Review Article

Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid

Table 6

Access control list fields.

FieldDescription

AddressAddress of the destination node
Security suiteSecurity policy used
Key128-bit key used in AES algorithm
Last initial vector (IV)Used by the source to avoid reply attacks
Replay counterReplay counter is equal to IV but is used by the destination node