Abstract
Contact Tracing is considered as the first and the most effective step towards containing an outbreak, as resources for mass testing and large quantity of vaccines are highly unlikely available for immediate utilization. Effective contact tracing can allow societies to reopen from lock-down even before availability of vaccines. The objective of mobile contact tracing is to speed up the manual interview based contact tracing process for containing an outbreak efficiently and quickly. In this article, we throw light on some of the issues and challenges pertaining to the adoption of mobile contact tracing solutions for fighting COVID-19. In essence, we proposed an Evaluation framework for mobile contact tracing solutions to determine their usability, feasibility, scalability and effectiveness. We evaluate some of the already proposed contact tracing solutions in light of our proposed framework. Furthermore, we present possible attacks that can be launched against contact tracing solutions along with their necessary countermeasures to thwart any possibility of such attacks.
Keywords: COVID-19, Contact tracing, Security, Privacy, Scalability
1. Introduction
Severe Acute Respiratory Syndrome (SARS) is an atypical pneumonia that is characterized by a high rate of transmission, which began in Guangdong Province, China, in November 2002 [1]. One of the largest SARS outbreaks to date began in Singapore in mid-March 2003 [1] and was traced to a traveler returning from Hong Kong. Recently in China, several local health facilities in Wuhan, Hubei Province, reported clusters of patients with pneumonia of unknown cause that they supposedly and epidemiologically linked to a seafood and wet animal wholesale market in the province. However the due spread through untraced contacts eventually lead to its spread on a global scale which is what we see today as a pandemic (COVID-19) [2]. Contact Tracing is a key strategy for mitigating the impact of infections like COVID-19 on health care systems in specific and health of the population in general, and is thereby expected to slow the spread of infectious diseases. It allows individuals of a country or a community to relieve distress from a community’s containment measures, as it gives the corresponding infected individuals a chance to quarantine themselves voluntarily. Contact tracing is expected to increase the sensitivity followed by the readiness of a country, a community, or individuals for an emerging pandemic like novel Coronavirus (COVID-19) by mitigating the already available flaws of the traditional detection which solely relies on symptoms. According to WHO [3], contact-tracing occurs in three steps:
-
1.
Identifying the Contact: From the already confirmed positive cases, identifying those that the patient had contact with (according to the transmission modalities of the pathogen).
-
2.
Listing of Contacts: Keep a record of possible contacts of the infected patients and inform those individuals.
-
3.
Contact Follow-Up: A necessary follow-up of the patients that are believed to have come in contact with the infected individuals and those who are positive.
Containment is a primary road-map to quickly halt an outbreak, which may become an epidemic and then in the worst case, turn into a pandemic, which is exactly what happened in case of COVID-19. Containment is accomplished by rapid identification of the individuals followed by their quarantine for a maximum of 14 days which under conservative assumptions happens to be the time period after which an individual starts to develop symptoms [4]. The next step is to identify those people who they had contact with, within the previous days which is then accompanied by decontamination of places that the infected individual had traveled to in the recent past. In essence, this process is expensive in terms of labor and prone to various errors that may lead to some privacy concerns. With a limited number of resources the government has, the process of contact tracing needs to be automated so as to stop the untraced spread of the disease. In order to understand why contact tracing is so important, we need to determine how contagious a disease is. This depends upon the average number of individuals that will catch the disease from one infected individual. The determination of these features is done with certain parameters like the infectious period, the rate of contact and the mode of transmission. Both incubation period and the mode of transmission are the functions of the nature of the disease causing pathogen. Thus, the only controllable parameter being the contact rate, which needs to be traced and controlled accordingly. Thereby, providing an idea about how important contact tracing is and how helpful it can be for lowering the rate of transmission of a disease before its translation into a pandemic. Whether contact tracing and isolation of known cases is enough to prevent the spread of the epidemic, some predictions were made by Ferretti et al. [5]. They quantified the expected success of digital contact tracing and suggested some requirements for its ethical implementation. As the need arise, several proposals are being proposed to contain the further spread of this pandemic. However, it is equally important to have an evaluation criteria for these solutions so as to check which solution deems fit for adoption.
Considering the advancements in technology, almost every alternate individual on earth carries a device which has the capabilities of being tracked through GPS with proper infrastructure [3]. Such capabilities, like the tracking of location trails with proper timestamps and the ability to log them can certainly allow one to compare infected individuals with that of the ones who have been in their close proximity, thus enabling contact tracing. Now that we know what is at stake, it is also important to understand the magnitude of the grave consequences it can draw. Since, digital contact tracing is widely being demanded because of the need of the hour, there are a number of proposals emerging from the scientific community leveraging state-of-the-art technology to make contact tracing actually possible and less cumbersome in practice. However, with the proposals coming in numbers, one important aspect is their careful evaluation in a generic sense before being considered for wide adoption by the masses. To this end, there is not a general framework or an assessment criteria for digital contact tracing solutions to determine their feasibility, usability and scalability. To address this problem in hand, we propose an evaluation framework to analyze and evaluate some of the contact tracing systems based on some parameters and discuss about the possibility of attacks on them and their countermeasures.
In this article, we investigated several contact tracing solutions under the evaluation framework we proposed. The parameters of the evaluation framework are highly important to contact tracing solutions since the problem is explicitly defined along with the areas that needs improvement and careful analysis. We analytically study the importance of these parameters in a contact tracing solution to pave a way for practical considerations for a contact tracing solution to be adopted in practice.
Key findings and discussions of this article can be listed as follows:
-
•
We highlighted the underlying issues & problems with mobile contact tracing solutions.
-
•
We proposed a general evaluation framework for contact tracing solutions and provided a thorough introduction of each of the parameters.
-
•
We evaluated some of the available contact tracing solution in light of our framework.
-
•
We also performed a comparative analysis of the evaluated contact tracing solutions to provide comprehensive insights for better understand these solutions.
-
•
Furthermore, we provided possible attacks on contact tracing solutions and their potential countermeasures.
Rest of the paper is organized as follows: Section 2 discusses about the issues and challenges in adopting mobile contact tracing solutions. Section 3 presents the proposed framework for evaluating contact tracing solutions. In Section 4, we evaluate some of the available contact tracing solutions in light of our proposed framework. Section 5 presents the taxonomy of the possible attacks on available contact tracing solutions and their possible countermeasures. Section 6 concludes the paper by providing insights into what was achieved in the paper and the underlying motivation for doing that. A brief summary of most of the available contact tracing solutions is presented in Table A.2 which is included as Appendix.
2. Issues and challenges in mobile contact tracing
In this section, we discuss issues and challenges pertaining to the adoption of contact tracing solutions. Digital contact tracing speeds up the process of identification of the individuals who might have come in close contact with the contagious ones. However, before merging the traditional contact tracing methodology with the current state-of-the-art technology, there arise potential risks and issues. Some of the primary concerns of which are of securing the identity of an infected individual from others, stopping the spread of misinformation, stopping snoopers from causing panic among the masses and withholding the countries from establishing a surveillance state. Some examples of mass surveillance activities among contact tracing solutions that might have some serious consequences are:
Israel passed a legislation that allows the government to track the mobile phone data of individuals suspected to be infected [6].
South-Korean government on the other hand has maintained a public database of known patients which contains information about their occupation, age, gender and travel routes [7].
There are several technology based solutions suggested to be adopted as a digital contact tracing solution/mechanism, some of which are based on GPS tracking and the others, that are based on Bluetooth based token sharing. Despite the efforts, there are issues with the underlying technologies which are to be understood, highlighted and mitigated in best possible ways to strengthen the available solutions. These issues should be addressed to narrow down any strategic window of opportunity for malicious actors, snoopers and surveillance state/government. The Automatic Contact tracing systems based on Bluetooth communications was first proposed by Altuwaiyan et al. [8] in 2018. The Bluetooth based contact tracing systems can directly detect whether users came in proximity of each other. The proximity can be approximated by the strength of the signal, which although is reduced by obstructions like walls. Therefore in a high risk environment for close contact like buildings or public transits it can more effectively and accurately reflect functional proximity [9]. However, with applications that evaluate exposure risk based on Bluetooth, proximity exchange is in essence not sufficient because of the fact that apart from the human to human interaction, Coronavirus (COVID-19) can also transmit through common environments or commonly touched surfaces [10]. Another important drawback of pure Bluetooth based systems is the problem of slow or low rate of adoption which in turn limits the user base thus affecting the effectiveness of the system. Zeadally et al. in [11] has provided a detailed discussion on issues and possible attacks on Bluetooth technology. GPS, on the other hand is not secure by its inherent nature. Also, there are some functionalities that GPS based systems cannot provide. One of the main concerns is spoofing attacks, where a spoofer creates a false GPS signal with an incorrect time and location to a particular receiver [12]. Warner et al. in [13] gave a simple demonstration to show GPS is vulnerable to spoofing.
