Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8979
Title: On the Design and Implementation of a Blockchain Enabled E-Voting Application Within IoT-Oriented Smart Cities
Authors: Rathee, Geetanjali
Iqbal, Razi
Waqar, Omer
Bashir, Ali Kashif
Keywords: Blockchain
Trust-based e-voting
Blockchain e-voting
Smart cities
Issue Date: 2021
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: A smart city refers to an intelligent environment obtained by deploying all available resources and recent technologies in a coordinated and smart manner. Intelligent sensors (Internet of Things (IoT) devices) along with 5G technology working mutually are steadily becoming more pervasive and accomplish users' desires more effectively. Among a variety of IoT use cases, e-voting is a considerable application of IoT that relegates it to the next phase in the growth of technologies related to smart cities. In conventional applications, all the devices are often assumed to be cooperative and trusted. However, in practice, devices may be disrupted by the intruders to behave maliciously with the aim of degradation of the network services. Therefore, the privacy and security aws in the e-voting systems in particular lead to a huge problem where intruders may perform a number of frauds for rigging the polls. Thus, the potential challenge is to distinguish the legitimate IoT devices from the malicious ones by computing their trust values through social optimizer in order to establish a legitimate communication environment. Further, in order to prevent from future modi cations of data captured by smart devices, a Blockchain is maintained where blocks of all legitimate IoT devices are recorded. This article has introduced a secure and transparent e-voting mechanism through IoT devices using Blockchain technology with the aim of detecting and resolving the various threats caused by an intruder at various levels. Further, in order to validate the proposed mechanism, it is analyzed against various security parameters such as message alteration, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack and authentication delay.
URI: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8979
Appears in Collections:Journal Articles



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.