AUTOMATED COMPLEX "ELECTRONIC SIGNATURE OF THE VOTER (EPO)" AS AN ELEMENT OF THE CRITICAL INFRASTRUCTURE OF THE ELECTION PROCESS

Authors

DOI:

https://doi.org/10.69635/mssl.2025.1.2.26

Keywords:

Voter Electronic Signature, Critical Information Infrastructure, Reliability, Resilience, MTBF, MTTR, Zero Trust, IDS, SIEM, Machine Learning, E-Voting

Abstract

The article studies the automated complex "Electronic Voter Signature" (EPO) as an element of the critical information infrastructure of the election process. It is shown that modern electoral systems can no longer rely solely on paper procedures and traditional identification mechanisms, as the intensity of cyber threats aimed at undermining trust in voting results is increasing. A system model of the EPO complex is proposed, in which key modules are allocated: biometric verification of voters, cryptographic protection and signature, management of voting sessions, logging and auditing, integration with the electronic voting system, as well as security monitoring subsystems based on Zero Trust, IDS (intrusion detection systems) and SIEM (centralized event correlation) approaches. To assess the reliability and stability of the complex, probabilistic models of reliability theory, indicators of average uptime (MTBF) and mean recovery time (MTTR), availability factor and generalized stability function were used. Special attention is paid to modeling cascade failures in the network of district nodes interacting through secure channels, using graph models and simulation scenarios. To increase the effectiveness of cyber defense, the use of machine learning methods, in particular, deep architectures CNN+LSTM, AE+LSTM and Byte2Image transformations for analyzing network traffic and event logs is proposed. It has been demonstrated that the combination of redundant architectural solutions, the Zero Trust concept and intelligent anomaly detection systems allows achieving a significantly higher level of availability and resilience of the EPO complex compared to the basic configurations. A method for protecting the biometric identification and authentication unit by human face from spoofing attacks is proposed using algorithms for converting color image spaces into YCrCb and CIE L*u*v* and analyzing attack signs using the ETC classifier. The normative aspects of the regulation of electoral information systems in Ukraine were discussed, the need for formal recognition of electoral systems as a component of the national critical infrastructure was emphasized. Recommendations were formulated for the integration of cyber resilience requirements into national electoral and cybersecurity regulations, as well as directions for further research on risk modeling and evaluation of the effectiveness of hybrid ML/AI solutions in the electoral process.

References

Faruk, M., Alam, F., Islam, M., & Rahman, A. (2024). Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency. Clust. Comput., 27, 4015-4034. https://doi.org/10.1007/s10586-023-04261-x.

Shaikh, A., Adhikari, N., Nazir, A., Shah, A., Baig, S., & Shihi, H. (2025). Blockchain-enhanced electoral integrity: a robust model for secure digital voting systems in Oman. F1000Research. https://doi.org/10.12688/f1000research.160087.1.

Potluri, P., Jayakarthik, R., Agarwal, S., S, S., S, V., & R, A. (2024). A Comprehensive Evaluation of Secured Electronic Voting System Design based on Face Biometric Authentication Policy. 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 446-453. https://doi.org/10.1109/i-smac61858.2024.10714856.

Alown, M., Kiraz, M., & Bingol, M. (2025). Enhancing Democratic Processes: A Survey of DRE, Internet, and Blockchain in Electronic Voting Systems. IEEE Access, 13, 20512-20545. https://doi.org/10.1109/access.2025.3531349.

Prajapat, S., Gautam, U., Gautam, D., Kumar, P., & Vasilakos, A. (2024). Designing a Robust Quantum Signature Protocol Based on Quantum Key Distribution for E-Voting Applications. Mathematics. https://doi.org/10.3390/math12162558.

Shopina, I., Khomiakov, D., Khrystynchenko, N., Zhukov, S., & Shpenov, D. (2020). CYBERSECURITY: LEGAL AND ORGANIZATIONAL SUPPORT IN LEADING COUNTRIES, NATO AND EU STANDARDS. Journal of Security and Sustainability Issues, 9, 977-992. https://doi.org/10.9770/jssi.2020.9.3(22).

