Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Secured Clustered Network for Localization and Monitoring of Smart Energy Meters (SEM) in Ghana

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 89 - Number 4
Year of Publication: 2014
Griffith S. Klogo
James D. Gadze

Griffith S Klogo and James D Gadze. Article: Secured Clustered Network for Localization and Monitoring of Smart Energy Meters (SEM) in Ghana. International Journal of Computer Applications 89(4):15-19, March 2014. Full text available. BibTeX

	author = {Griffith S. Klogo and James D. Gadze},
	title = {Article: Secured Clustered Network for Localization and Monitoring of Smart Energy Meters (SEM) in Ghana},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {89},
	number = {4},
	pages = {15-19},
	month = {March},
	note = {Full text available}


Security of smart energy metering infrastructures is an important issue to address for reliability of sensed data and the authentication and authorization of users of the data. A wireless clustered network has been proposed for the localization and monitoring of smart energy meters. Due to the inability of utility service providers to visit the facilities of consumers regularly results in the difficulty of detecting fraud in good time, when energy meters are tampered with. These tampering, illegal connection and illegal bypass of smart energy meters results in commercial and operational losses. This paper proposes measures to address security issues that may arise in the proposed clustered network for locating and monitoring smart energy meters. The security goals of confidentiality/secrecy, authorization, integrity, authentication and availability and availability that are related to the metering infrastructure are addressed in this paper.


  • Annual Report of Electricity Company of Ghana, 2006
  • ECG targets 90% prepaid meters for Accra consumers http://thechronicle. com. gh/ecg-targets-90-prepaid-meters-for-accra-consumers/, accessed July 30, 2013, 10:08 GMT
  • C. S. Yeo, R. Buyya, H. Pourreza, R. Eskicioglu, P. Graham and F. Sommers, "Cluster Computing: High-Performance, High-Availability, and High-Throughput Processing on a Network of Computers"
  • K. Sun, P. Peng and P. Ning, "Secure Distributed Cluster Formation in Wireless Sensor Networks"
  • A. A. Abbasi and M. Younis, "A survey on clustering algorithm for wireless sensor networks", Computer Communication 30 (2007) pp 2826-2841
  • 802. 11 Wireless Networks, Security and Analysis, ISDN 1617-7975, Springer London Dordrecht Heidelberg New York.
  • Consumer Protection, http://www. purc. com. gh/purc/complaints/consumerprotection, accessed July 30, 2013, 18:08 GMT
  • Secure Socket Layer (SSL) Virtual Private Network (VPN) technology, By Qiang Huang and Jazib Frahim, Network World, October 22, 2008 03:09 PM ET, viewed online http://www. networkworld. com/subnets/cisco/102208-ch2-ssl-vpn-technology. html
  • White Paper, "Public Key Encryption and Digital Signature: How do they work?" CGI Group Inc. , 2004
  • General Purpose Hash Function Algorithms, http://www. partow. net/programming/hashfunctions/#HashingMethodologies, accessed July 31, 2013, 10:38 GMT
  • Ayushi, "A Symmetric Key Cryptographic Algorithm ", 2010 International Journal of Computer Applications (0975 - 8887), Vol. 1 – No. 15, pp 1- 4.