3. Proposed evaluation framework for contact tracing solutions
The proposed evaluation framework is a five-step method for evaluating a particular contact tracing solution as shown in Fig. 1. The figure depicts the diagrammatic representation of the framework and each step is summarized in detail below. The aim of our evaluation model is to categorize the contact tracing solutions so as to be able to identify each solution easily and further have a general criteria for the evaluation of contact tracing systems. It is equally important to provide the motivation behind choosing these parameters for evaluation of contact tracing solutions. Since contact tracing solutions involve collection and use of sensitive data of individuals such as their health history, infection state, current health symptoms, medical conditions and their location. It is evident that the use of this sensitive personal information of individuals has elicited serious concerns about the overall integrity of these solutions. These concerns have motivated interest in transparency of the whole process, so that the stakeholders can better understand the fine details, including the purpose of the solution, the security it offers, the data that is being collected and the proposed solution’s use of the collected data. With all these factors in perspective, we figured out the parameters that best suit the purpose and are well generalized in nature. Although, there are other parameters which can be used to further better the analysis of contact tracing solutions like the Battery consumption/Battery efficiency, likelihood of adoption and number of downloads (in thousands) a particular application has received, but as the theme of the targeted schemes in perspective is much general, it will not be feasible to evaluate them on these parameters at this point. We further put some of the available contact tracing solutions under the framework’s assessment criteria and analyze them explicitly.
Fig. 1.
Contact tracing evaluation framework.
Before providing a detailed description of the five principles of the evaluation criteria it is important to give a brief introduction of these principles for a better understanding of the evaluation criteria. The underlying parameters are as:
-
E1.
Centralized or Decentralized: A Centralized system is one where all the users are connected to a single point of authority or a server. The central authority stores all the data where all the other users can this information. While as a decentralized system is one where no entity is a sole authority or has control over the whole network or the data.
-
E2.
Proximity or GPS: Global Positioning System (GPS) has seen its growth from a meagre positioning system to its omnipresence as a trusted navigation, timing data and positioning source. For the close proximity case, bluetooth technology is chosen due to the evident reasons like low cost, low power consumption and it’s ability to be integrated in a wide range of portable devices.
-
E3.
Privacy: Privacy is an extensive concept, and encompasses a wide range of things from control over one’s body, freedom of thought, solitude in one’s home, control over personal information, freedom from surveillance, protection of one’s reputation, and protection from interrogations and searches [14]. Cryptographically, there are several notions of privacy that have been introduced over the years and are widely used in practice. Keeping in view the context of the problem in perspective, we involve some popular definitions like k-anonymity [15], differential privacy [16] and information-theoretic privacy [17].
-
E4.
Adversarial Model: The adversarial model depicts the setting which the adversary is working under or the corruption abilities of an adversary. There are several adversarial models in the field of cryptography but we use the Semi-honest/ Honest but Curious model in our case. In this model, the adversary can try to obtain the information that they are not entitled to
-
E5.
Scalability: A solution is said to be scalable if it can be adopted by masses without significant changes to the underlying infrastructure. There can be various parameters under the wide blanket of scalability depending upon the application being targeted like number of downloads, Battery optimization etc. However, in a generic way we consider the scalability of the system as its behavior under varied workloads.
Now that we have a general overview about the parameters of the evaluation model. It will be easy to understand the subtle characteristics of the model.
-
•
Nature of the model (Centralized or Decentralized) The question of whether a solution should be centralized or decentralized is of central importance in contact tracing systems because in centralized systems, we have a central semi-trusted authority like a Health or a government authority in our case. For example, consider the case of Singapore’s TraceTogether app [18], the government maintains a database that links randomly generated tokens from an individual’s phone to their phone numbers and then to their actual identities. They can build a list of all other people they have been in contact with after an infected user is compelled to upload his data. With these things into consideration, no individual would want to be exploited by a central authority under any circumstances. Thus, the notion of decentralization causes a dent to such surveillance infrastructures and give individuals something to look up to. We look at it as a policy that fulfills the necessary requirements of contact tracing while providing the privacy we want. However, [19] provided great insights into security and privacy analysis of contact tracing systems. He argued that contrary to common belief that decentralization solves the privacy concerns of centralized systems, it rather introduces some new attack vectors against privacy itself. For literature relevance, we have organized proposals in A.2 and characterized them in a context that we feel is important to contact tracing systems.
-
•
Technique Employed (Proximity based or GPS based) Our second assessment criterion is to understand the underlying technique employed by the contact tracing solution. Since, the idea is to track the people who came in close contact with each other, there are two mechanisms that are usually used to ensure tracking of individuals. They are Proximity based (Bluetooth) and GPS based. Some of the solutions employ the use of both while most of them rely on one or the other. The widely adopted technique is the one which makes use of Proximity based tracking due to all the evident reasons. Since Proximity based solutions are usually more accurate compared to GPS based solutions [20], it is one of the reference selection parameters. Among other advantages is its ability to classify close contacts with a significantly lower false positive rate than GPS [20], its low power consumption and the rate of adoption. The rate of adoption is another important parameter for contact tracing solutions. It is quite evident that people are wary of tracking the location data, which can hamper its adoption and pave a way for Proximity based solutions.
-
•
Privacy Privacy is the backbone of contact tracing solutions. Safeguarding privacy should be the first step in devising contact tracing solutions. Privacy of individuals has not been a concern in some of the contact tracing proposals. Some countries have even adopted the notion of mass surveillance to track people in the name of contact tracing [21]. Although there is not a single notion of privacy that can guarantee with absolute certainty, the privacy requirements that a contact tracing solution needs but we can try to formulate certain notions of privacy so as to make privacy preserving a real thing in practice. To that end, we adapt the notions used by Cho et al. [22], because these notions seem to be general to all the schemes and relevant to the design of contact tracing solutions. We further define levels of privacy that the proposed models fulfill. We label them as following:
L1 (Level One): Privacy from Snoopers.
L2 (Level Two): Privacy from Users.
L3 (Level Three): Privacy from Authorities.
-
•
Adversarial Model Evaluation Considering the importance of data being uploaded for effective detection of individuals who have been in contact with an infected individual (a contagious one) along with the privacy concerns that arise inherently with it, it is important to evaluate the contact tracing solutions under a threat model. Here we use a semi-honest Model of privacy [23], which we expect is the best fit for this case. We also take into consideration various roles of an adversary or a nefarious actor as to what he can do to invade the privacy of users. The analysis of a contact tracing system in the adversarial model is focusing on how the proposed system is believed to behave under various attacks and its ability to withstand certain attacks. We have discussed the possible attacks that we have seen in various proposals as of now and proposed their possible countermeasures. We have evaluated each proposal under the semi-honest model.
-
•Scalability After a contact tracing solution is being framed, developed and deployed, it is then important to understand and analyze how it behaves under certain computational parameters and assumptions. Although, there are factors that may give us better asymptotic bounds on scalability like: the daily traffic, computations done on the phone and computations done in the backend. But for brevity, we determine the scalability of a contact tracing solution on parameters like:
-
–Number of Users adopting the solution and
-
–Behavior of the solution under varied workloads
-
–
4. Evaluation of the proposed solutions
In this section, in light of the proposed evaluation framework as described in Section 3. We evaluate and analyze some of the proposed contact tracing solutions. However, there are certain contact tracing solutions where insufficient information is available about the proposed solution. We omit their discussion for very obvious reasons. Despite that, we have provided brief summaries of most of the solutions in Table A.2 as an Appendix. Owing to clear understanding and simplicity, we adapt Tang’s notations [20] to indicate the workflow of contact tracing solutions. We briefly describe the architecture of each solution. We will give insights into some contact tracing solutions and discuss them in light of our framework. Comparative analysis of evaluated solutions is also presented in Table 1. We start with a solution which is the first proposed privacy-preserving contact tracing solution that paved a way for other proposals.
4.1. EPIC
Altuwaiyan et al.’s [8] model is an efficient privacy preserving contact tracing solution that enables users to upload their data securely to the server and if in case someone gets infected, others can check whether they ever came in contact with that infected individual. No unnecessary information is disclosed to the server. A matching score is used to represent the result of the contact tracing. The technical specifications are described below.
The participating entities in the system model are:
-
•
Smartphones
-
•
short-range wireless devices like Access points
-
•
Bluetooth devices and
-
•
A Server (it stores encrypted data from the users and the corresponding timestamps in plaintext)
The several phases of this architecture are described below.
Setup or initialization Phase
Since no special setup is needed. We assume that this phase has occurred.
Scanning or Sensing Phase
During this phase, the user’s smartphones will collect raw data about nearby short-range wireless signals (WiFi and Bluetooth) by performing timely adaptive wireless scanning.
