Skip to main content

2016 | OriginalPaper | Buchkapitel

On the Impact of Location Errors on Localization Attacks in Location-Based Social Network Services

verfasst von : Hanni Cheng, Shiling Mao, Minhui Xue, Xiaojun Hei

Erschienen in: Security, Privacy, and Anonymity in Computation, Communication, and Storage

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Location-based Social Network (LBSN) services, such as People Nearby in WeChat, enable users to discover users within the geographic proximity. Though contemporary LBSN services have adopted various obfuscation techniques to blur the location information, recent research has shown that based on the number theory, one can still accurately pinpoint user locations by strategically placing multiple virtual probes. In this paper, we conducted a comprehensive simulation study to examine the impact of location errors on localization attacks to track target users based on the number theory by using the LBSN services provided by WeChat. Our simulation experiments include four location error models including the exponential model, the Gaussian model, the uniform model, and the Rayleigh model. We improve the one-dimensional and two-dimensional localization algorithms where the location errors exit. Our simulation results demonstrate that the number theory based localization attacks remain effective and efficient in that target users can still be pinpointed with high accuracy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ding, Y., Peddinti, S.T., Ross, K.W.: Beijing stalking from timbuktu: a generic measurement approach for exploiting location-based social discovery. In: ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 75–80 (2014) Ding, Y., Peddinti, S.T., Ross, K.W.: Beijing stalking from timbuktu: a generic measurement approach for exploiting location-based social discovery. In: ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 75–80 (2014)
2.
Zurück zum Zitat Li, M., Zhu, H., Gao, Z., Chen, S., Le, Y., Shangqian, H., Ren, K.: All your location are belong to us: breaking mobile social networks for automated user location tracking. In: ACM Mobihoc, pp. 43–52 (2014) Li, M., Zhu, H., Gao, Z., Chen, S., Le, Y., Shangqian, H., Ren, K.: All your location are belong to us: breaking mobile social networks for automated user location tracking. In: ACM Mobihoc, pp. 43–52 (2014)
3.
Zurück zum Zitat Polakis, I., Argyros, G., Petsios, T., Sivakorn, S., Keromytis, A.D.: Where’s wally? Precise user discovery attacks in location proximity services. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 817–828. ACM (2015) Polakis, I., Argyros, G., Petsios, T., Sivakorn, S., Keromytis, A.D.: Where’s wally? Precise user discovery attacks in location proximity services. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 817–828. ACM (2015)
4.
Zurück zum Zitat Xue, M., Ballard, C.L., Liu, K., Nemelka, C.L., Yanqiu, W., Ross, K.W., Qian, H.: You can yak but you can’t hide: localizing anonymous social network users. In: Proceedings of the 2016 Conference on Internet Measurement Conference. ACM (2016) Xue, M., Ballard, C.L., Liu, K., Nemelka, C.L., Yanqiu, W., Ross, K.W., Qian, H.: You can yak but you can’t hide: localizing anonymous social network users. In: Proceedings of the 2016 Conference on Internet Measurement Conference. ACM (2016)
5.
Zurück zum Zitat Xue, M., Liu, Y., Ross, K.W., Qian, H.: I know where you are: thwarting privacy protection in location-based social discovery services. In: 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 179–184 (2015) Xue, M., Liu, Y., Ross, K.W., Qian, H.: I know where you are: thwarting privacy protection in location-based social discovery services. In: 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 179–184 (2015)
6.
Zurück zum Zitat Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., Hubaux, J.P.: Hiding in the mobile crowd: location privacy through collaboration. IEEE Trans. Dependable Secure Comput. 11(3), 266–279 (2014)CrossRef Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., Hubaux, J.P.: Hiding in the mobile crowd: location privacy through collaboration. IEEE Trans. Dependable Secure Comput. 11(3), 266–279 (2014)CrossRef
7.
Zurück zum Zitat Wang, R., Xue, M., Liu, K., Qian, H.: Data-driven privacy analytics: a WeChat case study in location-based social networks. In: Xu, K., Zhu, H. (eds.) WASA 2015. LNCS, vol. 9204, pp. 561–570. Springer, Heidelberg (2015). doi:10.1007/978-3-319-21837-3_55 CrossRef Wang, R., Xue, M., Liu, K., Qian, H.: Data-driven privacy analytics: a WeChat case study in location-based social networks. In: Xu, K., Zhu, H. (eds.) WASA 2015. LNCS, vol. 9204, pp. 561–570. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-21837-3_​55 CrossRef
8.
Zurück zum Zitat Xue, M., Yang, L., Ross, K.W. et al.: Characterizing user behaviors in location-based find-and-flirt services: anonymity and demographics. Peer-to-Peer Netw. Appl. 1–11 (2016). doi:10.1007/s12083-016-0444-5 Xue, M., Yang, L., Ross, K.W. et al.: Characterizing user behaviors in location-based find-and-flirt services: anonymity and demographics. Peer-to-Peer Netw. Appl. 1–11 (2016). doi:10.​1007/​s12083-016-0444-5
9.
Zurück zum Zitat Xue, M., Liu, Y., Ross, K.W., Qian, H.: Thwarting location privacy protection in location-based social discovery services. Secur. Comm. Networks. 9, 1496–1508 (2016). doi:10.1002/sec.1438 CrossRef Xue, M., Liu, Y., Ross, K.W., Qian, H.: Thwarting location privacy protection in location-based social discovery services. Secur. Comm. Networks. 9, 1496–1508 (2016). doi:10.​1002/​sec.​1438 CrossRef
10.
Zurück zum Zitat Peng, J., Meng, Y., Xue, M., Hei, X., Ross, K.W.: Attacks, defenses in location-based social networks: a heuristic number theory approach. In: International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), pp. 64–71, November 2015. doi:10.1109/SocialSec2015.19 Peng, J., Meng, Y., Xue, M., Hei, X., Ross, K.W.: Attacks, defenses in location-based social networks: a heuristic number theory approach. In: International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), pp. 64–71, November 2015. doi:10.​1109/​SocialSec2015.​19
Metadaten
Titel
On the Impact of Location Errors on Localization Attacks in Location-Based Social Network Services
verfasst von
Hanni Cheng
Shiling Mao
Minhui Xue
Xiaojun Hei
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-49148-6_29