scholarly journals Breaking Users’ Mobile Phone Number Based on Geographical Location: A Case Study with YY

Information ◽  
2018 ◽  
Vol 9 (8) ◽  
pp. 200
Author(s):  
Hongzhou Yue ◽  
Huaping Guo ◽  
Xingpo Ma

Geographical location and mobile phone numbers are important parts of user privacy and lots of studies have been working on the privacy leakage problems of these two aspects. However, no researchers have ever studied the security problems that can be caused by the interaction between them. We show a new form of network attack in this paper by making full use of the relationship between them; namely, we try to break a user’s mobile phone number with the aid of a user’s geographical location that has been broken. We study the phenomenon of exposing a user’s geographical location and parts of their phone number that exist in a series of popular software products, and the possibility of the user’s mobile phone number to be broken is discussed. We choose one of the software (the largest entertainment webcast platform in China—YY) as the research object. First, taking advantage of a series of security vulnerabilities that exist in YY, a user’s accurate geographical location is broken by the trilateration localization algorithm. Then, their mobile phone number attribution can be inferred according to their geographical location. Next, a mobile phone number test set is constructed according to the mobile phone segment allocation made by the three carriers (telecommunication operators) and the exposed parts of the user’s phone number. Finally, a brute-force method is used to break the user’s mobile phone number. The great effect of a user’s geographical location on breaking a mobile phone number is proved by experiments, and security precaution suggestions are given at the end of the paper.

2014 ◽  
Vol 631-632 ◽  
pp. 618-622
Author(s):  
Mei Hui Xu ◽  
Ya Qi Wang ◽  
Long Xi Xu

The 3G era, the smartphone market share is higher and higher. The mobile phone based on the Android platform accounts for more than half of the market share. Once the user lost the phone, it is not only hard to find, but also to face important data leak and privacy security issues. So, the demand to provide mobile phone found function appears increasingly urgent. If the mobile phone is lost, this platform can get information on replaced mobile phone SIM card to boot for the first time, and upload the new mobile phone number and current phone location information to the server. It provides users with inquiry function on the web in order to achieve the purpose of tracking the lost mobile phone. The application prospect of this study is widespread, not only limited to track the missing phone, also involves other position service in the life need. The relevant mobile localization algorithm is detailed in this paper.


2021 ◽  
Vol 13 (24) ◽  
pp. 13713
Author(s):  
Xuesong Gao ◽  
Hui Wang ◽  
Lun Liu

People’s movement trace harvested from mobile phone signals has become an important new data source for studying human behavior and related socioeconomic topics in social science. With growing concern about privacy leakage of big data, mobile phone data holders now tend to provide aggregate-level mobility data instead of individual-level data. However, most algorithms for measuring mobility are based on individual-level data—how the existing mobility algorithms can be properly transformed to apply on aggregate-level data remains undiscussed. This paper explores the transformation of individual data-based mobility metrics to fit with grid-aggregate data. Fifteen candidate metrics measuring five indicators of mobility are proposed and the most suitable one for each indicator is selected. Future research about aggregate-level mobility data may refer to our analysis to assist in the selection of suitable mobility metrics.


2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Mostafa Yavari ◽  
Masoumeh Safkhani ◽  
Saru Kumari ◽  
Sachin Kumar ◽  
Chien-Ming Chen

Communication security between IoT devices is a major concern in this area, and the blockchain has raised hopes that this concern will be addressed. In the blockchain concept, the majority or even all network nodes check the validity and accuracy of exchanged data before accepting and recording them, whether this data is related to financial transactions or measurements of a sensor or an authentication message. In evaluating the validity of an exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices information with distributed attitude a new authentication protocol based on blockchain is proposed and it is claimed that this protocol satisfies user privacy preserving and security. However, in this paper, we show that this protocol has security vulnerabilities against secret disclosure, replay, traceability, and Token reuse attacks with the success probability of 1 and constant complexity of also 1. We also proposed an improved blockchain-based authentication protocol (IBCbAP) that has security properties such as secure access management and anonymity. We implemented IBCbAP using JavaScript programming language and Ethereum local blockchain. We also proved IBCbAP’s security both informally and formally through the Scyther tool. Our comparisons showed that IBCbAP could provide suitable security along with reasonable cost.


2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Konglin Zhu ◽  
Xiaoman He ◽  
Bin Xiang ◽  
Lin Zhang ◽  
Achille Pattavina

With the rapid proliferation of mobile devices, explosive mobile applications (apps) are developed in the past few years. However, the functions of mobile apps are varied and the designs of them are not well understood by end users, especially the activities and functions related to user privacy. Therefore, understanding how much danger of mobile apps with respect to privacy violation to mobile users is becomes a critical issue when people use mobile devices. In this paper, we evaluate the mobile app privacy violation of mobile users by computing the danger coefficient. In order to help people reduce the privacy leakage, we combine both the user preference to mobile apps and the privacy risk of apps and propose a mobile app usage recommendation method named AppURank to recommend the secure apps with the same function as the “dangerous” one for people use. The evaluation results show that our recommendation can reduce the privacy leakage by 50%.


Author(s):  
B. I. Bakare ◽  
A. Umoru ◽  
S. Orike

This paper is an improved alcohol level sensing system, that measures alcohol intakes, display percentage of alcohol, sound an alarm if alcohol percentage is above the preset thresh hood, documents offender’s data via keypad and transmit same data to a central server with SIM800 GSM/GPRS module via short messaging services for proper documentation and persecution purpose. Here we used an alcohol sensor circuit along with LCD display, a buzzer alarm, ATmega328 microcontroller, keypad and GSM sim module. The system first uses the alcohol sensor in order to detect the alcohol. The sensor provides analog input. These analog inputs are sent to the microcontroller for further processing. The microcontroller calculates the percentage of alcohol from the analog input received and displays the same on the LCD screen. The device was observed to sound an alarm when the percentage of alcohol exceeded the preset value of 0.05 g/mL. Through the use of a 4x4 keypad, documentation of the driver license serial number, the car plate number and name of the driver was achieved. These documented details of the erring driver were transmitted to a preprogrammed mobile phone number via SMS using the SIM800 GSM/GPRS module.


Sign in / Sign up

Export Citation Format

Share Document