Fig. 1From: 5G wireless P2MP backhaul security protocol: an adaptive approach5G wireless backhaul network architectureBack to article page