Fig. 5From: 5G wireless P2MP backhaul security protocol: an adaptive approachPolicy update phaseBack to article page