Claim Missing Document
Check
Articles

Found 1 Documents
Search

Preventing Man in The Middle Attack on E-voting System Using Multi-layer Security Protocol Sunday, Uzoma
International Journal of Informatics, Information System and Computer Engineering (INJIISCOM) Vol. 6 No. 1 (2025): INJIISCOM: VOLUME 6, ISSUE 1, JUNE 2025
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Intelligent technologies, most notably the growth of the World Wide Web, are used to improve human life. In comparison to prior eras, an increasing number of jobs may now be accomplished swiftly and efficiently thanks to the Internet's spectacular development. One relatively new field that has been identified is e-voting. There are several ways to vote, including online, using a mobile application, and in person at a polling station. The internet's rapid expansion means that application security cannot be ignored. I developed an Android application with a 5-step security process—user authentication, fingerprint authentication, captcha, OTP verification, and cryptography—before voting in order to thwart phishing attempts. With a mobile device, voters may now cast their ballots online at any time and from any place. The application is created and deployed using Android Studio. The software development life cycle is followed in this research when developing the voting application. The outcome of this study is the development of a voter-friendly mobile application that functions as a useful tool to enable voters to cast ballots with five security levels.