The current GTK is shared with an associating client station in the third
EAPoL exchange of the 4-way handshake, but a further handshake, the
group key handshake, is used when the GTK needs to be updated.
A new GTK will be derived by the access point using a pseudo-random
function of the GMK together with its MAC address and a nonce (GNonce).
The new GTK is then distributed via the group key handshake, as follows;
Step (1) The access point sends the new GTK in encrypted unicast
messages to each station in the BSS. The new GTK is
encrypted using each station’s unique KEK and protects
the data from being tampered using a MIC.
Chapter Eight
224
Step (3) ...