Fig. 5From: Research on trusted DNP3-BAE protocol based on hash chainAuthentication and key agreementBack to article page