Recently, with the development of Wireless Sensor Networks (WSNs), many new routing protocols have been designed for WSNs. Routing protocols in WSNs, however, might differ depending on the application and network architecture. Furthermore, WSNs are exposed to numerous routing security threats. Therefore, it is headachy for us to choose secure routing protocols for application in WSNs. In respect that the choice of secure routing protocols for WSNs is intimately related with the application requirements and routing protocol characteristics and the attacks on routing protocol, there is no "panacea" secure routing protocol. In this paper, we present a table that guides us to choose appropriate secure routing protocols for a particular application in WSNs.