Reporting phase or Detection Phase
When a user is detected as positive, then the user will upload its data to the server which is encrypted with corresponding timestamps for each network scan. The data: Wireless Device Unique Identifier (BSSID), Wireless Signal Strength indication (RSSI) and Wireless Signal type (WiFi, Bluetooth) are depicted as tuples of data points where depicts information about the first encountered device. is the hashed unique identifier, is the strength of the detected signal and is the device type for time intervals and so on.
Tracing phase
When a user is identified to be infected and another user wants to check whether they have been in close contact, the user sends a request to the server which includes his public key. The server matches the scans between the infected user and the requested user based on timestamps. Note that the timestamps are stored in plaintext on the server. After a match is found, the next step is to check whether these two individuals have scanned similar wireless devices. The server has the information of the infected individual in plaintext already. However, no information about a regular user is available to the server. The server uses the user’s public key which it received and encrypts each . The server returns a matrix which has the encrypted subtraction of all pairs of and using a homomorphic encryption scheme multiplied by a random value d added by the server to prevent from knowing unnecessary information about .
The results of the matrix are then decrypted by the user and a binary array is retrieved corresponding to the decryption result. 1 indicates that two wireless devices matched and vice versa. The infected user also sends with the matched where . EPIC is also a new method to measure the distance between two smart devices as is evident from the proposal itself. This in practice is more accurate than other solutions.
Taking into account the privacy of the proposal model, the infected individuals are supposed to reveal the location data to the server where the network identifiers are hashed. Since network identifiers are often static, it is of importance that this gives the server the freedom to compute the location data points of the infected users. Another important thing to note is that the timestamps are stored in plaintext, which suggests that, at a particular timestamp the location of the user is available to the server. So, based on our evaluation criteria, it is clear that homomorphic encryption is used to ensure privacy to the queries. The manipulations are done on the encrypted data itself. Although, the level of privacy this solution provides is L1 (Level One), L2 (Level Two) and L3 (Level Three), but there are some serious concerns when it comes to L3 (Level three). Like we discussed above, there is a possibility of attacks and some serious privacy leaks that should be avoided. Perhaps certain measures should be taken into consideration and if the modifications are done correctly, we assume that the L3 (Level three) privacy will be provided in its entirety. Analyzing the solution in light of the adversarial model, it is to be noted that the notion of semi-honest/honest-but-curious model fits the purpose here. To this end, we have seen that the privacy concerns here are the deductions that the server can do based on the information being uploaded thereby linking users based on particular timestamps. Another important thing to consider is that we omit the case of a malicious actor contaminating the database with faulty queries. Scalability is another important factor which impacts a solution’s widespread adoption. They have also developed an android application and tested it under various scenarios. Though the number of users that the app was tested with was 10. It is worth taking into consideration the system behavior when the number increases 10x or 100x (which happens to be a simpler scenario towards its deployment in a real world scenario). Though some scenarios are discussed in the proposed model itself, the overhead will surely increase as the number of users increase.
4.2. Tracetogether
TraceTogether [18] is the first mobile application based adoption of contact tracing. A system developed by Singapore’s Government Technology Agency along with the Ministry of Health to tackle the ongoing pandemic. The app operates by exchanging time varying tokens via Bluetooth connections between nearby phones.
The entities in this solution are:
-
•
Users and
-
•
Ministry of Health (MoH)
It is believed that the Ministry of Health (MoH) of Singapore government is to be trusted to protect the users information thus making this solution a centralized one. It is to be noted that a user might be compelled by the authorities to release his data on the app in case someone is diagnosed with COVID-19 and in Singapore, it is considered as a criminal offense to not assist the Ministry of Health in mapping one’s movements.
The different phases of the solution are described below:
Setup or Initialization Phase
During this phase, users download the TraceTogether app [18] and install it on their phones. Before the app is launched, the MoH of Singapore selects some time intervals , which will end right when the pandemic is over. The app then sends the phone number to MoH and receives a pseudonym from them. MoH stores in its database the pair (, ) where is the phone number of the user and the is the pseudonym generated by the authority against this number. The authority then generates the secret key and selects an encryption algorithm . For a user , MoH sends the initial pseudonym to the user’s app at the beginning of time interval for .
Scanning or Sensing Phase
In this phase, a user broadcasts at the time interval for all . Users store the TID’s of each other along with the signal strength i.e. if user and come in range of Bluetooth communication they will store () where the first two entries are the corresponding pseudonyms of the users and respectively at time interval and Sigstren is the signal between their devices.
Reporting phase or Detection Phase
When a user is tested positive for COVID-19 then the infected user will have to comply with MoH and upload the locally stored data to MoH’s database.
Tracing phase
After user stores the data on to the MoH’s server, MoH then decrypts every single and obtains through which they can lookup his and then do the necessary followup.
Now, that the proposal is completely well understood, it is quite clear that the proposed contact tracing solution is a proximity based centralized solution where the centralized authority is the Ministry of Health. The encryption technique is chosen by the authority so the notion of privacy is not clear in a sense that it is under the direct control of MoH. In terms of the level of privacy, the app provides L1 (Level One) and L2 (Level Two) levels of privacy since time varying tokens offer privacy among the users. However, it is to be noted that the time varying nature of these random tokens also provides privacy from snoopers to a greater extent if refresh rate is well set. If the rate is too frequent, then the server will have to store huge number of tokens and if the rate is slow then the user can be tracked down by a snooper while walking down the street. Here the semi-honest model of privacy seems to fit which is quite obvious due to the fact that the solution is centralized and under complete control of the MoH of the Singapore government. Though the central authority is following the protocol but if situation arises, they can deviate from it depending upon the circumstances and severity of the reason for deviation. Since, the proposed model relies on a central authority it fails to fulfill the third level of privacy (L3) because there is a possibility of a linkage attack [24]. The behavior of TraceTogether [18] under various modifications is given in [22] and the underlying protocol behind TraceTogether is Bluetrace [25].
In terms of scalability, the application has received over 2.1 million downloads so far [26] which is almost 36% of the total population of the country [27], and it is a voluntary choice for the Singaporean’s to install the app. But the noticeable part here is, if more than half of the Singaporean population adapt this technology as a measure to stop the spread of COVID-19, the amount of time-varying location data which is exposed to the authorities will be huge and can draw serious consequences. There is a possibility that a malicious user can manipulate (i.e. add or delete) the data collected by the app. Another possibility is of relay attacks. In addition, there are some other attacks proposed in [19]. Although, there is an advantage of identifying infected individuals but at the cost of an expensive trade-off between privacy and utility.
4.3. Reichert’s MPC based solution
Reichert’s MPC based solution [28] consists of two parties under semi-honest security settings. This solution leverages the already available applications of contact tracing that use location-based-services and store their history locally where health authorities can use the data points of infected individuals to initiate an MPC session with anyone who wants to trace themselves.
The participating entities are:
-
•
Users and
-
•
Health Authority (HA) that offers data matching as a service after collecting and storing the geolocation data of the individuals.
The phases of the proposed solution can be briefly discussed below:
Setup or Initialization Phase
During the setup phase, Health Authority (HA) prepares the cryptographic keys for later use in generation of garbled circuits [29].
Scanning or Sensing Phase
In this phase, users record their geolocation data points on the fly for different time intervals . At a particular time , a user generates and stores a tuple , where and represents latitude and longitude of the location respectively. The health authority can then use these data points in order to initiate a MPC session with every individual who wants to trace themselves.
Reporting phase or Detection Phase
If a user is detected positive for COVID-19, then the user will share the data points with the HA.
Tracing phase
The Health Authority sends a garbled circuit to all those that are interested. Each user has to perform oblivious communication with the HA. Based on the shared data points, the participating parties together will determine where the trajectories of infected and non-infected individuals intersect. A joint computation is performed by the HA and the users and by performing a secure binary search on the ORAM. If an element is found, then the user has been in close contact with an infected individual.
In light of our proposed framework, the model is geolocation based and has a central Health Authority. Garbled circuit (GC) construction which is fundamental to Multi-party Computation is used to seek privacy between the users such that no information about the inputs and outputs are revealed. The level of privacy this solution offers is L1 (Level One) and L2 (Level Two). Since we use the semi-honest model, assuming that the proposed solution offer L3 (Level Three) privacy will be misleading. There are several attacks that are possible on this proposed solution. Since this contact tracing solution is a theoretical in nature, the other aspects are overshadowed. There is a possibility of a DDoS attack in a situation where the number of users grow exceedingly large. In that case, HA will have to prepare garbled circuits for all the individuals thereby increasing the overhead and complexity, which in turn will take a toll on its efficiency. The attacks that are technology specific are not considered in this analysis since we have a separate section devoted to attacks which cover attacks on GPS based systems as well. Scalability on the other hand will be a bottleneck because there are several factors that will hinder the adoption of this solution unless necessary countermeasures are taken in this regard.
