International Journal of Computer Applications
The applications of the Wireless Sensor Networks (WSNs) comprising of resource constrained sensor nodes are increasing day-by-day. However, the pervasive environment in which the WSNs are deployed and the criticality of the available resources therein makes the applicability of the security protocols therein, non-trivial. Amongst various panaceas pursued in paper, one of the attractive ones is using privacy homomorphism based secure data aggregation. Indeed one can find several algorithms based on either symmetric key cryptography or asymmetric key cryptography in the paper that supports either additive or multiplicative ho-mom orphic encryption.