Skip to main content
Top

2019 | OriginalPaper | Chapter

A Location Spoofing Detection Method for Social Networks (Short Paper)

Authors : Chaoping Ding, Ting Wu, Tong Qiao, Ning Zheng, Ming Xu, Yiming Wu, Wenjing Xia

Published in: Collaborative Computing: Networking, Applications and Worksharing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

It is well known that check-in data from location-based social networks (LBSN) can be used to predict human movement. However, there are large discrepancies between check-in data and actual user mobility, because users can easily spoof their location in LBSN. The act of location spoofing refers to intentionally making false location, leading to a negative impact both on the credibility of location-based social networks and the reliability of spatial-temporal data. In this paper, a location spoofing detection method in social networks is proposed. First, Latent Dirichlet Allocation (LDA) model is used to learn the topics of users by mining user-generated microblog information, based on this a similarity matrix associated with the venue is calculated. And the venue visiting probability is computed based on user historical check-in data by using Bayes model. Then, the similarity value and visiting probability is combined to quantize the probability of location spoofing. Experiments on a large scale and real-world LBSN dataset collected from Weibo show that the proposed approach can effectively detect certain types of location spoofing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., Zimmerman, J.: I’m the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2409–2418. ACM (2011) Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., Zimmerman, J.: I’m the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2409–2418. ACM (2011)
2.
go back to reference Patil, S., Norcie, G., Kapadia, A., Lee, A.: Check out where i am!: location-sharing motivations, preferences, and practices. In: CHI 2012 Extended Abstracts on Human Factors in Computing Systems, pp. 1997–2002. ACM (2012) Patil, S., Norcie, G., Kapadia, A., Lee, A.: Check out where i am!: location-sharing motivations, preferences, and practices. In: CHI 2012 Extended Abstracts on Human Factors in Computing Systems, pp. 1997–2002. ACM (2012)
3.
go back to reference He, W., Liu, X., Ren, M.: Location cheating: a security challenge to location-based social network services. In: 2011 31st International Conference on Distributed computing systems (ICDCS), pp. 740–749. IEEE (2011) He, W., Liu, X., Ren, M.: Location cheating: a security challenge to location-based social network services. In: 2011 31st International Conference on Distributed computing systems (ICDCS), pp. 740–749. IEEE (2011)
4.
go back to reference Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285–1292. IEEE (2012) Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285–1292. IEEE (2012)
5.
go back to reference Polakis, I., Volanis, S., Athanasopoulos, E., Markatos, E.P.: The man who was there: validating check-ins in location-based services. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 19–28. ACM (2013) Polakis, I., Volanis, S., Athanasopoulos, E., Markatos, E.P.: The man who was there: validating check-ins in location-based services. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 19–28. ACM (2013)
6.
go back to reference Zhang, Z., et al.: On the validity of geosocial mobility traces. In: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, p. 11. ACM (2013) Zhang, Z., et al.: On the validity of geosocial mobility traces. In: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, p. 11. ACM (2013)
7.
go back to reference Wang, G., Schoenebeck, S.Y., Zheng, H., Zhao, B.Y.: “Will check-in for badges”: understanding bias and misbehavior on location-based social networks. In: ICWSM, pp. 417–426 (2016) Wang, G., Schoenebeck, S.Y., Zheng, H., Zhao, B.Y.: “Will check-in for badges”: understanding bias and misbehavior on location-based social networks. In: ICWSM, pp. 417–426 (2016)
8.
go back to reference Papalexakis, E., Pelechrinis, K., Faloutsos, C.: Spotting misbehaviors in location-based social networks using tensors. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 551–552. ACM (2014) Papalexakis, E., Pelechrinis, K., Faloutsos, C.: Spotting misbehaviors in location-based social networks using tensors. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 551–552. ACM (2014)
9.
go back to reference Zhao, B., Sui, D.Z.: True lies in geospatial big data: detecting location spoofing in social media. Ann. GIS 23(1), 1–14 (2017)CrossRef Zhao, B., Sui, D.Z.: True lies in geospatial big data: detecting location spoofing in social media. Ann. GIS 23(1), 1–14 (2017)CrossRef
10.
11.
go back to reference Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993–1022 (2003)MATH Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993–1022 (2003)MATH
12.
go back to reference Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. Nat. Acad. Sci. 101(suppl 1), 5228–5235 (2004)CrossRef Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. Nat. Acad. Sci. 101(suppl 1), 5228–5235 (2004)CrossRef
13.
go back to reference Goldberg, Y., Levy, O.: word2vec explained: deriving Mikolov et al.’s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722 (2014) Goldberg, Y., Levy, O.: word2vec explained: deriving Mikolov et al.’s negative-sampling word-embedding method. arXiv preprint arXiv:​1402.​3722 (2014)
Metadata
Title
A Location Spoofing Detection Method for Social Networks (Short Paper)
Authors
Chaoping Ding
Ting Wu
Tong Qiao
Ning Zheng
Ming Xu
Yiming Wu
Wenjing Xia
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-12981-1_9