4.4. CAUDHT
This is a decentralized system based on distributed hash tables which limits the responsibilities of a HA to just confirming results of confirmed positive individuals by minimizing the amount of data that the centralized authority can derive from the protocol. The system is believed to be adaptable to proposals like DP-3T, though as an extension and not as a replacement.
The entities in the CAUDHT [30] model are:
-
•
Users and
-
•
Distributed Hash table (DHT)
-
•
Health Authority (HA) is merely used to retrieve signatures for the corresponding Bluetooth low energy (BLE) ID’s to verify the infected individual.
The phases of this proposed solution are briefly described below:
Setup or Initialization Phase
During the setup phase, we assume that the users have installed the app and a common DHT is chosen as a store-and-retrieve postbox where storage is provided as a key–value store. Apart from this, the HA needs to publish its public key before the protocol is run for infection verification.
Scanning or Sensing Phase
The CAUDHT protocol offers several protocol mechanisms and sensing in the proposed solution takes place as the collection mechanism. In the collection mechanism, the BLE IDs are broadcasted after a scan is performed to look for nearby devices. Each device advertises an ID which is stored when a signal is picked up from a device. These IDs are generated by means of an asymmetric key pair where the secret key is stored on the phone and the corresponding public key is broadcasted. This allows later verification that the contact with an infected individual actually happened. The scan retrieves 256bit ID which occurs automatically in android and iOS [31]. The BLE IDs are stored locally on a user’s phone.
Reporting phase or Detection Phase
After a user is tested positive, he is supposed to retrieve HA’s signature for every shared BLE ID in a blind way. For this purpose, textbook RSA is used for blind signatures in order to verify an infected user. Since HA’s public key is available to all, the users can verify that the individual is actually the infected one and not a malicious one. When a user had come in contact with an infected user it had received the BLE IDs from that user. Since the IDs are public keys, she encrypts her own BLE ID that she advertised during the last time she encountered this specific ID of that particular user. The infected user then accesses the DHT and stores the signatures of encrypted BLE ID at the DHT addresses corresponding to the user who came in contact with an infected user.
Tracing phase
This phase in the proposed solution is called the Pooling mechanism. In order to check whether a user has been in contact with an infected person, they need to periodically query the DHT. After a user is detected positive, he leaves a message in the corresponding contact’s postbox. Since the message was encrypted with the corresponding contact’s public key, the corresponding contact can search for this key in the DHT. An encrypted result will be returned which can then be decrypted by the corresponding user who holds the secret key.
Speaking of the proposed model in light of our framework, it is decentralized and uses proximity based tracing. Distributed Hash Tables (DHTs) are used to allow decentralization rather than relying on a central database. The levels of privacy this solution offers is L1 (Level One), L2 (Level Two) and L3 (Level Three). Although there are several underlying issues with the proposed solution where future modifications are needed, we highlight some of them here. In the semi-honest model setting, we consider a scenario where a malicious positive patient can claim to have seen the random BLE IDs which in turn will make users believe that they have contracted the disease. This is avoided by the lookup which is provided by DHT. The system resists against linkage attacks possible by the Health Authority. An eavesdropper cannot claim to be infected since a signature from the Health Authority uniquely determines an infected user from a non-infected one. Non-infected users can also try to learn about the ones who came in contact with an infected one. If a message is placed in the DHT when an infection is confirmed, an eavesdropper can conclude that the user has been in contact with an infected user. In order to prevent this, postboxes can hold more than one message and users can write random messages into their own or other user’s postboxes. Only the meaningful will be taken and the random ones discarded. The security of the system is enhanced with the use of DHT and Blind Signatures [32]. In terms of how scalable the solution is, DHT is more scalable than the options available like Tor [33] to be used for hiding a user’s identity. As proposed by the model, growth of the DHT does not affect the scalability problem. DHT overflow is avoided by deleting the older entries preferably after 14–21 days because for that period only, the data is useful. The amount of data stored in the DHT is constant no matter how many participants there are since all users are part of the DHT’s set of nodes.
4.5. Berke et al. ’s location based system
Berke et al.’s [9] contact tracing model is a GPS based solution for contact tracing that leverages partitioning of fine-grained GPS locations and private set intersection allowing the system to detect when a user came in close proximity of positive patients to assess and inform them of the risk while preservation privacy of the individuals.
The entities or participating entries of the system are:
-
•
Users (in possession of a smartphone) and
-
•
Server (used to store the redacted, transformed and encrypted data)
The various phases of the system can be described briefly below:
Setup or Initialization Phase
It is assumed that users possess a smartphone capable of collecting and storing data.
Scanning or Sensing Phase
As the users move throughout the day, timestamped GPS points are collected within a user’s device. The data is collected in the form of tuples of latitude, longitude and time: (latitude, longitude, time).
Reporting phase or Detection Phase
A user’s app scans/checks for matches between their collected points and the points shared by users who were diagnosed as positive carriers so as to identify points of contact. Though the GPS points are never directly compared to find the matches, they are instead matched to a 3-dimensional grid where two dimensions are latitude and longitude while as the third dimension is time. They are then obfuscated using a deterministic one-way Hash function (e.g. NIST Standard SHA256) [34].
Tracing phase
When a patient is diagnosed as a positive carrier, the patients share their redacted, anonymized, hashed point intervals to the server. Users periodically share their point intervals with the central server to detect if their hashed point intervals matched with anyone who is diagnosed to be a positive carrier. This happens by means of a Private set protocol.
Analyzing this solution in light of our evaluation framework, this is a GPS based solution where privacy preservation is done either manually or automatic redaction & obfuscation using a deterministic hash function along with private set intersection. Though the system provides L1 (Level One) and L2 (Level Two) privacy. It is highly likely that the system provides L3 (Level Three) level privacy even when the semi-honest nature of the server suggests that it can be compromised as well. Speaking of attack vectors in the semi-honest setting, several things are to be taken into consideration. Since, for the wide adoption of Bluetooth based solutions special applications are required that could suffer from slower or limited adoption. Thus, the fact that the applications on a user’s phone are already collecting the user’s GPS location histories, this solution leverages the fact that this is infact important to more quickly roll out their system as a life saving alternative for contact tracing solutions. They provided a simple scheme that uses Diffie–Hellman protocol [35] to better understand how Private set intersection supports the privacy goals set by the model. There certainly are privacy risks if a model is constructed based on their intermediary implementation which involves publishing of data points to a flat data file for other users to download rather than having a server perform private set intersection protocol. The concern with this is the attacker’s attempt to reconstruct location histories of users diagnosed as carriers and possible re-identification of those from their shared anonymized data. There are other issues when it comes to tradeoff between privacy, adoption and possible risks which might be a deciding factor for scalability. However, it is also suggested that the proximity and GPS location sharing should be opt-in.
4.6. DP-3T
Before we get into the technical details of the best known system for contact tracing, at least until now under certain assumptions. We will talk about DP-3T’s [36] inclusion in PEPP-PT as a potential candidate followed by its exclusion which received serious backlash from the scientific community amidst this pandemic. A team of 25 researchers from 8 European institutes collaborated to produce a privacy-preserving contact tracing solution on a fast-track basis. The transparent process of DP-3T makes it a different and trustworthy system for contact tracing from the already available solutions. Though PEPP-PT has not commented on why they excluded DP-3T from their website but this raised serious concerns among the scientific community where they considered this as unacceptable under any circumstances. 300+ scientists from all over the world signed a document highlighting four principles that they feel should be adopted while going in the direction of designing contact tracing systems. Decentralization and Open Sourceness lies at the very core of DP-3T. The entities present in the DP-3T are:
-
•
The Users
-
•
Health Authority (HA)
-
•
Server (Note that the backend server is used for matching activities between the users)
The phases of the proposed solution are briefly described as below:
Setup or Initialization Phase
It is assumed that a user possesses a smartphone that is capable of collecting and storing data. User in this phase generates a random initial daily key , and computes the following-up daily keys based on a chain of hashes: i.e. the key for day 1 is and the key for day is . The identifiers for a user on a particular day is generated as follows (say n ephemeral IDs are required in a day): . Note that length of is not specified but the suggested length is HMAC-SHA-256 key.
Scanning or Sensing Phase
In this phase, ephemeral IDs are broadcasted in a random order by user . At the same instant of time, the received ephemeral IDs are stored on the user’s smartphone along with the corresponding proximity of the device, duration, some auxiliary data, and coarse time indication.
Reporting phase or Detection Phase Suppose that a user is tested positive for COVID-19, then the user will be instructed by the Health Authority (HA) to upload their key to the backend server where denotes the first day on which user became infectious. After this, the user chooses a new daily key depending on the day when this event occurs. As it is not mentioned by Troncoso et al. in [36] whether this key should be sent to the server but it is believed that this key should also be sent to the server due to the fact that user might continue to be infectious.
