Skip to main content

A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10581))

Included in the following conference series:

  • 2109 Accesses

Abstract

The accuracy of existing geolocation methods for WeChat users depends on the stable correspondence between reported distance and actual distance. In view of the difficulty to pinpoint users’ location in real-world due to WeChat location protection strategy, a WeChat User geolocating Algorithm based on reported and actual distance relation analysis is proposed. Firstly, statistical characteristics of the relation between reported distance and actual distance are obtained based on collected data. Secondly, optimization parameters are selected based on these characteristics to determine the space where the target user is located. Finally, stepwise strategies are taken to improve the accuracy rate of space partition. Experimental results show that, on the premise that target users can be discovered, the proposed algorithm could achieve higher accuracy compared with the classical space partition based algorithm and the heuristic number theory based algorithm. The highest geolocating accuracy is within 10 m and 56% of geolocation results are within 60 m.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: Proceedings of the International Conference on World Wide Web, pp. 591–600. ACM, Raleigh (2010)

    Google Scholar 

  2. Nemelka, C.L., Ballard, C.L., Liu, K., Xue, M., Ross, K.W.: You can yak but you can’t hide. In: Proceedings of the ACM Conference on Online Social Networks, p. 99. ACM, Stanford (2015)

    Google Scholar 

  3. Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H., Zhao, B.Y.: Whispers in the dark: analysis of an anonymous social network. In: Proceedings of the Internet Measurement Conference, pp. 137–150. ACM, Vancouver (2014)

    Google Scholar 

  4. Zheng, Y.: Location-based social networks: users. In: Zheng, Y., Zhou, X. (eds.) Computing with Spatial Trajectories, pp. 243–276. Springer, New York (2011). doi:10.1007/978-1-4614-1629-6_8

    Chapter  Google Scholar 

  5. Hoang, N.P., Asano, Y., Yoshikawa, M.: Your neighbors are my spies: location and other privacy concerns in dating apps. In: Proceedings of the 18th International Conference on Advanced Communication Technology, pp. 715–721. IEEE, PyeongChang (2016)

    Google Scholar 

  6. Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., Hubaux, J.: Hiding in the mobile crowd: location privacy through collaboration. IEEE Trans. Dependable Secure Comput. 11(3), 266–279 (2014)

    Article  Google Scholar 

  7. Xue, M., Liu, Y., Ross, K.W., Qian, H.: I know where you are: thwarting privacy protection in location-based social discovery services. In: Proceedings of the IEEE Conference on Computer Communications Workshops, pp. 179–184. IEEE, Hong Kong (2015)

    Google Scholar 

  8. Peng, J., Meng, Y., Xue, M., Hei, X., Ross, K.W.: Attacks and defenses in location-based social networks: a heuristic number theory approach. In: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, pp. 64–71. IEEE, Hangzhou (2015)

    Google Scholar 

  9. Cheng, H., Mao, S., Xue, M., Hei, X.: On the impact of location errors on localization attacks in location-based social network services. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10066, pp. 343–357. Springer, Cham (2016). doi:10.1007/978-3-319-49148-6_29

    Google Scholar 

  10. Ding, Y., Peddinti, S.T., Ross, K.W.: Stalking Beijing from Timbuktu: a generic measurement approach for exploiting location-based social discovery. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 75–80. ACM, Scottsdale (2014)

    Google Scholar 

  11. Li, M., Zhu, H., Gao, Z., Chen, S., Ren, K., Yu, L., Hu, S.: All your location are belong to us: breaking mobile social networks for automated user location tracking. In: Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, pp. 43–52. ACM, Philadelphia (2014)

    Google Scholar 

  12. Polakis, I., Argyros, G., Petsios, T., Sivakorn, S., Keromytis, A.D.: Where’s Wally? Precise user discovery attacks in location proximity services. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 817–828. ACM, Denver (2015)

    Google Scholar 

  13. Wang, R., Xue, M., Liu, K., Qian, H.: Data-driven privacy analytics: a WeChat case study in location-based social networks. In: Xu, K., Zhu, H. (eds.) WASA 2015. LNCS, vol. 9204, pp. 561–570. Springer, Cham (2015). doi:10.1007/978-3-319-21837-3_55

    Chapter  Google Scholar 

Download references

Acknowledgment

The work presented in this paper is supported by the National Natural Science Foundation of China (No. U1636219, 61379151, 61401512, 61572052), the National Key R&D Program of China (No. 2016YFB0801303, 2016QY01W0105) and the Key Technologies R&D Program of Henan Province (No. 162102210032).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangyang Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Shi, W., Luo, X., Zhao, F., Peng, Z., Gan, Y. (2017). A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69471-9_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69470-2

  • Online ISBN: 978-3-319-69471-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics