Volume 8, Number 1, March 2022
Pages 48-64
ISSN (Print): 2409-9600, ISSN (Online): 2409-9619
JJEE
Jordan Journal of Electrical Engineering
A Review on Technology-Based Contact Tracing Solutions
and Its Application in Developing Countries
Agburu O. Adikpe1* , Abdulmalik S. Yaro2 , Abdoulie M. S. Tekanyi3 ,
Mohammed D. Almustapha4 , Ezekiel E. Agbon5 , Oluwatobiloba A. Ayofe6
1, 2, 3, 4, 5 Electronics
and Telecommunications Engineering Department, Ahmadu Bello University, Zaria, Kaduna,
Nigeria
E-mail: agburuadikpe@gmail.com
6 Department of Computer Engineering, Federal Polytechnic, Ede, Osun, Nigeria
Received: September 06, 2021
Revised: October 07, 2021
Accepted: October 13, 2021
Abstract— To mitigate the spread of the Coronavirus disease 2019 (COVID-19) caused by severe acute
respiratory syndrome Coronavirus 2 (SARS-CoV-2), a plethora of technology-based contact tracing (CT)
applications have been proposed, designed, and deployed by private and government entities in various
countries globally in order to return society to some semblance of normalcy. Although most of the modifications
done on the underlining protocols mostly focus on the privacy and ethical concerns of these solutions, pragmatic
applications within developing countries are not considered, as applications in most cases are considered to be
ubiquitous. This disparity leads to a design-reality gap as the involved entities fail to pay attention to the local
conditions in which these systems could be deployed. In this work, an in-depth analysis of state-of-the-art
technology-based CT protocols is discussed while considering the compatibility of these designs with the reality
of lopsided levels of digital divides and other structural inequalities in developing countries. In addition, a
number of existing solutions implemented in developing countries are delineated. Furthermore, pragmatic
applications that consider social and technological infrastructures to bridge the gaps in these infrastructures are
discussed as well as possible recommendations that could be implemented to effectively mitigate the spread of
pandemic outbreaks in developing countries.
Keywords— Contact tracing; Covid-19; Developing countries; Technology-based contact tracing.
1.
INTRODUCTION
In a bid to stop the widespread of the Coronavirus disease 2019 (COVID-19) pandemic,
private and government entities have arduously worked together to develop systems, which
would enable them to identify infected individuals and curb the spread of the pandemic [1].
A key procedure used by these entities in identifying an individual who is infected or has
been in close contact with an infected individual is known as contact tracing (CT) [2]. In the
past, this process was primarily carried out by two procedures. The first involved training a
plethora of personnel to protect themselves from the outbreak as well as questioning and
obtaining localization information from infected individuals. The second part involved using
the information obtained to follow-up on individuals the infected person recalled to have
been in contact with for certain duration [3-5]; for COVID-19 this is about seven to fourteen
days [6]. Although this procedure has been adopted in the past to mitigate the spread of a
number of pandemics, it was discovered not to scale well in situations where the rate of
infection was incredibly high. In addition, it has been identified to be time-consuming and
capital intensive [3, 5]. To address this, private and government entities considered a
technology-based CT system. This technology-based process has been introduced, not as an
alternative to phase out the manual CT process but to augment it. On this premise, multiple
* Corresponding author
Article’s DOI: 10.5455/jjee.204-1630926826
49
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
solutions built atop technologies such as Bluetooth, global positioning system (GPS), ultrawide band (UWB), and several other technologies have been introduced as a technologybased solution to mitigate the spread of the outbreak [2, 7]. However, the design of these
solutions is built using developed countries such as Singapore, United States, South Korea,
and other developed nations as a benchmark for this technology-based process. This
yardstick, which has been used as a non-official standard for the development of these
solutions, defeats the purpose of applicability in developing countries such as India, Vietnam,
Nigeria, South Africa, the Philippines, and others [8]. A primary reason behind this is that the
level of technological integration in developed societies is different from that in societies or
countries that are developing. Looking at this from a wide range of solutions - that have been
proposed and implemented in several works - a keystone, which influenced this disparity can
be traced to the early rollouts of technology-based CT solutions. The early rollouts of these
technology-based solutions focused on usability rather than privacy [3, 8]. To address this
concern, subsequent versions worked on improving the technical limitations of the system
while addressing privacy and ethical concerns. Though multiple solutions addressing this
challenge has been proposed and implemented in several works, a major concern is that these
solutions are developed on the assumption that their application, as regards implementation
on a global scale, is ubiquitous. Though this is not the case in all cases; however, this
perspective could lead to unintended challenges, especially in developing countries with
lopsided levels of digital divides and other structural inequalities [8].
1.1.
Contact Tracing
This process involves locating an infected individual and those individuals that have
associated with him in order to curb the spread of an outbreak [2]. Successful containment of
the disease rests on the ability to identify and isolate infected individuals from the general
public [5]. The manual process of carrying out this procedure involves training several
medical personnel and then using those trained personnel to identify individuals that are
contact risks, as well as individuals who are latent contact risks [3]. However, failing to
identify individuals who are infected or have been in contact with infected individuals can
cause the disease to silently spread. This can be challenging especially for diseases where
the symptoms are not detected until after a number of days. For instance, about 70% of
the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) transmissions occur
before a person is identified as infected [9]. In instances such as this, it has been discovered
that the manual process would not scale well in situations where the spread of the outbreak
was very high. As a means to mitigate this drawback, technology-based CT was introduced
to augment the manual CT process. The technology-based CT solution uses a variety of
technologies that considers factors such as proximity awareness, location-based services,
proximity duration, automated decision making, geospatial technologies and machine
learning algorithms to scrutinize the digital footprint of infected individuals so as to trace
those who are latent contact risks and enforce specific health protocols [9]. Although the
technology-based solutions have been used by societies to combat the ongoing COVID-19
pandemic, there is minimal adoption of these solutions by individuals in developing
countries [8]. A review of existing technology-based CT solutions in developing countries is
discussed in section 3.
