(The article reviews the problems and challenges of wireless sensor networks in the security direction, studies the main user authentication schemes at that time and analyzes their main characteristics, and finally points out the direction that needs further research.)