Terlyuk, O., & Terlyuk, I. (2025). Electronic Voting іn Ukraine: Legal Aspects іn the Context of Technological Innovations and Prospects. Visnik Nacional’nogo universitetu «Lvivska politehnika». Seria: Uridicni nauki. https://doi.org/10.23939/law2025.46.343.

Gavrik, R. (2022). On the prospects of introduction of electronic voting in Ukraine in the context of implementation of the concept of development of electronic democracy and digitalization. Uzhhorod National University Herald. Series: Law. https://doi.org/10.24144/2307-3322.2022.70.45.

Pavshuk, K., Mokhonchuk, B., Romaniuk, P., Liubchenko, O., & Murtishcheva, A. (2025). Possibilities of Implementing E-Voting System in Ukraine. Politics in Central Europe. https://doi.org/10.2478/pce-2025-0009.

Verkhovna Rada Ukrainy. (2012). Pro vybory narodnykh deputativ Ukrainy [On the elections of people’s deputies of Ukraine], Vidomosti Verkhovnoi Rady Ukrainy (VVR), 10-11, Art. 73. https://zakon.rada.gov.ua/laws/show/4632-17#Text (vtratyv chynnistʹ, okrim polozhenʹ shchodo orhanizatsiyi ta provedennya promizhnykh vyboriv ta zamishchennya narodnykh deputativ Ukrainy, obranykh u zahalʹnoderzhavnomu vyborchomu okruzi, povnovazhenʹ yakykh dostrokovo prypyneni, shcho diyutʹ do nastepnykh cherhovykh abo pozacherhovykh vyboriv narodnykh deputativ Ukrainy, na pidstavi Kodeksu № 396-IX vid 19.12.2019, VVR, 2020, № 7, № 8, № 9, st.48).

Verkhovna Rada Ukrainy. (2007). Pro Derzhavnyi reiestr vybortsiv [On the State Register of Voters], Vidomosti Verkhovnoi Rady Ukrainy (VVR), 20, Art. 282. https://zakon.rada.gov.ua/laws/show/1024-16#Text

Verkhovna Rada Ukrainy. (2022). Pro elektronnu identyfikatsiiu ta elektronni dovirchi posluhy [Law of Ukraine on electronic identification and trust services] (Law No. 2155-VIII, 2017, as amended by Law No. 2801-IX, 2022). Vidomosti Verkhovnoi Rady Ukrainy, 45, 400. Retrieved from https://zakon.rada.gov.ua/laws/show/2155-19

Verkhovna Rada Ukrainy. (2017). Pro osnovni zasady zabezpechennia kiberbezpeky Ukrainy [On the basic principles of ensuring the cybersecurity of Ukraine]. Vidomosti Verkhovnoi Rady Ukrainy, 45, 403. https://zakon.rada.gov.ua/laws/show/2163-19

Polotnianko, O., Madryha, T., Pyrohovska, V., Pozniakov, S., & Berezovska-Chmil, O. (2024). Regulatory frameworks for securing electoral processes in Ukraine: managing information security challenges. Multidisciplinary Science Journal. https://doi.org/10.31893/multiscience.2024ss0702.

Gudz, L. (2024). ENSURING HUMAN RIGHTS IN THE CONTEXT OF IMPLEMENTATION OF ELECTRONIC VOTING IN UKRAINE: PERSPECTIVES AND RISKS. The Journal of V. N. Karazin Kharkiv National University, Series "Law". https://doi.org/10.26565/2075-1834-2024-37-07.

Havrik, R. (2023). Estonian experience of electronic voting: prospects of implementation in Ukraine. Economics. Finances. Law. https://doi.org/10.37634/efp.2023.6.13.

Khade., S. (2025). Enhancing Electoral Integrity: Implementation of a Secure E-Voting Platform. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT. https://doi.org/10.55041/ijsrem41520.

