Review Article
Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid
Table 6
Access control list fields.
| Field | Description |
| Address | Address of the destination node | Security suite | Security policy used | Key | 128-bit key used in AES algorithm | Last initial vector (IV) | Used by the source to avoid reply attacks | Replay counter | Replay counter is equal to IV but is used by the destination node |
|
|