Tracing phase
The tracing phase involves periodic broadcasts from the server after user has been confirmed to be positive. After receiving , another user can recompute the ephemeral IDs for day as follows: . In the same way user can compute IDs for the remaining days as well. With EphIDs, user can check whether any of the computed IDs appears in the user’s local storage. Based on the related information like proximity, duration, auxiliary data and coarse time indication, the user can take the measures needed.
In light of our evaluation framework, the solution is decentralized and proximity based. The analysis part done by Vaudenay in [19] discussed that there are 13 possible attacks on DP-3T. As a reply to this, a detailed document to this analysis was uploaded by the DP-3T community. The community verified 1 attack among 13 as a potential attack which can also be mitigated. The Privacy level that the solution provides is L1 (Level One), L2 (Level Two) and L3 (Level Three). But there are concerns regarding the adoption and the behavior of the solution under varied situations. The white-paper of the solution mentioned “Several contact events” as a possible threat. We categorize the attacks possible in a separate section on attacks with their possible countermeasures. The analysis in [19] discussed that decentralization creates more threats than it seems to solve. It will be great to see how the solution works in practice and it’s scalability will be tested as the number of users increase. Though, the reference implementation is given, it will be too early to evaluate it based on a reference implementation. With the development of the application, several hurdles are to be crossed when it comes to the design. The Solution however is the best available of all proposed solutions as of now.
4.7. ROBERT
ROBERT [37] is a scheme designed to reliably notify individuals of past concursion with an infected individual with strong focus on individual privacy. This scheme is a result of a collaborative work between Inria (PRIVATICS team) and Fraunhofer AISEC. The entities present in ROBERT are:
-
•
The Users with an App
-
•
Server (Serv) {Note that the backend server is under the control of a Central Authority}
-
•
Health Authority (HA)
It is assumed that the server (Serv) is well configured with a domain name and a certificate. The server (Serv) is also believed to be highly secure. The phases of the proposed solution are briefly described as below:
Setup or Initialization Phase
It is believed that the users possess a smartphone capable of running the app which they download from an official App store. During the initialization phase, the app registers to the server (Serv), which generates a permanent identifier (ID) and a number of several Ephemeral Bluetooth Identifiers (). For each registered ID, the backend keeps an entry for each one of them and maintains a table (IDTable). The stored information is “anonymous” and cannot be associated to a particular user because no personal information is stored in the table (IDTable).
Scanning or Sensing Phase
During the scanning phase, the App broadcasts and receives HELLO messages using Bluetooth Low Energy to and from other devices, which are running the same application in the proximity. These HELLO messages contain several fields, and in particular, the field which is of most importance is an Ephemeral Bluetooth Identifier. The HELLO messages that are collected are stored as a local list (LocalProximityList) into the application, along with the time of reception of these HELLO messages (and some other information such as the strength of the Bluetooth signal or the user’s speed).
Reporting phase or Detection Phase When an individual is tested and diagnosed as COVID-19 positive, his/her smartphone’s application uploads its LocalProximityList to the server (Srv) after an explicit user consent and proper authorization from the medical authority. The server (Srv) then flags all IDs of IDTable of which at least one EBID appears in the uploaded LocalProximityList, as “exposed”. There are some key important things to note here:
1. The server does not learn the identifiers of the infected user’s App but only the EB_IDs contained in its LocalProximityList (list of Ephemeral Bluetooth Identifiers they were in proximity with).
2. Given any two random identifiers of IDTable being flagged as “exposed”, the server (Srv) cannot tell whether they appeared in the same or in different LocalProximityList lists.
Tracing phase
On a regular basis, the App queries its user’s “exposure status” by examining the server with its EB_IDs. The server (Serv) then crosschecks, how many times the App’s EB_IDs were flagged as “exposed”. From this information (and possibly from other parameters like, the user’s speed/acceleration during the contact and the duration of the exposure), the server (Srv) computes a risk score. If this risk score is larger than a given threshold (specific scores are omitted), the bit “1” (“at risk of exposure”) is sent back to the App and his/her account is deactivated, otherwise the bit “0” is sent back. When this message is received by the app on the User’s phone, a notification is displayed to the user indicating the instructions to follow further (e.g., go the hospital for a test, call a specific phone number, stay in quarantine, etc.).
In light of our evaluation framework, the solution is centralized and proximity based. The levels of privacy that this solution offers is L1, L2 and L3. The evaluation under the attack model suggest that the information that is stored during the initialization phase is “anonymous” thus thwarting any possibility of a linkage attack. Furthermore, it is noted that the proximity links between identifiers are not kept which fairly implies that no proximity graph can be built. In the detailed specifications of ROBERT [37], they proposed the standard format of HELLO messages to be 16 bytes (128 bits) long. Here, it is of importance that the MAC is just 5 bytes (40 bits) long, however in cryptographic sense, it is not enough to provide collision-resistance but long enough to resist replay attacks. One of the attacks, that all proximity tracking schemes are vulnerable to “one entry attack” as proposed by [19], is mitigated by the ROBERT scheme. In terms of scalability, it is of due notice that the backend infrastructure needs to store a large amount of keys for each user of the system and further perform computations (decryption, hash computation and HMAC comparison) on them. However, for a reasonably robust server infrastructure it should be computationally feasible (see Table 1).
Table 1.
Comparative analysis of evaluated solutions.
| Contact Tracing Solution | Privacy |
Open Source | Underlying Technology | Architecture | Type of Project | Role of the Server | Potential Contact Finding Method | ||
|---|---|---|---|---|---|---|---|---|---|
| L1 | L2 | L3 | |||||||
| EPIC | ● | ● | ◐ | ✕ | WiFi + Bluetooth Low Energy (BLE) | Centralized | Private | Stores encrypted data & Score matching calculation | Weight based Method |
| TraceTogether | ● | ● | ◐ | ✓ | Bluetooth Low Energy (BLE) | Centralized | Government | Collects & Stores the locally stored pair of points | Matching Locally Stored Data-points of Users |
| Reichert’s MPC based Solution | ● | ● | ◐ | ✕ | Global Positioning System (GPS) | Centralized | Private | Collects geolocation data & offers data matching | Secure Binary Search on the ORAM |
| CAUDHT | ● | ● | ● | ✕ | Bluetooth Low Energy (BLE) | Decentralized | Private | Blinded Postbox | Pooling Mechanism |
| Berke et al’s location based system | ● | ● | ◐ | ✕ | Global Positioning System (GPS) | Centralized | Private | Stores redacted, transformed & encrypted location histories | Private Set Intersection Protocol |
| DP-3T | ● | ● | ● | ✓ | Bluetooth Low Energy (BLE) | Decentralized | Consortium | Acts as a matching platform | Data Matching |
| ROBERT | ● | ● | ● | ✓ | Bluetooth Low Energy (BLE) | Centralized | Consortium | Stores LocalProximityList & performs computation | Risk Score Calculation |
5. Possible attacks on contact tracing solutions and their countermeasures
This section presents a taxonomy of possible attacks on contact tracing solutions as shown in Fig. 2. Other than that, a discussion on the possible countermeasures is briefly discussed.
Fig. 2.
Possible attacks on contact tracing solutions.
5.1. Generic attacks
This section categorizes attacks based on their generality unlike those that are specific to a certain adoption of a technique like we will discuss in next sub-sections. However, there might be other possible attacks other than the one’s we have discussed in this part. The attacks discussed below are the common and does not need any high technical setup.
5.1.1. Resource drain attack
Most contact tracing mechanisms face resource drain attacks leading to denial-of-service attacks in them. In a resource drain attack, an attacker sends a huge number of garbage messages from the device, forcing the other devices to drain the energy if the message is invalid or drain the energy and storage if the message is valid [38]. Such attacks do not affect the services provided by contact tracing mechanisms but may lead to low performance of phones.
Countermeasures
Various countermeasures include garbage message filtering, detection of attack and reporting to the phone user that will help to mitigate the attacks caused by resource drain attacks.
5.1.2. Trolling attacks
In trolling attacks, an adversary spreads a fear of virus exposure by causing a sense of being in close proximity to the diagnosed people [39]. As a consequence, the non-affected people will conduct tests and waste the resources of diagnostic centers, leading to loss of trust in the contact tracing systems.
Countermeasures
The primary countermeasure includes attack detection by health authorities. Further, a proper security mechanism is required to make sure that the attacker does not compromise a contact tracing application and thereby prevent the spread of false information about a person (trolling) or leaking personal information from such apps while connecting to other devices for contact tracing.
