Towards One Person, One Vote via Real-Time Voter s Registration and Identification

Similar documents
E- Voting System [2016]

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)

AN EVALUATION OF MARYLAND S NEW VOTING MACHINE

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)

E-Voting, a technical perspective

Estonian National Electoral Committee. E-Voting System. General Overview

WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED?

Secure Voter Registration and Eligibility Checking for Nigerian Elections

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

The problems with a paper based voting

L9. Electronic Voting

Volume I Appendix A. Table of Contents

Office of Al Schmidt City Commissioner of Philadelphia

Electronic Voting in Belgium Past, Today and Future

Additional Case study UK electoral system

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College

THE FEASIBILITY OF HARMONIZATION OF NATIONAL IDENTITY DATA AND VOTER REGISTER: The Technical Challenges, Legal Obstacles and the Opportunities

Privacy Issues in an Electronic Voting Machine

Case Study. MegaMatcher Accelerator

Voting Corruption, or is it? A White Paper by:

Security Analysis on an Elementary E-Voting System

The Use of New Voting Technologies (NVT)

Online Voting System Using Aadhar Card and Biometric

Colorado Secretary of State Election Rules [8 CCR ]

POLLING TOUR GUIDE U.S. Election Program. November 8, 2016 I F E. S 30 Ye L A

L14. Electronic Voting

FAQ s Voting Method & Appropriateness to PICC Elections

Smart Voting System using UIDAI

M-Vote (Online Voting System)

Good morning. I am Don Norris, Professor of Public Policy and Director of the

Election Inspector Training Points Booklet

CHAPTER 2 LITERATURE REVIEW

Statement on Security & Auditability

SECURE REMOTE VOTER REGISTRATION

The E-voting Controversy: What are the Risks?

Arthur M. Keller, Ph.D. David Mertz, Ph.D.

Voting System Examination Election Systems & Software (ES&S)

TO: Chair and Members REPORT NO. CS Committee of the Whole Operations & Administration

Introduction of Electronic Voting In Namibia

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

ANTI FRAUD MEASURES. Principles

Municipality of Chatham-Kent. Legislative Services. Municipal Governance

CALIFORNIA DEMOCRATIC PARTY PROMOTE AND PROTECT THE VOTE (P2TV) Twenty- Eight Questions for Election Day, November 8, 2016

BIOMETRICS - WHY NOW?

Election 2000: A Case Study in Human Factors and Design

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

AADHAAR BASED VOTING SYSTEM USING FINGERPRINT SCANNER

VOTERGA SAFE COMMISSION RECOMMENDATIONS

Aadhaar Based Voting System Using Android Application

Implementation of aadhar based voting machine using

PINELLAS COUNTY VOTER GUIDE INSIDE. D e b o r a h Clark. S u p e r v i s o r of Elections. P i n e l l a s County. - How to Register to Vote

GAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments

The usage of electronic voting is spreading because of the potential benefits of anonymity,

THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING

Supporting Electronic Voting Research

The purchase of new voting equipment

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

Response to the Scottish Government s Consultation on Electoral Reform

Bandwidth and Resource Allocation for Full Implementation of e-election in Nigeria Nsed A.Akonjom and Julie C.Ogbulezie

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

Office for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING

Every electronic device used in elections operates and interacts

2018 General Election FAQs

CALTECH/MIT VOTING TECHNOLOGY PROJECT A

Biometrics: primed for business use

Colorado Secretary of State Election Rules [8 CCR ]

Mecklenburg County Department of Internal Audit. Mecklenburg County Board of Elections Elections Process Report 1476

VOTER INFORMATI ON VOTE SAR A SOTA COUNTY. Ron Turner SUPERVISOR OF ELECTIONS

APPLICATION REVIEW A SILICON TRUST PUBLICATION. May Utilising the synergies between passports and eid cards

Thoughts On Appropriate Technologies for Voting

Key Considerations for Oversight Actors

Designing issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.

Ballot Reconciliation Procedure Guide

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

Voting Protocol. Bekir Arslan November 15, 2008

2018 Municipal Election. Policies & Procedures. Internet & Telephone Voting

A MESSAGE FROM OUR SUPERVISOR OF ELECTIONS

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

TRADITIONAL (PAPER BALLOT) VOTING ELECTION POLICIES and PROCEDURES. for the 2018 MUNICIPAL ELECTION October 22, 2018

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

BILINGUAL ELECTION OFFICER HANDBOOK

Recommendations of the Symposium. Facilitating Voting as People Age: Implications of Cognitive Impairment March 2006

Electronic Voting Machine Information Sheet

A paramount concern in elections is how to regularly ensure that the vote count is accurate.

