Skip to main content

A Location Spoofing Detection Method for Social Networks (Short Paper)

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2018)

Abstract

It is well known that check-in data from location-based social networks (LBSN) can be used to predict human movement. However, there are large discrepancies between check-in data and actual user mobility, because users can easily spoof their location in LBSN. The act of location spoofing refers to intentionally making false location, leading to a negative impact both on the credibility of location-based social networks and the reliability of spatial-temporal data. In this paper, a location spoofing detection method in social networks is proposed. First, Latent Dirichlet Allocation (LDA) model is used to learn the topics of users by mining user-generated microblog information, based on this a similarity matrix associated with the venue is calculated. And the venue visiting probability is computed based on user historical check-in data by using Bayes model. Then, the similarity value and visiting probability is combined to quantize the probability of location spoofing. Experiments on a large scale and real-world LBSN dataset collected from Weibo show that the proposed approach can effectively detect certain types of location spoofing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://weibo.com/.

  2. 2.

    http://meituan.com/.

References

  1. Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., Zimmerman, J.: I’m the mayor of my house: examining why people use foursquare-a social-driven location sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2409–2418. ACM (2011)

    Google Scholar 

  2. Patil, S., Norcie, G., Kapadia, A., Lee, A.: Check out where i am!: location-sharing motivations, preferences, and practices. In: CHI 2012 Extended Abstracts on Human Factors in Computing Systems, pp. 1997–2002. ACM (2012)

    Google Scholar 

  3. He, W., Liu, X., Ren, M.: Location cheating: a security challenge to location-based social network services. In: 2011 31st International Conference on Distributed computing systems (ICDCS), pp. 740–749. IEEE (2011)

    Google Scholar 

  4. Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285–1292. IEEE (2012)

    Google Scholar 

  5. Polakis, I., Volanis, S., Athanasopoulos, E., Markatos, E.P.: The man who was there: validating check-ins in location-based services. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 19–28. ACM (2013)

    Google Scholar 

  6. Zhang, Z., et al.: On the validity of geosocial mobility traces. In: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, p. 11. ACM (2013)

    Google Scholar 

  7. Wang, G., Schoenebeck, S.Y., Zheng, H., Zhao, B.Y.: “Will check-in for badges”: understanding bias and misbehavior on location-based social networks. In: ICWSM, pp. 417–426 (2016)

    Google Scholar 

  8. Papalexakis, E., Pelechrinis, K., Faloutsos, C.: Spotting misbehaviors in location-based social networks using tensors. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 551–552. ACM (2014)

    Google Scholar 

  9. Zhao, B., Sui, D.Z.: True lies in geospatial big data: detecting location spoofing in social media. Ann. GIS 23(1), 1–14 (2017)

    Article  Google Scholar 

  10. Lin, J.: Divergence measures based on the Shannon entropy. IEEE Trans. Inf. Theory 37, 145–151 (1991)

    Article  MathSciNet  Google Scholar 

  11. Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993–1022 (2003)

    MATH  Google Scholar 

  12. Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. Nat. Acad. Sci. 101(suppl 1), 5228–5235 (2004)

    Article  Google Scholar 

  13. Goldberg, Y., Levy, O.: word2vec explained: deriving Mikolov et al.’s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722 (2014)

Download references

Acknowledgment

This work is supported by the cyberspace security Major Program in National Key Research and Development Plan of China under grant 2016YFB0800201, Natural Science Foundation of China under grants 61572165 and 61702150, State Key Program of Zhejiang Province Natural Science Foundation of China under grant LZ15F020003, Key Research and Development Plan Project of Zhejiang Province under grants 2017C01062 and 2017C01065, and the Scientific Research fund of Zhejiang Provincial Education Department under grant Y201737924, and Zhejiang Provincial Natural Science Foundation of China under Grant No. LGG18F020015.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ding, C. et al. (2019). A Location Spoofing Detection Method for Social Networks (Short Paper). In: Gao, H., Wang, X., Yin, Y., Iqbal, M. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 268. Springer, Cham. https://doi.org/10.1007/978-3-030-12981-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12981-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12980-4

  • Online ISBN: 978-3-030-12981-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics