M. P. Shio-kumar-singh, D. K. Singh, and . Singh, Applications, Classifications, and Selections of Energy-Efficient Routing Protocols for Wireless Sensor Networks, International Journal of Advanced Engineering Sciences and Technologies, 2010.

J. Hill, R. Szewczyk, A. Woo, S. Hollar, and D. C. Pister, System architecture directions for networked sensors, Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000.
DOI : 10.1145/356989.356998

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.697

K. Maraiya, K. Kant, and N. Gupta, Wireless Sensor Network: A Review on Data Aggregation, International Journal of Scientific and Engineering Research, 2011.

S. Madden, R. Szewczyk, M. Franklin, and D. Culler, Supporting aggregate queries over ad-hoc wireless sensor networks, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, 2002.
DOI : 10.1109/MCSA.2002.1017485

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.3507

D. Wagner, Resilient aggregation in sensor networks, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, 2004.
DOI : 10.1145/1029102.1029116

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.4622

C. Intanagonwiwat, D. Estrin, R. Govindan, and J. Heidemann, Impact of network density on data aggregation in wireless sensor networks, Proceedings 22nd International Conference on Distributed Computing Systems, 2002.
DOI : 10.1109/ICDCS.2002.1022289

N. Li, N. Zhang, S. K. Das, and B. Thuraisingham, Privacy-preserving in wireless sensor networks: A state-of-the-art survey, Ad Hoc Networks, 2009.

R. Bista and J. Chang, Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey, Sensors, vol.33, issue.5, 2010.
DOI : 10.1145/974121.974126

D. Westhoff, J. Girao, and M. Acharya, Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation, IEEE Transactions on Mobile Computing, vol.5, issue.10, 2006.
DOI : 10.1109/TMC.2006.144

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.7012

J. Domingo-ferrer, A Provably Secure Additive and Multiplicative Privacy Homomorphism*, Proc. Information Security Conf, pp.471-483, 2002.
DOI : 10.1007/3-540-45811-5_37

C. Castelluccia, E. Mykletun, and G. Tsudik, Efficient Aggregation of Encrypted Data in WSN, 2005.

C. Castellucia, C. Aldar, E. Chan, G. Mykletun, and . Tsudnik, Efficient and Provably Secure Aggregation of encrypted data in WSNs, ACM transactions on Sensor Networks, vol.5, issue.3, 2009.

O. Goldreich, S. Goldwasser, and S. Micali, How to construct random functions, Journal of the ACM, vol.33, issue.4, 1986.
DOI : 10.1145/6490.6503

W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, 2007.
DOI : 10.1109/INFCOM.2007.237

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.9062

S. Madden, M. J. Franklin, and J. M. Hellerstein, TAG: A Tiny AGgregation Service for Ad- Hoc Sensor Networks, OSDI, 2002.

M. Conti, L. Zhang, S. Roy, R. D. Pietro, S. Jajodia et al., Privacy-preserving robust data aggregation in WSNs, Secur. Commun. Netw, 2009.

H. Choi, S. Zhu, and T. F. Porta, SET: Detecting node clones in sensor networks, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, 2007.
DOI : 10.1109/SECCOM.2007.4550353

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.7522

L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586117

W. He, H. Nguyen, X. Liu, K. Nahrstedt, and T. Abdelzaher, iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks, MILCOM 2008, 2008 IEEE Military Communications Conference, 2008.
DOI : 10.1109/MILCOM.2008.4753645

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.1681