4.development of Electricity Theft Detection Using Smart Meter in Power Distribution Network Based On Wireless Technology
4.development of Electricity Theft Detection Using Smart Meter in Power Distribution Network Based On Wireless Technology
4.development of Electricity Theft Detection Using Smart Meter in Power Distribution Network Based On Wireless Technology
ABSTRACT:
It is realized that the innovative headways are expanding at a speedier pace. However, the usage of
advances in different segments is low. It is realized that power burglary frequently happens in different
spots. So we propose a framework where we ceaselessly screen the power theft utilizing sensors. The
Input voltage to the framework and the yield voltage drawn by the load is additionally checked. The sensor
esteems are continually checked. On the off chance that power burglary is recognized, at that point an
alarm message is given to the client utilizing GSM Module. The alarm message gives the time when
burglary happens and furthermore the present sensor esteems.
I. INTRODUCTION:
In intelligent energy metering framework as proposed in examine with the capacity to convey
remotely, command data’s are sent to the meter by means of SMS and the meter answers with the pertinent
vitality utilization readings again through SMS. Along these lines it permits both the power supply
organizations and the client to have a superior observing of the energy extracted by the load. Energy has
been a vital calculated worldview for future vitality utilize. Step by step instructions to influence vitality
to utilize more productive and viable is exceptionally basic for future social and financial improvements
because of constrained accessibility of non-sustainable power source assets and costly methods for
securing sustainable power sources [1].
In the course of the most recent couple of years, Smart Energy Meter has been proposed as an
imaginative arrangement went for encouraging moderateness and diminishing the cost of utilities [2]. The
past energy meter has mechanical development with different wrong, tedious and unreliable meter
perusing strategies. The issue with this framework is that it requires more human work, timing and causes
blunder. So there is a need of vitality meter which will give bill to user both as an SMS alongside other
inbuilt highlights, for example, tamper proof, blame discovery and so forth [3]. Furthermore, the online
approach produces cautions about utilizations of energy as and when required by a predefined estimating
structure through a call/email/short instant message.
Operational misfortunes bring about with vitality appropriation which is essentially arranged into
either specialized or non-specialized in nature. The creators in depicted power robbery control by
computing NTL > 5%, anyway the outer control area disengagement of legitimate customers is a major
issue. The key inspiration of this examination is the vitality emergency of our nation since long time. One
of the principle explanations for power lack in Pakistan is the Power Theft. In spite of knowing the
whereabouts of the people and associations who are engaged with carrying out this wrongdoing, the power
organizations are defenseless to stop this threat. In the event that the line men attempt to remove the power
supply, they are annoyed and debilitated. An essential part in regards to brilliant lattice, is played by
Advanced Metering Infrastructure (AMI) related with layman's life. As of late, numerous clever electronic
gadgets like computerized blame recorders, defensive transfers and so forth are acquainted with be
25
International Journal of Advanced Research in Electrical Engineering
connected to keen meters. These IEDs screen the status of operational exercises ceaselessly. In case of an
issue, the user responds speedily and confines the effects to a base by disconnecting the framework.
This system displaying the information about the energy consumed in terms of units, and if any
theft occurs that will be displayed in the website. Hence every user can check the information anywhere
globally. Thing speak web page is used for displaying the information of the system. In this IOT based
meter reading system is designed to continuously monitor in the meter reading and service provider. The
system consists of voltage sensor to monitor the incoming voltage.
And also the voltage and current consumed by the loads are monitored using the Voltage sensor
and the Current sensor. The sensor values are monitored and if the variation between the voltage and
current sensor in the incoming and outgoing is very large, then the theft message is provided to the
concerned person.
26
International Journal of Advanced Research in Electrical Engineering
The message consists of the current sensor value and the time when the theft is occurred. This
indicates the theft of power in home.
V. MICROCONTROLLER - PIC16F877A:
The term PIC, or Peripheral Interface Controller, is the name given by Microchip Technologies to
its single – chip microcontrollers. PIC micros have grown to become the most widely used
microcontrollers in the 8- bit microcontroller segment.
The PIC16F877A CMOS FLASH-based 8-bit microcontroller is upward compatible with the
PIC16C5x, PIC12Cxxx and PIC16C7x devices. It features 200 ns instruction execution, 256 bytes of
EEPROM data memory, self-programming, an ICD, 2 Comparators, 8 channels of 10-bit Analog-to-
Digital (A/D) converter, 2 capture/compare/PWM functions, a synchronous serial port that can be
configured as either 3-wire SPI or 2-wire I2C bus, a USART, and a Parallel Slave Port.
