This document summarizes and compares several key distribution schemes for establishing secure communication in wireless sensor networks. It discusses the Eschenauer-Gligor basic probabilistic key predistribution scheme and extensions like the q-composite scheme. It also covers threshold-based schemes by Du et al. and Liu and Ning that improve network resilience. The document analyzes the advantages and disadvantages of different approaches and notes that resource-constrained sensors require efficient key management schemes to enable secure communication.