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
1.2.
50
Contribution of this Review
Most of the works that review technology-based CT discuss the solutions proposed
and implemented around privacy and ethical concerns, system architecture, impact
management and user adoption - primarily in developed countries. A number of studies
[3, 8-10] have briefly highlighted that solutions should be adapted to developing countries,
with the closest study to this work being the work of [8], which focuses on Africa. However,
this paper goes further to review existing technology-based CT solutions in developing
countries and further considers structural inequalities, which account for the lopsided levels
of digital divides in these countries. On this premise, this work discusses technology-based
CT solutions with underlining concerns related to developing countries, while
recommending possible solutions that take into consideration the local conditions of these
countries. The technological solutions reviewed in this literature focus on solutions built atop
technology features in mobile phones.
1.2.1. Comparison of this Review with State-of-the-Art Surveys and Reviews
A comparison of this review with other survey and review literature is summarized in
Table 1. From this review, the key considerations under which this review is compared with
others in Table 1 are primarily influenced by the consideration of social and technological
divides that influence the application of technology-based CT solutions in developing
countries. These are discussed later in section 4.
Table 1. Comparison of this review paper with existing COVID-19 contact tracing reviews and surveys.
Reference
Year
[7]
[2]
[11]
[4]
[12]
[13]
[14]
[15]
[3]
[16]
[9]
This review
2020
2020
2020
2020
2021
2021
2021
2021
2021
2021
2021
2021
Discussed
technologies used
in CT
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
Discussed
adoption rates
No
No
Yes
Yes
No
Yes
Yes
Yes
No
Yes
Yes
Yes
Addressed digital
divides in
implementation
No
No
No
No
No
No
No
No
No
No
No
Yes
Open
challenges
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
In the work of [7], the survey reviewed several technologies used in CT. The authors
focused on Bluetooth low energy (BLE). The BLE-based approaches were discussed from a
server side and a client side. This disparity outlined the risk that impacts these solutions.
Following this, the authors discussed several limitations of the approaches as well as several
cryptographic solutions that could be used to secure approaches built atop BLE.
The work of [2] discussed in detail the impact of the COVID-19 outbreak on various
aspects of society and offered medical insight on the COVID-19 outbreak. Following this, the
51
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
authors discussed several technology-based interventions that were researched, designed
and/or implemented to curb the spread of the pandemic outbreak.
The review in the work of [11] provided an analysis of some existing wireless
communication technologies used in CT as regards their methodologies. In addition, the
authors discussed the challenges of technology-based CT and the impact of these challenges
on the adoption rates of technology-based CT.
An analysis of the security and data protection of technology-based CT solutions was
studied in the work of [4]. The work studied several adversarial models and presented
insights and directions to be considered for future developments of technology-based CT
initiatives. Regarding the rate of adoption, the authors focused on European countries. In
addition, the authors selected Google play store to obtain the number of applications
downloaded in order to estimate the users’ adoption per country.
The work of [12] focused on internet of things (IoT) tools for CT. The authors discussed
CT applications used by different countries for COVID-19. These solutions focused on
wireless communication features that are present in smartphones. In addition, the summary
delineated the pros and cons of using them. Furthermore, the work discussed hybrid
solutions and future directions that could enhance the effectiveness of these tools in IoT space.
From 96 literatures obtained from Scopus and Web of Science, only 25 studies were
used in the work of [13]. The key consideration in this review was centered on cultural
context and individual characteristics. As discussed later in subsection 4.4, the work of [13]
discusses cultural context from the perspective of CT application adoption. The discussion on
the subject of cultural context generally centers on the perception of users on the subject of
privacy. In addition, how this perception influences the rate of adoption is also considered.
Individual characteristics, on the other hand, primarily focused on variation in acceptance
and social diversity.
In the work of [14], the adoption rate of CT applications in European countries was
delineated. Following this, the adoption rate of the application was analyzed based on
engagement, functionality, aesthetics and information. Simulated best case adoption rates
(BCARs) were simulated to show the percentage of adoption needed to make technologybased CT solutions an effective tool.
The work of [15] discussed the privacy of COVID-19 CT and exposure notification
applications. In this work, the summary of technology-based CT applications was focused on
the solutions implemented in developed countries. The primary challenge discussed centered
on factors impacting adoption rates.
The work of [3] primarily focuses on the security and privacy issues of CT applications.
The authors discussed privacy issues and security attacks such as bluesnarfing, enumeration,
etc., and how these attacks impact technology-based initiatives. An advanced encryption
standard (AES) and random cloud storage were recommended in [3] for protecting the
collected data.
The work of [16] aimed to recommend the best practice guidance needed to design the
ideal technology-based CT application. The authors, which cut across various disciplines
agreed on six key considerations needed to achieve their set goal.
The work of [9] gave a systematic review of technology-based CT papers from January
1, 2020 to March 31, 2021. The work focused on the effective reproductive number and works
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
52
that reduce this number. The authors also reported on the adoption rate and compared
technology-based CT with manual CT procedures. Following this, the work compared the
ability of both CT procedures to reduce the effective reproductive number.
In contrast to the surveys and reviews summarized in Table 1, our review jointly
discusses the technologies used in technology-based CT solutions, adoption rates primarily in
developing countries, digital divides in implementing technology-based CT in developing
countries and open challenges. It is important to note that this field is a highly dynamic
research field. Therefore, at the time of writing this paper, new and related research, which
might include other key considerations as regards developing countries, might not be
captured in Table 1.
1.3.
