Wireless sensor networks are highly vulnerable to attacks because, it consists of various resources constrained devices and they communicate via wireless links. The most fundamental security problem in WSN is key management that covers the establishment, distribution, renewing and revocation of cryptographic keys. Several key management protocols were proposed in the literature. Unfortunately, most of them are not resilient to nodes capture. This means that an attacker compromising a node can reuse the node's key materials to populate any part of the network with cloned nodes and new injected nodes.