MID Term Progress Report Final FInal
MID Term Progress Report Final FInal
SCHOOL OF ENGINEERING
Bachelor of Engineering
Project Members:
May 2024
ABSTRACT
i
ACKNOWLEDGEMENT
We would like to extend a very warm thanks to our project coordinator, Mr. Pramish
Shrestha, for approving our project, "Electronic Voting System" as our academic project
for the duration of this semester. We would also like to express our profound gratitude to
our supervisor Anand Gachhadar, for his guidance, because of which the progress of our
project is possible. Finally, we would also like to share our sincere gratitude to the entire
faculty of the Department of Electrical and Electronics Engineering for the help and support
during this project. Additionally, we expect such help and guidance in the near future.
ii
TABLE OF CONTENTS
ABSTRACT.......................................................................................................................... i
iii
CONCLUSION .................................................................................................................. 18
REFERENCES .................................................................................................................. 19
iv
LIST OF ABBREVIATIONS
v
LIST OF FIGURES
vi
LIST OF TABLES
vii
CHAPTER I: INTRODUCTION
In comparison to the traditional paper ballot voting systems, e-voting systems have many
advantages such as lower costs, the reduction of manual errors, and increased accessibility
for potential voters. Electronic voting systems include EVM placed in polling stations. E-
voting systems have the potential to modernize electoral processes, improve accessibility,
and enhance the integrity and efficiency of elections. However, their adoption and
implementation require careful consideration of security, accessibility, and transparency
considerations to ensure that they uphold democratic principles and maintain public trust
in the electoral process.
This electronic voting system incorporates an ID card reader and Fingerprint Sensor to
prevent unauthorized access. Eventually, verified voter data is securely stored to maintain
confidentiality. To confirm a selection, voters must press the button again, turning it blue,
thus minimizing errors and affirming the vote's accuracy.
All data is promptly recorded and stored securely on servers to prevent interference.
Furthermore, voting results are processed and displayed for public surveys, transparency
and accountability. This comprehensive approach ensures the reliability and integrity of the
digital voting system, instilling confidence among voters.
1
1.2 Problem Definition
EVM were first tested in Nepal in the 2008 federal assembly elections. The response to this
test was positive. Since then, Nepal has been carrying out calculations using ballot papers.
As a result, Nepal’s digital transformation has come a little later which involved the audit
and tally system as manual but the ballot system with electronic advancements.
In a traditional paper-based voting system there are several factors that violate the whole
electoral process such as counting of votes, fake voters and involvement of outside sources
and other problems like time consumption, cost budget problems etc. So, the purpose of
this year’s project is to model a reliable and functioning E-voting system so that a vote can
be given and tallied in a secure manner while maintaining the voting norms.
1.3 Objectives
ii. Creating a database and a proper tally system to make voting more efficient.
2
CHAPTER II: LITERATURE REVIEW
This section explains the relevant studies which have been already conducted relating to
the Electronic Voting System topics in different domains.
V. Kiruthika Priya, et. al (V. K. Priya, 2017) created an electronic voting machine that
helped to eradicate defrauding the manual voting systems and prior versions of electronic
voting. The thesis looked into and proposed a system that included multiple layers of
verifications to ensure the reliability of the device. With the inclusion of biometric
fingerprint sensors, each voter is entered into the system only after being recognized and
checked with the given database of enlisted voters. Once the corresponding fingerprint is
matched with the information provided, the voter will be allowed to proceed to choose their
preferred candidate from the panel of buttons. The final vote is then displayed onto an LCD
for the satisfaction of voters. The proposed project displays transparency and carries the
feature of being autonomous during operation.
Nakriya Brenda Kintu, et.al (Abdulhamid, 2013) designed “A Secure E-Voting System
Using Biometric Fingerprint and Crypt-Watermark Methodology”. The design fingerprint
sensor for gaining the biometric data which was tallied with database and result was given
if the user is verified or not after which they were allowed to vote or denied. The systems
were used in Estonia and Brazil for local as well as national elections. The system utilized
biometric fingerprint technology and crypt-watermark methodology to ensure security.
