Abstract

Contact tracing is a way to track people who have been in contact with infected patients of COVID-19 and thereby effective control is achieved. Various countries have developed their own contact tracing applications which deploy the same or different protocol. It is of utmost importance to improve public awareness on the potential hidden risks of the respective protocols and applications and instill user confidence. The purpose of this research is to study the security and privacy of the existing contact tracing protocols to ensure that the security and privacy of users can be guaranteed. The protocols used by the applications include DP-3T protocol, TCN protocol, PEPP-PT protocol and BlueTrace protocol. The architecture of the protocols can be classified into centralised and decentralised architectures. In addition, the contact tracing applications in seven selected countries will be briefly analysed and compared. Some common user concerns are also outlined.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.