Fig. 12From: Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networksUser movementsBack to article page