Preventing Double Spending Attacks through Crow Search Algorithm to Enhance E-Voting System Security


  • S Muthulakshmi KPR Institute of Engineering and Technology image/svg+xml
  • A Kannammal Coimbatore Institute of Technology



Internet of Things Application, Tangle, Directed Acrylic Graph, Crow Search Algorithm, E-Voting System, Double Spending Attack


Electronic voting system is the process of polling votes and counting votes. In most of the countries voting may now be done electronically, there are still several difficulties involved, including the expense of paper, how ballots are organized, the possibility of varying results when tallying the votes, and others. Duplicate votes pose a significant concern as they can be fraudulently cast by individuals. To focus on this issue, Distributed Ledger Technology (DLT) is employed to enhance the voting procedure in a secured manner. A directed acyclic graph is used by the Internet of Things Application (IOTA), a promising distributed ledger system. Faster transaction confirmation, high scalability and zero transaction fees are achieved via the Directed Acyclic Graph structure. In both IOTA tangle and blockchain technology, the public cast duplicate votes. The unauthorized user can create duplicate votes in the blockchain as well as IOTA tangle. This can be focused in this proposed method. The double spending problem can be solved by using Crow Search Algorithm (CSA). This Optimization problem produces an improved result for resolving double spending in e-voting systems.


Download data is not yet available.
<br data-mce-bogus="1"> <br data-mce-bogus="1">


Vladucu MV, Dong Z, Medina J, Rojas-Cessa R. E-Voting Meets Blockchain: A Survey. IEEE Access. 2023;11:23293–308. DOI:

Muthulakshmi.S, Kannammal.A. Security Enhancements Based on Optimal Lightweight Blockchain Model for Data Sharing in Wireless IoT Networks. AHSWN.2023;.55: 233-256.

Conti M, Kumar G, Nerurkar P, Saha R, Vigneri L. A survey on security challenges and solutions in the IOTA. Journal of Network and Computer Applications 2022;203:103383. DOI:

Chen Y, Tang X, Yao R, Bie R. Security Analysis of A Parasite Chain Attack in IOTA Based on Repeated Game. Procedia Computer Science 2022;202:83–8. DOI:

Haseeb K, Almustafa KM, Jan Z, Saba T, Tariq U. Secure and Energy-Aware Heuristic Routing Protocol for Wireless Sensor Network. IEEE Access 2020;8:163962–74. DOI:

He J, Peng Z, Zhang L, Zuo L, Cui D, Li Q. Enhanced crow search algorithm with multi-stage search integration for global optimization problems. Soft Computing 2023;27:14877–907. DOI:

Han X, Xu Q, Yue L, Dong Y, Xie G, Xu X. An Improved Crow Search Algorithm Based on Spiral Search Mechanism for Solving Numerical and Engineering Optimization Problems. IEEE Access 2020:1–1. DOI:

Cullen A, Ferraro P, King C, Shorten R. Distributed Ledger Technology for IoT: Parasite Chain Attacks. IEEE. 2020; 7: 7112-71227112-7122. DOI:

Cheng Q, Huang H, Chen M. A Novel Crow Search Algorithm Based on Improved Flower Pollination. Mathematical Problems in Engineering 2021;2021:1–26. DOI:

Algamal ZY, Abdallh GY. A QSAR classification model of skin sensitization potential based on improving binary crow search algorithm. Electronic Journal of Applied Statistical Analysis. 2020; 13: 86-95.

Anter AM, Hassenian AE, Oliva D. An improved fast fuzzy c-means using crow search optimization algorithm for crop identification in agricultural. Expert Systems with Applications 2019;118:340–54. DOI:

Fred L, Kumar S, Padmanaban P, Gulyas B, Kumar H. A Fuzzy-crow search optimization for medical image segmentation. Applications of Hybrid Metaheuristic Algorithms for Image Processing. Springer. 2020. 890:413-439. DOI:

Upadhyay P, Chhabra JK. Kapur’s entropy based optimal multilevel image segmentation using Crow Search Algorithm. Applied Soft Computing 2020;97:105522. DOI:

Muthulakshmi S, Kannammal A, Padma Priya M, Pramila V, Shobiadevi G. Improvising micro transactions using IOTA tangle on smart refrigerator applications. International Journal of Health Sciences 2022:4955–65. DOI:

Chen Y, Guo Y, Wang M, Xu E, Xie H, Bie R. Securing IOTA Blockchain Against Tangle Vulnerability by Using Large Deviation Theory. IEEE Internet of Things Journal 2023;11:1952–65. DOI:

Ullah I, de Roode G, Meratnia N, Havinga P. Threat Modeling—How to Visualize Attacks on IOTA? Sensors 2021;21:1834. DOI:

Aruchamy P, Gnanaselvi S, Sowndarya D, Naveenkumar P. An artificial intelligence approach for energy‐aware intrusion detection and secure routing in internet of things‐enabled wireless sensor networks. Concurrency and Computation: Practice and Experience 2023;35. DOI:

Vazhuthi PPI, Prasanth A, Manikandan SP, Sowndarya KKD. A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. Peer-to-Peer Networking and Applications 2023;16:1049–68. DOI:

Askarzadeh A. A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm. Computers & Structures 2016;169:1–12. DOI:

Cortés-Caicedo B, Avellaneda-Gómez LS, Montoya OD, Alvarado-Barrios L, Álvarez-Arroyo C. An Improved Crow Search Algorithm Applied to the Phase Swapping Problem in Asymmetric Distribution Systems. Symmetry 2021;13:1329. DOI:

Perazzo P, Arena A, Dini G. An Analysis of Routing Attacks against IOTA Cryptocurrency. IEEE International Conference on Blockchain. 2020. 517-524. DOI:

Houssein EH, Helmy BE-D, Elngar AA, Abdelminaam DS, Shaban H. An Improved Tunicate Swarm Algorithm for Global Optimization and Image Segmentation. IEEE Access 2021;9:56066–92. DOI:




How to Cite

S. Muthulakshmi and A. Kannammal, “Preventing Double Spending Attacks through Crow Search Algorithm to Enhance E-Voting System Security”, EAI Endorsed Trans IoT, vol. 10, Feb. 2024.