Preventing Double Spending Attacks through Crow Search Algorithm to Enhance E-Voting System Security
DOI:
https://doi.org/10.4108/eetiot.5208Keywords:
Internet of Things Application, Tangle, Directed Acrylic Graph, Crow Search Algorithm, E-Voting System, Double Spending AttackAbstract
Electronic voting system is the process of polling votes and counting votes. In most of the countries voting may now be done electronically, there are still several difficulties involved, including the expense of paper, how ballots are organized, the possibility of varying results when tallying the votes, and others. Duplicate votes pose a significant concern as they can be fraudulently cast by individuals. To focus on this issue, Distributed Ledger Technology (DLT) is employed to enhance the voting procedure in a secured manner. A directed acyclic graph is used by the Internet of Things Application (IOTA), a promising distributed ledger system. Faster transaction confirmation, high scalability and zero transaction fees are achieved via the Directed Acyclic Graph structure. In both IOTA tangle and blockchain technology, the public cast duplicate votes. The unauthorized user can create duplicate votes in the blockchain as well as IOTA tangle. This can be focused in this proposed method. The double spending problem can be solved by using Crow Search Algorithm (CSA). This Optimization problem produces an improved result for resolving double spending in e-voting systems.
Downloads
References
Vladucu MV, Dong Z, Medina J, Rojas-Cessa R. E-Voting Meets Blockchain: A Survey. IEEE Access. 2023;11:23293–308. DOI: https://doi.org/10.1109/ACCESS.2023.3253682
Muthulakshmi.S, Kannammal.A. Security Enhancements Based on Optimal Lightweight Blockchain Model for Data Sharing in Wireless IoT Networks. AHSWN.2023;.55: 233-256.
Conti M, Kumar G, Nerurkar P, Saha R, Vigneri L. A survey on security challenges and solutions in the IOTA. Journal of Network and Computer Applications 2022;203:103383. DOI: https://doi.org/10.1016/j.jnca.2022.103383
Chen Y, Tang X, Yao R, Bie R. Security Analysis of A Parasite Chain Attack in IOTA Based on Repeated Game. Procedia Computer Science 2022;202:83–8. DOI: https://doi.org/10.1016/j.procs.2022.04.012
Haseeb K, Almustafa KM, Jan Z, Saba T, Tariq U. Secure and Energy-Aware Heuristic Routing Protocol for Wireless Sensor Network. IEEE Access 2020;8:163962–74. DOI: https://doi.org/10.1109/ACCESS.2020.3022285
He J, Peng Z, Zhang L, Zuo L, Cui D, Li Q. Enhanced crow search algorithm with multi-stage search integration for global optimization problems. Soft Computing 2023;27:14877–907. DOI: https://doi.org/10.1007/s00500-023-08577-z
Han X, Xu Q, Yue L, Dong Y, Xie G, Xu X. An Improved Crow Search Algorithm Based on Spiral Search Mechanism for Solving Numerical and Engineering Optimization Problems. IEEE Access 2020:1–1. DOI: https://doi.org/10.1109/ACCESS.2020.2980300
Cullen A, Ferraro P, King C, Shorten R. Distributed Ledger Technology for IoT: Parasite Chain Attacks. IEEE. 2020; 7: 7112-71227112-7122. DOI: https://doi.org/10.1109/JIOT.2020.2983401
Cheng Q, Huang H, Chen M. A Novel Crow Search Algorithm Based on Improved Flower Pollination. Mathematical Problems in Engineering 2021;2021:1–26. DOI: https://doi.org/10.1155/2021/1048879
Algamal ZY, Abdallh GY. A QSAR classification model of skin sensitization potential based on improving binary crow search algorithm. Electronic Journal of Applied Statistical Analysis. 2020; 13: 86-95.
Anter AM, Hassenian AE, Oliva D. An improved fast fuzzy c-means using crow search optimization algorithm for crop identification in agricultural. Expert Systems with Applications 2019;118:340–54. DOI: https://doi.org/10.1016/j.eswa.2018.10.009
Fred L, Kumar S, Padmanaban P, Gulyas B, Kumar H. A Fuzzy-crow search optimization for medical image segmentation. Applications of Hybrid Metaheuristic Algorithms for Image Processing. Springer. 2020. 890:413-439. DOI: https://doi.org/10.1007/978-3-030-40977-7_18
Upadhyay P, Chhabra JK. Kapur’s entropy based optimal multilevel image segmentation using Crow Search Algorithm. Applied Soft Computing 2020;97:105522. DOI: https://doi.org/10.1016/j.asoc.2019.105522
Muthulakshmi S, Kannammal A, Padma Priya M, Pramila V, Shobiadevi G. Improvising micro transactions using IOTA tangle on smart refrigerator applications. International Journal of Health Sciences 2022:4955–65. DOI: https://doi.org/10.53730/ijhs.v6nS4.9209
Chen Y, Guo Y, Wang M, Xu E, Xie H, Bie R. Securing IOTA Blockchain Against Tangle Vulnerability by Using Large Deviation Theory. IEEE Internet of Things Journal 2023;11:1952–65. DOI: https://doi.org/10.1109/JIOT.2023.3283788
Ullah I, de Roode G, Meratnia N, Havinga P. Threat Modeling—How to Visualize Attacks on IOTA? Sensors 2021;21:1834. DOI: https://doi.org/10.3390/s21051834
Aruchamy P, Gnanaselvi S, Sowndarya D, Naveenkumar P. An artificial intelligence approach for energy‐aware intrusion detection and secure routing in internet of things‐enabled wireless sensor networks. Concurrency and Computation: Practice and Experience 2023;35. DOI: https://doi.org/10.1002/cpe.7818
Vazhuthi PPI, Prasanth A, Manikandan SP, Sowndarya KKD. A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. Peer-to-Peer Networking and Applications 2023;16:1049–68. DOI: https://doi.org/10.1007/s12083-023-01458-0
Askarzadeh A. A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm. Computers & Structures 2016;169:1–12. DOI: https://doi.org/10.1016/j.compstruc.2016.03.001
Cortés-Caicedo B, Avellaneda-Gómez LS, Montoya OD, Alvarado-Barrios L, Álvarez-Arroyo C. An Improved Crow Search Algorithm Applied to the Phase Swapping Problem in Asymmetric Distribution Systems. Symmetry 2021;13:1329. DOI: https://doi.org/10.3390/sym13081329
Perazzo P, Arena A, Dini G. An Analysis of Routing Attacks against IOTA Cryptocurrency. IEEE International Conference on Blockchain. 2020. 517-524. DOI: https://doi.org/10.1109/Blockchain50366.2020.00075
Houssein EH, Helmy BE-D, Elngar AA, Abdelminaam DS, Shaban H. An Improved Tunicate Swarm Algorithm for Global Optimization and Image Segmentation. IEEE Access 2021;9:56066–92. DOI: https://doi.org/10.1109/ACCESS.2021.3072336
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.