@InProceedings{Thomason:2013:EvaluatingImpactBroadcast, author = "Thomason, Alasdair and Leeke, Matthew and Bradbury, Matthew and Jhumka, Arshad", booktitle = "12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", title = "{Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy}", year = "2013", month = "16--18 July", pages = "667--674", abstract = "Providing source location privacy has become a relevant issue for protocols used in the context of wireless sensor networks. In particular, where an asset is monitored using a wireless sensor network it is often the case that the location of the asset being monitored should be concealed from those eavesdropping on the network. The use of fake sources represents an approach to addressing the source location privacy problem. This paper explores practical factors for the configuration and application of fake source protocols, with a focus on the interplay between the broadcast rates of sensor nodes, message collisions and achieved privacy. Combined with existing work in energy efficient fake source protocols, these contributions evidence the existence of an effective range of broadcast rates for fake source protocols.", doi = "10.1109/TrustCom.2013.81", file = ":TrustCom2013.pdf:PDF", keywords = "protocols;telecommunication security;wireless sensor networks;broadcast rates;collisions;eavesdropping;energy efficient fake source protocols;message collisions;sensor nodes;source location privacy problem;wireless sensor networks;Context;Monitoring;Position measurement;Privacy;Protocols;Safety;Wireless sensor networks;Collisions;Distributed Eavesdropper;Fake Source;Security;Source Location Privacy;Wireless Sensor Networks" }