Research Article

Electronic User Authentication Key for Access to HMI/SCADA via Unsecured Internet Networks

Figure 5

Algorithm of the first level of user authentication with an electronic key.