How biometrics can improve the targeting of social protection. What we do. How we do it.

The Angola National ID Card

I-A. Voting Systems As Part of Cyber Security Critical Infrastructure.

ELECTION MANUAL FOR REGIONAL CONVENTIONS

Experiences as an e-counting election observer in the UK

14 Managing Split Precincts

User Research of a Voting Machine: Preliminary Findings and Experiences

about Frequently Asked Questions: VOTING IN SIERRA LEONE Why is it important for Sierra Leoneans to vote? Who is eligible to vote in Sierra Leone?

Key Considerations for Implementing Bodies and Oversight Actors

Testimony of George Gilbert Director of Elections Guilford County, NC

Enhanced Automated Biometric Web-Based Electronic Voting System for Nigeria

Titanic Exhibition Centre Count centre Information pack

National Intelligence, 2017 at iii; Securing Elections from Foreign Interference, Brennan Center for Justice, June 29, 2017 at 4.

ABC systems in Europe and beyond - status and recommendations for the way forward

Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals

Transcription:

Towards One Person, One Vote via Real-Time Voter s Registration and Identification B. Isong 1, O. Ekabua 2 and M. Mbodila 3 1 Department of Computer Science and Information Systems, University of Venda, Thohoyandou, South Africa 2 Department of Computer Science, North West University, Mmabatho, South Africa 3 Science Foundation - Computer Science Unit, University of Venda, Thohoyandou, South Africa Abstract - The transparency and trustworthiness of any electoral process and their result is what characterized it to be free and fair. Although many voting systems exist, yet the voting systems does not guarantee one man one vote, nor ensures that the vote is cast by an authentic person. This results to discrepancies like chain voting, multiple voting, and impersonation emanating from multiple registrations during the electoral process. When these exist, the trustworthiness and the integrity of our elections are threatened and compromised resulting to failures or corruption of the democratic process. To stop these forms of elections fraud, voters need some form of identification in a real-time mode beginning from the registration exercise. Our objective is to propose a form of voter s registration and identification that ensures that one person votes only once. In this paper, we propose a solution of dealing with the problems during elections through the use of real-time registration and identification of voters utilizing RFID and biometric technologies. Keywords: Elections, Election frauds, Registration, Identification, Democracy, RFID 1 Introduction Since the 17 th century, elections have been the standard mechanism by which modern representative democracy has functioned. Elections constitute government initiated process that provides citizens with a service decided by a vote. It is seen as a viable decision making mechanism through which democracy can be empowered. The end product is always the election result. To have an acceptable result, it is thus crucial to organize elections in an unbiased and fair way devoid of manipulations [17]. This is because the public can only gain confidence in the electoral system if it is based on transparently fair, strong procedures and working methods [1][11][20]. One way to achieve this is when some form of Information and Communication Technologies (ICTs) tools are employed. The application and impact of ICTs on electoral processes, particularly the electronic voting (e-voting) systems have been beneficial. These systems have improved efficiency in the voting process as evidenced in many developed nations. Winners of elections and the entire general public are usually pleased with the outcome if it is sufficiently transparent, accurate, free and fair, though it is more challenging to persuade the losers (and their supporters) that they lost [7]. Countries such as the US, UK, France Russia, Brazil, France, India, etc. have already deployed e-voting widely [7][20]. Despite the benefits associated with the use of e-voting systems, that is, increased public confidence and participation in the political process, greater convenience in terms of voting time and location, reduced cost, access to people with disabilities, etc.[8][20], modern election systems still suffers large scale election frauds called voter s frauds. The nature of theses frauds is particularly, the problems of voter s authentication and verification and his/her eligibility to vote. The voting system does not pledge that the vote is cast by an authentic person or one person, one vote. This gives way for foul practices in the electoral process like chain voting [12], multiple voting, ghosts voting or impersonation. When voting systems of this nature exist, the trustworthiness and the integrity of our elections are threaten and compromised [4]. These will in turn results to failures or corruption of democracy [5]. In order to rid our elections of doubts and opportunities for fraud and failures [13][14][15][16] the systems has to be made more transparent, trustworthy, accurate and reusable. One way to achieve this is through real-time registration and identification of voters. This approach will ensure that an eligible voter vote only once. The objective of this paper is to propose a form of voter s registration and identification that ensures that one person votes only once in an election. Therefore, in this paper, we propose a solution of dealing with the problems in the voting system through the use of real-time registration and identification of voters during election. The system makes use of radio frequency identification-based (RFID-based) voter s card. We also discussed benefits of the system in general. These are discussed in subsequent sections. 2 Challenges in Modern Electoral Systems One of the major issues facing modern electoral system, particularly, e-voting is having substantial public confidence in the electoral process as well as its results [20]. The system

