scholarly journals Another Look at Privacy-Preserving Automated Contact Tracing

2022 ◽  
Vol 8 (2) ◽  
pp. 1-27
Author(s):  
Qiang Tang

In the current COVID-19 pandemic, manual contact tracing has been proven to be very helpful to reach close contacts of infected users and slow down spread of the virus. To improve its scalability, a number of automated contact tracing (ACT) solutions have been proposed, and some of them have been deployed. Despite the dedicated efforts, security and privacy issues of these solutions are still open and under intensive debate. In this article, we examine the ACT concept from a broader perspective, by focusing on not only security and privacy issues but also functional issues such as interface, usability, and coverage. We first elaborate on these issues and particularly point out the inevitable privacy leakages in existing Bluetooth Low Energy based ACT solutions, including centralized and decentralized ones. In addition, we examine the existing venue-based ACT solutions and identify their privacy and security concerns. Then, we propose a generic venue-based ACT solution and a concrete instantiation based on Bluetooth Low Energy technology. Our solution monitors users’ contacting history only in virus-spreading-prone venues and offers higher-level protection for both security and privacy than its predecessors. Finally, we evaluate our solution from security, privacy, and efficiency perspectives, and also highlight how to reduce false positives in some specific indoor environments.

2021 ◽  
Vol 2 (2) ◽  
pp. 1-33 ◽  
Author(s):  
Leonie Reichert ◽  
Samuel Brack ◽  
BjÖRN Scheuermann

To combat the ongoing Covid-19 pandemic, many new ways have been proposed on how to automate the process of finding infected people, also called contact tracing . A special focus was put on preserving the privacy of users. Bluetooth Low Energy as base technology has the most promising properties, so this survey focuses on automated contact tracing techniques using Bluetooth Low Energy. We define multiple classes of methods and identify two major groups: systems that rely on a server for finding new infections and systems that distribute this process. Existing approaches are systematically classified regarding security and privacy criteria.


Author(s):  
Yue Zhang ◽  
Jian Weng ◽  
Rajib Dey ◽  
Xinwen Fu

Author(s):  
Marco Cremonini ◽  
Ernesto Damiani ◽  
Sabrina De Capitani di Vimercati ◽  
Angelo Corallo ◽  
Gianluca Elia

Mobile systems and applications are raising some important information security and privacy issues. This chapter discusses the need for privacy and security in mobile systems and presents technological trends which highlight that this issue is of growing concern.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 335 ◽  
Author(s):  
T Veerraju ◽  
Dr K. Kiran Kumar

With the rapid advancement of Internet of Things has enabled to combine the intercommunication and interconnection between seamless networks. Cloud computing provides backend solutions and one among the most prominent technologies for the users, still cannot be solved all the problems such as latency of real time applications. However, a new computing paradigm comes in to the picture. Many of the researchers focused on this exemplar known as Fog/Edge computing, which has been planned to the extension of cloud services. Fog provides the services to the edge of the networks, which makes communication, computation and storage for end users through fog devices and for servers like controllers. We analyze the study, which aims to augment low bandwidth, latency along with the privacy and security.   The major problem in the Fog computing is security due to the limited resources. In this paper, we investigated the protection issues and confrontation of Fog and also provide countermeasures on security for different attacks. We focused the future security directions and challenges to address in fog networks.


2021 ◽  
pp. 101474
Author(s):  
Pablo G. Madoery ◽  
Ramiro Detke ◽  
Lucas Blanco ◽  
Sandro Comerci ◽  
Juan Fraire ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (16) ◽  
pp. 3487 ◽  
Author(s):  
Baichuan Huang ◽  
Jingbin Liu ◽  
Wei Sun ◽  
Fan Yang

Among the current indoor positioning technologies, Bluetooth low energy (BLE) has gained increasing attention. In particular, the traditional distance estimation derived from aggregate RSS and signal-attenuation models is generally unstable because of the complicated interference in indoor environments. To improve the adaptability and robustness of the BLE positioning system, we propose making full use of the three separate channels of BLE instead of their combination, which has generally been used before. In the first step, three signal-attenuation models are separately established for each BLE advertising channel in the offline phase, and a more stable distance in the online phase can be acquired by assembling measurements from all three channels with the distance decision strategy. Subsequently, a weighted trilateration method with uncertainties related to the distances derived in the first step is proposed to determine the user’s optimal position. The test results demonstrate that our proposed algorithm for determining the distance error achieves a value of less than 2.2 m at 90%, while for the positioning error, it achieves a value of less than 2.4 m at 90%. Compared with the traditional methods, the positioning error of our method is reduced by 33% to 38% for different smartphones and scenarios.


2019 ◽  
Vol 98 ◽  
pp. 103288 ◽  
Author(s):  
Didi Surian ◽  
Vitaliy Kim ◽  
Ranjeeta Menon ◽  
Adam G. Dunn ◽  
Vitali Sintchenko ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document