Fig. 8From: Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networksThe UE rule in RNRP protocolBack to article page