{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:39Z","timestamp":1740149019620,"version":"3.37.3"},"reference-count":14,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Key Laboratory of Network Assessment Technology","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}]},{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Key Laboratory of Network Security and Protection Technology","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100009996","name":"Shaanxi Province Postdoctoral Science Foundation","doi-asserted-by":"crossref","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}],"id":[{"id":"10.13039\/501100009996","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Hong Kong GRF","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}]},{"name":"HKPolyU Research Grants (G-YBJX) of China","award":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"],"award-info":[{"award-number":["2016YFB0801004","2016QY07405","61602371","61221063","61202396","2015M582663","2016JQ6034","PolyU 152279\/16E"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>Proximity-based apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, proximity-based nearby-stranger (NS) apps that encourage people to make friends with nearby strangers have gained popularity recently. As another typical type of proximity-based apps, some ridesharing (RS) apps allowing drivers to search nearby passengers and get their ridesharing requests also become popular due to their contribution to economy and emission reduction. In this paper, we concentrate on the location privacy of proximity-based mobile apps. By analyzing the communication mechanism, we find that many apps of this type are vulnerable to large-scale location spoofing attack (LLSA). We accordingly propose three approaches to performing LLSA. To evaluate the threat of LLSA posed to proximity-based mobile apps, we perform real-world case studies against an NS app named Weibo and an RS app called Didi. The results show that our approaches can effectively and automatically collect a huge volume of users\u2019 locations or travel records, thereby demonstrating the severity of LLSA. We apply the LLSA approaches against nine popular proximity-based apps with millions of installations to evaluate the defense strength. We finally suggest possible countermeasures for the proposed attacks.<\/jats:p>","DOI":"10.1155\/2018\/3182402","type":"journal-article","created":{"date-parts":[[2018,2,14]],"date-time":"2018-02-14T23:40:16Z","timestamp":1518651616000},"page":"1-22","source":"Crossref","is-referenced-by-count":3,"title":["Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing"],"prefix":"10.1155","volume":"2018","author":[{"given":"Shuang","family":"Zhao","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0934-5035","authenticated-orcid":true,"given":"Xiaobo","family":"Ma","sequence":"additional","affiliation":[{"name":"MOE KLINNS Lab, Xi\u2019an Jiaotong University, Xi\u2019an, China"}]},{"given":"Bo","family":"Bai","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yankang","family":"Zhao","sequence":"additional","affiliation":[{"name":"MOE KLINNS Lab, Xi\u2019an Jiaotong University, Xi\u2019an, China"}]},{"given":"Wei","family":"Zou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zeming","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong"}]},{"given":"Xinliang","family":"Qiu","sequence":"additional","affiliation":[{"name":"Beijing One Scorpion Cyber Security Co., Ltd., Beijing, China"}]}],"member":"311","reference":[{"year":"2012","key":"3"},{"year":"Aug 2012","key":"5"},{"year":"2009","key":"6"},{"year":"1995","key":"8"},{"year":"2007","key":"9"},{"volume":"501","year":"1995","key":"10"},{"year":"2012","key":"16"},{"key":"17"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2465375"},{"volume-title":"Floating car data from smartphones: What google and waze know about you and how hackers can control traffic","year":"2013","key":"27"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1080\/17489720801941789"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.95"},{"key":"39","first-page":"81","volume":"2011","year":"2011","journal-title":"ICWSM"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.05.009"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/3182402.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/3182402.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/3182402.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T00:59:09Z","timestamp":1589849949000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/3182402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":14,"alternative-id":["3182402","3182402"],"URL":"https:\/\/doi.org\/10.1155\/2018\/3182402","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018]]}}}