Fig. 3From: Research on trusted DNP3-BAE protocol based on hash chainThe MSC model of second loopholeBack to article page