Abstract

Voting in this country is the most tedious job to be handled, involving all kinds of corrupted and illegal deeds. Elections in India are conducted exclusively using EVM’s developed over the past two decades by a group of government-owned companies. These devices, known in India as EVMs, have been adopted greatly for their simple design, ease of conduct, and robustness. However, recently they have also been marked prey following widespread reports of election irregularities. Despite this criticism, many details of the mechanism have never been publicly discussed, and they have not been subjected to a stringent, independent security evaluation. We conclude that in spite of the machines’ simplicity and software trusted computing base, they are vulnerable to indigenous attacks that can modify election results and violate the law of the election commission. Most of the attacks done are physical, by changing the electricals, but if the machine is connected real time to a cloud server and involves an independent screen which shows the confirmation of choice symbolically before placing the final vote, it can help in detecting problems and maintain the integrity of the system.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.