Abstract. We study the use of known, well-connected network topology, to improve key setup and management. Specifically, we present the TopKeyS protocol, that uses such known-topology to allow easier, plug and play key distribution. Furthermore, ,TopKeyS improves security by limiting impact of key exposures: it ensures both perfect forward secrecy and proactive key refresh, re-establishing security after exposure. TopKeyS assumes a trusted the authentication server device, whose public key is known to all devices. This server is initialized with the network topology. We analyze the properties of the TopKeyS protocol and show sufficient topology conditions for its applicability. We prove its security against an attacker that is able control some of the devices in the network. We further present AR-TopKeyS, an improvement of TopKeyS that is secure even for Adversarial Routing.