CFP last date
22 April 2024
Reseach Article

Secured Clustered Network for Localization and Monitoring of Smart Energy Meters (SEM) in Ghana

by Griffith S. Klogo, James D. Gadze
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 4
Year of Publication: 2014
Authors: Griffith S. Klogo, James D. Gadze
10.5120/15490-4280

Griffith S. Klogo, James D. Gadze . Secured Clustered Network for Localization and Monitoring of Smart Energy Meters (SEM) in Ghana. International Journal of Computer Applications. 89, 4 ( March 2014), 15-19. DOI=10.5120/15490-4280

@article{ 10.5120/15490-4280,
author = { Griffith S. Klogo, James D. Gadze },
title = { Secured Clustered Network for Localization and Monitoring of Smart Energy Meters (SEM) in Ghana },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 4 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number4/15490-4280/ },
doi = { 10.5120/15490-4280 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:08:22.843929+05:30
%A Griffith S. Klogo
%A James D. Gadze
%T Secured Clustered Network for Localization and Monitoring of Smart Energy Meters (SEM) in Ghana
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 4
%P 15-19
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of smart energy metering infrastructures is an important issue to address for reliability of sensed data and the authentication and authorization of users of the data. A wireless clustered network has been proposed for the localization and monitoring of smart energy meters. Due to the inability of utility service providers to visit the facilities of consumers regularly results in the difficulty of detecting fraud in good time, when energy meters are tampered with. These tampering, illegal connection and illegal bypass of smart energy meters results in commercial and operational losses. This paper proposes measures to address security issues that may arise in the proposed clustered network for locating and monitoring smart energy meters. The security goals of confidentiality/secrecy, authorization, integrity, authentication and availability and availability that are related to the metering infrastructure are addressed in this paper.

References
  1. Annual Report of Electricity Company of Ghana, 2006
  2. ECG targets 90% prepaid meters for Accra consumers http://thechronicle. com. gh/ecg-targets-90-prepaid-meters-for-accra-consumers/, accessed July 30, 2013, 10:08 GMT
  3. C. S. Yeo, R. Buyya, H. Pourreza, R. Eskicioglu, P. Graham and F. Sommers, "Cluster Computing: High-Performance, High-Availability, and High-Throughput Processing on a Network of Computers"
  4. K. Sun, P. Peng and P. Ning, "Secure Distributed Cluster Formation in Wireless Sensor Networks"
  5. A. A. Abbasi and M. Younis, "A survey on clustering algorithm for wireless sensor networks", Computer Communication 30 (2007) pp 2826-2841
  6. 802. 11 Wireless Networks, Security and Analysis, ISDN 1617-7975, Springer London Dordrecht Heidelberg New York.
  7. Consumer Protection, http://www. purc. com. gh/purc/complaints/consumerprotection, accessed July 30, 2013, 18:08 GMT
  8. Secure Socket Layer (SSL) Virtual Private Network (VPN) technology, By Qiang Huang and Jazib Frahim, Network World, October 22, 2008 03:09 PM ET, viewed online http://www. networkworld. com/subnets/cisco/102208-ch2-ssl-vpn-technology. html
  9. White Paper, "Public Key Encryption and Digital Signature: How do they work?" CGI Group Inc. , 2004
  10. General Purpose Hash Function Algorithms, http://www. partow. net/programming/hashfunctions/#HashingMethodologies, accessed July 31, 2013, 10:38 GMT
  11. Ayushi, "A Symmetric Key Cryptographic Algorithm ", 2010 International Journal of Computer Applications (0975 - 8887), Vol. 1 – No. 15, pp 1- 4.
Index Terms

Computer Science
Information Sciences

Keywords

Clustered-network confidentiality/secrecy authorization integrity authentication and availability.