Fig. 7From: 5G wireless P2MP backhaul security protocol: an adaptive approachVerification result of the key update phaseBack to article page