“…Network topology it had organized, dynamic changes since, distributed control, multiple network structure, node function limitations, limitations of wireless networks, poor security, large-scale, data redundancy and aggregation. Because of the impact of node energy, storage space, computing power, complex topology and other factors, WSN was vulnerable to be malicious attacked [1] . WSN did not rely on the possibility of a fixed infrastructure, so the existing traditional network security mechanisms could not be fully applied to it, although the use of passive preventive measures, such as encryption and authentication technology, network attacks can decrease to a certain extent, we also could not completely avoid being attacked, so security defense measures are indispensable.…”