Organization of this Review
Concerning the rest of this paper, an overview of wireless communication features in
smartphones that are used for technology-based CT is discussed in section 2. In section 3, an
overview of technology-based CT solutions that are utilized or proposed in developing
countries is discussed. Taking Nigeria as a case study, section 4 focuses on the key challenges
that limit the permeation of the technology-based approach in developing countries. A
succinct overview of possible recommendations to address the challenges outlined in section
4 is discussed in section 5. Finally, this paper is concluded in section 6.
2.
OVERVIEW OF WIRELESS
TECHNOLOGY-BASED CT
COMMUNICATION
FEATURES
USED
FOR
Before the COVID-19 pandemic thrust technology-based CT into the limelight, the
technology had already been quietly explored for this purpose for over a decade [17]. In one
of the earlier accounts, the author in [17] alongside other researchers explored the potential
of the technology in 2009. Although reception towards the concept was lukewarm at the
time, the work proposed a Bluetooth-based solution as a viable way of curbing a budding
outbreak in a small social network. This study laid part of the key foundation needed to use
a technology-based approach to determine an individual who came into close contact with
another during a period that met the requirements for the individual to be considered a
contact risk.
To give a quantitative metrics to this, earlier works like [18-20], used the received
signal strength indicator (RSSI) measured between the transmitter and the receiver of paired
devices for distance estimation and localization of devices. This obtained information which can be used to determine if an individual is a contact risk or not - was adapted as a
non-official standard for using its subsequent variants as a CT aid. However, a major
drawback of Bluetooth was that it required a connection to be established between devices
involved before exchanging data. The added complexity involved in establishing a
connection between devices impeded the efficient exchange of messages. In addition, the
signals were prone to attacks by malicious individuals, since the devices advertise
themselves [7, 21]. As the interest in technology-based CT grew, private and government
entities have discovered that the most effective technology-based CT approaches thus far are
those that utilize known and newer wireless communication features that are built into
53
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
smartphones [2, 9]. Delineated in the following subsections are other smartphone features
upon which technology-based CT solutions are built.
2.1.
Bluetooth Low Energy
Among the wireless communication technologies adopted for CT, BLE has had the
highest rate of adoption, as most CT solutions implemented across the globe have most of
their solution built atop BLE [9]. BLE is a subcategory of Bluetooth [22]. The added term
“low energy” refers to the reduction in the energy consumed by the device battery. This
extends the battery’s lifetime in comparison to the legacy Bluetooth technology. The BLE
variant of Bluetooth was released in 2010 as part of the Bluetooth 4 radio specifications. Like
the legacy Bluetooth, it operates in the 2.4 GHz ISM band, in which three advertisement
channels and 37 data channels are defined [23]. The BLE represents an effective step to
expand the ecosystem of Bluetooth to the IoT [21].
Generally, BLE devices can be assigned one of two roles, peripheral or central, and
they are identified by a device address. Once connected, a peripheral device and a central
device can communicate by exchanging data packets over the BLE data channels [21]. Fig. 1
delineates a basic BLE handshake flow. For a BLE-enabled device, central devices scan for
nearby devices by tuning on the peripheral advertisements to scan for advertising services.
BLE enabled device is
turned ON
Is device central ?
No
Yes
Scan for peripheral
services
Device is
peripheral
Advertise services
No
Does central discover
peripheral services ?
Yes
Central reads
characteristics value
Central writes to the
same characteristics
value
Fig. 1. Conventional BLE handshake flow.
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
54
If discovered, the central device reads and writes the value of the characteristics.
Though the BLE technology is not designed to measure distance, the distance between two
devices can be measured using the RSSI. The primary principle for this measurement follows
the inverse square law [24]. As per its application in CT, when the RSS measured is relatively
high, it is generally assumed that a contact event has occurred and the reverse is the case for
individuals whose devices are far apart [21, 24]. This is used by CT applications to provide a
good enough estimation of proximity. Nonetheless, this is not always the case in real-world
settings. In these settings, variables such as absorption and device orientation could strongly
attenuate the radio signals, while reflection on the other hand could change the signal
strength received in indoor environments as shown in the work of [25]. In addition, the
significant variation of transmission power over different smartphones affects distance
estimation [9]. These errors in measurements could cause either a false sense of safety or a
false sense of panic. Within the drawbacks of the BLE-based solution for CT is that it is
unable to tell if an obstacle such as plexiglass separates an individual from another. In this
case, the BLE-based distance estimation can falsely alert an individual that they might be an
infection risk, resulting in unnecessary panic. On the other hand, an individual could build a
false sense of security if an infected individual is not running the application at the point of
contact or if distance estimation does not successfully register the contact [6, 25].
For the purpose of usability, it is crucial that technology-based CT applications can run
in the background. However, the iOS version of the BLE-based app is bound by restrictions
that iOS has on background Bluetooth functionality; thereby its proprietary advertisement
format is not readable by non-iOS devices [7].
BLE is susceptible to replay and relay attacks, during which malicious users
impersonate and rebroadcast the location and history of users, which affects the data
collected by the central server. Privacy-friendly schemes such as private set intersection [26],
elliptic curve cryptography [27] to name a few, are used to protect the information
broadcasted and received between users as well as between users and the central server.
2.2.
GPS
GPS is a satellite navigation system used by authorities around the world to monitor
the location of GPS-enabled devices. This technique is adopted by countries such as India,
Ghana, the Philippines, Thailand, and Norway to monitor COVID-19. A major drawback of
using this technology as a CT tool is that it can reveal sensitive information about individuals
[11]. In addition, it has low precision in indoor environments. The precision for GPS is about
10m. This decreases in areas with tall buildings. This vertical limitation, that is, for floor
detection, signifies that individuals identified within a tall building would register within the
margin of error. Furthermore, the battery usage is higher in comparison to BLE [7, 21].
