Security analysis of current voting systems

Abdullahi Lawal Abba, Mohammed Awad, Zakaria Al-Qudah, Abdul Halim Jallad

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Electronic voting (e-voting) has become progressively well known in this technologically-driven world. It is viewed as a way to further strengthen and improve the democratic processes in society. E-voting ought to be implemented in a manner that guarantees sufficient user needs, which means it should provide an easy-to-use user interface. Evoting is also meant to maintain similar security and secrecy standards to those assured by traditional voting system. Thus, the purpose of this paper is to analyze the vulnerabilities that may affect e-voting systems. The paper presents the requirements and the concepts of an e-voting system. We summarize the different phases and the leading actors of e-voting systems and discuss the importance of security in e-voting systems by looking into the claims of hacks on the recent general election in the United States. In this paper, we closely examine some states where calls for recounts in the 2016 general elections were requested due to suspicions in voting systems security. We conclude with security recommendations to lessen or completely eradicate the risks and perils to the security of current voting systems.

Original languageEnglish
Title of host publication2017 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781538608722
DOIs
Publication statusPublished - Jun 28 2017
Externally publishedYes
Event2017 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2017 - Ras Al Khaimah, United Arab Emirates
Duration: Nov 21 2017Nov 23 2017

Publication series

Name2017 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2017
Volume2018-January

Other

Other2017 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2017
Country/TerritoryUnited Arab Emirates
CityRas Al Khaimah
Period11/21/1711/23/17

Keywords

  • cyber attacks
  • E-voting
  • phishing
  • security
  • vulnerability

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Instrumentation
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Security analysis of current voting systems'. Together they form a unique fingerprint.

Cite this