UsingNewKeys
Second phase of Key Refresh procedure, nodes will use the new keys when encrypting messages but will still receive using the old or new keys. Nodes shall only receive Secure Network beacons secured using the new Network Key.