Unlike BLE where the restrictions by Apple’s iOS limit the functionality of the
application’s usage running in the background, the limitations do not affect applications
related to location tracking. Therefore, in contrast to other wireless communication features
in smartphones that are restricted from running in the background, GPS-based CT
applications, whose primary function is related to location tracking can run in the
background of iOS devices.
55
2.3.
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
Wireless Fidelity
Wireless Fidelity (Wi-Fi) is another communication technology that is identified as an
effective CT tool [5]. In most uses’ cases, this solution works with the assumption that
universities, corporate offices and other locations where a high density of individuals tend to
spend their day have access to Wi-Fi. On this premise, Wi-Fi based CT could be done from
either the device or the network, and in either case, they are used to characterize and model
the movement of users. Although its primary application is indoor, it requires an
infrastructure that might not be available in all places, especially outdoors. This limits its
application as regards CT especially in areas without Wi-Fi coverage. In addition, its use
raises privacy and ethical concerns, since the location of individuals can be documented
actively and passively when their device is connected to the Wi-Fi network [1]. Furthermore,
location estimates are not always accurate, as multiple users can connect to the same access
point (AP) from different rooms. Since estimates are primarily based on timestamps of
devices connected to an access point, uninfected individuals could receive false risk alerts,
which could cause unnecessary panic.
2.4.
UWB
The newer generation of smartphones such as the iPhone 11 and the Xiaomi Mix 4 are
equipped with UWB wireless communication capabilities [28]. In order to address the
challenge of accurate distance estimation and localization using the conventional BLE
systems, UWB uses a low energy level for short-range, high bandwidth communications
over the radio spectrum. Furthermore, UWB has less noise interference, which makes it a
suitable technology-based CT approach for indoor applications [12]. Although it provides
higher accuracy (<0.5m) [9] with a low error of margin of about 0.1m [12] than BLE for both
distance estimation and localization, its major drawback is the technology’s incompatibility
with smartphones not equipped with this technology. Unlike GPS, Wi-Fi and QR codes,
privacy concerns are low.
2.5.
Quick Response Code
Quick response code (commonly referred to as QR codes) is a machine-readable visual
label that contains data. The data embedded in the QR codes enable the technology to
function as an identifier, tracker and locator [29]. This method of CT requires an individual
to take photographs of the QR code at various locations. A mobile application automatically
reads the locations encoded into these QR codes and populates the central database with the
user’s information. If a user is tested positive, the information updated can be used to alert
contacts who had interacted with the same QR code within the duration of concern. China
has a high adoption rate for this approach. The data obtained was used to assign color codes
(green, yellow and red) to users. This color-coding generally influenced the citizen’s degree
of movement [15]. However, the movement of individuals is non-deterministic; therefore, its
efficiency as regards its application is highest within the same room/floor of a building. If
the QR codes are positioned outdoors, the direction of individuals that may have interacted
with the same QR codes, would not have necessarily followed the same direction or be in
close proximity at the time of interaction [11]. This could cause a false sense of panic. Like
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
56
the BLE-based CT process, QR codes also processes and match local grouping information.
However, privacy preservation is low [30]. Table 2 summarizes the different wireless
communication features in smartphones that are used for technology-based CT.
Table 2. Summary of the different wireless communication features in smartphones used for
technology-based CT.
Technology
BLE
GPS
Wi-Fi
UWB
QR Codes
3.
Location/
Proximity
Accuracy
Outdoors (<2m)
Indoors (<2m)
Outdoors (10m)
Indoors
(Extremely low)
Outdoors
(Depending on
APs)
Indoors (<1m)
Outdoors
(Depending on
UWB
transmitters)
Indoors (<0.5m)
Outdoors
(Building level)
Indoors
(Room/floor
level)
Running in
background (iOS
and Android)
Infrastructure
required
Privacy
concerns
No, yes
No
Low
Yes, yes
No
High
No, yes
No, yes
No, yes
OVERVIEW OF EXISTING
DEVELOPING COUNTRIES
Yes
No
Yes
TECHNOLOGY-BASED
Target
environment
Outdoors,
indoors
Outdoors,
limited
indoors
Low
Limited
outdoors,
indoors
Low
Limited
outdoors,
indoors
High
Limited
Outdoor,
indoor
CT
SOLUTIONS
IN
Works such as [4, 12, 14, 15] - which discuss the present tools used for technologybased CT - offer a sizeable range of information on the CT solutions implemented around the
globe. As regards adoption and usage, these works delineated the rate of adoption of various
technology-based CT applications and the number of downloads from Google Play store,
respectively. However, most of the information on the adoption rates and the number of
downloads are for developed countries with little to no information on technology-based CT
solutions in developing countries. To build around the latter, information concerning
technology-based CT solutions that were designed and/or implemented in developing
countries were obtained from Google Scholar. This information was used to streamline the
number of countries to sixteen. However, not all solutions had details concerning their
system architecture, trust model, technology, adoption rate and information on the number
of downloads from Google Play store. However, for countries listed, information found on
any three of the five details earlier mentioned was included in Table 3. Primary details of the
factors considered for the CT applications are discussed in the following sub-sections.
57
3.1.
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
System Architecture
There are generally two types of system architectures engaged in the development of
technology-based CT applications. The applications could either be centralized or
decentralized in approach [5].
In the underlining framework of the centralized architecture, a central authority
manages personal data collected from the technology-based CT applications [5]. Although
there are arguments which state that the centralized approach of technology-based CT is the
most effective and easy solution, there have been concerns surrounding the data gathered by
this approach [5, 14]. The large-scale collection of information gathered by entities involved
in handling the information uploaded by individuals that use technology-based CT
applications has sparked concerns about how this data would be handled post-COVID-19
[14]. To address this, a decentralized approach that prioritizes the end-users privacy was
developed. Technology-based CT solutions designed based on the decentralized approach
give individuals the control to either share the data collected through their devices over a
certain duration to a central server or not. This approach generally protects the personal
identities of the infected and non-infected individuals from the central authorities. The
central authorities are only aware of the pseudo identities of individuals and these can be
used to alert individuals who are potential contact risks. However, there are concerns that
this would fail if a large number of individuals who are alerted to be contact risks refuse to
act accordingly [5].
