Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/79775
Title: Exploiting proximity-based mobile apps for large-scale location privacy probing
Authors: Zhao, S
Luo, XP 
Ma, XB
Bai, B
Zhao, YK
Zou, W
Yang, ZM
Au, MH 
Qiu, XL
Issue Date: 2018
Publisher: Hindawi
Source: Security and communication networks, 2018, UNSP 3182402 How to cite?
Journal: Security and communication networks 
Abstract: Proximity-based apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, proximity-based nearby-stranger (NS) apps that encourage people to make friends with nearby strangers have gained popularity recently. As another typical type of proximity-based apps, some ridesharing (RS) apps allowing drivers to search nearby passengers and get their ridesharing requests also become popular due to their contribution to economy and emission reduction. In this paper, we concentrate on the location privacy of proximity-based mobile apps. By analyzing the communication mechanism, we find that many apps of this type are vulnerable to large-scale location spoofing attack (LLSA). We accordingly propose three approaches to performing LLSA. To evaluate the threat of LLSA posed to proximity-based mobile apps, we perform real-world case studies against an NS app named Weibo and an RS app called Didi. The results show that our approaches can effectively and automatically collect a huge volume of users' locations or travel records, thereby demonstrating the severity of LLSA. We apply the LLSA approaches against nine popular proximity-based apps with millions of installations to evaluate the defense strength. We finally suggest possible countermeasures for the proposed attacks.
URI: http://hdl.handle.net/10397/79775
ISSN: 1939-0114
EISSN: 1939-0122
DOI: 10.1155/2018/3182402
Appears in Collections:Journal/Magazine Article

Access
View full-text via PolyU eLinks SFX Query
Show full item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.