DSpace Repository

BLE-based sensors for privacy-enabled contagious disease monitoring with zero trust architecture

Show simple item record

dc.contributor.author Chamola, Vinay
dc.date.accessioned 2025-01-03T04:02:25Z
dc.date.available 2025-01-03T04:02:25Z
dc.date.issued 2025
dc.identifier.uri https://www.sciencedirect.com/science/article/pii/S1570870524003044
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16677
dc.description.abstract Digital contact tracing is an important technique to stop the spread of infectious diseases. Due to data integrity, and privacy problems, smartphone apps suffer from low adoption rates. Also, these apps excessively drain batteries and sometimes give false alarms. They are also not able to detect fomite-based contacts or indirect contacts. BEacon-based Contact Tracing or BECT is a contact tracing framework that uses Bluetooth beacon sensors that periodically broadcast “tokens” to close users. Users who are positively diagnosed voluntarily provide their tokens to the health authority-maintained server for tracing contacts. We target environments like campuses like companies, colleges, and prisons, where use can be mandated thus mitigating low adoption rate issues. This approach detects indirect contacts and preserves the device’s battery. We create a simulation to examine the proposed framework’s performance in detecting indirect contacts and compare it with the existing apps’ framework. We also analyze the cost and power consumption for our technique and assess the placement strategies for beacons. Incorporating Zero Trust Architecture enhances the framework’s security and privacy. en_US
dc.language.iso en en_US
dc.publisher Elsevier en_US
dc.subject EEE en_US
dc.subject Digital contact tracing en_US
dc.subject Bluetooth low energy sensors en_US
dc.subject Indirect contacts en_US
dc.subject Infectious diseases en_US
dc.subject Privacy-preserving en_US
dc.subject IoT en_US
dc.title BLE-based sensors for privacy-enabled contagious disease monitoring with zero trust architecture en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account