skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

A Location Privacy Attack Based on the Location Sharing Mechanism with Erroneous Distance in Geosocial Networks

Sensors (Basel, Switzerland), 2020-02, Vol.20 (3), p.918 [Peer Reviewed Journal]

2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2020 by the authors. 2020 ;ISSN: 1424-8220 ;EISSN: 1424-8220 ;DOI: 10.3390/s20030918 ;PMID: 32050454

Full text available

Citations Cited by
  • Title:
    A Location Privacy Attack Based on the Location Sharing Mechanism with Erroneous Distance in Geosocial Networks
  • Author: Lin, Tu-Liang ; Chang, Hong-Yi ; Li, Sheng-Lin
  • Subjects: Accuracy ; Algorithms ; Cellular telephones ; geosocial networks ; Global positioning systems ; GPS ; Inference ; Localization ; location privacy ; location sharing mechanism ; Location-based services ; Privacy ; Social networks
  • Is Part Of: Sensors (Basel, Switzerland), 2020-02, Vol.20 (3), p.918
  • Description: Geographical social networks (GSN) is an emerging research area. For example, Foursquare, Yelp, and WeChat are all well-known service providers in this field. These applications are also known as location-based services (LBS). Previous studies have suggested that these location-based services may expose user location information. In order to ensure the privacy of the user's location data, the service provider may provide corresponding protection mechanisms for its applications, including spatial cloaking, fuzzy location information, etc., so that the user's real location cannot be easily cracked. It has been shown that if the positioning data provided by the user is not accurate enough, it is still difficult for an attacker to obtain the user's true location. Taking this factor into consideration, our attack method is divided into two stages for the entire attack process: (1) Search stage: cover the area where the targeted user is located with unit discs, and then calculate the minimum dominating set. Use the triangle positioning method to find the minimum precision disc. (2) Inference phase: Considering the existence of errors, an Error-Adjusted Space Partition Attack Algorithm (EASPAA) was proposed during the inference phase. Improved the need for accurate distance information to be able to derive the user's true location. In this study, we focus on the Location Sharing Mechanism with Maximal Coverage Limit to implement the whole attack. Experimental results show that the proposed method still can accurately infer the user's real location even when there is an error in the user's location information.
  • Publisher: Switzerland: MDPI AG
  • Language: English
  • Identifier: ISSN: 1424-8220
    EISSN: 1424-8220
    DOI: 10.3390/s20030918
    PMID: 32050454
  • Source: PubMed
    Geneva Foundation Free Medical Journals at publisher websites
    AUTh Library subscriptions: ProQuest Central
    ROAD
    Directory of Open Access Journals: DOAJ

Searching Remote Databases, Please Wait