Research Article

Study on Security and Privacy in 5G-Enabled Applications

Figure 5

End-to-end protocol stack for secondary authentication [28].