Biometric fingerprints were employed to authenticate voters, thereby enhancing system
accuracy and preventing unauthorized access. In addition, crypt-watermarking techniques
were applied to embed digital watermarks into ballots, safeguarding them against
interference. This dual-layered approach combined biometric verification with
cryptographic safeguards, resulting in a robust and secure e-voting platform that enhanced
trust and integrity in the electoral process.
Ronald L. Rivest (Norden, 2019) introduced “The Three Ballot Voting System” who
designed a system which not only lets each voter verify that the vote is recorded as they
intended, but they get a “receipt” that can be taken home that can be used later to verify
that his/her vote is included in the final tally. The receipt, however, does not allow them to
prove to anyone else how they voted. In the Three Ballot Voting System, voters are given
three blank ballots, identical except for a unique identifier that is distinct for each ballot.
3
To vote for a candidate, the voter must select that candidate on two of the three ballots. To
vote against a candidate (the equivalent of leaving a ballot blank in other systems), the voter
must select that candidate on exactly one ballot.
A.G. Rao, et. al (India, 2014) developed the EVM consisting of a control unit and a
balloting unit connected by a five-meter cable. It recorded up to 3840 votes for 64
candidates that ran on a 6-volt alkaline battery. The program controlling the EVM was
etched permanently in silicon during manufacturing to prevent alterations. Tamper-proof
protocols included once-write software and real-time inventory tracking by the Election
Commission of India, ensure security. EVM had no wireless components and were
designed to withstand power interruptions, making them reliable for elections in areas with
erratic power supply.
Friðrik Þ. Hjálmarsson (Pathak, 2021) introduced a system to utilize a 6-digit PIN alongside
electronic IDs from Auokenni for voter authentication and introduced a dual-layered
approach to verify voter identity. While this system enhanced security by requiring two
forms of authentication, there remained a concern that individuals could exploit it to cast
multiple votes if they possessed knowledge of multiple electronic IDs and their
corresponding PINs. The system was tested a number of times but couldn’t pass the final
verification due to lack of end-to-end encryption and security factors.
Syed Mahmud Hasan, et.al (Hasan, 2014)created an electronic voting machine that helped
eradicate fraud in manual voting systems by preventing multiple votes from the same user.
With the inclusion of a Near Field Communication ID card reader and biometric fingerprint
device, each voter entered the system swiftly only after being recognized and checked
against the database of enlisted voters. Once the corresponding fingerprint was matched
with the information provided by the identification card, the voter was allowed to vote for
their preferred candidate through a panel of buttons. The respective card was then marked
for further referencing, and the voter was not allowed to take part in multiple votes. The
proposed project also carried the unique feature of being autonomous during the course of
operation, which helped diminish the issue of hacking occurring in previous attempts of
electronic voting machines.
The paper "A Secure e-Government's e-Voting System," designed by Essam M. Ramzy
Hamed and Muhammad Hosam Sedky, offers an effective electronic voting solution made
4
to handle the security issues related to voting processes. This modern system, called the
Voting Model System (VMS), attempts to guarantee the accuracy, privacy, and integrity of
voting processes. Through the use of strong authentication protocols, encryption methods,
and decentralized data management, the VMS provides an efficient and dependable way to
hold elections. The study places the development of the VMS into the larger context of
electoral technology by conducting a detailed literature review of all currently in use e-
voting systems worldwide. It does this by identifying major successes and implementation-
related issues faced by different countries.
5
CHAPTER III: PROJECT METHODOLOGY
The process starts with a human verification mechanism that uses a fingerprint sensor and
ID card reader to verify each voter's identification and stop illegal access. After being
validated, the voter's information is safely kept protecting privacy and stop illegal access.
Only the buttons that have been selected will illuminate green to show that a decision has
been made during the voting phase of the interface. The system asks for confirmation by
pressing the button once again after choosing a candidate or choice, turning it green to
indicate that the selection has been made. By using a twofold confirmation process,
mistakes are reduced, and the validity of the vote is guaranteed.