5.1.3. Replay attacks
In a replay attack, the attacker uses one or two devices at different instances and advertises at the later time a message recorded at the earlier time [40]. In replay attack, the attacker advertises a proximity identifier derived from a diagnosis key before the victim observes the publication of this key [41]. If such attacks continue to happen, it will spread fear and anxiety among the people such that they will believe to have come in touch with the affected person, leading to loss of resources at diagnosis centers.
Countermeasures
The prime countermeasure is attack detection by health authorities.
5.1.4. Proximity app attack
Any contact tracing application on a phone can leak proximity information about a person. A log of a user’s proximity to other users could be used to show who they associate with and infer what they were doing [42]. Fear of disclosure of such proximity information might fear users from participating in expressive activity in public places.
Countermeasures
The application should not collect location information and time stamp information, and it should build time limits into their applications themselves, along with regular check-ins with the users as to whether they want to continue broadcasting.
5.1.5. Tracking and deanonymization attacks
Tracking and deanonymization attacks are intended to violate privacy leading to harmful impacts such as relying on false alert injections [43], [44]. The attacker is interested in exposing the identity of a person, or several persons in a meeting, whose mobile device advertised messages including particular proximity identifiers. The privacy of the targeted person is violated if his diagnosis key is published.
Countermeasures
The mobile device varies the signal strength in a way that makes it difficult to determine with good accuracy the location of the device from the few samples that the attacker may collect over a reasonably short period of time. The chances that an attacker will be forced to stalk the targeted person are more and so is his risk of getting discovered.
5.1.6. Screen lock attack or ransomware
In this attack, hackers are using fake contact tracing apps to lock the android phones, therefore misusing the global pandemic to steal bank details, photos, videos and other private information [45]. For example, CovidLock changes the password of the phone and demands a ransom of $100 bitcoins for unlocking; otherwise it threatens to either permanently delete their data or leak their data to social media [46].
Countermeasures
Few countermeasures include installing anti-virus, never installing from a third party application store, never visiting any shady websites, etc.
5.1.7. Backend impersonation
In backend impersonation, an attack is launched by an attacker device by masquerading as another device and misrepresenting its identity by changing its own identity. It can then advertise the incorrect information to other participating devices leading to the creation of loops in the information routing [47].
Countermeasures
Basic cyber-security mechanisms are required to prevent such attacks.
5.1.8. False injection or false report attack
In this attack, an attacker injects false data and compromises the communication of information among smartphones [48]. False reports can be injected through compromised smartphones, thereby leading to low performance of any contact tracing applications. In COVID detection mechanisms, when an adversary compromises more phones and combines all the obtained secret keys, the adversary can freely forge the event reports.
Countermeasures
Effective filtering schemes such as interleaved hop-by-hop authentication, Statistical en-Route filtering, etc. are required to mitigate the impacts of false data injection attacks [49], [50].
5.2. Attacks specific to bluetooth based solutions
Since mobile contact tracing leverages the fact that there are billions of devices that are in use today capable of Bluetooth based information exchange, but these devices are also exposed to a lot of security issues that are to be mitigated for better use of these solutions. We have discussed certain Bluetooth based attacks that can possibly be launched with little setup. Though Zeadally et al. in [11] has categorized and further discussed a full taxonomy of attacks on Bluetooth. For brevity, we discuss some attacks that we feel are common to this setting and then we briefly write about its possible countermeasures.
5.2.1. Bluejacking
In this type of attack, Bluetooth technology is exploited by sending un-welcomed messages to those devices that have Bluetooth enabled. The receiver has no knowledge of the sender. The contents it receives is the message along with the name and model of sender’s phone. The messages sent does not do any harm to the user but are actually intended to cause the user to counter react in a particular manner or to add a new contact in his device’s addressbook [51].
Countermeasures
This attack can be avoided by setting the devices in non-discoverable, hidden or invisible mode. Devices that are set in these modes are not susceptible to this type of attack [51].
5.2.2. Bluesnarfing
This type of attack allows unapproved access to a Bluetooth node. In this attack, the intruder hacks the node so as to access document files, contactbook etc. Here a attacker could even possibly call and forward messages to other devices as well [52].
Countermeasures
Devices that have discovery mode of their devices disabled can avoid this attack. By keeping the device in invisible mode and by leveraging tools that restrict the connection of the device to known devices only.
Table A.2.
Summary of available Contact Tracing solutions.
| Available Solution | Centralized/ Decentralized |
Type of Project | Type of Tracking | Status of the project/work | Medium of information sharing |
|---|---|---|---|---|---|
| Decentralized Privacy Preserving Proximity Tracing (DP-3T) [36] | Decentralized | Public(Open-Source) | Proximity Tracking | Proposed with Reference implementation | Broadcasting |
| Pan European Privacy Preserving Proximity Tracing (PEPP-PT) [53] | Decentralized | Private | Proximity Tracing | Under Development | a |
| Netherlands: Private Tracer [54] | Decentralized | Public (Open Source) | Proximity Tracing | Under Development | a |
| Austria: “Stopp Corona” app [55] | Decentralized | Red Cross | Proximity Tracing | Developed and Published | Selective Broadcasting |
| Austria: NOVID20 [56] | Decentralized | Private (Open Source) | Location & Proximity Tracing | Developed | a |
| Finland: Ketju project [57] | Decentralized | Private & Public | Proximity Tracing | Under Development | Selective Broadcasting |
| Germany: “Corona-Datenspende” (Robert Koch Institut) [58] | Decentralized | Government | Data Tracking | Developed | Broadcasting |
| Iceland: Government app project [59] | Decentralized | Government | Data Tracking | a | a |
| India: Aarogya Setu mobile app [60] | Decentralized | Government | Proximity and Location Tracing | Developed | Selective Broadcasting |
| Ireland: HSE App [61] | Decentralized | Government | Proximity Tracing | Under Development | a |
| Israel: “Hamagen” app [62] | Decentralized | Government (Open Source) | Location Tracing | Developed | Unicasting |
| Italy: Rilevatore terremoto [63] | Decentralized | Government | Location Tracing | Developed | a |
| Norway: App by the Institute of Public Health [64] | Decentralized | Government | Location & Proximity Tracing | Developed | Selective Broadcasting |
| Singapore: “TraceTogether” app [18] | Centralized | Government | Proximity Tracing | Developed | Broadcasting |
| Switzerland: “WeTrace” app [65] | Decentralized | Private (Open Source) | Proximity Tracing | Under development | Selective Broadcasting |
| United Kingdom: NHSX/University of Oxford tracking app [66] | Decentralized | Government | Proximity Tracing | Under Development | Selective Broadcasting |
| United States: Covid Watch (Stanford University) [67] | Decentralized | Public (Open Source) | Proximity Tracing | Under Development | Selective Broadcasting |
| United States: CoEpi [68] | Decentralized | Private (Open Source) | Proximity Tracing | Developed | Selective Broadcasting |
| Spain: “Open Coronavirus” app [69] | Decentralized | Private (Open Source) | Location and Proximity Tracing | Developed | a |
| Bluetrace [25] | Decentralized | Private | Proximity Tracing | Proposed with Reference implementation | Selective Broadcasting |
| CAUDHT [30] | Decentralized | Private | Proximity Tracing | Proposed | Selective Broadcasting |
| ROBERT [37] | Centralized | Private | Proximity Tracing | Proposed | Broadcasting |
| South Korea: Multi-Source Contact Tracing [70] | Centralized | Government | Security Footage, GPS data | In practice | Broadcasting |
| Disease Exposure Risk with Location Data: A Proposal for Cryptographic Preservation of Privacy [9] | Centralized | Private | Location Tracing | Proposed | Selective Broadcasting |
Not Enough information.
5.2.3. Bluebugging
This attack is of most and serious concern. In this type of attack, the attacker gets unauthorized access to a device, thereby being capable of running commands or make phone calls etc. These result is major problems. This attack exploits a security flaw present in the firmware of some of the older Bluetooth devices (usually with those that are using Bluetooth Classic) in order to gain access to the attacked device [71].
Countermeasures
This type of attack can be avoided by switching off the radio (Bluetooth) capability while it is not being used. The attackers can only make connection when Bluetooth is enabled. The another important practice is to scan all the incoming messages (multimedia) for possible infections (viruses). The attackers usually gain access by transmitting this sort of information to it [72].
5.3. Attacks specific to geo location or GPS based solutions
With the advancement in technologies, GPS (Global Positioning System) devices have become more affordable and with the result our lives are becoming increasingly dependent on precise positioning and timing. But there have been a lot of researchers that have proved that GPS is vulnerable to two main attacks viz., jamming and spoofing attacks. In this subsection, we investigate these attacks against GPS and their countermeasures [73].
5.3.1. Jamming attacks
Jamming is the intentional or unintentional interference of the signal that prevents it from being received, which is relatively simple to do [74]. The aim is to overpower the extremely weak GPS signals so that they cannot be acquired and tracked anymore by the GPS receiver, and majority of GPS receivers do not implement any countermeasures against jamming.
