Fig. 10From: Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networksThe simulation of RNRP protocolBack to article page