Jafar, U., Aziz, M., Shukur, Z., & Hussain, H. (2022). A Systematic Literature Review and Meta-Analysis on Scalable Blockchain-Based Electronic Voting Systems. Sensors (Basel, Switzerland), 22. https://doi.org/10.3390/s22197585.

Pavshuk, K. (2024). Trust in electronic voting: the Estonian case. Problems of legality. https://doi.org/10.21564/2414-990x.166.310197.

Polotnianko, O. (2025). The use of modern information technologies during elections in developed countries. Visegrad Journal on Human Rights. https://doi.org/10.61345/1339-7915.2024.6.13.

Son, S. (2021). Legal regulation of the universal European election process. ScienceRise: Juridical Science. https://doi.org/10.15587/2523-4153.2021.234520.

Haripriya, T., G, V., Babu, M., Aswini, G., & S, R. (2024). Biometric System Based Electronic Voting Machine. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. https://doi.org/10.32628/cseit2410315.

Abdullah, A., & Ali, N. (2025). Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking. Journal of Applied Engineering and Technological Science (JAETS). https://doi.org/10.37385/jaets.v6i2.6223.

Chen, C., Tan, D., Meng, X., & Gao, J. (2022). An influential node identification method considering multi-attribute decision fusion and dependency. Scientific Reports, 12. https://doi.org/10.1038/s41598-022-23430-3.

Singh, K., Chandrasekar, V., Zou, W., Kurths, J., & Senthilkumar, D. (2025). Graph coloring framework to mitigate cascading failure in complex networks. Communications Physics. https://doi.org/10.1038/s42005-025-02089-y.

Tigrek, R. (2019). Fault Management Based on Systems Description as Directed Graph With Absolute Dependence Relations. IEEE Systems Journal, 13, 3687-3696. https://doi.org/10.1109/jsyst.2019.2927404.

Wang, R., Li, Y., Xu, J., Wang, Z., & Gao, J. (2022). F2G: A hybrid fault-function graphical model for reliability analysis of complex equipment with coupled faults. Reliab. Eng. Syst. Saf., 226, 108662. https://doi.org/10.1016/j.ress.2022.108662.

Xu, W., Liu, X., Wang, T., & Liu, X. (2025). Fault-tolerant adaptive synchronization for discrete high-order multi-agent systems with stochastic noise. IEEE Transactions on Automation Science and Engineering, 22, 14833-14842. https://doi.org/10.1109/tase.2025.3562514.

Rivas-Dávalos, F., Toledo-Adame, D., & Martinez-Ceseña, E. (2025). Identifying core nodes in interaction graphs for critical component analysis in cascading failures of power grids. Archives of Electrical Engineering. https://doi.org/10.24425/aee.2025.153022.

Kabir, S. (2017). An overview of fault tree analysis and its application in model-based dependability analysis. Expert Syst. Appl., 77, 114-135. https://doi.org/10.1016/j.eswa.2017.01.058.

Duan, D., Duan, D., Lv, C., Si, S., Wang, Z., Li, D., Gao, J., Havlin, S., Stanley, H., & Boccaletti, S. (2019). Universal behavior of cascading failures in interdependent networks. Proceedings of the National Academy of Sciences, 116, 22452 - 22457. https://doi.org/10.1073/pnas.1904421116.

Issa, L., & Hassan, Z. (2021). Use of a modified Markov models for parallel reliability systems that are subject to maintenance. Journal of Physics: Conference Series, 1999. https://doi.org/10.1088/1742-6596/1999/1/012087.

Çekyay, B., & Özekici, S. (2015). Reliability, MTTF and steady-state availability analysis of systems with exponential lifetimes. Applied Mathematical Modelling, 39, 284-296. https://doi.org/10.1016/j.apm.2014.05.029.

Signoré, J. and Leroy, A. (2021). Markov modeling. Springer Reliability Engineering Series. https://doi.org/10.1007/978-3-030-64708-7_31 .

Çekyay, B., & Özekici, S. (2015). Reliability, MTTF and steady-state availability analysis of systems with exponential lifetimes. Applied Mathematical Modelling, 39, 284-296. https://doi.org/10.1016/j.apm.2014.05.029.

