Wireless Sensor Network (WSN) is infrastructure- less. This is mainly used for target monitoring, target detection by setting in an ad-hoc style. So, in a wireless network target want to be protected. But the network cannot hide source permanently but it is capable of increasing the safety time. Both data privacy and location privacy are important to WSN security. In the case of data privacy there are many encrypting algorithm to protect data.But it is not possible in the case of source location privacy. When taking source location privacy there is source location privacy and sink location privacy.Source location privacy techniques will collapse generally by tracing back by the attacker.Hiding the source location is a crucial challenge in WSNs since the location of a source sensor gives contextual information about an event. In WSNs, a variety of approaches are utilised to safeguard the source location.One of these methods concealed the source location by using fakesources. Phantom nodes were utilised in another method to shield the source location. Although the current systems operate pretty well with the use of fake sources and phantom nodes.The efficient way to protect source location privacy is using of both phantom nodes and fake nodes.There is determination of fake source to protect from adversary which is chosen by randomly.So determining fake sources by path extension which helps to increase the safety time.PEM is done after the initialfake sources are determined, each of them will choose a newfake source from its neighbor. There by can increase the safety time.Wireless Sensor Network (WSN) is infrastructure- less. This is mainly used for target monitoring, target detection by setting in an ad-hoc style. So, in a wireless network target want to be protected. But the network cannot hide source permanently but it is capable of increasing the safety time. Both data privacy and location privacy are important to WSN security. In the case of data privacy there are many encrypting algorithm to protect data.But it is not possible in the case of source location privacy. When taking source location privacy there is source location privacy and sink location privacy.Source location privacy techniques will collapse generally by tracing back by the attacker.Hiding the source location is a crucial challenge in WSNs since the location of a source sensor gives contextual information about an event. In WSNs, a variety of approaches are utilised to safeguard the source location.One of these methods concealed the source location by using fakesources. Phantom nodes were utilised in another method to shield the source location. Although the current systems operate pretty well with the use of fake sources and phantom nodes.The efficient way to protect source location privacy is using of both phantom nodes and fake nodes.There is determination of fake source to protect from adversary which is chosen by randomly.So determining fake sources by path extension which helps to increase the safety time.PEM is done after the initialfake sources are determined, each of them will choose a newfake source from its neighbor. There by can increase the safety time., {"references":["1.\tM. Bradbury, A. Jhumka and M. Leeke (2018). Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115, 67–81.","2.\tJ. Chen, Z. Lin, Y. Hu and B.Wang (2015). Hiding the source based on limited flooding for sensor networks. Sensors, 15(11), 29129–29148.","3.\tG. Han, X. Miao, H. Wang, M. Guizani and W. Zhang (2019). Cpslp: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multisinks. IEEE Transactions on Vehicular Technology, 68(3), 2739–2750.","4.\tH. Wang, G. Han, W. Zhang, M. Guizani and S. Chan (2019). A probabilistic source location privacy protection scheme in wireless sensor networks. IEEE Transactions on Vehicular Technology, 68(6), 5917– 5927.","5.\tNa Wang, Junsong Fu, Jian Li, Bharat K. Bhargava, \"Source-Location Privacy Protection based on Anonymity Cloud in Wireless Sensor Networks , IEEE Transactions on Information Forensics and Security, 15(2019), 100-114","6.\tOzturk, C.; Zhang, Y.; Trappe, W. Source-location privacy in energy constrained sensor networks routing, In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington,","7.\tDC, USA, 25–29 October 2004; pp. 88–93","8.\tA. Thomason, M. Leeke, M. Bradbury, A. Jhumka, Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2013, pp. 667–674. doi:10.1109/TrustCom.2013.81.","9.\tLong, J., Dong, M., Ota, K. and Liu, A. Achieving source location pri- vacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks. IEEE Access, 2, 2004, pp.633-651.","10.\tRoy, Pradeep Kumar, Jyoti Prakash Singh, Prabhat Kumar, and M. P. Singh. Source location privacy using fake source and phantom routing (FSAPR) technique in wireless sensor networks. Procedia Computer Science 57 (2015): 936-941."]}