Abstract: A growing number of researches is done on the permutation routing problem in wireless networks, however, none of these studies do address the problems of security in the permutation routing in wireless sensor networks, The permutation routing problem in a military application is the fact that each soldier has items (information), that not concerned by him, and perhaps data which concerned, that is, in such applications and for confidential reasons, during the deployment, a soldier may hold items which are not necessary its own. The soldier to accomplish his task must receive its items from other soldiers in the network where it belongs. The necessity and the importance of secure permutation routing appear well when the permutation is a military application. The aspects of security that we deal with in this paper are not merely the authenticity, confidentiality, integrity, and non-repudiation, but we also show how we secure the partitioning into clusters and cliques in order to get consistency clusters and cliques