Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/MASS.2012.6502516guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

You unlocked the Mt. Everest badge on foursquare! Countering location fraud in Geosocial Networks

Published: 08 October 2012 Publication History

Abstract

GeoSocial Networks (GSNs) are online social networks centered on the location information of their users. Users “check-in” their location and use it to acquire location-based special status (e.g., badges, mayorships) and receive venue dependent rewards. The strategy of rewarding user participation however makes cheating a profitable behavior. In this paper we introduce XACT, a suite of venue-oriented secure location verification mechanisms that enable venues and GSN providers to certify the locations claimed by users. We prove that XACT is correct, secure and easy to use. We validate the need for secure location verification mechanisms by collecting and analyzing data from the most popular GSNs today: 780,000 Foursquare users and 143,000 Gowalla users. Through a proof-of-concept implementation on a Revision C4 BeagleBoard embedded system we show that XACT is easy to deploy and economically viable. We analytically and empirically prove that XACT detects location cheating attacks.

Cited By

View all
  • (2022)Sybil-Based Attacks on Google Maps or How to Forge the Image of City LifeProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3528538(73-84)Online publication date: 16-May-2022
  • (2021)Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing ServicesProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3485888(944-956)Online publication date: 6-Dec-2021
  • (2020)Location Spoofing Detection for Social Network Service using Camera FingerprintProceedings of the 2020 4th International Conference on Vision, Image and Signal Processing10.1145/3448823.3448843(1-6)Online publication date: 9-Dec-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
MASS '12: Proceedings of the 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
October 2012
509 pages
ISBN:9781467324335

Publisher

IEEE Computer Society

United States

Publication History

Published: 08 October 2012

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Sybil-Based Attacks on Google Maps or How to Forge the Image of City LifeProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3528538(73-84)Online publication date: 16-May-2022
  • (2021)Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing ServicesProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3485888(944-956)Online publication date: 6-Dec-2021
  • (2020)Location Spoofing Detection for Social Network Service using Camera FingerprintProceedings of the 2020 4th International Conference on Vision, Image and Signal Processing10.1145/3448823.3448843(1-6)Online publication date: 9-Dec-2020
  • (2016)Defending against Sybil Devices in Crowdsourced Mapping ServicesProceedings of on MobiSys 2016 PhD Forum10.1145/2930056.2933320(3-4)Online publication date: 26-Jun-2016
  • (2016)Defending against Sybil Devices in Crowdsourced Mapping ServicesProceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services10.1145/2906388.2906420(179-191)Online publication date: 20-Jun-2016
  • (2015)Strengthening Authentication with Privacy-Preserving Location Verification of Mobile PhonesProceedings of the 14th ACM Workshop on Privacy in the Electronic Society10.1145/2808138.2808144(37-48)Online publication date: 12-Oct-2015
  • (2015)I Know Where You areProceedings of the 10th ACM Symposium on Information, Computer and Communications Security10.1145/2714576.2714634(567-577)Online publication date: 14-Apr-2015
  • (2014)Venue attacks in location-based social networksProceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis10.1145/2675682.2676395(1-8)Online publication date: 4-Nov-2014
  • (2014)Secure and private proofs for location-based activity summaries in urban areasProceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing10.1145/2632048.2632064(751-762)Online publication date: 13-Sep-2014
  • (2013)The man who was thereProceedings of the 29th Annual Computer Security Applications Conference10.1145/2523649.2523653(19-28)Online publication date: 9-Dec-2013
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media