Development and Implementation of an E-Voting Mobile Application
Downloads
The fundamental right to vote or simply voting in elections forms the basis of democracy. The conduct of periodic, competitive, participatory, credible and non-violent elections is one of the main yardsticks used to determine the democratic condition of a state. In Nigeria, elections have been conducted using the manual system of voting ever since we started practicing democracy in 1999, but these elections using the manual means, have been marred with a lot of electoral malpractices and hitches. These include; violent attacks on the voters, result manipulations, vote buying, remoteness of polling centers etc. These are enough reasons that necessitate the development and implementation of an electronic voting system that goes a long way in addressing most of these problems. Nigeria’s first ever electronic voting election was in introduced on February 6, 2018 in Kaduna state independent electoral commission (KAD-SIECOM). (KAD-SSIECOM) has appointed EMPTECH to provide an integrated electronic voting solution for the purpose of conducting local government council elections in the 23 local government councils of Kaduna state in 2018. The e-voting system aims at eliminating the bottlenecks evident in the manual voting system such as; the lengthy registration process, unnecessary movement of votes units, election violence and ultimately, the incredibility of the votes. This was achieved by developing a time effective registration platform which registers a voter and assigns a voter their voter’s card immediately. The voter also gets to vote from their nearest safe and convenient polling unit and their votes is counted where it belongs. The results obtained from subsequent tests were very impressive in terms of time, security and accuracy as compared to the manual system. Such system with all these capabilities will go a long in ameliorating the aforementioned problems of the existing manual system of voting in the Nigerian electoral process.
Paul David Webb, Roger Gibbins, Heinz Eulau, “Election”, Encyclopaedia Britannica. [Online]. Available: https://www.britannica.com/topic/election-political-science. [Accessed: Aug. 05, 2019].
Toba Paul Ayeni, Adebimpe Omolayo Esan, “The Impact of ICT in the Conduct of Elections in Nigeria”, American Journal of Computer Science and Information Technology, February 09, 2018 . [Online]. Available: http://www.imedpub.com/articles/the-impact-of-ict-in-the-conduct-of-elections-innigeria.php?aid=22211. [Accessed: Aug. 05, 2019].
ACE, E-voting, The Electoral Knowledge Network, n.d., [Online]. Available: http://aceproject.org/ace-en/focus/e-voting/default. [Accessed: Aug. 07, 2019].
Victor Ekwealor, Inside Nigeria’s first ever electronic voting exercise in Kaduna State, Techpoint Africa, May 14, 2018, [Online]. Available: https://techpoint.africa/2018/05/14/kaduna-electronicvoting/. [Access: Aug. 10, 2019].
Seth Rosenblatt, Jason Cipriani, Two-factor authentication: What you need to know (FAQ), CNET, June 15, 2015, [Online]. Available: https://www.cnet.com/news/two-factor-authentication-what-youneed-to-know-faq. [Accessed: Aug. 10, 2019].
Alexandra Petru , What is two-factor authentication (2FA)?, iPhone Backup Extractor, Oct. 08, ș, What is two-factor authentication (2FA)?, iPhone Backup Extractor, Oct. 08, 2017, [Online]. Available: http://www.iphonebackupextractor.com/blog/2016/jun/3/extract-data-twofactor-authentication/. [Accessed: Aug. 11, 2019].
van Tilborg, Henk C.A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security, Volume 1 . Springer Science & Business Media. p.1305.
Jason Cipriani, Seth Rosenblatt, Two-factor verification: What you need to know (FAQ), CNET, June 15, 2015, [Online]. Available: https://www.cnet.com/news/two-factor-authentication-what-youneed-to-know-faq. [Accessed: Aug. 10, 2019].
Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi “On the (In) Security of Mobile Two-Factor Authentication” Lecture Notes in Computer Science, pp. 365-383, Nov 2014.
Alireza Pirayesh Sabzevar, Angelos Stavrou “Universal Multi-Factor Authentication Using Graphical Passwords”, Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems. pp. 625-632, 2008.
Olufemi Sunday Adeoye “Evaluating the Performance of two-factor authentication solution in the Banking Sector” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 2, July 2012.
Rahul Kale, Neha Gore, Kavita, Nilesh Jadhav, Swapnil Shinde “ Review Paper on Two Factor Authentication Using Mobile Phone” International Journal of Innovative research and Studies, Vol. 2, Issue 5, pp. 164 - 170, May 2013.
van Tilborg, Henk C.A.; Jajodia, Sushil, eds. (2011). Encyclopedia of Cryptography and Security, Volume 1 . Springer Science & Business Media. p.1305.
CardLogix Corporation, Smart Card Basics, CardLogix Corporation, 2010. [Online] Available from: http://www.smartcardbasics.com [Accessed 1/05/19].
Tarun Agarwal, How does the Smart Card Works?, ElProCus, n.d. [Online] Available from: https://www.elprocus.com/working-of-smart-card/ [Accessed 1/05/19].
MichaL Bairanzade, Smart card integration and specifications, ASPENCORE, 2002. [Online] Available from: https://www.eetimes.com/document.asp? doc_id=1200923 [Accessed 1/05/19].
Wikipedia, Smart card, Wikipedia, Wikipedia, n.d. [Online] Available from: https://en.wikipedia.org/wiki/Smart_card [Accessed 29/04/19].
D. Maio, and D. Maltoni, “Direct gray-scale minutiae detection in fingerprints”, IEEE Transactions Pattern Analysis and Machine Intelligence, vol. 19(1), pp. 27-40, 1997.
S.L.Nita, M.I.Mihailiscu, V.C. Pau,” Security and CryptographicChallenges for Authentication Based on Biometrics Data”, www.mdpi.com/journal/cryptography, pp.1-22, 2018,
K. Nallaperumall, A. L. Fred and S. Padmapriya, “A Novel for Fingerprint Feature Extraction Using Fixed Size Templates”, IEEE 2005 Conference, pp. 371-374, 2005.
M. Egele, D. Brumley, Y. Fratantonio, and C. Kruegel, “An empirical study of cryptographic misuse in Android applications,” in Proceedings of the ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), pp. 73–83, ACM, Berlin, Germany, November 2013.
Kumar,R. Chandra,P. Hanmandlu, M.,”Local directional pattern (LDP) based fingerprint matching using SLFNN”, IEEE Second International Conference on Image Information Processing (ICIIP), Pages: 493 - 498, DOI: 10.1109/ICIIP.2013.6707640, 2013.
N. Vurukonda and B.T. Rao, “A Study on Data Storage Security Issuesin Cloud,” Computing. Procedia Computer Science, 92, pp. 128-135, 2016.
Ruxandra Burtica, Eleonora Maria Mocanu, Mugurel Ionuţ Andreica, Nicolae Ţăpuş, “Practical application and evaluation of no-SQL databases in Cloud Computing”, IEEE 2012
Hoxmeier, J. A., &DiCesare, C. (2000). System response time and user satisfaction: An experimental study of browser-based applications. AMCIS 2000 Proceedings, 347.