A Novel Approach for RFID-Based Smart EVM System

  • Dipanjan SenEmail author
  • Savio Jay Sengupta
  • Abhishek Sharma
  • Wasim Reja
  • Bijoy Goswami
  • Subir Kumar Sarkar
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 665)


A customized and highly secured EVM system has been designed by using RFID (Sengupta et al in Eur J Sci Res 97(4):592–603 (2013) [1]) to achieve a reliable high-end communication system for the purpose of election and voting. In this work, an overview of the existing problems related to the electronic voting machine has been introduced initially and then the proposed systems are designed using RFID (Sengupta et al in Eur J Sci Res 97(4):592–603 (2013) [1]), (Bag and Sarkar in Int J Radio Freq Ident Technol Appl 4(2):197–211 (2013) [2]) in detail. The problems related to security breeching at the voting centers are very common. A detailed study has been done considering the security breaching and access in case of the complete voting system using EVM. Keeping in mind, the present scenario of high-end securities for the corporate industries, banks, etc., we have designed a secure and flexible RFID-based EVM system using low frequency RFID technology (Bag and Sarkar in Int J Radio Freq Ident Technol Appl 4(2):197–211 (2013) [2]) and biometric sensors. The system has been practically implemented in laboratory, and the experimental data shows that this system can be widely used by the election commission at the voting centers to maintain the confidentiality.


RFID LF range Arduino EVM system High-end security Biometric sensors 



Authors of this work would like to thank the financial support obtained from the DST-WB project. Ref. No: 287(Sanc.)/ST/P/S&T/6G-43/2017.


  1. 1.
    Bag, J., Rajanna., K.M, Sarkar, S.K.: Design and FPGA implementation of a Zig-bee enabled processor for RFID reader suitable for power efficient home/office automation. Eur. J. Sci. Res. 97(4), 592–603 (2013)Google Scholar
  2. 2.
    Bag, J., Sarkar, S.K.: Development and VLSI implementation of a data security scheme for RFID system using programmable cellular automata. Int. J. Radio Freq. Ident. Technol. Appl. 4(2), 197–211 (2013)Google Scholar
  3. 3.
    Bag, J., Roy, S., Kantha, B., Sarkar, S.K.: Advanced multiple step security (AMSS) scheme using PCA for RFID system and its FPGA implementation. Int. J. RFID Technol. Appl. Inderscience 4(4), 325–341 (2015)Google Scholar
  4. 4.
    Siio, I., Hayasaka, T.: Putting information to things: RFID tags and their application. IPSJ Mag. 40(8), 846–850 (1999)Google Scholar
  5. 5.
    Wang, S.-W., et al.: RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. HICSS2006, vol. 8, 4–7 Jan 2006Google Scholar
  6. 6.
    Ranasinghe, D.C., Engels, D.W., Cole, P.H.: Security and privacy solutions for low-cost RFID system. In: Proceedings of IEEE ISSNIP, Melbourne, Australia, pp. 337–345, 5–8 Dec 2005Google Scholar
  7. 7.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems ans security and privacy implications. Technical report MITAUTOID-WH-04. Auto Center, MIT, US (2002)Google Scholar
  8. 8.
    Zhang, J., Tian, G.Y., Marindra, A.M.J., Sunny, A.I., Zhao, A.B.: A review of passive RFID tag antenna-based sensors and systems for structural health monitoring applications. Sensors 17(2), 265 (2017)Google Scholar
  9. 9.
    Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24, 381–394 (2006)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Dipanjan Sen
    • 1
    Email author
  • Savio Jay Sengupta
    • 1
  • Abhishek Sharma
    • 2
  • Wasim Reja
    • 1
  • Bijoy Goswami
    • 1
  • Subir Kumar Sarkar
    • 1
  1. 1.Department of Electronics and Tele-Communication EngineeringJadavpur UniversityKolkataIndia
  2. 2.Dunzo Digital Pvt. LtdBangaloreIndia

Personalised recommendations