{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:53:14Z","timestamp":1762505594890,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2010,5,4]],"date-time":"2010-05-04T00:00:00Z","timestamp":1272931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.<\/jats:p>","DOI":"10.3390\/s100504577","type":"journal-article","created":{"date-parts":[[2010,5,4]],"date-time":"2010-05-04T11:18:03Z","timestamp":1272971883000},"page":"4577-4601","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey"],"prefix":"10.3390","volume":"10","author":[{"given":"Rabindra","family":"Bista","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Chonbuk National University, Chonju, Chonbuk 561-756, Korea"}]},{"given":"Jae-Woo","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Chonbuk National University, Chonju, Chonbuk 561-756, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2010,5,4]]},"reference":[{"key":"ref_1","unstructured":"Karl, H., and Willig, A. (2003). A Short Survey of Wireless Sensor Networks, Technical University of Berlin. TKN Technical Report TKN-03-018;."},{"key":"ref_2","unstructured":"R\u00f6mer, K. (, January February). Programming paradigms and middleware for sensor networks. Karlsruhe, Germany."},{"key":"ref_3","unstructured":"Available online: http:\/\/www.millennial.net\/newsandevents\/pressreleases\/050824.php (accessed on 10 March 2010)."},{"key":"ref_4","unstructured":"Lewis, F.L. Available online: http:\/\/arri.uta.edu\/acs\/networks\/WirelessSensorNetChap04.pdf (accessed on 15 March 2010)."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/332833.332838","article-title":"Wireless integrated network sensors","volume":"43","author":"Pottie","year":"2000","journal-title":"Commun. ACM"},{"key":"ref_6","unstructured":"Datta, S., and Woody, T. (2007). Business 2.0 Magazine."},{"key":"ref_7","unstructured":"(2003). By the Editors of Technology Review. 10 Emerging Technologies that Will Change the World. Technology Review Magazine (MIT)."},{"key":"ref_8","first-page":"40","article-title":"MICA the commercialization of micro sensor motes","volume":"19","author":"Horton","year":"2002","journal-title":"IEEE Sens. J"},{"key":"ref_9","unstructured":"Considine, J., Li, F., Kollios, G., and Byers, J. (April,, January 30). Approximate aggregation techniques for sensor databases. Boston, MA, USA."},{"key":"ref_10","unstructured":"Madden, S.R., Franklin, M.J., Hellerstein, J.M., and Hong, W. (2002, January December). TAG: A tiny aggregation service for ad hoc sensor networks. Boston, MA, USA."},{"key":"ref_11","unstructured":"Itanagonwiwat, C., Govindan, R., and Estrin, D. (2002, January September). Directed diffusion: A scalable and robust communication paradigm for sensor networks. Atlanta, GA, USA."},{"key":"ref_12","unstructured":"Itanagonwiwat, C., Estrin, D., Govindan, R., and Heidemann, J. (2002, January July). Impact of network density on data aggregation in wireless sensor networks. Vienna, Austria."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Deshpande, A., Nath, S., Gibbons, P.B., and Seshan, S. (2003, January June). Cache-and-query for wide area sensor databases. San Diego, CA, USA.","DOI":"10.1145\/872757.872818"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Solis, I., and Obraczka, K. (,  2004). The impact of timing in data aggregation for sensor networks. Paris, France.","DOI":"10.1109\/ICC.2004.1313222"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Tang, X., and Xu, J. (2006, January April). Extending network lifetime for precision-constrained data aggregation in wireless sensor networks. Barcelona, Catalunya, Spain.","DOI":"10.1109\/INFOCOM.2006.149"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Bista, R., Kim, Y.K., and Chang, J.W. (2009, January October). A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks. Xiamen, China.","DOI":"10.1109\/CIT.2009.33"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., and Abdelzaher, T. (2007, January May). Pda: Privacy-preserving data aggregation in wireless sensor networks. Anchorage, AK, USA.","DOI":"10.1109\/INFCOM.2007.237"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1016\/j.adhoc.2009.04.009","article-title":"Privacy-preserving in wireless sensor networks: A state-of-the-art survey","volume":"7","author":"Li","year":"2009","journal-title":"Ad Hoc Networks"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1002\/sec.95","article-title":"Privacy-preserving robust data aggregation in wireless sensor networks","volume":"2","author":"Conti","year":"2009","journal-title":"Secur. Commun. Netw"},{"key":"ref_20","unstructured":"Chen, D., and Varshney, P.K. (2004, January June). QoS support in wireless sensor networks: A survey. Las Vegas, NV, USA."