This document reviews techniques for secure data aggregation in wireless sensor networks. It discusses two main approaches: hop-by-hop encryption and end-to-end encryption. With hop-by-hop encryption, data is encrypted at each node and decrypted and re-encrypted by aggregator nodes. With end-to-end encryption, data is only decrypted at the base station. The document also proposes using an efficient distributed trust model to evaluate the trustworthiness of nodes to help avoid false data aggregation. Secure data aggregation aims to provide data confidentiality, integrity, authentication and availability while reducing energy consumption through efficient aggregation in wireless sensor networks.