An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs

  • Irfana Memon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7513)


Wireless sensor network (WSN) technology has the potential to change the way we live, work, protect and do business, with applications in entertainment, travel, industry, telemedicine, disaster and emergency management. Data aggregation is key technique for power-efficient information acquisition in WSNs. However, data privacy during data aggregation is an important issue when the WSN is deployed in sensitive data applications, such as telemedicine. If the issues associated with data privacy are not seriously considered, the technology would not be trustingly used for many valuable applications. The existing privacy preserving data aggregation protocols provide a method to sustain privacy of collected sensor’s data from external and internal adversaries during data aggregation in WSNs. The basic aim of the paper is to investigate the critical aspects of the existing privacy preserving data aggregation protocols for WSNs and highlight their major limitations. We claim that in future such limitations can be corrected. Our ongoing work is to propose an alternative solution to overcome such limitations, but this will be presented in a future paper.


Sensor Node Wireless Sensor Network Cluster Head Data Aggregation Stream Cipher 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Singh, S.K., Singh, M.P., Singh, D.K.: Applications, Classifications, and Selections of Energy-Efficient Routing Protocols for Wireless Sensor Networks. International Journal of Advanced Engineering Sciences and Technologies (2010)Google Scholar
  2. 2.
    Hill, J., Szewczyk, R., Woo, A., Hollar, S., Pister, D.C.K.: System architecture directions for networked sensors. In: Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (2000)Google Scholar
  3. 3.
    Maraiya, K., Kant, K., Gupta, N.: Wireless Sensor Network: A Review on Data Aggregation. International Journal of Scientific and Engineering Research (2011)Google Scholar
  4. 4.
    Madden, S., Szewczyk, R., Franklin, M., Culler, D.: Supporting aggregate queries over ad-hoc sensor networks. In: Workshop on Mobile Computing and Systems Applications (2002)Google Scholar
  5. 5.
    Wagner, D.: Resilient aggregation in sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Adhoc and Sensor Networks (2004)Google Scholar
  6. 6.
    Intanagonwiwat, C., Estrin, D., Govindan, R., Heidemann, J.: Impact of Network Density on Data aggregation in Wireless Sensor Networks. In: Proceedings of the 22nd International Conference on Distributed Computing Systems (2002)Google Scholar
  7. 7.
    Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy-preserving in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks (2009)Google Scholar
  8. 8.
    Bista, R., Chang, J.-W.: Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey. Sensors (2010)Google Scholar
  9. 9.
    Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution and routing adaptation. IEEE Transactions on Mobile Computing (2006)Google Scholar
  10. 10.
    Domingo-Ferrer, J.: A Provably Secure Additive and Multiplicative Privacy Homomorphism. In: Proc. Information Security Conf., pp. 471–483 (October 2002)Google Scholar
  11. 11.
    Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient Aggregation of Encrypted Data in WSN. In: MobiQuitous. IEEE Computer Society (2005)Google Scholar
  12. 12.
    Castellucia, C., Chan, A.C.-F., Mykletun, E., Tsudnik, G.: Efficient and Provably Secure Aggregation of encrypted data in WSNs. ACM Transactions on Sensor Networks 5(3) (May 2009)Google Scholar
  13. 13.
    Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the Association for Computing Machinay (1986)Google Scholar
  14. 14.
    He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. IEEE INFOCOM (2007)Google Scholar
  15. 15.
    Madden, S., Franklin, M.J., Hellerstein, J.M.: TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. OSDI (2002)Google Scholar
  16. 16.
    Conti, M., Zhang, L., Roy, S., Pietro, R.D., Jajodia, S., Mancini, L.V.: Privacy-preserving robust data aggregation in WSNs. Secur. Commun. Netw. (2009)Google Scholar
  17. 17.
    Choi, H., Zhu, S., La Porta, T.F.: SET: Detecting Node Clones in Sensor Networks. In: Proceedings of IEEE 3rd International Conference on Security and Privacy in Communication Networks (2007)Google Scholar
  18. 18.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (November 2002)Google Scholar
  19. 19.
    He, W., Nguyen, H., Liu, X., Nahrstedt, K., Abdelzaher, T.: iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks. In: Proceedings of IEEE Military Communication Conference, MILCOM, San Diego, CA, USA (November 2008)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Irfana Memon
    • 1
  1. 1.ERISCS Research GroupAix-Marseille UniversitéFrance

Personalised recommendations