Formal Analysis of Improved and Secure Architecture of E-voting System using Hierarchical Coloured Petri Nets

Z. Ahmad, F. Ahmad, Z. A Gondal


Casting a vote is the fundamental right of any citizen. Pakistan follows the traditional manual voting
system and there are number of factors influencing in such a way that put a question as if the vote has
been casted correctly and should be considered towards final count. Manual counting process of vote do
not provide the security measures minimizing the attempts of frauds like increase or decrease in the vote
count. Therefore, the idea of secure and improved E-voting system is proposed to overcome such flaws
in current voting system in Pakistan. In this manuscript, an improved component-based architecture,
security features and future recommendations are presented. Different techniques linked with voter’s
authentication, confidentiality and integrity are suggested to minimize the flaws and maximize the
benefits of voting system. Further, the proposed architecture is formally modelled through ‘coloured
Petri nets’ to validate it. Formal analysis is also performed based on the state space generated to
simulate the hierarchical coloured Petri net based formal model of proposed E-voting system.

Full Text:



M. Volkamer and M. McGaley, “Requirements and evaluation procedures for eVoting”, The Second International Conference on Availability, Reliability and Security, pp. 895-902, 2007.

N. Paul and A.S. Tanenbaum, “The design of a trustworthy voting system”, Annual Computer Security Applications Conference, pp. 507-517, 2009.

A. Al-ameen and S.A. Talab, “E-voting systems vulnerabilities”, IEEE 8th International Conference on Information Science and Digital Content Technology, vol. 1, pp. 67-73, 2012.

R. Cooke and R. Anane, “A service-oriented architecture for robust e-voting,” Serv. Oriented Comput. Appl., vol. 6, no. 3, pp. 249-266, 2012.

H. Pan, E. Hou and N. Ansari, “E-NOTE: An e-voting system that ensures voter confidentiality and voting accuracy”, IEEE International Conference on Communications, pp. 825-829, 2012.

K.M. Abosamra, A.A. Abdelhafez, G.M.R. Assassa and M.F.M. Mursi, “A practical, secure and auditable e-voting system", J. Inf. Secur. Appl., vol. 36, pp. 69-89, 2017.

K. Jensen and L.M. Kristensen, "Coloured Petri nets : Modelling and validation of concurrent systems", Springer Science & Business Media, 2009.

F. Ahmad, A. Sadiq, A.M. Martinez-Enriquez, A. Muhammad, M.W. Anwar, U. Bajwa, M. Naseer and S.A. Khan, “Component based architecture for the control of crossing regions in railway networks”, 16th IEEE International Conference on Machine Learning and Applications, pp. 540-545, 2017.

H.D. Tho and N.T.H. Ha, “A protocol for securing e-voting system”, International Conference on Advanced Engineering Theory and Applications, Springer, Cham, pp. 38-48, 2017.

P. Realpe-Muñoz, C.A. Collazos, J. Hurtado, T. Granollers, J. Muñoz-Arteaga, and J. Velasco-Medina, “Eye tracking-based behavioural study of users using e-voting systems,” Comput. Stand. Interfaces, vol. 55, pp. 182–195, Jan. 2018.

Y. Zhou, H. Gao and J. Cheng, “An extension of QSL for E-voting systems”, Advances in Computer Science and Ubiquitous Computing, Singapore: Springer, pp. 87-96, 2016.

A. Chowdhury, “Revolution in authentication process by using biometrics”, IEEE International Conference on Recent Trends in Information Systems, pp. 36-41, 2011.

Z. Ahmed et al. / The Nucleus 56, No. 4 (2019) 137-142

A. Sarajlic, N. Behlilovi and I. Sokolovi, “A modular concept of E-voting system that protects user privacy using random password distribution”, 18th IEEE International Conference on Systems, Signals and Image Processing, pp. 1-5, 2011.

N. Kshetri and J. Voas, “Blockchain-enabled e-voting”, IEEE Softw., vol. 35, no. 4, pp. 95-99, 2018.

M. Pawlak, A. Poniszewska-Marańda and N. Kryvinska, “Towards the intelligent agents for blockchain e-voting system”, Procedia Comput. Sci., vol. 141, pp. 239-246, 2018.

J.-H. Hsiao, R. Tso, C.-M. Chen, and M.-E. Wu, “Decentralized E-voting systems based on the blockchain technology”, Advances in Computer Science and Ubiquitous Computing, Singapore: Springer, pp. 305-309, 2018.

L. Jing, X. Wang, Z. Huang, L. Wang and Y. Xiang, "Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing", J. Parallel Distr. Com., vol. 130, pp. 91-97, 2019.

K.M. Khan, J. Arshad and M. M. Khan, "Simulation of transaction malleability attack for blockchain-based e-voting", Comput. Electr. Eng., vol. 83, p. 106583, 2020.

H.C. Chen and R. Deviani, “A secure e-voting system based on RSA time-lock puzzle mechanism”, IEEE Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 596-601, 2012.

S. Djanali, B.A. Pratomo, K.P.N. Cipto, A. Koesriputranto and H. Studiawan, “Design and development of voting data security for electronic voting (E-Voting)”, 4th International Conference on Information and Communication Technology, pp. 1-4, 2016.


  • There are currently no refbacks.