Research Article

Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

Figure 13

Simulated scenario under (a) no attack; (b) jamming CSMA/CA; (c) PN Flooding.
(a)
(b)
(c)