Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

A Survey on Secure Data Aggregation Protocols in Wireless Sensor Networks

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 55 - Number 18
Year of Publication: 2012
Josna Jose
Joyce Jose
Fijo Jose

Josna Jose, Joyce Jose and Fijo Jose. Article: A Survey on Secure Data Aggregation Protocols in Wireless Sensor Networks. International Journal of Computer Applications 55(18):17-21, October 2012. Full text available. BibTeX

	author = {Josna Jose and Joyce Jose and Fijo Jose},
	title = {Article: A Survey on Secure Data Aggregation Protocols in Wireless Sensor Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {55},
	number = {18},
	pages = {17-21},
	month = {October},
	note = {Full text available}


Wireless sensor network is a collection of large number of low cost resource constraint sensor nodes that are communicating using wireless medium. Sensor nodes are resource constrained in memory, sensing, communication capability, computational capability, battery power. Communication requires more power in sensor networks. One of the solutions to reduce number of bits transmitted is data aggregation. Data Aggregation is a process of aggregating data coming from different source using aggregation function to reduce redundancy in the Transmitted data. The aggregated results have great impact in accuracy and robustness of the final result get from the base station. Security is an important criterion to be considered because, wireless sensor nodes are deployed in a remote or hostile environment area that is prone to attacks easily. So data aggregation and security are essential for WSN. Many secure aggregations are proposed in wireless sensor network. But due to resource constrained nature, secure data aggregation also need new approaches. In this survey we are going to compare existing secure data aggregation protocol and their limitations and advantages.


  • Y. Sang and H. Shen, Secure Data Aggregation in Wireless Sensor Networks:ASurvey.
  • Dr. G. Padmavathi, Mrs. D. Shanmugapriya, 2009, A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, (IJCSIS) International Journal of Computer Science and Information Security.
  • H. Cam, S. Ozdemir, P. Nair, and D. Muthuavinashiappan, ESPDA: energy-efficient and secure pattern-based data aggregation for wireless sensor networks, IEEE Sensors–The Second IEEE Conference on Sensors, Oct. 22-24, 2003, Toronto, Canada.
  • H. Sanli, S. Ozdemir, and H. Cam, SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks, Proc. IEEE 60th Int'l Conf. Vehicular Technology (VTC 04-Fall), vol. 7, pp. 4650-4654, Sept. 2004.
  • Y. Yang, X. Wang, S. Zhu, and G. Cao, SDAP: A Secure Hop-by- Hop Data Aggregation Protocol for Sensor Networks, ACM Trans. Information and System Security (TISSEC), vol. 11, no. 4, pp. 1-43, 2008.
  • D. Westhoff, J. Girao, and M. Acharya, Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks:Encryption, Key Distribution, and Routing Adaptation, IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006.
  • C. Castelluccia, E. Mykletun, and G. Tsudik, Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems, pp. 109-117, July 2005.
  • S. Ozdemir, Concealed Data Aggregation in Heterogeneous Sensor Networks Using Privacy Homomorphism, Proc. IEEE Int'l Conf. Pervasive Services, pp. 165-168, July 2007.
  • S. Ozdemir and Y. Xiao, Hierarchical Concealed Data Aggregation for Wireless Sensor Networks.
  • W. Zhang, Y. Liu, S. K. Das, P. De, Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach, Elsevier Pervasive Mobile Comput. 4 (2008) 658–680.
  • J. Girao, D. Westhoff, and M. Schneider. CDA: Concealed Data Aggregation in Wireless Sensor Networks. In Proc. 40th International Conference on Communiacations, IEEE ICC '05, Korea, May 2005.
  • Y. E. Aslan and E. Kayaaslan, Security in wireless sensor network, JOURNAL OF CS514 CLASS FILES, VOL. 1, NO. 1, JANUVARY 2008.
  • A. Pandey and R. C Tripathi, A Survey on Wireless Sensor Networks Security, International Journal of Computer Applicationsc (0975-8887), Volume 3-No. 2, June 2010.
  • S. Peter and K. Piotrowski, On Concealed Data Aggregation for Wireless Sensor Networks.
  • C-M Chen,Y-H Lin, Y-C Lin and H-M Sun, RCDA:Recoverable Concealed data aggregation for Data Integtrity in Wireless Sensor Networks, IEEE TRANSACTION ON PARALLEL AND DISTRIBUTED SYSTEMs,VOL. 23,NO. 4,APRIL 2012.
  • S. Ozdemir and Y. Xiao, Secure data aggregation in wireless sensor networks: A Comprehensive overview, Computer Networks 53 , 2022-2037,2009.