esp-ena/README.md

166 lines
7.7 KiB
Markdown
Raw Normal View History

2020-07-11 12:11:34 +02:00
# esp-ena
Implementation of contact tracing with the Covid-19 Exposure Notification API by Apple and Google on an ESP32 (with [ESP-IDF](https://docs.espressif.com/projects/esp-idf/en/latest/esp32/index.html)).
2020-07-25 13:40:35 +02:00
More information about the Covid-19 Exposure Notification at [Apple](https://www.apple.com/covid19/contacttracing/) and [Google](https://www.google.com/covid19/exposurenotifications/). This is fully compatible with the official API and is meant for people without smartphone or without access to Apples/Googles implementation.
2020-07-11 12:11:34 +02:00
The main source (the Exposure Notification API) is a separate module in [**components/ena**](components/ena).
2020-07-25 14:00:51 +02:00
This implementation fully covers the BLE part including the cryptography specifications needed and the exposure check.
2020-07-28 16:50:42 +02:00
The following acronyms will be used in code and comments:
* *ENA* Exposure Notification Api
* *ENIN* ENIntervalNumber - timestamp with 10 minutes resolution
* *TEK* Temporary Exposure Key - personal secret key changed every 24h, published when infected
* *RPI* Rolling Proximity Identifier - send and received identifer changed every 10 minutes
* *AEM* Associated Encrypted Metadata - send and received metadata
2020-07-25 14:00:51 +02:00
### Features implemented
* send/receive BLE beacons as defined in [Bluetooth® Specification (Apple/Google)](https://blog.google/documents/70/Exposure_Notification_-_Bluetooth_Specification_v1.2.2.pdf) and [Cryptography Specification (Apple/Google)](https://blog.google/documents/69/Exposure_Notification_-_Cryptography_Specification_v1.2.1.pdf)
* BLE privacy (change random MAC address in random interval)
2020-07-28 16:50:42 +02:00
* permanent storage on flash of last keys, beacons and exposures (storage is limited, see [storage math](#some-storage-math) for details)
2020-07-25 14:00:51 +02:00
* parsing of Exposure Key export binaries as defined in [Exposure Key export file format and verification](https://developers.google.com/android/exposure-notifications/exposure-key-file-format) (big thanks to [nanopb](https://github.com/nanopb/nanopb) for making this easier than I thought!)
* calculating exposure risks/scores (after adding reported keys and storing exposure information) as defined in [ENExposureConfiguration (Apple)](https://developer.apple.com/documentation/exposurenotification/enexposureconfiguration)
2020-07-11 12:11:34 +02:00
Additional features for full ENA device
2020-07-25 14:00:51 +02:00
* RTC support with DS3231 (for correct system time)
* display support with SSD1306
* interface to
* set time
* show exposure status
2020-07-11 12:11:34 +02:00
2020-07-25 14:00:51 +02:00
### Features in development
* automatically receive Exposure Key export from web (started with [Corona Warn App](https://github.com/corona-warn-app))
2020-07-11 12:11:34 +02:00
* send infected status (will test [Corona Warn App](https://github.com/corona-warn-app))
* battery support
* 3d print case
* interface to
* delete data
* report infection
2020-07-11 12:11:34 +02:00
2020-07-28 16:50:42 +02:00
### Limitations/Problems/Questions
2020-07-11 12:11:34 +02:00
* WiFi or other external connection needed for infections status (auto-connect to open WiFis?)
* obtaining accessibility
* all parameters (scanning time, thresholds etc.)
2020-07-28 16:50:42 +02:00
* memory (RAM) is really low with BLE and WiFi enabled, unzipping a Exposure Key export not possible for now, maybe disable BLE service for download.
2020-07-25 14:00:51 +02:00
* service UUID is send reversed, RPI and AEM also send in reverse? Don't know BLE specification enough
2020-07-28 16:50:42 +02:00
### some storage math
Due to limited storage, I made some calculations. I have fixed counting of TEKs (14 for two weeks), temporary beacons (1000, longest period for temp. storage is 20 minutes, so recognizing about 1000 different beacons in 20 minutes is possible) and exposure information (choose 500, this is like a limit of infected keys to be met). So the biggest limitation is to store beacons permanently after threshold of 5 minutes. That's what those calculations are for to check, if storage is enough for practical use.
overview of storage in bytes without permanent beacons:
| | size (B) | num | overall (B) |
| :-----------: | -------: | ---: | ----------: |
| TEK | 21 | 14 | 294 |
| Exposure Info | 20 | 500 | 10000 |
| temp. Beacon | 32 | 1000 | 32000 |
Additional 4 bytes counting for every type gives overall 42310B used without perm. beacons.
