| Figure 4.1-1 | IAB Architecture |
| Figure 4.2-1 | IAB security architecture |
| Figure 5.2.3.1-1 | A simplified illustration of backhaul-RLF recovery |
| Figure 5.3.1.1-1 | IAB architecture; a) IAB-node using SA mode with NGC; b) IAB-node using EN-DC |
| Figure 5.3.1.1-2 | Protocol stack for the support of F1-U protocol |
| Figure 5.3.1.1-3 | Protocol stack for the support of F1-C protocol |
| Figure 6.1.1.2-1 | Authentication of IAB Node, NAS and AS security Set-up in 5GS |
| Figure 6.1.1.2-2 | Authentication of IAB Node, NAS and AS security Set-up in EPS |
| Figure 6.2.1.1-1 | Establishment of F1 security association using Shared Key |
| Figure 6.2.1.1-2 | KIAB derivation function |
| Figure 6.3.2-1 | F1-C protocol stack for IAB |
| Figure 6.3.1.2-2 | F1-U protocol stack for IAB |