Fig. 13From: Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networksHandover modelBack to article page