For now, a partition size of 2494464B will leave 2452154B free for met beacons which leads to a total storage of 76629
beacons. This gives the following table, where I added some lower boundaries to calculate with.
| total beacons | aver. per day | aver. for 10 minute window |
| ------------: | ------------: | -------------------------: |
| 50000 | 3571 | 24 |
| 70000 | 5000 | 34 |
| 76629 | 5473 | 38 |
So on average it is possible to meet 38 (24 on a lower boundary) different devices inside of 10 minutes. I have no practical experience/numbers how many beacons are stored on average for a 14-days period in currently running ENA-Apps. But I think regarding the average is calculated for 24h (which is quite unpractical because of sleep and hours without meeting many people), the storage should be enough for the purpose of contact tracing.
2020-07-11 12:11:34 +02:00
## How to use
### Hardware Required
2020-07-25 14:00:51 +02:00
For now just an ESP32 is required. DS3231 RTC and SSD1306 Display are required for a complete device.
2020-07-11 12:11:34 +02:00
### Configure the project
```
idf.py menuconfig
```
required
* enable bluetooth (BLE)
* add partition-table for storage (currently hardcoded name "ena")
* mbedTLS enable HKDF
recommended
2020-07-15 22:32:51 +02:00
* BLE *Scan Duplicate* (By Device Address and Advertising Data)
debug options
* Log output set to Debug
2020-07-15 22:32:51 +02:00
* Exposure Notification API / Storage enable *Dump storage*
2020-07-11 12:11:34 +02:00
### Build and Flash
May flash partition table:
```
idf.py partition_table-flash
```
2020-07-11 12:11:34 +02:00
Build the project and flash it to the board, then run monitor tool to view serial output:
```
idf.py -p PORT flash monitor
```
(Replace PORT with the name of the serial port to use.)
(To exit the serial monitor, type ``Ctrl-]``.)
## Troubleshooting
Sometimes I get errors from BT-stack of ESP-IDF printed. Didn't affect functionality for now, but I also could not find out what it caused and what it means.
```
E (909164) BT_HCI: btu_hcif_hdl_command_complete opcode 0x2005 status 0xc
```
## Structure
The project is divided in different components. The main.c just wrap up all components. The Exposure Notification API is in **ena** module
2020-07-15 22:29:52 +02:00
### ena
The ena module contains the main functions of eps-ena with bluetooth scanning and adverting, storing data, handle beacons and check exposure.
2020-07-15 22:29:52 +02:00
* *ena-beacons* handles scanned data by storing temporary beacons, check for threshold and store beacons permanently
2020-07-11 12:11:34 +02:00
* *ena-crypto* covers cryptography part (key creation, encryption etc.)
* *ena-storage* storage part to store own TEKs and beacons
* *ena-bluetooth-scan* BLE scans for detecting other beacons
* *ena-bluetooth-advertise* BLE advertising to send own beacons
2020-07-25 14:03:55 +02:00
* *ena-exposure* decode Exposure Key export, compare with stored beacons, calculate score and risk
2020-07-11 12:11:34 +02:00
* *ena* run all together and timing for scanning and advertising
2020-07-15 22:29:52 +02:00
### ena-cwa
2020-07-25 14:03:55 +02:00
Connection to german Exposure App ([Corona Warn App](https://github.com/corona-warn-app)) for download Exposure Key export (and maybe later report infection).
### interface
2020-07-15 22:29:52 +02:00
Adds interface functionality via touch pads for control and setup.
### i2c-main
Just start I2C driver for display and RTC.
### ds3231
I2C driver for a DS3231 RTC
2020-07-15 22:29:52 +02:00
### ssd1306
I2C driver for a SSD1306 display.
### nanopb
2020-07-25 14:03:55 +02:00
[Nanopb](https://github.com/nanopb/nanopb) for reading Protocol Buffers of Exposure Key export. Including already generated Headers from *.proto files.
### miniz
2020-07-25 14:03:55 +02:00
[Miniz](https://github.com/richgel999/miniz) for unzipping Exposure Key export (not successful for now due to memory limit)
2020-07-25 13:40:35 +02:00
## Demo
[Demo Video (early stage)](https://twitter.com/Lurkars/status/1282223547579019264)