@InProceedings{Laikin:2016:TowardsFakeSources, author = "Laikin, Joanna F. and Bradbury, Matthew and Gu, Chen and Leeke, Matthew", booktitle = "15th IEEE International Conference on Communication Systems (ICCS'16)", title = "{Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources}", year = "2016", month = "14--16 December", pages = "1--6", abstract = "Wireless sensor networks (WSNs) are regularly used in asset monitoring applications, where the location of an asset or assets must be kept private. Providing location privacy for such an asset is tantamount to protecting the location of a source node from an attacker who is attempting to locate it. Although no solution exists to provide source location privacy over an extended period, it has been shown that attackers can be sufficiently inhibited by prominent approaches that use either a phantom node, via which protocol messages are routed, or nodes assigned to be fake sources, each of which then broadcast fake messages. However, the applicability of fake source approaches to networks where location privacy must be maintained for multiple sources has yet to be considered. This paper addresses this issue by analysing a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources.", doi = "10.1109/ICCS.2016.7833572", file = ":ICCS2016.pdf:PDF", keywords = "Algorithm design and analysis;Energy consumption;Monitoring;Position measurement;Privacy;Safety;Wireless sensor networks;Context Privacy;Fake Source;Location;Multiple Sources;Wireless Sensor Networks" }