Preventing Double Spending Attacks through Crow Search Algorithm to Enhance E-Voting System Security

Authors

  • S Muthulakshmi KPR Institute of Engineering and Technology image/svg+xml
  • A Kannammal Coimbatore Institute of Technology

DOI:

https://doi.org/10.4108/eetiot.5208

Keywords:

Internet of Things Application, Tangle, Directed Acrylic Graph, Crow Search Algorithm, E-Voting System, Double Spending Attack

Abstract

Electronic voting system is the process of polling votes and counting votes. In most of the countries voting may now be done electronically, there are still several difficulties involved, including the expense of paper, how ballots are organized, the possibility of varying results when tallying the votes, and others. Duplicate votes pose a significant concern as they can be fraudulently cast by individuals. To focus on this issue, Distributed Ledger Technology (DLT) is employed to enhance the voting procedure in a secured manner. A directed acyclic graph is used by the Internet of Things Application (IOTA), a promising distributed ledger system. Faster transaction confirmation, high scalability and zero transaction fees are achieved via the Directed Acyclic Graph structure. In both IOTA tangle and blockchain technology, the public cast duplicate votes. The unauthorized user can create duplicate votes in the blockchain as well as IOTA tangle. This can be focused in this proposed method. The double spending problem can be solved by using Crow Search Algorithm (CSA). This Optimization problem produces an improved result for resolving double spending in e-voting systems.

Downloads

Download data is not yet available.
<br data-mce-bogus="1"> <br data-mce-bogus="1">

References

Vladucu MV, Dong Z, Medina J, Rojas-Cessa R. E-Voting Meets Blockchain: A Survey. IEEE Access. 2023;11:23293–308. DOI: https://doi.org/10.1109/ACCESS.2023.3253682

Muthulakshmi.S, Kannammal.A. Security Enhancements Based on Optimal Lightweight Blockchain Model for Data Sharing in Wireless IoT Networks. AHSWN.2023;.55: 233-256.

Conti M, Kumar G, Nerurkar P, Saha R, Vigneri L. A survey on security challenges and solutions in the IOTA. Journal of Network and Computer Applications 2022;203:103383. DOI: https://doi.org/10.1016/j.jnca.2022.103383

Chen Y, Tang X, Yao R, Bie R. Security Analysis of A Parasite Chain Attack in IOTA Based on Repeated Game. Procedia Computer Science 2022;202:83–8. DOI: https://doi.org/10.1016/j.procs.2022.04.012

Haseeb K, Almustafa KM, Jan Z, Saba T, Tariq U. Secure and Energy-Aware Heuristic Routing Protocol for Wireless Sensor Network. IEEE Access 2020;8:163962–74. DOI: https://doi.org/10.1109/ACCESS.2020.3022285

He J, Peng Z, Zhang L, Zuo L, Cui D, Li Q. Enhanced crow search algorithm with multi-stage search integration for global optimization problems. Soft Computing 2023;27:14877–907. DOI: https://doi.org/10.1007/s00500-023-08577-z

Han X, Xu Q, Yue L, Dong Y, Xie G, Xu X. An Improved Crow Search Algorithm Based on Spiral Search Mechanism for Solving Numerical and Engineering Optimization Problems. IEEE Access 2020:1–1. DOI: https://doi.org/10.1109/ACCESS.2020.2980300

Cullen A, Ferraro P, King C, Shorten R. Distributed Ledger Technology for IoT: Parasite Chain Attacks. IEEE. 2020; 7: 7112-71227112-7122. DOI: https://doi.org/10.1109/JIOT.2020.2983401

Cheng Q, Huang H, Chen M. A Novel Crow Search Algorithm Based on Improved Flower Pollination. Mathematical Problems in Engineering 2021;2021:1–26. DOI: https://doi.org/10.1155/2021/1048879

Algamal ZY, Abdallh GY. A QSAR classification model of skin sensitization potential based on improving binary crow search algorithm. Electronic Journal of Applied Statistical Analysis. 2020; 13: 86-95.

Anter AM, Hassenian AE, Oliva D. An improved fast fuzzy c-means using crow search optimization algorithm for crop identification in agricultural. Expert Systems with Applications 2019;118:340–54. DOI: https://doi.org/10.1016/j.eswa.2018.10.009

Fred L, Kumar S, Padmanaban P, Gulyas B, Kumar H. A Fuzzy-crow search optimization for medical image segmentation. Applications of Hybrid Metaheuristic Algorithms for Image Processing. Springer. 2020. 890:413-439. DOI: https://doi.org/10.1007/978-3-030-40977-7_18

Upadhyay P, Chhabra JK. Kapur’s entropy based optimal multilevel image segmentation using Crow Search Algorithm. Applied Soft Computing 2020;97:105522. DOI: https://doi.org/10.1016/j.asoc.2019.105522

Muthulakshmi S, Kannammal A, Padma Priya M, Pramila V, Shobiadevi G. Improvising micro transactions using IOTA tangle on smart refrigerator applications. International Journal of Health Sciences 2022:4955–65. DOI: https://doi.org/10.53730/ijhs.v6nS4.9209

Chen Y, Guo Y, Wang M, Xu E, Xie H, Bie R. Securing IOTA Blockchain Against Tangle Vulnerability by Using Large Deviation Theory. IEEE Internet of Things Journal 2023;11:1952–65. DOI: https://doi.org/10.1109/JIOT.2023.3283788

Ullah I, de Roode G, Meratnia N, Havinga P. Threat Modeling—How to Visualize Attacks on IOTA? Sensors 2021;21:1834. DOI: https://doi.org/10.3390/s21051834

Aruchamy P, Gnanaselvi S, Sowndarya D, Naveenkumar P. An artificial intelligence approach for energy‐aware intrusion detection and secure routing in internet of things‐enabled wireless sensor networks. Concurrency and Computation: Practice and Experience 2023;35. DOI: https://doi.org/10.1002/cpe.7818

Vazhuthi PPI, Prasanth A, Manikandan SP, Sowndarya KKD. A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. Peer-to-Peer Networking and Applications 2023;16:1049–68. DOI: https://doi.org/10.1007/s12083-023-01458-0

Askarzadeh A. A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm. Computers & Structures 2016;169:1–12. DOI: https://doi.org/10.1016/j.compstruc.2016.03.001

Cortés-Caicedo B, Avellaneda-Gómez LS, Montoya OD, Alvarado-Barrios L, Álvarez-Arroyo C. An Improved Crow Search Algorithm Applied to the Phase Swapping Problem in Asymmetric Distribution Systems. Symmetry 2021;13:1329. DOI: https://doi.org/10.3390/sym13081329

Perazzo P, Arena A, Dini G. An Analysis of Routing Attacks against IOTA Cryptocurrency. IEEE International Conference on Blockchain. 2020. 517-524. DOI: https://doi.org/10.1109/Blockchain50366.2020.00075

Houssein EH, Helmy BE-D, Elngar AA, Abdelminaam DS, Shaban H. An Improved Tunicate Swarm Algorithm for Global Optimization and Image Segmentation. IEEE Access 2021;9:56066–92. DOI: https://doi.org/10.1109/ACCESS.2021.3072336

Downloads

Published

26-02-2024

How to Cite

[1]
S. Muthulakshmi and A. Kannammal, “Preventing Double Spending Attacks through Crow Search Algorithm to Enhance E-Voting System Security”, EAI Endorsed Trans IoT, vol. 10, Feb. 2024.