Abstract
Location-based Social Network (LBSN) services, such as People Nearby in WeChat, enable users to discover users within the geographic proximity. Though contemporary LBSN services have adopted various obfuscation techniques to blur the location information, recent research has shown that based on the number theory, one can still accurately pinpoint user locations by strategically placing multiple virtual probes. In this paper, we conducted a comprehensive simulation study to examine the impact of location errors on localization attacks to track target users based on the number theory by using the LBSN services provided by WeChat. Our simulation experiments include four location error models including the exponential model, the Gaussian model, the uniform model, and the Rayleigh model. We improve the one-dimensional and two-dimensional localization algorithms where the location errors exit. Our simulation results demonstrate that the number theory based localization attacks remain effective and efficient in that target users can still be pinpointed with high accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ding, Y., Peddinti, S.T., Ross, K.W.: Beijing stalking from timbuktu: a generic measurement approach for exploiting location-based social discovery. In: ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 75–80 (2014)
Li, M., Zhu, H., Gao, Z., Chen, S., Le, Y., Shangqian, H., Ren, K.: All your location are belong to us: breaking mobile social networks for automated user location tracking. In: ACM Mobihoc, pp. 43–52 (2014)
Polakis, I., Argyros, G., Petsios, T., Sivakorn, S., Keromytis, A.D.: Where’s wally? Precise user discovery attacks in location proximity services. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 817–828. ACM (2015)
Xue, M., Ballard, C.L., Liu, K., Nemelka, C.L., Yanqiu, W., Ross, K.W., Qian, H.: You can yak but you can’t hide: localizing anonymous social network users. In: Proceedings of the 2016 Conference on Internet Measurement Conference. ACM (2016)
Xue, M., Liu, Y., Ross, K.W., Qian, H.: I know where you are: thwarting privacy protection in location-based social discovery services. In: 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 179–184 (2015)
Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., Hubaux, J.P.: Hiding in the mobile crowd: location privacy through collaboration. IEEE Trans. Dependable Secure Comput. 11(3), 266–279 (2014)
Wang, R., Xue, M., Liu, K., Qian, H.: Data-driven privacy analytics: a WeChat case study in location-based social networks. In: Xu, K., Zhu, H. (eds.) WASA 2015. LNCS, vol. 9204, pp. 561–570. Springer, Heidelberg (2015). doi:10.1007/978-3-319-21837-3_55
Xue, M., Yang, L., Ross, K.W. et al.: Characterizing user behaviors in location-based find-and-flirt services: anonymity and demographics. Peer-to-Peer Netw. Appl. 1–11 (2016). doi:10.1007/s12083-016-0444-5
Xue, M., Liu, Y., Ross, K.W., Qian, H.: Thwarting location privacy protection in location-based social discovery services. Secur. Comm. Networks. 9, 1496–1508 (2016). doi:10.1002/sec.1438
Peng, J., Meng, Y., Xue, M., Hei, X., Ross, K.W.: Attacks, defenses in location-based social networks: a heuristic number theory approach. In: International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), pp. 64–71, November 2015. doi:10.1109/SocialSec2015.19
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China (No. 61370231), and in part by the Fundamental Research Funds for the Central Universities (No. HUST:2016YXMS303).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Cheng, H., Mao, S., Xue, M., Hei, X. (2016). On the Impact of Location Errors on Localization Attacks in Location-Based Social Network Services. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-49148-6_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49147-9
Online ISBN: 978-3-319-49148-6
eBook Packages: Computer ScienceComputer Science (R0)