| Access restrictions | Mixed encryption authentication | Defend against attacks |
IEC 61850 protocol with AES algorithm | × | × | × |
IEC 61850 protocol with DES algorithm | × | × | × |
IEC 61850 protocol with W-EAP algorithm | √ | √ | √ |