. It produces user
includes the hash of the previous and current blocks, creating interface (UI) elements that can display dynamic data. React
a chain of blocks and guaranteeing the security of the is frequently used as the V in M VC. React provides a more
blockchain. Let's have a look at where a 3-block chain straightforward programming model and higher speed. Node
sequence is worn to get a better understanding of it in the
may be used to build React on the server, while React
context of E-voting. Each block in Fig. 3 denotes a cast vote
or the total number of votes cast by voters. Voter data, the Native can be used to build native apps. One-way reactive
current hash, and the hash of the following block are the data flow, which React imp lements, is less boilerp late and
three components of each block. Nu merous authorities are simpler to understand than conventional data binding.
assigned to record or preserve each vote's tally using
V. RESULT S AND DISCUSSION
Blockchain. Let's assume that a hacker tries to alter the data
of the second block from the outside or from the inside. As a result, time consumption during transaction
In such a case, any modification to the counting might processing on the blockchain network is reduced. If user
have an impact on all blocks that come after the data or vote requests are increasing, then computational time will also
information has been uploaded. This results in an irrational increase, as seen in Fig 5. User demand is decreasing, so
update of the hash of the present block as well as of blocks 3 computation time also decreases. Power consumption is also
and all succeeding blocks because they no longer have a increasing in blockchain transactions.
valid hash of the prior block. Therefore, changing a single 50
chunk will render all the following blocks unusable. This
Computation Time (Sec)

paper's focus is on analyzing the legitimacy of IoT devices 40


where hackers attempt to explo it them in order to cast
30
fraudulent votes. The suggested framework is examined in
relation to a number of networking aspects, including the 20
likelihood that it is accurate, the potency of an attack, and the
10
requests that hacked IoT devices in the network may
perform. 0
50 100 150 200
IV. EXPERIMENT AL ENVIRONMENT
User Request
A. Solidity
The Ethereu m Network team created Solidity, an object-
oriented programming language, for the purpose of building Figure 5. Number of User Requests Vs Computational T ime
and developing smart contracts on blockchain systems. It is
applied to the development of s mart contracts, which apply When the number of voters in the system grows, so does
business logic and produce a series of transaction records the authentication time increase because there are many
processes for very detailed information available in the
within the blockchain framework. It serves as a tool for
system, like passport number, bio metric details, etc. Du ring
writing mach ine-level code and comp iling it for use with the
the voting process, the system verifies all of the voter's
Ethereu m Virtual Machine (EVM). It is quite similar to C
informat ion. In this case, the authentication process takes
and C++ and is rather easy to learn and comprehend. A
more t ime for a co mplete transaction on the blockchain
"main" in C is co mparable to a "contract" in Solid ity, fo r network, as seen in Fig 6.
instance.

978-1-6654-7451-1/23/$31.00 ©2023 IEEE 32


Authorized licensed use limited to: Australian National University. Downloaded on November 15,2023 at 23:27:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT 2023)
IEEE Xplore Part Number: CFP23CV1-ART; ISBN: 978-1-6654-7451-1