To strike a balance between both approaches, a number of researchers have proposed
and implemented a hybrid approach that enables the health authorities (HAs) and infected
individuals to operate both architectures at different stages of the technology-based CT
infrastructure. The infected individuals’ information could be used to obtain information
concerning whom the infected individual had come in contact with while preserving the
identity of the individuals with whom the infected individual did not come in contact.
3.2.
Trust Model
Concerning the trust model and security proofs, centralized servers are trusted.
However, the protocols are designed in a way that the information leakage to the servers is
still acceptable as in the case of a passive (semi-honest) server corruption [31]. Since there is
no absolute certainty as to whether the dealer or administrator of the servers would be
honest or not, system architectures are further enhanced by using cryptographic techniques
[32] to secure information of users from malicious outsiders and insiders alike. In essence, if
the protocol is secure against active adversaries and communication complexity is optimized
between involved devices - such that the administrator does not collude with either party
and it is secure against attack from malicious outsiders - then the protocol is trusted or
honest; else, it is semi-honest or honest-but-curious [33].
3.3.
Users Adoption
The summary of CT mobile applications (commonly referred to as apps) delineated in
Table 3 highlights apps utilized or proposed in developing countries. From the list of
countries, the number of downloads identified in Google Play store as at the time of this
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
58
writing could only be obtained for India, Vietnam, Columbia, South Africa, Saudi Arabia,
Indonesia, Thailand, Philippines, Turkey, Malaysia, and Latvia. Due to location restrictions
from Google Play store, data on the number of downloads for countries such as Pakistan and
Ghana were not accessible. However, the number of downloads from Bulgaria was retrieved
from the work of [4]. In addition, there was no information present on Google Play store on
the KDTRACE app discussed in the work of [34], neither was there any data on the user’s
adoption rate. However, it was identified in the work [32] that the app was still in
development by the state’s government.
Table 3. Summary of existing contact tracing apps in developing countries.
User’s
adoption
(%)
5.24
7.40
10.42
Number of
downloads
from Play store
100, 000+
100,000,000+
10, 000, 000+
20
10, 000, 000+
-
1.68
1, 000, 000+
-
-
-
-
Centralized
GPS
-
29.2
10, 000, 000+
Tunisia
Centralized
BLE
0.85
100, 000+
-
-
0.1
-
100, 000+
-
7.15
5, 000, 000+
30.5
10, 000, 000+
3.70
10, 000, 000+
0.9
1, 000, 000+
0.2
10, 000+
App
Country
System
architecture
Technology
Apturi COVID
Arogyu Setu
Bluezone
Latvia
India
Vietnam
Decentralized
Centralized
Centralized
BLE
BLE, GPS
BLE
Corona App
Colombia
Centralized
GPS
Covid Alert
South
Africa
-
BLE
Covid-19 Gov
PK
Pakistan
Centralized
Tawakkalna
Saudi
Arabia
E7mi
GH COVID-19
Tracker
Hayat Eve Sigar
KDTRACE
Ghana
Centralized
GPS
Turkey
Nigeria
Centralized
BLE
BLE
MorChana app
Thailand
Centralized
BLE, GPS
Mytrace
Malaysia
Centralized
BLE
PeduliLindungi
Indonesia
Centralized
BLE
Stay Safe PH
Philippines
Centralized
GPS
VirusSafe
Bulgaria
Centralized
GPS
Trust
model
Honest
Honest
SemiHonest
Semihonest
Semihonest
Honest
Semihonest
Semihonest
Semihonest
Semihonest
Semihonest
- signifies that the information was not found
The estimated user adoption rate for each country was obtained by dividing the
number of downloads by the entire country’s population. In addition, the calculation was
based on the information obtained from Google Play store and does not include the number
of downloads from outside sources such as Apple store.
59
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
A major reason for the low rate of adoption of technology-based CT solutions among
individuals in these countries has to do with their perception of privacy issues concerning the
usage of information generated by these apps [28, 35]. While these solutions are proposed to
curb the spread of the outbreak, its effectiveness is mutually inclusive to its rate of adoption.
As reviewed in the work of [9], varied adoption percentages have been proposed to increase
the effectiveness of these solutions and curb the spread of the COVID-19 pandemic. While
100% uptake of the app by users is ideal to control the spread of a pandemic, the work of [9]
identified from reviews that an 80% uptake by smartphone users would need to actively
utilize CT apps to mitigate the spread of the pandemic.
4.
CHALLENGES OF TECHNOLOGY-BASED CT IN DEVELOPING COUNTRIES
Capturing the dynamic nature of an outbreak can be challenging, as measuring and
obtaining every available data that captures both the geographical and temporal extent of the
sample space can be difficult. Nonetheless, obtaining an abstract interpretation - while
considering the geographical and temporal extent of the sample space - is possible [12].
Despite the difficulty in representing the entire sample space, it has been stated in multiple
studies [3, 9, 10, 11, 28] that an increase in the level of adoption would increase the
information obtained from a sample space, which in turn would increase the reliability of the
system. Though the delineated studies support this approach, the practicability of these
solutions, if not well thought out by researchers and government entities could limit its
application and adoption in developing countries. Taking Nigeria as a case study of a
developing country, factors that limit the practicability of technology-based CT are discussed
in the following subsections.
4.1.
