Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ICDCS.2011.42guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Location Cheating: A Security Challenge to Location-Based Social Network Services

Published: 20 June 2011 Publication History
  • Get Citation Alerts
  • Abstract

    Location-based mobile social network services such as foursquare and Gowalla have grown exponentially over the past several years. These location-based services utilize the geographical position to enrich user experiences in a variety of contexts, including location-based searching and location-based mobile advertising. To attract more users, the location-based mobile social network services provide real-world rewards to the user, when a user checks in at a certain venue or location. This gives incentives for users to cheat on their locations. In this paper, we investigate the threat of location cheating attacks, find the root cause of the vulnerability, and outline the possible defending mechanisms. We use foursquare as an example to introduce a novel location cheating attack, which can easily pass the current location verification mechanism (e.g., cheater code of foursquare). We also crawl the foursquare website. By analyzing the crawled data, we show that automated large scale cheating is possible. Through this paper, we aim to call attention to location cheating in mobile social network services and provide insights into the defending mechanisms.

    Cited By

    View all
    • (2023)Inferring Real Mobility in Presence of Fake Check-ins DataACM Transactions on Intelligent Systems and Technology10.1145/3604941Online publication date: 26-Sep-2023
    • (2021)OneNet-based Smart Classroom Design for Effective Teaching Management2021 4th International Conference on Information Systems and Computer Aided Education10.1145/3482632.3487507(2746-2751)Online publication date: 24-Sep-2021
    • (2020)Risk-based Authentication Based on Network Latency ProfilingProceedings of the 13th ACM Workshop on Artificial Intelligence and Security10.1145/3411508.3421377(105-115)Online publication date: 13-Nov-2020
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ICDCS '11: Proceedings of the 2011 31st International Conference on Distributed Computing Systems
    June 2011
    923 pages
    ISBN:9780769543642

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 20 June 2011

    Author Tags

    1. Location cheating
    2. Location-based services
    3. Online mobile social networks

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Inferring Real Mobility in Presence of Fake Check-ins DataACM Transactions on Intelligent Systems and Technology10.1145/3604941Online publication date: 26-Sep-2023
    • (2021)OneNet-based Smart Classroom Design for Effective Teaching Management2021 4th International Conference on Information Systems and Computer Aided Education10.1145/3482632.3487507(2746-2751)Online publication date: 24-Sep-2021
    • (2020)Risk-based Authentication Based on Network Latency ProfilingProceedings of the 13th ACM Workshop on Artificial Intelligence and Security10.1145/3411508.3421377(105-115)Online publication date: 13-Nov-2020
    • (2019)Publish or Drop Traffic Event Alerts? Quality-aware Decision Making in Participatory Sensing-based Vehicular CPSACM Transactions on Cyber-Physical Systems10.1145/33214804:1(1-28)Online publication date: 2-Nov-2019
    • (2018)Motivations and practices for cheating in Pokémon GOProceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services10.1145/3229434.3229466(1-13)Online publication date: 3-Sep-2018
    • (2017)Mobile social networksComputer Communications10.1016/j.comcom.2016.11.006100:C(1-19)Online publication date: 1-Mar-2017
    • (2016)Location corroborations by mobile devices without tracesProceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems10.1145/2996913.2997010(1-4)Online publication date: 31-Oct-2016
    • (2016)Defending against Sybil Devices in Crowdsourced Mapping ServicesProceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services10.1145/2906388.2906420(179-191)Online publication date: 20-Jun-2016
    • (2015)Strengthening Authentication with Privacy-Preserving Location Verification of Mobile PhonesProceedings of the 14th ACM Workshop on Privacy in the Electronic Society10.1145/2808138.2808144(37-48)Online publication date: 12-Oct-2015
    • (2015)Proximity Based Security For Location Based ServicesProceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015)10.1145/2743065.2743120(1-5)Online publication date: 6-Mar-2015
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media