[2] A. Mani, S. Patil, S. Sheth, and L. S. Kondaka, “College Election


Authentication Delay 5 System using Blockchain,” ITM Web Conf., vol. 44, p. 03005, doi:
10.1051/ itm conf/20224403005(2022).
4
[3] K. Keerthi, N. Venkatesh, G. D. Lakshmi, N. S. Chand, and D.
3 Haritha, “JOURNAL OF CRITICAL REVIEWS E-Voting System
using Blockchain T echnology.” (2010).
2 [4] B. Patil, D. Naringrekar, and P. Mahapatro, “EasyChair Preprint
Voting System Based on Blockchain Technology VOTING SYST EM
1 BASED ON BLOCKCHAIN T ECHNOLOGY,” (2022).
[5] G. Rathee, R. Iqbal, O. Waqar, and A. K. Bashir, “On the Design and
0 Implementation of a Blockchain Enabled E-Voting Application
50 100 150 200 within IoT-Oriented Smart Cities,” IEEE Access, vol. 9, pp. 34165–
Number Of Voters 34176, doi: 10.1109/ACCESS.2021.3061411(2021).
[6] Atul Lal Shrivastava, Rajendra Kumar Dwivedi, "A Secure Design of
the Smart Vehicular IoT System using Blockchain T echnology", 9th
IEEE International Conference on Computing for Sustainable Global
Figure 6. Number of Voters Vs Authentication Delay Development (16th INDIA Com 2022), Bharati Vidyapeeth, New
Delhi, India, to be held on 23-25
DOI: 10.23919/INDIACom54597.2022.9763216(March, 2022).
In the blockchain network, miners verify the accuracy of
voters by performing transactions by the valid voters in the [7] Hamdan, Yasir Babiker, and A. Sathesh. "Construction of Efficient
Smart Voting Machine with Liveness Detection Module." Journal of
system. As the number of miners on the blockchain network Innovative Image P rocessing (JIIP) 3, no. 03 (2021): 255-268.
increases, accuracy also increases, as seen in Fig 7. Du ring [8] Ayyasamy, S. "Metadata Securing Approach on Ubiquitous
executing the transaction number of users, the accuracy is Computing Devices with an Optimized Blockchain Model." Journal
also perfect. of Ubiquitous Computing and Communication Technologies 4, no.
2(2022): 57-67.
[9] Atul Lal Shrivastava, Rajendra Kumar Dwivedi, "Designing A Secure
99

Vehicular Internet of Things (IoT) using Blockchain", Part of the


97

LNNS Book Series, Springer, 6th Springer International Conference


ACCURACY %

on Inventive Systems and Control (ICISC 2022), JCT College of


95

Engineering and Technology, Coimbatore, India, 6-7 Jan 2022.


93

[10] Atul Lal Shrivastava, Rajendra Kumar Dwivedi, "Air Quality


91

Prediction using Supervised Machine Learning T echniques", Part of


the SIST Book Series, Springer, 6th Springer International
Conference on Information and Communication Technology for
Intelligent Systems (ICTIS 2022), Ahmedabad, India, 22-23 April
2022.
25 50 75 100 125 [11] Neelam Chauhan, Rajendra Kumar Dwivedi, "Designing A Secure
Smart Healthcare System with Blockchain", Part of the LNNS Book
NUMBER OF MINERS Series, Springer, 6th Springer International Conference on Inventive
Systems and Control (ICISC 2022), JCT College of Engineering and
T echnology, Coimbatore, India, 6-7 Jan 2022.
Figure 7. Number of Miners Vs Accuracy [12] Neelam Chauhan, Rajendra Kumar Dwivedi, "A Survey on Designing
A Secure Smart Healthcare System with Blockchain", Part of the
LNDECT Book Series, Springer, 3rd Springer International
VI. CONCLUSION A ND FUT URE DIRECT IONS Conference on Mobile Computing and Sustainable Informatics
(ICMCSI 2022), Tribhuvan University, Nepal, 27-28 Jan 2022.
A hybrid system that allows for scenarios where [13] Trishla Kumari, Rakesh Kumar, Rajendra Kumar Dwivedi, "Design
whitelisted access is necessary but all transactions are of A Secure and Smart Healthcare IoT with Blockchain: A Review",
visible to the public is a permissioned, public, shared Part of the SIST Book Series, Springer, 6th Springer International
Conference on Information and Communication Technology for
blockchain. Transparency will be provided, which is Intelligent Systems (ICTIS 2022), Ahmedabad, India, 22-23 April
essential in democracies. However, there are solutions for 2022.
some of the additional issues that e-voting may bring, such [14] Yu, B. et al. (2018). Platform-Independent Secure Blockchain-Based
as preserving privacy, particularly in the case of public Voting System. In: Chen, L., Manulis, M., Schneider, S. (eds)
Information Security. ISC 2018. Lecture Notes in Computer
permission-less blockchains. Another issue is how quickly Science(), vol 11060. Springer, Cham. https://doi.org/10.1007/978-3-
the transactions can be validated. Therefore, wh ile many 319-99136-8_20.
problems are claimed to be solved by blockchain [15] Hsiao, JH., Tso, R., Chen, CM., Wu, ME. (2018). Decentralized E-
technology, one area where it may ultimately make sense is Voting Systems Based on the Blockchain Technology. In: Park, J.,
Loia, V., Yi, G., Sung, Y. (eds) Advances in Computer Science and
electronic voting systems. Ubiquitous Computing. CUTE CSA 2017 2017. Lecture Notes in
Electrical Engineering, vol 474. Springer, Singapore.
In future, this research work can be extended on https://doi.org/10.1007/978-981-10-7605-3_50.
consensus protocols and smart contracts to enhance the [16] Li, C., Xiao, J., Dai, X. et al. AMVchain: authority management
mechanism on blockchain-based voting systems. Peer-to-Peer Netw.
security and improve the computational time. Appl. 14, 2801–2812 (2021). https://doi.org/10.1007/s12083-021-
01100-x.
REFERENCES
[17] Xiao, S., Wang, X.A., Wang, W., Wang, H. (2020). Survey on
[1] Mansi Bajpai, Atebar Haider, Dr. Alok Mishra, Dr. Yusuf Perwej, and Blockchain-Based Electronic Voting. In: Barolli, L., Nishino, H.,
Dr. Neeta Rastogi, “A Novel Vote Counting System Based on Secure Miwa, H. (eds) Advances in Intelligent Networking and Collaborative
Blockchain,” Int. J. Sci. Res. Sci. Eng. Technol., pp. 69–79, doi: Systems. INCoS 2019. Advances in Intelligent Systems and
10.32628/ijsrset22948(Jul. 2022). Computing, vol 1035. Springer, Cham.
[18] Pawlak, M., Guziur, J., Poniszewska-Marańda, A. (2019). Voting
Process with Blockchain Technology: Auditable Blockchain Voting

