Review Article
Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid
Table 6
Access control list fields.
| | Field | Description |
| | Address | Address of the destination node | | Security suite | Security policy used | | Key | 128-bit key used in AES algorithm | | Last initial vector (IV) | Used by the source to avoid reply attacks | | Replay counter | Replay counter is equal to IV but is used by the destination node |
|
|