Fig. 2From: 5G wireless P2MP backhaul security protocol: an adaptive approachInitial authentication phaseBack to article page