is faced with huge amount of flaws worsen by programming errors [8]. It introduces new sets of risks, doubts and opportunities for fraud and failure and the technologies used are not as safe, trustworthy, dependable, etc [7]. Most of these issues have already been reported in the US being mostly caused by the Direct Recording Electronic (DREs) voting machines [4]. The situation showed a number of system deficiencies such as confusing ballots, registration mix up, systems failure on election day, software bugs preventing votes being recorded, hard to use interfaces, recount impossibility, mistakes in polling place operations, and even absentee ballot problems that caused the losses of millions of votes [4][7][8][17]. These recorded problematic situations have reduced public confidence and trust on the democratic process world wide. It has also brought about a global trend of moving away from e-voting and widespread criticism. In addition, the voting systems at large do not guarantee that the vote is cast by an authentic voter or one person voting only once. This therefore create avenue for frauds in the electoral process like multiple voting and impersonation. With systems of this nature, the trustworthiness and the integrity of our elections can be undermined with the sideeffects of failures or corruption of democracy [5]. It is based on this pitfall we proposed a system of real-time registration and identification. 3 The Proposed Approach Our approach is based on the need to ensure that one voter vote only once in order to rid doubts and failures opportunity in our elections. This solution is based on realtime registration and identification of voters before being allowed to vote. The system consists of real-time registration, RFID-based voter s card that utilizes the electronic product code (EPC) [10][17][18] and the biometrics technology for finger prints, etc. for real-time identification. The layout of the polling station and path of a voter in the proposed system is shown in Fig. 1. The application of this election approach will go along way to reducing voter frauds during elections that have since threatened the integrity of our elections. Basically, our system tends to offer an electoral system that is reliable and transparent with minimum or no possible fraudulent practices. That is, provides authentication and verification of the voters, preventing multiple voting or impersonation, allows for audit and recount of votes anytime and anywhere and pave way for reusability of the election assets [9][17]. 4 Overview of the System The proposed system combines a number of existing modern systems of voting ideas in an innovative way, with motivating new variations RFID and biometric technology. The system components are discussed below. Internet Inspectors Central DB Voter Authentication & Verification Ballot Paper Polling Station Polling Booth Polling Box Reception Desk RIFD Voter s Card & Biometrics Checking Entrance Exit Auditors Figure 1: Layout of the polling station and voter identification process 4.1 The Voter s ID Card The voter s card is the identity card (ID card) received after being registered as eligible electorate for voting purposes. The proposed voter s card is RFID-based, having a tag that stores the unique code (EPC) for a particular voter s information in the central database. The card is just a standard ID card designed with simplicity and convenience with the passport photograph of the holder appearing on the front side of the card (See Fig. 2). This card can serve a dual purpose like voting card, national ID card etc., and is reusable in subsequent elections. Figure 2: Voter s ID Card Sample 4.2 The Central Database We propose a central database where all voters information collected during voter s registration exercise will be stored. For countries with already existing central database, this will be an added advantage. For those without existing one, the central database can be created during voter s registration exercise by capturing the necessary information. This database can also serve a dual purpose. That is, it can be made available to other sectors of government and non-governmental organizations (NGOs) in a read-only mode.

