Fig. 2From: Towards 5G cellular network forensicsThe LI protocol stack. The encryption and authentication keys used on the LI application layer are negotiated during the forensic readiness phase between the operators and the LEABack to article page