A method of handling security key change for a user equipment in a
wireless communication system includes applying a radio resource control
procedure to activate key change, where the radio resource control
procedure covers two conditions where the key change is accompanied with
an authentication and key agreement run and without an authentication and
key agreement run.