TY - GEN
T1 - Evaluating two security systems for mobile voting fortification
AU - Moloja, DIna
AU - Mpekoa, Noluntu
AU - Van Greunen, Darelle
N1 - Publisher Copyright:
© 2020 ACM.
PY - 2020/9/24
Y1 - 2020/9/24
N2 - The developments in Information and Communication Technology transformed almost every aspect of everyday life. Modern societies are now fully dependent on ICT for commercial, labor, and leisure activities, excluding in the voting area. Using ICT for democratic elections is quiet in its early stages. Nevertheless, utilizing ICT, specifically mobile phones, traditional voting processes can be streamlined to except the cost of social assets and time. Other researchers have already developed a mobile voting system, which is the use of a mobile phone to cast a vote. However, using a fast-growing device like mobile phones to vote poses security vulnerabilities. Mobile phones are exposed to security challenges, including malicious threats and intrusions as they are increasingly utilized to store sensitive personal data, such as financial data used for mobile banking. This paper is concerned with the security of the mobile phone as a utensil to vote amid the election. The paper evaluated two security systems to check, among the two-security systems, the one that best guards mobile voting. Simulations were utilized to evaluate the security systems and the findings were that Suricata is more reliable and effective than Snort in protecting XaP mobile application. This paper provides a significant contribution to the literature in mobile voting security as no research has been piloted that evaluates two security systems for mobile voting protection.
AB - The developments in Information and Communication Technology transformed almost every aspect of everyday life. Modern societies are now fully dependent on ICT for commercial, labor, and leisure activities, excluding in the voting area. Using ICT for democratic elections is quiet in its early stages. Nevertheless, utilizing ICT, specifically mobile phones, traditional voting processes can be streamlined to except the cost of social assets and time. Other researchers have already developed a mobile voting system, which is the use of a mobile phone to cast a vote. However, using a fast-growing device like mobile phones to vote poses security vulnerabilities. Mobile phones are exposed to security challenges, including malicious threats and intrusions as they are increasingly utilized to store sensitive personal data, such as financial data used for mobile banking. This paper is concerned with the security of the mobile phone as a utensil to vote amid the election. The paper evaluated two security systems to check, among the two-security systems, the one that best guards mobile voting. Simulations were utilized to evaluate the security systems and the findings were that Suricata is more reliable and effective than Snort in protecting XaP mobile application. This paper provides a significant contribution to the literature in mobile voting security as no research has been piloted that evaluates two security systems for mobile voting protection.
KW - cloud computing
KW - cyber security
KW - mobile phone
KW - mobile voting
UR - http://www.scopus.com/inward/record.url?scp=85092301655&partnerID=8YFLogxK
U2 - 10.1145/3415088.3415109
DO - 10.1145/3415088.3415109
M3 - Conference contribution
AN - SCOPUS:85092301655
T3 - ACM International Conference Proceeding Series
BT - Proceedings of the 2020 International Conference on Intelligent and Innovative Computing Applications, ICONIC 2020
A2 - Pudaruth, Sameerchand
A2 - Nayyar, Anand
PB - Association for Computing Machinery
T2 - 2nd International Conference on Intelligent and Innovative Computing Applications, ICONIC 2020
Y2 - 24 September 2020 through 25 September 2020
ER -