| Wireless sensor network (WSN) consists of a large number of micro sensor nodes whichdeployed in monitoring area, these nodes which distributed densely and collaborated with eachother, then complete the tasks of collecting of information, surveillance and perceiving environment.But, the nodes are limited by the limitation of resource. Large redundant information and valuableenergy resource would be caused if single node transmits data to sink node independently. The datafusion technology can decrease the redundant information and reduce the network data traffic. So itcan extend the lifetime of network.The environment of deployed qualities of the sensor network expose its vulnerability to theattackers. It can cause even worse damages if the sink nodes is attacked. How to design a feasiblesafety data fusion scheme is a research focus in the field of security data fusion. In recent years, theresearch of security data fusion has made great progress. This paper puts forward some solutions ofsecurity technology in two directions, and compared with the existing technology.In the process of data transmission, it put forward SPDAA, which introduced differencecomparison method to reduce redundant data among sense nodes; in order to reduce the energyconsumption of network, the SPDAA uses the model code comparison algorithm to select thetransmit nodes before the real data transmission; Finally, it uses the two hop authenticationalgorithm for the data encryption authentication. Compared with SSDAA, the SPDAA canminimizes the blind rejection of sensed data, and have significant savings in energy consumptionwhile preserving data integrity, so it can balance the network energy consumption and extend thenetwork lifetime.In the process of the maintenance of node trust value, it puts forward the RMFP, the behavior ofnodes is described by using fuzzy mathematics theory method, and the fuzzy membership degree isconverted by the fuzzy membership functions. Finally, the trust value is achieved by integrating thefuzzy membership degrees. The RMFP has great significant in the discovering of eliminatingmalicious nodes. |