Low Ownership of Smartphones
Nigeria as a developing country is considered the “Giant of Africa.” In 2021, the World
Bank reported that before the COVID-19 outbreak, 4 out of 10 Nigerians were living below
the national poverty line, and millions more were living just above that line with the
possibility of them falling back when shock occurs [36]. With the waves of lockdown and the
collapse of businesses, as well as the massive lay-off of personnel, shock occurred. With this
as the present reality, a massive number of individuals are more interested in their day-today living than owning a smartphone. By social class, the majority of Nigerians are within
the bracket of the lower class. The monthly earnings of individuals within this class are
within $80 - $250 and with the average price of an off-the-shelf smartphone within the range
of $60 - $150, ownership especially in rural areas is significantly low. With a high number of
individuals not technologically oriented, and a number of them identified within the
vulnerable group, that is, the elderly, technology-based CT solutions built atop technologybased features of smartphones as downloadable apps might not scale well.
4.2.
Erratic Power Supply
About 47% of Nigerians do not have access to grid electricity [37] and those who have
access only get an average of 6.8 hours of electricity supplied to them [38]. In the work of
[39], a key finding as regards the effectiveness of the proposed technology-based CT solution
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
60
was to have the Bluetooth turned on instead of randomly at certain times of the day. In
addition to the network operations and the functions within smartphones that consume
power, adding a technology-based CT application that requires a higher frequency of wakeup functions for more efficient CT would not be favorable, since the state of electricity
supply within the country is erratic.
4.3.
Poorly Equipped Staffs
At the height of the COVID-19 pandemic, a major complaint amid the trained
personnel who served at the frontlines concerned the poor supply of necessary equipment.
The cost of this was dire, as a number of frontline workers across the globe became victims of
the problems they painstakingly fought to address. The phobia that resulted from this
shortcoming caused medical facilities in developing countries like Nigeria and Bangladesh to
barely address medical cases for the suspicion of the case being a COVID-19 infection. This
resulted in a massive number of patients being rejected from these facilities [6].
4.4.
Cultural Framework
The work of [13] discusses the cultural framework from the perspective of application
adoption, and as delineated in the work of [16], the discussion on the subject of cultural
framework generally centres on the perception of users on the subject of privacy and how this
affects the rate of adoption. Although the perception of these frameworks differs with
countries, the countries that are primarily discussed within this framework are developed
countries. This subsection extends the scope of this framework by briefly discussing how
cultural values in developing countries, such as Nigeria affect the adoption of technologybased CT. Communal living is part of the ethos of Nigerians. Due to this, individuals are at
risk of being infected as there is little to no respect and in some cases, awareness for barrier
gestures such as social distancing and preventive measures such as quarantine during their
daily encounters.
5.
POSSIBLE RECOMMENDATIONS
Although it is difficult to account for every possible scenario, it is expedient to develop
an efficient CT solution that identifies individuals who are contact risks as well as
individuals who are latent contact risks in developing countries. On this premise, it is
important that designers take into consideration cultural values, social structures, domestic
political factors, skills, resources and the reality of users in these developing countries. The
information that is gathered from these can be used to design solutions that close the social
and technological gap of adapting technology-based CT solutions to mitigate the spread of
an outbreak [8]. Discussed below are possible recommendations that can be adopted by
designers and government entities.
5.1.
Compatibility with Operating Systems Outside Android and iOS
The work of [6] highlighted that 67% of the world’s population own a mobile phone,
and according to [9], 56% of these mobile devices are smartphones. Putting into
consideration the market share of smartphones, a majority of these smartphones operate on
61
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
Android and iOS operating systems. However, other non-tactile and tactile smartphones
operate on other operating systems such as Blackberry, Symbian OS, Palm/Web OS, and the
newly developed Calyx OS. Though their market penetration is not as large as the popularly
known Android and iOS operating systems, they are still equipped with the underlining
technologies on which technology-based CT solutions are built. To account for this niche of
users, designers and government entities need to adopt the technology-based CT solutions to
seamlessly operate with operating systems outside Android and iOS operating systems.
5.2.
Compatibility with a Fraction of the 44%
As underlined in subsection 4.1, the cost of these smartphones has led to the low
penetration rate of smartphones in developing countries. As a result, most individuals opt
for mobile phones that are not equipped with most of the wireless communication features
in smartphones. A significant number of these users make up the remaining 44% of mobile
phone users, and within this pool, a significant number of these devices are equipped with
Bluetooth. Since most technology-based CT solutions are built atop variants of Bluetooth,
designing Bluetooth-based CT solutions that operate with these mobile phones and are
compatible with smartphones would create a more effective network that further bridges the
gap of the digital divide.
5.3.
Utilizing Cell Towers for Localization and Distance Estimation
A majority of the individuals that populate the rural communities are identified to be
within the vulnerable group. The digital literacy of these individuals is low, which largely
contributes to the lopsided levels of digital divides. Nonetheless, a significant number of
these individuals possess a mobile phone with an active SIM card. In a case where any of
these individuals test positive for COVID-19, HAs could work with network operators as
proposed in the work of [6] to obtain location data. This data can be used to map out the
mobility of the individual over a number of days. In addition, the information could be used
to identify individuals who were in close proximity with the infected individual. For this
approach to be efficient, enhanced precision as regards localization and distance estimation
would need to be addressed, and the individuals would need to have their mobile phones
powered on.
5.4.
Awareness Campaigns
Awareness campaigns around social and technological requirements during outbreaks
could slow the spread of the pandemic. On this premise, initiatives that involve religious
leaders, advertisements through local programs on television and radio, and town criers in
local communities could enlighten individuals of an outbreak. This approach alongside
technology-based CT can be used to gradually bridge the information gap that causes the
digital divide in developing countries [8].
5.5.
