6.4.7 Security

For more details on the security key exchange in a centralized network between the trust center and end device, refer to 6.2.5 Security.