Fig. 4From: Research on trusted DNP3-BAE protocol based on hash chainThe MSC model of third loopholeBack to article page