Technology-Based CT should Augment Manual CT
According to the work of [9], there is no conclusive finding that identifies which CT
strategy is superior. Although the entities involved are yet to find the balance between the
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
62
challenges and opportunities in using one of the techniques over another, or to augment the
other, it is eventually the responsibility of these entities to navigate through these and ensure
that their efforts towards curbing the spread of an outbreak are at its core human-centered.
This approach would enable us to navigate this era and better prepare for likely outbreaks
that could occur in the future.
6.
CONCLUSIONS
Since the outbreak of the on-going COVID-19 pandemic, technology-based CT
solutions have been adopted to flatten-the-curve and return society to some semblance of
normalcy. However, there are design concerns as regards the adoption of this technologybased solution in developing countries. As the social and technological gap between
developed countries varies from that of developing countries, it is, therefore, necessary for
private and government entities to consider adapting these technology-based solutions to
match the need of the reality of their environments. On this premise, technology-based CT
solutions in developing countries should scale beyond the use of technology-based features
built atop smartphones. Since their penetration differs significantly across countries, with a
remarkably low usage among the vulnerable group, that is, the elderly. These solutions
should be cheaper with efficient distance estimation while consuming less power and
preserving the privacy of the individuals.
REFERENCES
[1] A. Trivedi, C. Zakaria, R. Balan, A. Becker, G. Corey, P. Shenoy, “WiFiTrace: network-based
contact tracing for infectious diseases using passive WiFi sensing,” Proceedings of the ACM on
Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 5, no. 1, pp. 1-26, 2021.
[2] V. Chamola, V. Hassija, V. Gupta, M. Guizani, “A comprehensive review of the COVID-19
pandemic and the role of IoT, drones, AI, blockchain, and 5G in managing its impact,” IEEE
Access, vol. 8, pp. 90225-90265, 2020.
[3] B. Sowmiya, V. Abhijith, S. Sudersan, R. Sundar, M. Thangavel, P. Varalakshmi, “A survey on
security and privacy issues in contact tracing application of Covid-19,” SN Computer Science,
vol. 2, no. 3, pp. 1-11, 2021.
[4] T. Martin, G. Karopoulos, J. Hernández-Ramos, G. Kambourakis, I. Nai Fovino, “Demystifying
COVID-19 digital contact tracing: A survey on frameworks and mobile apps,” Wireless
Communications and Mobile Computing, vol. 2020, pp. 1-20, 2020.
[5] M. Jhanwar, S. Sarkar, “PHyCT: privacy preserving hybrid contact tracing,” IACR Cryptology
ePrint Archive, vol. 2020, pp. 1-10, 2020.
[6] M. Rahman, R. Khan, M. Khandaker, M. Sellathurai, M. Salan, “An automated contact tracing
approach for controlling COVID-19 spread based on geolocation data from mobile cellular
networks,” IEEE Access, vol. 8, pp. 213554-213565, 2020.
[7] L. Reichert, S. Brack, B. Scheuermann, “A survey of automatic contact tracing approaches using
Bluetooth Low Energy,” ACM Transactions on Computing for Healthcare, vol. 2, no. 2, pp. 1-33, 2021.
[8] E. Arakpogun, Z. Elsahn, K. Prime, P. Gerli, F. Olan, “Digital contact-tracing and pandemics:
institutional and technological preparedness in Africa,” World development, vol. 136, pp. 105105,
2020.
63
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
[9] G. Grekousis, Y. Liu, “Digital contact tracing, community uptake, and proximity awareness
technology to fight COVID-19: a systematic review,” Sustainable Cities and Society, vol. 71,
pp. 102995, 2021.
[10] P. Di Marco, P. Park, M. Pratesi, F. Santucci, “A Bluetooth-based architecture for contact tracing
in healthcare facilities,” Journal of Sensor and Actuator Networks, vol. 10, no. 1, pp. 1-15, 2021.
[11] M. Shahroz, F. Ahmad, M. Younis, N. Ahmad, M. Boulos, R. Vinuesa, J. Qadir, “COVID-19 digital
contact tracing applications and techniques: a review post initial deployments,” Transportation
Engineering, vol. 5, pp. 100072, 2021.
[12] V. Jahmunah, V. Sudarshan, S. Oh, R. Gururajan, R. Gururajan, X. Zhou, X. Tao, O. Faust,
E. Ciaccio, K. Ng, U. Acharya, “Future IoT tools for COVID‐19 contact tracing and prediction:
a review of the state‐of‐the‐science,” International journal of imaging systems and technology, vol. 31,
no. 2, pp. 455-471, 2021.
[13] M. Villius Zetterholm, Y. Lin, P. Jokela, “Digital contact tracing applications during COVID-19:
a scoping review about public acceptance,” Informatics, vol. 8, no. 3, pp. 48, 2021.
[14] L. Kahnbach, D. Lehr, J. Brandenburger, T. Mallwitz, S. Jent, S. Hannibal, B. Funk, M. Janneck,
“Quality and adoption of COVID-19 tracing apps and recommendations for development:
systematic interdisciplinary review of European apps,” Journal of medical Internet research, vol. 23,
no. 6, pp. e27989, 2021.
[15] E. Seto, P. Challa, P. Ware, “Adoption of COVID-19 contact tracing apps: a balance between
privacy and effectiveness,” Journal of Medical Internet Research, vol. 23, no. 3, 2021.
[16] J. O'Connell, M. Abbas, S. Beecham, J. Buckley, M. Chochlov, B. Fitzgerald, L. Glynn, K. Johnson,
J. Laffey, B. McNicholas, B. Nuseibeh, “Best practice guidance for digital contact tracing apps:
a cross-disciplinary review of the literature,” JMIR mHealth and uHealth, vol. 9, no. 6, pp. e27753,
2021.