Countermeasures
To countermeasure the jamming attack, we can use a notch filter or adaptive notch filters for GPS attack detection in contact tracing phones.
5.3.2. Spoofing attacks
In GPS spoofing, an attacker uses radio signals located near the device to interfere with the GPS signals in such a way that it either transmits no data at all or transmits inaccurate coordinates; thereby making the location functionality of smartphones, used for contact tracing apps, vulnerable to spoofing attacks [75].
Countermeasures
Use of encrypted versions of the system in the defense sector, basic cyber-security principles to protect various digital threats in companies, machine learning and other analytics to detect any suspicious attacks, etc.
6. Conclusions
With growing demand for contact tracing solutions it is the need of the hour to have one general solution that takes all the aspects into consideration. From security and privacy aspects to legal and ethical aspects. Though the proposed solutions do not look at all aspects in general but rather focus most on one or the other. In order to frame a strategy to evaluate the solutions in a generic way, our proposed framework takes some important aspects into consideration so as to evaluate a contact tracing solution. Since the notions for evaluation we have used in our framework are generic in a sense that a lot more can be discussed under each section. We did not want to narrow down the scope where we would miss some aspects. Another important thing is that we did not tread in the direction of legal and ethical aspects because we feel once a contact tracing solution passes this assessment criteria, then and only then the legal and ethical aspects are to be taken into consideration. Another reason why we omit the discussion of these parts is due to the varying nature of societal norms for various countries. If a solution works for one country, it does not imply that it will work for other countries as well. We have framed the available solutions in a tabular form and then evaluated some of the proposed solutions in light of our framework. We also conclude that Open-Sourceness is an important parameter in keeping a solution transparent so as to avoid the misuse of a technology for surveillance, inserting backdoors or being used as a Trojan horse. The need of the hour suggests a general solution and its wide adoption i.e. standardization. DP-3T is a promising solution with regard to the support it has received from the scientific community and due to its transparency. Though the reference implementation is available now, it is important to see how it behaves under a real scenario when the solution is adopted.
Declaration of Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Appendix. Summary of available contact tracing solutions
See Table A.2.
References
- 1.Hsu L.-Y., Lee C.-C., Green J.A., Ang B., Paton N.I., Lee L., Villacian J.S., Lim P.-L., Earnest A., Leo Y.-S. Severe acute respiratory syndrome (SARS) in Singapore: clinical features of index patient and initial contacts. Emerg. Infect. Dis. 2003;9(6):713. doi: 10.3201/eid0906.030264. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 2.Wuhan Municipal Health Commission; 2019. Report of Clustering Pneumonia of Unknown Etiology in Wuhan City. [Online]. Available: http://wjw.wuhan.gov.cn/front/web/showDetail/2019123108989. [Google Scholar]
- 3.Raskar R., Schunemann I., Barbar R., Vilcans K., Gray J., Vepakomma P., Kapa S., Nuzzo A., Gupta R., Berke A., et al. 2020. Apps gone rogue: Maintaining personal privacy in an epidemic. arXiv preprint arXiv:2003.08567. [Google Scholar]
- 4.Lauer S.A., Grantz K.H., Bi Q., Jones F.K., Zheng Q., Meredith H.R., Azman A.S., Reich N.G., Lessler J. The incubation period of coronavirus disease 2019 (COVID-19) from publicly reported confirmed cases: estimation and application. Ann. Internal Med. 2020;172(9):577–582. doi: 10.7326/M20-0504. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 5.Ferretti L., Wymant C., Kendall M., Zhao L., Nurtay A., Abeler-Dörner L., Parker M., Bonsall D., Fraser C. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science. 2020 doi: 10.1126/science.abb6936. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 6.Tidy J. 2020. “Coronavirus: Israel enables emergency spy powers,” BBC News, March 2020. [Online]. Available: https://www:bbc:com/news/technology-51930681. (Accessed 23 April 2020) [Google Scholar]
- 7.Kim M.J., Denyer S. March 2020. A travel log of the times in South Korea: Mapping the movements of coronavirus carriers ,” The Washington Post. https://www:washingtonpost:com/world/asiapacific/coronavirus-south-koreatracking-apps/2020/03/13/2bed568e-5fac-11eaac50-18701e14e06dstory:html. (Accessed 23 April 2020) [Google Scholar]
- 8.Altuwaiyan T., Hadian M., Liang X. 2018 IEEE International Conference on Communications (ICC) IEEE; 2018. EPIC: Efficient privacy-preserving contact tracing for infection detection; pp. 1–6. [Google Scholar]
- 9.Berke A., Bakker M., Vepakomma P., Raskar R., Larson K., Pentland A. 2020. Assessing disease exposure risk with location histories and protecting privacy: A cryptographic approach in response to a global pandemic. arXiv preprint arXiv:2003.14412. [Google Scholar]
- 10.Kampf G., Todt D., Pfaender S., Steinmann E. Persistence of coronaviruses on inanimate surfaces and its inactivation with biocidal agents. J. Hosp. Infect. 2020 doi: 10.1016/j.jhin.2020.01.022. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 11.Zeadally S., Siddiqui F., Baig Z. 25 years of bluetooth technology. Future Internet. 2019;11(9):194. [Google Scholar]
- 12.2020. Security and privacy issues with GPS tracking /navigation. [Online]. Available: https://cmu95752.wordpress.com/2011/12/14/security-and-privacy-issues-with-gps-tracking-navigation/#_ftn1. (Accessed 23 April 2020) [Google Scholar]
- 13.Warner J.S., Johnston R.G. A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. J. Secur. Adm. 2002;25(2):19–27. [Google Scholar]
- 14.Solove D.J. Harvard University Press, May; 2008. Understanding Privacy. [Google Scholar]
- 15.Sweeney L. k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2002;10(05):557–570. [Google Scholar]
- 16.Dwork C., McSherry F., Nissim K., Smith A. Theory of Cryptography Conference. Springer; 2006. Calibrating noise to sensitivity in private data analysis; pp. 265–284. [Google Scholar]
- 17.Shannon C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949;28(4):656–715. [Google Scholar]
- 18.2020. TraceTogether. [Online]. Available: https://www.tracetogether.gov.sg/. (Accessed 23 April 2020) [Google Scholar]
- 19.Vaudenay S. 2020. Analysis of DP3T. [Online]. Available: https://eprint.iacr.org/2020/399. (Accessed 23 April 2020) [Google Scholar]
- 20.Tang Q. 2020. Privacy-preserving contact tracing: current solutions and open questions. arXiv preprint arXiv:2004.06818. [Google Scholar]
- 21.Hamilton I.A. 2020. 11 countries are now using people’s phones to track the coronavirus pandemic, and it heralds a massive increase in surveillance. www.businessinsider.com/countries-tracking-citizensphones-coronavirus-2020-3?r=DE&IR. (Accessed 26 March 2020) [Google Scholar]
- 22.Cho H., Ippolito D., Yu Y.W. 2020. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arXiv preprint arXiv:2003.11511. [Google Scholar]
- 23.O. Goldreich, S. Micali, A. Wigderson, How to solve any protocol problem, in: Proc. of STOC, 1987.
- 24.Dwork C., Roth A., et al. The algorithmic foundations of differential privacy. Found. Trends® Theoret. Comput. Sci. 2014;9(3–4):211–407. [Google Scholar]
- 25.2020. Privacy-preserving cross-border contact tracing. [Online]. Available: https://bluetrace.io/. (Accessed 23 April 2020) [Google Scholar]
- 26.2020. TraceTogether, safer together. [Online]. Available: https://www.tracetogether.gov.sg/. (Accessed 25 July 2020) [Google Scholar]
- 27.2020. Countries in the world by population. [Online]. Available: https://www.worldometers.info/world-population/population-by-country/. (Accessed 25 July 2020) [Google Scholar]
- 28.Reichert L., Brack S., Scheuermann B. 2020. Privacy-preserving contact tracing of Covid-19 patients. Cryptology ePrint Archive, Report 2020/375, 2020. [Online]. Available: https …. [Google Scholar]
- 29.M. Bellare, V.T. Hoang, P. Rogaway, Foundations of garbled circuits, in: Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012, pp. 784–796.
