Research Article

Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

Figure 2

Protocol stack in AMI scenarios based on PRIME.