[17] M. Cebrian, “The past, present and future of digital contact tracing,” Nature Electronics, vol. 4,
no. 1, pp. 2-4, 2021.
[18] A. Kotanen, M. Hännikäinen, H. Leppäkoski, T. Hämäläinen, “Experimentson local positioning
with Bluetooth,” International Conference on Information Technology: Coding and Computing,
pp. 297–303, 2003.
[19] Y. Chapre, P. Mohapatra, S. Jha, A. Seneviratne, “Received signal strength indicator and its
analysis in a typical WLAN system (short paper),” In 38th Annual IEEE Conference on Local
Computer Networks, pp. 304-307, 2013.
[20] T. Altuwaiyan, M. Hadian, X. Liang, “EPIC: efficient privacy-preserving contact tracing for
infection detection,” In 2018 IEEE International Conference on Communications, pp. 1-6, 2013.
[21] J. Bay, J. Kek, A. Tan, C. Hau, L. Yongquan, J. Tan, T. Quy, “BlueTrace: a privacy-preserving
protocol for community-driven contact tracing across borders,” Government Technology AgencySingapore, pp. 1-9, 2020.
[22] G. Hatke, M. Montanari, S. Appadwedula, M. Wentz, J. Meklenburg, L. Ivers, J. Watson, P. Fiore,
“Using Bluetooth Low Energy (BLE) signal strength estimation to facilitate contact tracing for
COVID-19,” arXiv preprint arXiv:2006.15711, 2020.
[23] M. Cunche, A. Boutet, C. Castelluccia, C. Lauradoux, V. Roca, On Using Bluetooth-Low-Energy for
Contact Tracing, Doctoral dissertation, Inria Grenoble Rhône-Alpes; INSA de Lyon, 2020.
[24] P. Ng, P. Spachos, K. Plataniotis, “COVID-19 and your smartphone: BLE-based smart contact
tracing,” IEEE Systems Journal, vol. 15, no. 4, pp. 5367-5378, 2021.
[25] D. Leith, S. Farrell, “Coronavirus contact tracing: Evaluating the potential of using Bluetooth
received signal strength for proximity detection,” ACM SIGCOMM Computer Communication
Review, vol. 50, no. 4, pp. 66-74, 2020.
© 2022 Jordan Journal of Electrical Engineering. All rights reserved - Volume 8, Number 1, March 2022
64
[26] J. Chan, D. Foster, S. Gollakota, E. Horvitz, J. Jaeger, S. Kakade, T. Kohno, J. Langford, J. Larson,
P. Sharma, S. Singanamalla, J. Sunshine, S. Tessaro, “Pact: Privacy sensitive protocols and
mechanisms for mobile contact tracing,” arXiv preprint arXiv:2004.03544, 2020.
[27] P. Tedeschi, S. Bakiras, R. Di Pietro, “SpreadMeNot: a provably secure and privacy-preserving
contact tracing protocol, arXiv preprint arXiv:2011.07306, 2020.
[28] B. Etzlinger, B. Nußbaummüller, P. Peterseil, K. Hummel, “WIP: distance estimation for contact
tracing-a measurement study of BLE and UWB traces,” arXiv preprint arXiv:2101.09075, 2021.
[29] QR code, 2021. <http://www.wikipedia.com/wiki/QR_code>
[30] H. Xu, L. Zhang, O. Onireti, Y. Fang, W. Buchanan, M. Imran, “Beeptrace: Blockchain-enabled
privacy-preserving contact tracing for covid-19 pandemic and beyond,” IEEE Internet of Things
Journal, vol. 8, no. 5, pp. 3915-3929, 2020.
[31] H. Hsiao, C. Huang, B. Hong, S. Cheng, H. Hu, C. Wu, J. Lee, S. Wang, W. Jeng, “An empirical
evaluation of Bluetooth-based decentralized contact tracing in crowds,” arXiv preprint
arXiv:2011.04322, 2020.
[32] W. Beskorovajnov, F. Dörre, G. Hartung, A. Koch, J. Müller-Quade, T. Strufe, “ConTra Corona:
contact tracing against the Coronavirus by bridging the centralized-decentralized divide for
stronger privacy,” IACR Cryptology ePrint Archives, vol. 2020, pp. 505, 2020.
[33] J. Fitzsimons, A. Mantri, R. Pisarczyk, T. Rainforth, Z. Zhao, “A note on blind contact tracing at
scale with applications to the COVID-19 pandemic,” In Proceedings on the 15th international
Conference on Availability, Reliability and Security, pp. 1-6, 2020.
[34] R. Mustapha, M. Ahmed, M. Ahmad, “Knowledge management in pandemics: design and
implementation of social distancing mobile application,” In Knowledge Management International
Conference, pp. 151-155, 2021.
[35] I. Montagni, N. Roussel, R. Thiébaut, C. Tzourio, “The French Covid-19 contact tracing app:
knowledge, attitudes, beliefs and practices of students in the health domain,” MedRxiv, 2020.
[36] The world bank, 2021. <https://www.worldbank.org/en/country/nigeria/brief/monitoringcovid-19-impact-on-nigerian-households>
[37] The World Bank, 2020. <https://www.worldbank.org/en/news/press-release/2020/06/23/
Nigeria-to-keep-the-lights-on-and-power-its-economy>
[38] Micheal Ani, ”Nigerians enjoy only an average of 7hrs electricity from national grid daily,”
Business Day, Nigeria, 2020. <https://businessday.ng/energy/power/article/nigerians-enjoyonly-an-average-of-7hrs-electricity-from-national-grid-daily-nbs/>
[39] A. Hekmati, G. Ramachandran, B. Krishnamachari, “CONTAIN: Privacy-oriented contact tracing
protocols for epidemics,” In 2021 IFIP/IEEE International Symposium on Integrated Network
Management, pp. 872-877, 2021.