- 30.Brack S., Reichert L., Scheuermann B. 2020. Decentralized contact tracing using a DHT and blind signatures. [Google Scholar]
- 31.2020. Argenox Technologies LLC., “BLE Advertising Primer”. [Online]. Available: www.argenox.com/library/bluetoothlow-energy/ble-advertising-primer. (Accessed 05 April 2020) [Google Scholar]
- 32.Chaum D. Advances in Cryptology. Springer; 1983. Blind signatures for untraceable payments; pp. 199–203. [Google Scholar]
- 33.Dingledine R., Mathewson N., Syverson P. Naval Research Lab Washington DC; 2004. Tor: The Second-Generation Onion Router: Tech. Rep. [Google Scholar]
- 34.Dworkin M.J. 2015. SHA-3 Standard: Permutation-based Hash and Extendable-Output Functions: Tech. Rep. [Google Scholar]
- 35.Diffie W., Hellman M. New directions in cryptography. IEEE Trans. Inf. Theory. 1976;22(6):644–654. [Google Scholar]
- 36.2020. Decentralized Privacy-Preserving Proximity Tracing. Version: 3rd April 2020. PEPP-PT. [Online]. Available: https://github.com/DP-3T/documents. (Accessed 26 March 2020) [Google Scholar]
- 37.Castelluccia C., Bielova N., Boutet A., Cunche M., Lauradoux C., Le Métayer D., Roca V. 2020. ROBERT: ROBust and privacy-presERving proximity Tracing. [Google Scholar]
- 38.Brownfield M., Gupta Y., Davis N. Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop. IEEE; 2005. Wireless sensor network denial of sleep attack; pp. 356–364. [Google Scholar]
- 39.Gaus A. Trolling attacks and the need for new approaches to privacy torts. USFL Rev. 2012;47:353. [Google Scholar]
- 40.Feng Z., Ning J., Broustis I., Pelechrinis K., Krishnamurthy S.V., Faloutsos M. 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE; 2011. Coping with packet replay attacks in wireless networks; pp. 368–376. [Google Scholar]
- 41.Francillon A., Danev B., Capkun S. Proceedings of the Network and Distributed System Security Symposium (NDSS) Eidgenössische Technische Hochschule Zürich, Department of Computer Science; 2011. Relay attacks on passive keyless entry and start systems in modern cars. [Google Scholar]
- 42.Halevi T., Ma D., Saxena N., Xiang T. European Symposium on Research in Computer Security. Springer; 2012. Secure proximity detection for NFC devices based on ambient sensor data; pp. 379–396. [Google Scholar]
- 43.J. Su, A. Shukla, S. Goel, A. Narayanan, De-anonymizing web browsing data with social networks, in: Proceedings of the 26th International Conference on World Wide Web, 2017, pp. 1261–1269.
- 44.Gvili Y. 2020. Security analysis of the COVID-19 contact tracing specifications by Apple Inc. and Google Inc. Cryptology ePrint Archive, Report 2020/428. https://eprint.iacr.org/2020/428. [Google Scholar]
- 45.Andronio N., Zanero S., Maggi F. International Symposium on Recent Advances in Intrusion Detection. Springer; 2015. Heldroid: Dissecting and detecting mobile ransomware; pp. 382–404. [Google Scholar]
- 46.2020. Coronavirus stimulus scams are here. How to identify these new online and text attacks. [12] [Online]. Available: https://www.cnet.com/how-to/coronavirus-stimulus-scams-are-here-how-to-identify-these-new-online-and-text-attacks/. (Accessed 23 April 2020) [Google Scholar]
- 47.Wood P. 2020. Web application hacking: Exposing your backend. [Online]. Available: https://www.helpnetsecurity.com/2003/11/11/web-application-hacking-exposing-your-backend/. (Accessed 23 April 2020) [Google Scholar]
- 48.Z. Yu, Y. Guan, A dynamic en-route scheme for filtering false data injection in wireless sensor networks, in: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005, pp. 294–295.
- 49.Zhu S., Setia S., Jajodia S., Ning P. IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004. IEEE; 2004. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks; pp. 259–271. [Google Scholar]
- 50.Ye F., Luo H., Lu S., Zhang L. Statistical en-route filtering of injected false data in sensor networks. IEEE J. Sel. Areas Commun. 2005;23(4):839–850. [Google Scholar]
- 51.Kaviarasu S., Muthupandian P. Bluejacking technology: A review. Int. J. Trend Res. Dev. (IJTRD) 2016;3(6) [Online]. Available: https://www.ijtrd.com/papers/IJTRD6518.pdf. [Google Scholar]
- 52.Hassan S.S., Bibon S.D., Hossain M.S., Atiquzzaman M. Security threats in bluetooth technology. Comput. Secur. 2018;74:308–322. [Google Scholar]
- 53.2020. Pan-European privacy-preserving proximity tracing. [Online]. Available: https://www.pepp-pt.org/. (Accessed 23 April 2020) [Google Scholar]
- 54.2020. Private tracer. [Online]. Available: https://gitlab.com/PrivateTracer/coordination. (Accessed 23 April 2020) [Google Scholar]
- 55.2020. Meet the Stop Corona. [Online]. Available: https://www.roteskreuz.at/site/meet-the-stopp-corona-app/. (Accessed 23 April 2020) [Google Scholar]
- 56.2020. The private way of tracing contacts. [Online]. Available: https://www.novid20.org/en. (Accessed 23 April 2020) [Google Scholar]
- 57.2020. How close were you and for how long - were you exposed? This is how the official corona app works, which may soon be on your phone as well. [Online]. Available: https://yle.fi/uutiset/3-11299573. (Accessed 23 April 2020) [Google Scholar]
- 58.2020. Corona data donation. [Online]. Available: https://corona-datenspende.de/. (Accessed 23 April 2020) [Google Scholar]
- 59.2020. Tracking app may assist Iceland with coronavirus contact tracing. [Online]. Available: https://www.icelandreview.com/sci-tech/tracking-app-may-assist-iceland-with-coronavirus-contact-tracing/. (Accessed 23 April 2020) [Google Scholar]
- 60.2020. Aarogya setu mobile app. [Online]. Available: https://www.mygov.in/aarogya-setu-app/. (Accessed 23 April 2020) [Google Scholar]
- 61.2020. Coronavirus: Smartphone app to facilitate contact tracing to be rolled out, HSE says. [Online]. Available: https://www.irishtimes.com/news/ireland/irish-news/coronavirus-smartphone-app-to-facilitate-contact-tracing-to-be-rolled-out-hse-says-1.4215036. (Accessed 23 April 2020) [Google Scholar]
- 62.2020. Health ministry launches phone app to help prevent spread of coronavirus. [Online]. Available: https://www.timesofisrael.com/health-ministry-launches-phone-app-to-help-prevent-spread-of-coronavirus/. (Accessed 23 April 2020) [Google Scholar]
- 63.2020. Rilevatore terremoto. [Online]. Available: https://web.archive.org/web/20200403104132/https://sismo.app/it/covid/. (Accessed 23 April 2020) [Google Scholar]
- 64.2020. The FHI app will store info about your movements for 30 days. [Online]. Available: https://www.nrk.no/norge/fhi-app-skal-lagre-info-om-dine-bevegelser-i-30-dager-1.14963187. (Accessed 23 April 2020) [Google Scholar]
- 65.2020. WeTrace. [Online]. Available: https://wetrace.ch/. (Accessed 23 April 2020) [Google Scholar]
- 66.2020. Using a mobile app for contact tracing can stop the epidemic. [Online]. Available: https://045.medsci.ox.ac.uk/mobile-app. (Accessed 23 April 2020) [Google Scholar]
- 67.2020. Reduce the spread of COVID-19 without increasing the spread of surveillance. [Online]. Available: https://covid-watch.org/#. (Accessed 23 April 2020) [Google Scholar]
- 68.2020. CoEpi. [Online]. Available: https://github.com/Co-Epi. (Accessed 23 April 2020) [Google Scholar]
- 69.2020. Open-coronavirus. [Online]. Available: https://github.com/open-coronavirus/open-coronavirus. (Accessed 23 April 2020) [Google Scholar]
- 70.2020. How South Korea flattened the curve. [Online]. Available: https://www.nytimes.com/2020/03/23/world/asia/coronavirus-south-korea-flatten-curve.html. (Accessed 23 April 2020) [Google Scholar]
- 71.Padgette J., Bahr J., Batra M., Holtmann M., Smithbey R., Chen L., et al. National Institute of Standards and Technology; Gaithersburg, MD: 2017. Guide to Bluetooth Security (NIST Special Publication 800-121 Revision 2) [Google Scholar]
- 72.Dhuri S. Bluetooth attack and security. Int. J. Curr. Trends Eng. Res. 2017;3:76–81. [Google Scholar]
- 73.T. Nighswander, B. Ledvina, J. Diamond, R. Brumley, D. Brumley, GPS software attacks, in: Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012, pp. 450–461.
- 74.Vadlamani S., Eksioglu B., Medal H., Nandi A. Jamming attacks on wireless networks: A taxonomic survey. Int. J. Prod. Econ. 2016;172:76–94. [Google Scholar]
- 75.Warner J., Johnston R. GPS Spoofing countermeasures, Homeland Secur. J. 2003;25(2):19–27. [Google Scholar]


