Where Are WeChat Users: A Geolocation Method Based on User Missequence State Analysis

WeChat has earned more than one billion users worldwide. Research on the geolocation of WeChat users can not only discover the location of malicious users but also verify the validity of user privacy protection strategies. However, existing methods are susceptible to WeChat’s location confusion strategies, resulting in intolerable geolocating errors. In this article, a WeChat user geolocation method based on user missequence state analysis (MSAG) is proposed. Different from the existing methods which usually rely on the relationship between reported and actual distances of nearby users, MSAG utilizes the relation between user order and actual distances to geolocate the target. By statistical analysis of sequence changes of nearby users under different actual distances, the distance range that causes nearby users missequence is determined. During geolocation, the distance range of the target is delimited by checking the missequence state of the target and a user with a known location. Finally, we discuss trilateration strategies for different abnormal situations. Experimental results show that MASG can achieve high-precision geolocation of WeChat users, the average error is less than 50 m, and 72% of geolocating errors are within 60 m; compared with existing typical algorithms, the average error is reduced by 23.7%–50.7%.

[1]  Zhu Wang,et al.  Friendship Prediction Based on the Fusion of Topology and Geographical Features in LBSN , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[2]  Claudio Bettini,et al.  A Practical Location Privacy Attack in Proximity Services , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.

[3]  Minhui Xue,et al.  On the Impact of Location Errors on Localization Attacks in Location-Based Social Network Services , 2016, SpaCCS.

[4]  Keith W. Ross,et al.  I know where you are: Thwarting privacy protection in location-based social discovery services , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[5]  Jiming Chen,et al.  Social Discovery: Exploring the Correlation Among Three-Dimensional Social Relationships , 2015, IEEE Transactions on Computational Social Systems.

[6]  Fan Zhao,et al.  Geolocating a WeChat user based on the relation between reported and actual distance , 2018, Int. J. Distributed Sens. Networks.

[7]  Yan Meng,et al.  Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach , 2015, 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec).

[8]  Yuan Ding,et al.  Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social Discovery , 2014, SPSM@CCS.

[9]  Ben Y. Zhao,et al.  Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.

[10]  Yutaka Arakawa,et al.  Effective Trilateration-based Indoor Localization Method Utilizing Active Control of Lighting Devices , 2020 .

[11]  Haojin Zhu,et al.  All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.

[12]  Minhui Xue,et al.  Revisiting Localization Attacks in Mobile App People-Nearby Services , 2017, SpaCCS.

[13]  Ying Zhang,et al.  Robust distributed node localization with error management , 2006, MobiHoc '06.

[14]  Xiaohui Liang,et al.  Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.

[15]  Fengyuan Xu,et al.  A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Yu Zheng,et al.  Location-Based Social Networks: Users , 2011, Computing with Spatial Trajectories.

[17]  Xiping Liu,et al.  POI Recommendation of Location-Based Social Networks Using Tensor Factorization , 2018, 2018 19th IEEE International Conference on Mobile Data Management (MDM).

[18]  Rongrong Wang,et al.  Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks , 2015, WASA.

[19]  Yue Wang,et al.  Co-location social networks: Linking the physical world and cyberspace , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[20]  Masatoshi Yoshikawa,et al.  Your neighbors are my spies: Location and other privacy concerns in dating apps , 2016, 2016 18th International Conference on Advanced Communication Technology (ICACT).