All data is automatically captured in the background and kept on file on the server for future
use and auditing. The server protects the integrity of the data it stores by using strong
encryption and security procedures that forbid manipulation or tampering. Furthermore, the
voting results are correctly computed and processed, and the final total is visible to the
public on the internet, indicating accountability and openness in the electoral process. This
thorough process guarantees a dependable and trustworthy digital voting system, inspiring
confidence in both stakeholders and voters.
6
3.2 Existing Electronic Voting System in Nepal
7
3.3 Circuit Simulation
8
3.4 Website Design
9
Figure 8 – Admin Page
The website has been crafted using a combination of HTML, CSS, and JavaScript. The
registration functionality on the page is enabled by PHP, while JavaScript handles the
onclick events. The site comprises four distinct pages: the initial login page, where voters
and officials select their desired destination; the admin page, which includes a registration
page to safeguard sensitive information; the "Home" page, showcasing candidate and party
details; and the "Admin" page, which presents voter information. Additionally, the "About"
page will give details about the Electronic Voting System's procedures.
10
3.5 Database
The e-voting system's DFD shows how data flows through the system. It consists of voters
as external entities, voter RFID and Fingerprint Reading, Display in Site and Voting
Interface as computation procedures, as well as data repositories such the List of Voters,
List of Candidates, RFID and Fingerprint as databases. While candidate information flows
to the voting process, voter information comes from the RFID and Fingerprint Database
and is used in the verification process. Election results are kept in the Display and
Evaluation Database, while votes are tracked in the Voter's Database. This graphic
representation ensures openness and efficiency in the electronic voting process by helping
people understand how data flows through the system from voter registration to result
declaration.
11
3.6 User Case Diagram
The voting process's interactions and functionalities are shown in the EVM Use Case
Diagram. Three main actors are involved: administrators, election officials, and voters.
Voters view the list of candidates, cast votes, and confirm their identities. Voters are
counted and the procedure is monitored by election officials. The EVM system is
configured and maintained by administrators. A secure and efficient election process is
provided by these actors and their use cases. Voters engage in three activities: watching
candidates, checking identities, and casting votes. Votes counting and recording are
handled by election officials. The EVM system's configuration and care are performed by
administrators. The key interactions and features of the EVM during an election are
presented in this figure.
12
3.7 Entity Relation Diagram
The ER diagram displays the relationships between the various entities in the electronic
voting system. It includes candidates, voters, ballots cast, and election results. The "voters"
entity contains attributes such as voter_id, voter_name, rfid_card_id, and
fingerprint_template. Candidates are represented by the "candidates" entity, which has the
attributes candidate_id, candidate_name, and party_affiliation. Among the features that
remain with the "votes" item are vote_id, voter_id, candidate_id, and vote_timestamp.
Finally, the number of votes each candidate receives is tracked by the "election_results"
entity, which has the attributes candidate_id and votes_received. Voters' actions, such as
casting ballots, giving votes to candidates, and using those votes to determine election
results, define the connections between these entities. This ER diagram provides an
extensive synopsis.
13
CHAPTER IV: RESULT AND ANALYSIS
By now, we have created a structure for database and website design. Also, we have
conducted tests for RFID and Fingerprint sensor. The work to be accomplished includes:
14
CHAPTER V: DISCUSSION AND CONCLUSION
By following the outlined approach in the E - voting system, we expect achieving accuracy
through careful verification and a double confirmation process. Our focus in this project
includes strong verification measures and safe data storage. Ultimately, our goal is to create
an E - voting system that voters can rely on, upholding the principles of democracy and
meeting the needs of all involved.
15
Figure 15: 2017 Election Poll Result Shown Live
5.3 Limitations
16
GANTT CHART
Activities Duration
Semester 1 Semester 2
Feb Mar April May June Aug Sept Oct Nov Dec
Literature Review
Proposal Defense
Circuit Design
and Breadboard
Testing
Mid-term
Presentation
Software Testing
PCB Making
Assembly
Testing and
Modification
Final Presentation
Work Completed
Work to be Completed
17
CONCLUSION
18
REFERENCES
19