This document summarizes key techniques for key management in wireless sensor networks. It discusses requirements like confidentiality, integrity, and authentication. It also analyzes popular key distribution schemes like network keying, pairwise keying and group keying. Specific protocols discussed include Eschenauer-Gligor, Du-Deng-Han-Varshney, LEAP, SHELL, and Panja-Madria-Bhargava. Each approach is evaluated based on advantages like scalability, robustness and ability to support clustering, as well as disadvantages related to overhead, flexibility and ability to address node revocation. Overall the document provides an overview of the challenges and solutions for secure key management in resource-constrained wireless sensor networks.