Date Added: Dec 2010
Key Management Schemes (KMS) are a very important security mechanism for Wireless Sensor Networks (WSN), as they are used to manage the credentials (i.e. secret keys) that are needed by the security primitives. There are a large number of available KMS protocols in the literature, but it is not clear what should network designers do to choose the most suitable protocol for the needs of their applications. In this paper, the authors consider that given a certain set of application requirements, the network designer can check which properties comply with those requirements and select the KMS protocols that contain those particular properties.