TY - GEN
T1 - Security analysis of current voting systems
AU - Abba, Abdullahi Lawal
AU - Awad, Mohammed
AU - Al-Qudah, Zakaria
AU - Jallad, Abdul Halim
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/6/28
Y1 - 2017/6/28
N2 - Electronic voting (e-voting) has become progressively well known in this technologically-driven world. It is viewed as a way to further strengthen and improve the democratic processes in society. E-voting ought to be implemented in a manner that guarantees sufficient user needs, which means it should provide an easy-to-use user interface. Evoting is also meant to maintain similar security and secrecy standards to those assured by traditional voting system. Thus, the purpose of this paper is to analyze the vulnerabilities that may affect e-voting systems. The paper presents the requirements and the concepts of an e-voting system. We summarize the different phases and the leading actors of e-voting systems and discuss the importance of security in e-voting systems by looking into the claims of hacks on the recent general election in the United States. In this paper, we closely examine some states where calls for recounts in the 2016 general elections were requested due to suspicions in voting systems security. We conclude with security recommendations to lessen or completely eradicate the risks and perils to the security of current voting systems.
AB - Electronic voting (e-voting) has become progressively well known in this technologically-driven world. It is viewed as a way to further strengthen and improve the democratic processes in society. E-voting ought to be implemented in a manner that guarantees sufficient user needs, which means it should provide an easy-to-use user interface. Evoting is also meant to maintain similar security and secrecy standards to those assured by traditional voting system. Thus, the purpose of this paper is to analyze the vulnerabilities that may affect e-voting systems. The paper presents the requirements and the concepts of an e-voting system. We summarize the different phases and the leading actors of e-voting systems and discuss the importance of security in e-voting systems by looking into the claims of hacks on the recent general election in the United States. In this paper, we closely examine some states where calls for recounts in the 2016 general elections were requested due to suspicions in voting systems security. We conclude with security recommendations to lessen or completely eradicate the risks and perils to the security of current voting systems.
KW - cyber attacks
KW - E-voting
KW - phishing
KW - security
KW - vulnerability
UR - http://www.scopus.com/inward/record.url?scp=85045965107&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85045965107&partnerID=8YFLogxK
U2 - 10.1109/ICECTA.2017.8252006
DO - 10.1109/ICECTA.2017.8252006
M3 - Conference contribution
AN - SCOPUS:85045965107
T3 - 2017 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2017
SP - 1
EP - 6
BT - 2017 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2017
Y2 - 21 November 2017 through 23 November 2017
ER -