Manas Ranjan Mohapatra, Dr. Jitendra Sheetlani, Dr. Rasmi Ranjan Patra


IoT devices enhance efficiency, accuracy and economic advantages along with less involvement of human resources, thus our different daily applications have become more flexible and convenient. But, in IoT we have many security and privacy challenges emerging on regular basis. Earlier this issue has been addressed by introduction of many approaches to achieve privacy-preserving in data aggregation process. In this aspect this paper presents an outline of IoT-oriented approach for achieving privacy preservation together with minimizing communication overhead. This paper reviews the latest Privacy Preserving Data Aggregation (PPDA) techniques along with their comparative analysis. Latest techniques are investigated here to give a detail analysis of the each and every step of these techniques. In addition, every mathematical operation used in several PPDA schemes are analyzed here. Also current study will be advantageous to researchers in designing solutions in terms of energy efficiency and computational feasibility for ensuring user privacy in different IoT application


Privacy, Internet of Things, Computing, Network, Sensor, Grouping, Security, Data Aggregation, Communication Overhead.

Full Text:



Atzori L, Iera A, Morabito G, “The Internet of Things: a survey”, Compute Netw 2010; 54:2787-805.

Bista R, Jo K, Chang J. “A new approach to secure aggregation of private data in wireless sensor networks”, in IEEE international conference on dependable, autonomic and secure computing; 2009. p. 394-9.

He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T, “PDA: privacypreserving data aggregation in wireless sensor networks”, in Proceedings of the INFOCOM; May 2007. p. 2045-53.

Kumar V, Madria S, “PIP: privacy and integrity preserving data aggregation in wireless sensor networks”, in IEEE 32nd international symposium on reliable distributed systems (SRDS); 2013. p. 10-9.

Othman S., Bahattab A., Trad A, “Confidentiality and integrity for data aggregation in WSN using homomorphic encryption Wireless PersCommun”, 80 (2) (2014), pp. 867-889.

Othman S, Alzaid H, Trad A, “An efficient secure data aggregation scheme for wireless sensor networks”, in IEEE international conference on information, intelligence, systems and applications (IISA); 2013.

Yip S, Wong K, Phan R, Tan S, Ku I, Hew W, “A privacy-preserving and cheat-resilient electricity consumption reporting scheme for smart grids”, In: International conference on computer, information and telecommunication systems, CITS; 2014. p. 0-4.

Q. Li and G. Cao, “Providing efficient privacy-aware incentives for mobile sensing”, in Proc. IEEE 34th Int. Conf. Distrib. Comput. Syst. (ICDCS), Madrid, Spain, Jun./Jul. 2014, pp. 208–217.

Inayat Ali et al., “Privacy-Presereving data aggregation in Resource-Constrained Sensor Nodes in Internet of Things: A Review”, DOI: 10.1016/j.fcij.2017.11.004.



  • There are currently no refbacks.

Copyright (c) 2020 International Journal of Advanced Research in Computer Science