Fig. 2From: Research on trusted DNP3-BAE protocol based on hash chainThe MSC model of first loopholeBack to article page