Fig. 1From: Research on trusted DNP3-BAE protocol based on hash chainDNP3 communication threat modelBack to article page