This document summarizes various data aggregation techniques for wireless sensor networks. It discusses how data aggregation can help reduce transmission overhead and improve security by allowing computation on encrypted data through privacy homomorphism. Several data aggregation schemes are described, including concealed data aggregation (CDA) schemes based on privacy homomorphism that allow aggregation of encrypted data without decrypting it first. The document also reviews recoverable concealed data aggregation (RCDA) schemes, a concealed data aggregation scheme for multiple applications (CDAMA), and public key cryptosystems that can enable data aggregation functions to be performed on encrypted data in wireless sensor networks.