Development of an Internet Enabled Smart Energy Meter
International Journal of Electronics and Communication Engineering |
© 2017 by SSRG - IJECE Journal |
Volume 4 Issue 11 |
Year of Publication : 2017 |
Authors : Akingbade Kayodde, F |
How to Cite?
Akingbade Kayodde, F, "Development of an Internet Enabled Smart Energy Meter," SSRG International Journal of Electronics and Communication Engineering, vol. 4, no. 11, pp. 1-14, 2017. Crossref, https://doi.org/10.14445/23488549/IJECE-V4I11P101
Abstract:
Energy measurement has always been a critical aspect of power engineering. This is so because issues like accurate and transparent billing, energy management, cost of power transmission and distribution which all form the bedrock of the socio-economic and environmental factors involved in power engineering are based on it. Therefore, the more efficient the system responsible for measuring and analyzing power usage is, the better the decisions that can be made concerning costing, billing and distribution. A major trend in recent times that seeks to address this issue is the smart meter. The smart meter is becoming increasingly popular because it is a more sophisticated, easy-to-use and cost effective means of energy measurement. This paper deals with the design and implementation of a smart meter that has wireless internet capabilities which enables a remote control of components and digitizes the data acquisition process. The overall set up was tested for optimum efficiency and performance. A satisfactory outcome in terms of ease and accuracy was eventually obtained.
Keywords:
Smart Meter, Energy Measurement and Management..
References:
[1] Aroge, A. (2014) „The Smart Grid and Renewable Energy Integration in Nigeria‟, Global Energy Network Institute, pp. 1 – 41.
[2] Bhowmik, P. K. and Paul, A. (2011) „Remote detection of illegal electricity usage employing smart energy meter – A current based technique‟, Innovative Smart Grid Technologies, India, pp. 391-395.
[3] Blaser, M. (2005) „Industrial-strength security for ZigBee: the case for public-key cryptography‟, Embedded Computing Design.
[4] Bohli, J. M., Sorge, C. and Ugus, O. (2010) „A Privacy Model for Smart Metering‟, IEEE International Conference on Communications Workshops (ICC), pp. 1–5.
[5] Boyer, W. and McBride, S. (2009) „Study of security attribute of smart grid systems-current cyber security issues‟, Idaho National Laboratory Technical Report, Idaho Falls.
[6] Brown, B. et al. (2009) „AMI Security Implementation Guide‟, AMI-SEC-ASAP.
[7] Johnny, C, Wright, J. and Liu, V. Hacking Exposed Wireless: Wireless Security Secrets & Solutions, 2nd ed. Osborne: McGraw-Hill, 2010. 76.
[8] Cleveland, F. (2008) „Cyber security issues for advanced metering infrastructure (AMI)‟, Proc. IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, Pennsylvania, pp. 1–5.
[9] Das, V. (2009) „Wireless based Communication technology for Smart Meters‟, International Conference and trends in Communication Technologies.
[10] Deconinck, G., Delvaux, B., De Craemer, K., Qiu, Z. and Belmans, R. (2011) „Smart Meters from the angles of consumer protection and public service obligations‟, Intelligent System Application to Power Systems (ISAP), pp. 1 – 6.
[11] Efthymiou, C. and Kalogridis, G. (2010) „Smart grid privacy via anonymization of smart metering data‟, Proceedings from First IEEE International Conference on Smart Grid Communications, Gaithersburg, Maryland, pp. 238-243.
[12] Hartung, C., Balasalle, J. and Han, R. (2005) „Node compromise in sensor networks: the need for secure systems‟, Dept. of Computer Science, Univ. of Colorado, Technical Report CU-CS-990-05.
[13] Ipakchi, A. and Albuyeh, F. (2009) „Grid of the future‟ IEEE Power & Energy Magazine, 7(2), pp. 52–62.
[14] Communications, Gaithersburg, Maryland, pp. 238-243.
[15] Khalifa, T., Naik, V, and Nayak, A. „A Survey of communication protocols for automatic meter reading applications‟, IEEE Communications Surveys & Tutorials, pp. 1 – 15 [Online] Available at: [] (Accessed: Apr. 20, 2016).
[16] Lin, X., Lu, R., Ho, P., Shen, X. and Cao, Z. (2008) „TUA: A novel compromise-resilient authentication architecture for wireless mesh networks‟, IEEE Transaction on Wireless Communications, 7(4), pp. 1389–1399.
[17] Liu, V. (2010) Hacking Exposed Wireless: Wireless Security Secrets & Solutions (2nd ed.), Osborne: McGraw-Hill.
[18] McDaniel, P. and McLaughlin, S. (2009) „Security and privacy challenges in the smart grid‟, IEEE Security & Privacy, 7(3), pp. 75 – 77.
[19] Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E. and Irwin, D. (2010) „Private memoirs of a smart meter,‟ Proc. the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building (BuildSys), Zurich, Switzerland, pp. 61-66.
[20] Mora, R., Lopez, A. and Berganza, I. (2009) „Smart Grids Communications‟, Proceedings of the Third Workshop on Power Line Communications (WSPLC), Udine, Italy.
[21] Popa, M., Ciocarlie, H., Popa, A. S. and Racz, M. B. (2010) „Smart Metering for monitoring domestic utilities‟, 14th International Conference on Intelligent Engineering Systems (INES), pp. 55–60.
[22] Qiu, Z. and Deconinck, G. (2011) „Smart Meter's feedback and the potential for energy savings in household sector: A survey,‟ IEEE International Conference on Networking, Sensing and Control (ICNSC), pp.281 – 286.
[23] Quinn, E. (2009) „Privacy and the new energy infrastructure‟, Social Science Research Network (SSRN), [Online] Available at: [] (Accessed: Apr. 01, 2016).
[24] Quinn, E. (2009) „Smart metering and privacy: existing law and competing policies‟, A Report for the Colorado Public Utilities Commission, [Online] Available at: [] (Accessed: Apr. 01, 2016).
[25] Sadiq, S. (2012) „Remote controlled Energy Monitoring system, Control & Profiling via a GSM Network‟, International Conference regarding Innovations in Information Technology (IIT).
[26] Williams, P. N., Nunn, C. and Moore, P. M. (1992) Remote Meter monitoring & Control Using PLC Communications, United Kingdom, pp. 304–308.
[27] Wright, J., Johnny, C. and Liu, V. (2010) Hacking Exposed Wireless: Wireless Security Secrets & Solutions (2nd ed.), Osborne: McGraw-Hill.
[28] Wright, J., Johnny, C. and Liu, V. (2010) Hacking unprotected Wireless network: Wireless Security Secrets & Solutions (2nd ed.), Osborne: McGraw-Hill.
[29] Yang, B. (2009) „Study on security of wireless sensor network based on ZigBee standard‟, Proc. International Conference on Computational Intelligence and Security, vol. 2, pp. 426 –430.