Vulnerabilities and securities in the electronic voting: a review

Authors

  • Estefanía de las Mercedes Zurita Meza Instituto Superior Tecnológico Pelileo, Ecuador. https://orcid.org/0000-0001-5509-0152
  • Darwin Stalin Ramírez Supe Universidad Técnica de Ambato, Ecuador.

DOI:

https://doi.org/10.35290/ro.v2n1.2021.405

Keywords:

electronic voting, security, risk, vulnerability, encryption

Abstract

This paper presents a study of vulnerabilities, risks, considerations and securities that can occur in a system of electronic voting in an election process of any authority. It is proposed to make an analysis as an electronic voting system can impersonate the vote traditional manual that is used for several decades in all cities of the world, these systems must ensure the integrity and proper use of the data and information obtained, but some occasions not taken into account the security considerations that are necessary in this class of systems. For this, an analysis of the security provided by electronic voting system is made as well as the vulnerabilities that may occur during the election process and some considerations to consider about electronic voting.

Downloads

Download data is not yet available.

References

Alonso, C. (2015). Un informático en el lado del mal: Resultados de la búsqueda de Ataque multivoto. https://www.elladodelmal.com/search?q=Ataque%09multivoto

Altman, M., & Klass, G. M. (2005). Current Research in Voting, Elections, and Technology. Social Science Computer Review, 23(3), 269–273. https://doi.org/10.1177/0894439305275849

Bishop, M., & Wagner, D. (2007). Risks of e-voting. In Communications of the ACM (Vol. 50, Issue 11, p. 120). https://doi.org/10.1145/1297797.1297827

Cetinkaya, O., & Deniz, C. (2007). Verification and Validation Issues in Electronic Voting. The Electronic Journal of E-Government. http://www.ejeg.com/search/index.html?name=keywords&value= verification

Fernandez, A. (2020, May 3). Transforming political parties in the middle of a pandemic: The moment for online voting? | International IDEA. https://www.idea.int/news-media/news/transforming-political-parties-middle-pandemic-moment-online-voting

Gallegos-García, G., Gómez-Cárdenas, R., & Duchén-Sánchez, G. (2010). Protocolo de votación electrónica basado en emparejamientos bilineales. Revista Facultad de Ingenieria Universidad de Antioquia, 56, 234–244. https://revistas.udea.edu.co/index.php/ingenieria/article/view/14672/12827

Gerck, E., Andrew Neff, C., Rivest, R. L., Rubin, A. D., & Yung, M. (2002). The business of electronic voting. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2339, 243–268. https://doi.org/10.1007/3-540-46088-8_21

Gritzalis, D. A. (2002). Principles and requirements for a secure e-voting system. In Computers and Security (Vol. 21, Issue 6, pp. 539–556). Elsevier Ltd. https://doi.org/10.1016/S0167-4048(02)01014-3

Gritzalis, D. A. (Ed.). (2003). Secure Electronic Voting (Vol. 7). Springer US. https://doi.org/10.1007/978-1-4615-0239-5

Javaid, M. A. (2014). Electronic Voting System Security. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2393158

Kremer, S., Ryan, M., & Smyth, B. (2010). Election verifiability in electronic voting protocols. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6345 LNCS, 389–404. https://doi.org/10.1007/978-3-642-15497-3_24

Kuhn, D. R., Hu, V., Polk, W. T., & Chang, S.-J. H. (2001). Introduction to public key technology and the federal PKI infrastructure. https://doi.org/10.6028/NIST.SP.800-32

Montejano, G., García, P., & Silvia Bast, ; (2014). Análisis de la integridad de datos en Sistemas de e-Voting. http://www.unsl.edu.ar

Montes, M., Penazzi, D., & Wolovick, N. (2016). Consideraciones sobre el voto electrónico. In Repositorio Institucional de la UNLP. http://sedici.unlp.edu.ar/handle/10915/58355

Nardi, J., & Maenza, R. (2017). Voto Electrónico, Vulnerabilidades y Soluciones para Evitar Ataques. https://www.researchgate.net/publication/321182889_Voto_Electronico_Vulnerabilidades_y_Soluciones_para_Evitar_Ataques

Panizo, A. (2007). Aspectos tecnológicos del voto electrónico (Documento de Trabajo N.° 17). https://www.researchgate.net/publication/259668840_Aspectos_tecnologicos_del_voto_electronico

Rubin, A. D. (2002). Security considerations for remote electronic voting. Communications of the ACM, 45(12), 39–44. https://doi.org/10.1145/585597.585599

SmartReview. (2015). Voto Manual vs Voto Electrónico. https://es.slideshare.net/smartmatic/voto-manual-vs-voto-electrnico

Sterbenz, J. P. G., Hutchison, D., Çetinkaya, E. K., Jabbar, A., Rohrer, J. P., Schöller, M., & Smith, P. (2010). Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer Networks, 54(8), 1245–1265. https://doi.org/10.1016/j.comnet.2010.03.005

Van De Graaf, J., Montejano, G., & García, P. (2013). Optimización de un esquema “Ocuppancy Problem” orientado a E-Voting. http://www.dcc.ufmg.br/~jvdghttp://www.unsl.edu.ar

Published

2021-02-10

How to Cite

Zurita Meza, E. de las M. ., & Ramírez Supe, D. S. . (2021). Vulnerabilities and securities in the electronic voting: a review. ODIGOS JOURNAL, 2(1), 55–67. https://doi.org/10.35290/ro.v2n1.2021.405

Most read articles by the same author(s)