How To Use 5g Security Architecture