2020 International Conference on Cyberworlds (CW) 2020
DOI: 10.1109/cw49994.2020.00045
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Solution for Proximity Tracing Avoiding Identifier Exchanging

Abstract: Digital contact tracing is one of the actions useful, in combination with other measures, to manage an epidemic diffusion of an infectious disease in an after-lock-down phase. This is a very timely issue, due to the pandemic of COVID-19 we are unfortunately living. Apps for contact tracing aim to detect proximity of users and to evaluate the related risk in terms of possible contagious. Existing approaches leverage BLE or GPS, or their combination, even though the prevailing approach is BLE-based and relies on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(15 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…Global Positioning System, or GPS, as one of the most widely adopted location data technologies, is also embedded in CTAs and has been critiqued for its potential risks to health surveillance, for recording users' exact locations, for threatening location privacy, and for exposing personal data [ 45 ]. While Bluetooth-enabled CTAs compromise privacy through the exchange of identifiers, GPS-enabled solutions violate privacy primarily through mass tracing [ 46 ].…”
Section: Co-occurrence Analysis Of Abstract and Content Analysis Of T...mentioning
confidence: 99%
“…Global Positioning System, or GPS, as one of the most widely adopted location data technologies, is also embedded in CTAs and has been critiqued for its potential risks to health surveillance, for recording users' exact locations, for threatening location privacy, and for exposing personal data [ 45 ]. While Bluetooth-enabled CTAs compromise privacy through the exchange of identifiers, GPS-enabled solutions violate privacy primarily through mass tracing [ 46 ].…”
Section: Co-occurrence Analysis Of Abstract and Content Analysis Of T...mentioning
confidence: 99%
“…Pinkas and Ronen [19], building upon a design similar to DP-3T, proposed a system with an improved resilience to relay attacks and a better verification of risks. Buccafurri et al proposed an alternative protocol that completely avoids the exchange of identifier over BLE and instead relies on GPS [7]. Public-key cryptography.…”
Section: A Related Workmentioning
confidence: 99%
“…By using blind signatures based on RSA [6] with a length of 2048 bits for the modulus, the size of downloaded data is about 177MB 7 . The vast majority of daily downloaded data comes from the anonymous calls needed to evaluate the infection risk and their size is about 153MB, that can be processed as soon as received and deleted immediately after that, without flooding the memory of the smartphone.…”
Section: Performance Of Pronto-c2mentioning
confidence: 99%
“…In [6], the author replayed released RPIs from the health authority and managed to trigger a exposure warning in the target. Others [18]- [20] defined scenarios such as advertising the received identifiers either immediately or at a later time. [22] presents an approach using a malicious Software Development Kit (SDK) injected in an App to replay received identifiers.…”
Section: Related Work On Exposure Notification System Attacksmentioning
confidence: 99%
“…[21] mentions the Contact Pollution attack that works similarly to the Replay attack mentioned in [6]. Mitigation strategies for this type of attack have been proposed using protocols and location of devices [6], [17]- [20]. 2) Relay -This attack is similar to the Replay attacks; an attacker receives a RPI in one location and relays it to another device in a different location.…”
Section: Related Work On Exposure Notification System Attacksmentioning
confidence: 99%