“…These approaches take advantage of in-network data processing (also referred to as aggregation) to apply some obfuscating operations on the transmitted data [35], [58], [73], [78], [79], [98], [101], [124], [142], and [162]. A few common examples in this category include cluster-based private data aggregation [78] and its integrity enhanced version [79], secret perturbation [58], k-indistinguishable privacy-preserving data aggregation [73], a centralized authentication server based in-network aggregation for AMI [98,162], homomorphic encryption-based aggregation [28,33,101], a secure architecture for distributed secure hierarchical data collection aggregation of additive data [141,142], a secure and scalable data collection protocol for smart meter data [87,152], multifunctional, privacy-protecting aggregation [29], and a network coding-based encryption between smart meters and aggregators [124]. Another one is reported in [110].…”