978-1-6654-7451-1/23/$31.00 ©2023 IEEE 33


Authorized licensed use limited to: Australian National University. Downloaded on November 15,2023 at 23:27:08 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT 2023)
IEEE Xplore Part Number: CFP23CV1-ART; ISBN: 978-1-6654-7451-1

System. In: Xhafa, F., Barolli, L., Greguš, M. (eds) Advances in In: Themistocleous, M., Rupino da Cunha, P. (eds) Information
Intelligent Networking and Collaborative Systems. INCoS 2018. Systems. EMCIS 2018. Lecture Notes in Business Information
Lecture Notes on Data Engineering and Communications Processing, vol 341. Springer, Cham. https://doi.org/10.1007/978-3-
Technologies, vol 23. Springer, Cham. https://doi.org/10.1007/978-3- 030-11395-7_2.
319-98557-2_21. [21] Neelam Chauhan, Rajendra Kumar Dwivedi, "A Secure Design of the
[19] Abayomi-Zannu, T.P., Odun-Ayo, I., Tatama, B.F., Misra, S. (2020). Healthcare IoT System using Blockchain Technology", 9th IEEE
Implementing a Mobile Voting System Utilizing Blockchain International Conference on Computing for Sustainable Global
Technology and T wo-Factor Authentication in Nigeria. In: Singh, P., Development (16th INDIACom 2022), Bharati Vidyapeeth, New
Pawłowski, W., Tanwar, S., Kumar, N., Rodrigues, J., Obaidat, M. Delhi, India, to be held on 23-25, DOI:
(eds) Proceedings of First International Conference on Computing, 10.23919/INDIACom54597.2022.9763187( March, 2022).
Communications, and Cyber-Security (IC4S 2019). Lecture Notes in [22] Neelam Chauhan, Rajendra Kumar Dwivedi, "Designing A Secure
Networks and Systems, vol 121. Springer, Singapore. Smart Healthcare System with Blockchain: A Review", 1st IEEE
https://doi.org/10.1007/978-981-15-3369-3_63. International Conference on Informatics (ICI 2022), JIIT, Noida,
[20] Chaieb, M., Yousfi, S., Lafourcade, P., Robbana, R. (2019). Verify- India, to be held on 14-16 April, 2022, DOI:
Your-Vote: A Verifiable Blockchain-Based Online Voting Protocol. 10.1109/ICI53355.2022.9786895(April, 2022).

978-1-6654-7451-1/23/$31.00 ©2023 IEEE 34


Authorized licensed use limited to: Australian National University. Downloaded on November 15,2023 at 23:27:08 UTC from IEEE Xplore. Restrictions apply.

You might also like