@InProceedings{Jhumka:2012:TowardsUnderstandingSource, author = "Jhumka, Arshad and Bradbury, Matthew and Leeke, Matthew", booktitle = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", title = "{Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources}", year = "2012", month = "25--27 June", pages = "760--768", abstract = "Source location privacy is becoming an increasingly important property in wireless sensor network applications, such as asset monitoring. The original source location problem is to protect the location of a source in a wireless sensor network from a single distributed eavesdropper attack. Several techniques have been proposed to address the source location problem, where most of these apply some form of traffic analysis and engineering to provide enhanced privacy. One such technique, namely fake sources, has proved to be promising for providing source location privacy. Recent research has concentrated on investigating the efficiency of fake source approaches under various attacker models. In this paper, we (i) provide a novel formalisation of the source location privacy problem, (ii) prove the source location privacy problem to be NP-complete, and (iii) provide a heuristic that yields an optimal level of privacy under appropriate parameterisation. Crucially, the results presented show that fake sources can provide a high, sometimes optimal, level of privacy.", doi = "10.1109/TrustCom.2012.281", file = ":TrustCom2012.pdf:PDF", keywords = "computational complexity;data privacy;telecommunication security;wireless sensor networks;NP-complete problem;asset monitoring;attacker models;fake sources approach;original source location problem;privacy optimal level;single distributed eavesdropper attack;source location privacy problem formalisation;traffic analysis;wireless sensor network applications;Monitoring;Position measurement;Privacy;Protocols;Routing;Wireless communication;Wireless sensor networks;Complexity;Distributed Eavesdropper;Fake Source;Security;Source Location Privacy;Wireless Sensor Networks" }