4.3 Network Connectivity For the effective operation, we propose a fast network access to the central database in order to store and retrieve voter s information within milliseconds without compromising registration and voting time respectively. Preferably, a wireless local area network (WLAN) is required to connect devices (i.e. mobile readers/pc and Biometric) at several pool station to the central database. Though security is an issue at this point, issues of security attacks will be addressed later. 4.4 Real-Time Registration of Voters This is the first and crucial exercise in any election process where voter s information can be captured for storage and onward use. In most countries, there has been a culture of multiple registrations or one person registering for another during the exercise at different locations. This is as a result of lack of security measures to identify and track them down during registration exercise. In short, the system does not guarantee that one person registered only once. With the challenges faced by our modern electoral systems, voter s registration has to be conducted in a way that ensures one person, one vote. This can be achieved through the following procedures: Step 1: Data collection At the registration centre, voter s information can be collected through the use of Mobile PC equipped with AIDC (Automatic Identification and Data Capture) technology like the biometric technology. These systems will be connected directly and wirelessly to the central database during the registrations exercise. The mobile PC will be used to collect the Names, Sex, DateofBirth, Height, PlaceofBirth, Blood Group, Permanent home address and Nationality, etc [17]. On the other hand, the biometric technology will be used to collect Fingerprints and Passport photograph of the voter. Step 2: Data Management During the course of the registration, all information collected from a voter will be recorded, updated and store in a real-time mode into the central database. The biometric information (i.e. Finger prints) stored in the database will make it impossible for someone to register/vote twice even with a different voter s information or at different places. (See Fig. 3). Step 3: Card Issuance At the end of the registration exercise, perhaps, after a month the RFID-based voter s card will be issued to all registered individuals. The RFID tag on each card will have a unique EPC code which will be used to query the central database on a real-time mode to provide fast and reliable identification of the potential voter. VOTER S REGISTRATION CENTRE(s) G A T E W A Y Figure 3: Real-Time Voter s Registration The essence of the real-time registration is to ensure that a voter has only one voter s card and vote only once. For instance, if a voter has finished registering in one center and decide to go to another center to register, his/her information in the national database can be used to track he/she down and be denied registration immediately. 5 Activities at the Polling Station 5.1 Real-Time Identification and voting The first operation at the polling station is simply the realtime identification process. In this process, each voter will be individually identified against the information stored in the central database on a real-time mode. The operations within the system are simply authentication and verification [17] (see Fig. 1). As a voter enters the polling station with his/her RFID-based voter s card, the card is scanned with the RFID mobile reader by an electoral official. Simultaneously, the fingerprint scanner will be used to authenticate the voter (that is, providing twolayer security to voter s information). Upon valid authentication, specific information collected or documented about the voter during registration will display on the mobile PC. The information expected is just the voter s photograph, Name, Age, Place/Date of registration and Voting status. The voter is then allowed to vote independently with the voting status changed from 0 to 1. On the other hand, upon invalid authentication, the person is sent out of the voting place without been allowed to vote. Voting can take any strategy either the traditional approach or through the use of voting machine. 5.2 At the End of Voting NETWORK CENTRAL DATABASE At the end of the real-time identification and probably voting, the ballots are collated depending on the strategy utilized (manually or electronically) and the results computed. Winners are announced following the outcome.

