Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing

  • Zhao S
  • Luo X
  • Ma X
  • et al.
Citations of this article
Mendeley users who have this article in their library.


Proximity-based apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, proximity-based nearby-stranger (NS) apps that encourage people to make friends with nearby strangers have gained popularity recently. As another typical type of proximity-based apps, some ridesharing (RS) apps allowing drivers to search nearby passengers and get their ridesharing requests also become popular due to their contribution to economy and emission reduction. In this paper, we concentrate on the location privacy of proximity-based mobile apps. By analyzing the communication mechanism, we find that many apps of this type are vulnerable to large-scale location spoofing attack (LLSA). We accordingly propose three approaches to performing LLSA. To evaluate the threat of LLSA posed to proximity-based mobile apps, we perform real-world case studies against an NS app named Weibo and an RS app called Didi. The results show that our approaches can effectively and automatically collect a huge volume of users’ locations or travel records, thereby demonstrating the severity of LLSA. We apply the LLSA approaches against nine popular proximity-based apps with millions of installations to evaluate the defense strength. We finally suggest possible countermeasures for the proposed attacks.




Zhao, S., Luo, X., Ma, X., Bai, B., Zhao, Y., Zou, W., … Qiu, X. (2018). Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. Security and Communication Networks, 2018, 1–22. https://doi.org/10.1155/2018/3182402

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free