Fig. 2
From: Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks

The unified key hierarchy
From: Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
The unified key hierarchy