Torrado, N., Arriaza, A., & Navarro, J. (2021). A study on multi-level redundancy allocation in coherent systems formed by modules. Reliab. Eng. Syst. Saf., 213, 107694. https://doi.org/10.1016/j.ress.2021.107694.

Ain, N., Sardaraz, M., Tahir, M., Elsoud, M., & Alourani, A. (2025). Securing IoT Networks Against DDoS Attacks: A Hybrid Deep Learning Approach. Sensors (Basel, Switzerland), 25. https://doi.org/10.3390/s25051346.

Susilo, B., Muis, A., & Sari, R. (2025). Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm. Sensors (Basel, Switzerland), 25. https://doi.org/10.3390/s25020580.

Susilo, B., Muis, A., & Sari, R. (2025). Intelligent Intrusion Detection System Against Various Attacks Based on a Hybrid Deep Learning Algorithm. Sensors (Basel, Switzerland), 25. https://doi.org/10.3390/s25020580.

Balamurali, K., Chandru, S., Razvi, M., & Kumar, S. (2021). Face Spoof Detection Using VGG-Face Architecture. Journal of Physics: Conference Series, 1917. https://doi.org/10.1088/1742-6596/1917/1/012010.

Moon, Y., Ryoo, I., & Kim, S. (2021). Face Antispoofing Method Using Color Texture Segmentation on FPGA. Secur. Commun. Networks, 2021, 9939232:1-9939232:11. https://doi.org/10.1155/2021/9939232.

Sharma, D., & Selwal, A. (2023). A survey on face presentation attack detection mechanisms: hitherto and future perspectives. Multimedia Systems, 29, 1527 - 1577. https://doi.org/10.1007/s00530-023-01070-5.

Turhal, U., Yilmaz, A., & Nabiyev, V. (2023). A new face presentation attack detection method based on face-weighted multi-color multi-level texture features. Vis. Comput., 40, 1537-1552. https://doi.org/10.1007/s00371-023-02866-2.

Alown, M., Kiraz, M., & Bingol, M. (2025). Enhancing Democratic Processes: A Survey of DRE, Internet, and Blockchain in Electronic Voting Systems. IEEE Access, 13, 20512-20545. https://doi.org/10.1109/access.2025.3531349.

Jafar, U., Aziz, M., Shukur, Z., & Hussain, H. (2022). A Systematic Literature Review and Meta-Analysis on Scalable Blockchain-Based Electronic Voting Systems. Sensors (Basel, Switzerland), 22. https://doi.org/10.3390/s22197585.

Juybari, M., Hamadani, A., & Ardakan, M. (2023). Availability analysis and cost optimization of a repairable system with a mix of active and warm-standby components in a shock environment. Reliab. Eng. Syst. Saf., 237, 109375. https://doi.org/10.1016/j.ress.2023.109375.

Kostenko O. V. Compromise of a personal electronic signature key. Legal scientific electronic journal. 2019. № 6. С. 266-269. DOI: https://doi.org/10.32782/2524-0374/2019-6/63

Kostenko O. V., Prokopovich-Tkachenko D. I., Florov S. V. Legal risks of compromising a qualified electronic signature. Legal Scientific Electronic Journal. 2023. No. 11. Pp. 373-379. DOI: https://doi.org/10.32782/2524-0374/2023-11/91

Downloads

Views: 54

  |  

Downloads: 17

Published

2025-12-05

Issue

Section

Digital Identity, Privacy, and Cybersecurity

How to Cite

Dmytro V. Zhuravlov, & Dmytro D. Zhuravlov. (2025). AUTOMATED COMPLEX "ELECTRONIC SIGNATURE OF THE VOTER (EPO)" AS AN ELEMENT OF THE CRITICAL INFRASTRUCTURE OF THE ELECTION PROCESS. Metaverse Science, Society and Law, 1(2). https://doi.org/10.69635/mssl.2025.1.2.26

Similar Articles

1-10 of 14

You may also start an advanced similarity search for this article.