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/974121.974126","article-title":"QUASAR: Quality aware sensing architecture","volume":"33","author":"Lazaridis","year":"2004","journal-title":"ACM SIGMOD Record"},{"key":"ref_22","unstructured":"Chan, H., Perrig, A., and Song, D. (3,, January October). Secure hierarchical in-network aggregation in sensor networks. Alexandria, VA, USA."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Yang, Y., Wang, X., Zhu, S., and Cao, G. (2006, January May). SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. Florence, Italy.","DOI":"10.1145\/1132905.1132944"},{"key":"ref_24","unstructured":"Bartosz, P., Song, D., and Perrig, A. (,  2003). SIA: Secure information aggregation in sensor networks. Los Angeles, CA, USA."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Agrawal, R., and Srikant, R. (2000, January May). Privacy-preserving data mining. Dallas, TX, USA.","DOI":"10.1145\/342009.335438"},{"key":"ref_26","unstructured":"Kargupta, H., Datta, Q.W.S., and Sivakumar, K. (2003, January November). On the privacy preserving properties of random data perturbation techniques. Melbourne, FL, USA."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Choi, H., Zhu, S., La, P., and Thomas, F. (2007, January September). SET: Detecting node clones in sensor networks. Nice, France.","DOI":"10.1109\/SECCOM.2007.4550353"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., and Gligor, V.D. (2002, January November). A key-management scheme for distributed sensor networks. Washington, DC, USA.","DOI":"10.1145\/586110.586117"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Yao, J., and Wen, G. (2008, January October). Protecting classification privacy data aggregation in wireless sensor networks. Dalian, China.","DOI":"10.1109\/WiCom.2008.951"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Shao, M., Zhu, S., Zhang, W., and Cao, G. (2007, January May). pdcs: Security and privacy support for data-centric sensor networks. Anchorage, AK, USA.","DOI":"10.1109\/INFCOM.2007.154"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Zhang, W.S., Wang, C., and Feng, T.M. (2008, January March). GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data, concise contribution. Hong Kong, China.","DOI":"10.1109\/PERCOM.2008.60"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"He, W., Nguyen, H., Liu, X., Nahrstedt, K., and Abdelzaher, T. (2008, January November). iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks. San Diego, CA, USA.","DOI":"10.1109\/MILCOM.2008.4753645"},{"key":"ref_33","unstructured":"Girao, J., Westhoff, D., and Schneider, M. (2005, January May). CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks. Seoul, Korea."},{"key":"ref_34","unstructured":"Domingo-Ferrer, J. (2,, January September). A provably secure additive and multiplicative privacy homomorphism. Sao Paulo, Brazil."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Mykletun, E., and Tsudik, G. (2005, January July). Efficient aggregation of encrypted data in wireless sensor networks. San Diego, CA, USA.","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Sheng, B., and Li, Q. (2008, January April). Verifiable privacy-preserving range query in two-tiered sensor networks. Phoenix, AZ, USA.","DOI":"10.1109\/INFOCOM.2008.18"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B.R., Li, C., and Mehrotra, S. (2002, January June). Executing SQL over encrypted data in the database service provider model. Madison, WI, USA.","DOI":"10.1145\/564691.564717"},{"key":"ref_38","unstructured":"Hore, B., Mehrotra, S., and Tsudik, G. (3,, January August). A privacy-preserving index for range queries. Toronto, Canada."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Taban, G., and Gligor, V.D. (2009, January August). Privacy-preserving integrity-assured data aggregation in sensor networks. Vancouver, Canada.","DOI":"10.1109\/CSE.2009.389"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Bellare, M., Canetti, R., and Krawczyk, H. (1996, January August). Keying hash functions for message authentication. Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-68697-5_1"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2004, January June). Order preserving encryption for numeric data. Paris, France.","DOI":"10.1145\/1007568.1007632"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Bar-Yossef, Z., Kumar, S.R., and Sivakumar, D. (2001, January July). Sampling algorithms: lower bounds and applications. Heraklion, Crete, Greece.","DOI":"10.1145\/380752.380810"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/10\/5\/4577\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T22:02:20Z","timestamp":1760220140000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/10\/5\/4577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,4]]},"references-count":42,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2010,5]]}},"alternative-id":["s100504577"],"URL":"https:\/\/doi.org\/10.3390\/s100504577","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2010,5,4]]}}}