This approach permits auditing and recounting to be carry out if need arises. With this, the number of voters who actually voted will be compared with the number of votes obtained in order to put falsification of figures/results under check. The information in the central database provides a means to check for discrepancies before results are officially announced. With this process in place, the general public (i.e., winners, supporters and international communities) can have full confidence in the electoral system since it is based upon transparently fair, robust and working method [9]. This will surely protect the integrity of our elections. 6 Discussions Our proposed form of voter registration and identification will set a simple and clear standard for protecting the integrity of our elections if implemented. This will be more advantageous in developing countries where impersonation, multiple registrations and voting is the order of the election. In most countries, proxy voting, multiple registrations and voting are serious problems that sometimes lead to anarchy and failure of democracy. Situation like this tends to undermine the integrity of our elections and even threaten democracy at large. Elections have to be conducted in a transparent manner and results generally accepted by the public. One way to achieve these is by the use of real-time registration and identification of voters. With the implementation of this approach, lot of benefits can be derived. These benefits are highlighted as follows. Firstly, the approach promotes re-usability of tools. That is, RFIDbased cards can be re-used in present election as well as in subsequent ones. With this, huge savings can be promoted or made on the part of the government in terms of time, effort and cost of procuring sets of new tools [9]. Secondly, RFIDbased voter s card can be use as national ID card and in any other identification capacity. This will be an added advantage especially for countries where national ID card never existed. It will help to eliminate any forms of impersonation or criminal activities. Lastly, with our proposed approach, national central database can be implemented especially where central database never existed also. This will rid the wastage of resources in creating and procuring new ones every time the need arises. The national central database will as well provide supports to other sector of government (e.g. the national population census etc.) and the NGOs. With the mode of operation of this proposed approach, there are lots of factors that might impede its implementation or operation. We perceived resistance to change could be one of such factors [17]. This could manifest due to selfish/conflicting interest to continually committing election frauds. Another inevitable impediment is security attacks which could be physical or logical. Lastly are maintenance issues of not regularly maintaining the database. We believe this will be a difficult task except during registration exercise. 7 Conclusions In this paper, we presented ideal ways to curb election frauds during elections. We proposed the real-time registrations and identification of voters before they are allowed to vote. Many voting system exist but failed to pledge that the vote is cast by the right person. Our approach takes a simple and clear approach to protect the integrity of our elections- ensuring one man, one vote in an election. It uses RFID and biometrics technologies to enable real-time registration and RFID-based card for unique identification of voters in order to eliminate voting frauds relating to multiple registrations, multiple voting, impersonation, etc. The approach will offer electoral system that is transparent, trustworthy and reusable. 8 References [1] Gronlund, A. Democracy in an IT-framed society. Communications of the ACM, January 2001, Vol.44 [2] Macintosh, A. Characterizing e-participation in policy making. In the Proceedings of the 37th Annual Hawaii International Conference on System Sciences, USA, 2004 [3] Gaines, J: Democracy's downfall: is the computing technology for electronic voting secure and reliable enough for national use? Communications of the ACM, December 2006, Vol.36 Issue 4 [4] Simons, B: Electronic voting systems: the good, the bad, and the stupid, Communications of the ACM, October 2004, Vol. 2 Issue 7 [5] Electoral Fraud http://en.wikipedia.org/wiki/electoral_fraud. (20/3/12) [6] Xenakis, A. and Macintosh, A: E-electoral administration: organizational lessons learned from the deployment of e- voting in the UK, Communications of The ACM, May 2005. [7] Dill, D. L: Electronic Voting: An Overview of the Problems, Computer Science, Stanford University, 2004. [8] Wagner, D: Risks of e-voting, Communications of the ACM, November 2007, Vol. 50 Issue 11 [9] Isong, B. and Adetayo A.: "Structural Design of RFID- Based System: - a way of solving Elections problems in developing nations(africa)" BTH, Sweden, 2008 [10] Castro L., and Wamba, S.F: An Inside Look At RFID Technology, Journal of Technology Management & Innovation, March 2007, Vol.2 no. 001, pp.128-141

[11] Bertrand Haas, Engineering Better Voting Systems, DocEng 06, ACM, Amsterdam, the Netherlands, October 10 13 2006, p-56-58 [12] Douglas W. Jones, Chain Voting, Threat Analyses & Papers, NIST, Aug 26, 2005 [13] Anthony D. F., Andrew P., Emmett S., and Vladimir V. Small vote Manipulations Can Swing Elections: Considering the effects and implications of changing only a single vote per machine, COMMUNICATIONS OF THE ACM, October 2004, Vol 47, No. 10, pp-43-45 [14] Benjamin B. Bederson, Bongshin Lee, Robert M. Sherman, Paul S. Herrnson, Richard G. Niemi, Electronic Voting System Usability Issues, CHI 2003, ACM, Ft. Lauderdale, Florida, USA, April 5 10, 2003, p145-152 [15] Chris A. and Ralph M., E-Voting and Computer Science: Teaching About the Risks of Electronic Voting Technology, ITiCSE 05, ACM, Monte de Caparica, Portugal, June 27 29, 2005, pp227-231 [16] Arthur M., David M., Joseph L. and Arnold U., Privacy Issues in an Electronic Voting Machine, WPES 04, ACM, Washington, DC, USA, October 28, 2004, pp-33-34 [17] Isong, B.E. and Ekabua, O. O.: Re-engineering the traditional electoral process via real time registration and e-identification of voters: An approach for developing countries", Canadian Journal on Data Information and Knowledge Engineering (DIKE-1106-011), 15th June, 2011. [18] Linda C. and Samuel F.W. An Inside Look at RFID Technology. Journal of Tech. Management and Innovation, Pp.128-114, Vol.2, No. 001, March 2007. [19] Lewis S. Basic Introduction to RFID and its Uses in the Chain Supply, LARAN RFID, TECH white paper publication, May 2004. [20] Xenakis, A. and Macintosh, A: Using Knowledge management to improve Transparency in E-voting, KMGov 2003, pp. 274-284, 2003.