Research Article

On Man-in-the-Middle Attack Risks of the VPN Gate Relay System

Figure 3

The network topology of attack scenario 1.