Special Microcontroller Features
Flash Memory: 14.3 Kbytes (8192 words)
Data SRAM: 368 bytes
Data EEPROM: 256 bytes
Self-reprogrammable under software control
In-Circuit Serial Programming via two pins (5V)
Watchdog Timer with on-chip RC oscillator
Programmable code protection
Power-saving Sleep mode
In-Circuit Debug via two pins
10-bit, 8-channel A/D Converter
Brown-Out Reset
Analog Comparator module
Peripheral Features
33 I/O pins; 5 I/O ports
Timer0: 8-bit timer/counter with 8-bit prescaler
Timer1: 16-bit timer/counter with prescaler
o Can be incremented during Sleep via external crystal/clock
Timer2: 8-bit timer/counter with 8-bit period register, prescaler and postscaler
Two Capture, Compare, PWM modules
o 16-bit Capture input; max resolution 12.5 ns
o 16-bit Compare; max resolution 200 ns
27
International Journal of Advanced Research in Electrical Engineering
o 10-bit PWM
Synchronous Serial Port with two modes:
o SPI Master
o I2C Master and Slave
USART/SCI with 9-bit address detection
Parallel Slave Port (PSP)
o 8 bits wide with external RD, WR and CS controls
Brown-out detection circuitry for Brown-Out Reset
The simplest microcontroller architecture consists of a microprocessor, memory, and input/output.
The microprocessor consists of a central processing unit (CPU) and the control unit (CU).The CPU is the
brain of a microprocessor and is where all of the arithmetic and logical operations are performed. The
control unit controls the internal operations of the microprocessor and sends control signals to other parts
of the microprocessor to carry out the required instructions. Memory is an important part of a
microcomputer system.
Depending upon the application we can classify memories into two groups: program memory and
data memory. Program memory stores all the program code. This memory is usually a read-only memory
(ROM). Other types of memories, e.g. EPROM and PEROM flash memories are used for low-volume
applications and also during program development. Data memory is a read/write memory (RAM).
28
International Journal of Advanced Research in Electrical Engineering
• Tapping Wire: – By Causing or Making any connection with Overhead or Underground cables
or service wires; or
• Tampering Meter:- Which can be done by Simply Installing or Using a Tampered Meter, or a
Current Reversing Transformer, Loop Connection or Any other Device or Method which interferes
with the Accurate or Proper Calibration, Registration, or Metering of the Electric Current or
Otherwise Which results in a way where the electricity is stolen or wasted; or,
• Damaging the Meter:- Damaging or otherwise Destroying of an Electric Meter, Equipment, or
Apparatus, causes or allows any of them to be at the stage of being damaged which can be the
reason of interference with the accurate metering of the electricity; or,
• Unauthorized Use: - The Usage of electricity for the purpose other than for which the usage of
electricity was authorized.
29
International Journal of Advanced Research in Electrical Engineering
TNEB reveals that electricity, worth several crores of rupees, is stolen every year. TNEB usually hits the
headlines when it opens new power stations or when power outages during peak summer, attracting
consumers’ ire. But what not many know is that its Enforcement wing, which is on the job round the
clock, brings to book errant consumers who indulge in power theft.In the financial year 2016- 2017, the
enforcement wing detected 3,833 power thefts, leading to a provisional assessment of Rs.28.83 crore and
compounding fees of Rs.3.20 crore. In the financial year 2017 – 2018, Enforcement inspection led to
detection of 1.23 crore stolen units of power resulting in provisional assessment of Rs.32.76 crore and
Rs.3.56 crore compounding fees. In the same period, the 4881 thefts detected, the highest was in domestic
connections, followed by commercial services with the Low Tension industrial and agricultural thefts
respectively. In contrast, only 2 thefts were recorded in the High Tension sector. Power theft methods
include direct hook, direct tapping , bypassing meter, meter tampering, meter tilting, seal tampering,
affixing bogus seals, reversing Connections, neutral cut/neutral by-pass, damaging meters and metering
equipment, illegally restoring disconnected supply, un-authorized use of electricity and malfunctioning of
meter reading through external applications. Chennai Enforcement Division in 2016- 2017, Inspected
43363 number of services and detected 1091 nos of thefts leading to a provisional assessment of
Rs.763.62 lakhs and compounding fees of Rs.86.54 lakhs. In the financial year 2017- 2018, Inspected
45361 number of services and detected 1315 nos of thefts leading to a provisional assessment of
Rs.869.16 lakhs and compounding fees of Rs.100.195 lakhs.
30
International Journal of Advanced Research in Electrical Engineering
31
International Journal of Advanced Research in Electrical Engineering
X. SIMULATION RESULT:
The images explain the three phase and single phase tapping of the EB meters. The above image
(Fig.6) shows the tampering in Three phase. The bottom image (Fig.7) shows the tampering of Single
32
International Journal of Advanced Research in Electrical Engineering
phase EB meters. The tapping here is performed by directly connecting the power lines from main to the
Loads to the home.
The output is visible in the LCD display circuit. The controller checks for the sensor values. As
the controller detects the change in the source & load voltage and current, it displays the LCD as
“CURRENT THEFT DET”. And also the connection to the load is disconnected using the driver circuit
IV.CONCLUSION:
The point of this exploration was to acquire change the current power frameworks of the nation by
presenting another shrewd metering framework. For this reason, a GUI based shrewd vitality checking
and controlling framework was proposed. The results talked about, and perceptions made in this
exploration presumed that brilliant metering framework with IOT correspondence capacities will make
the present power administration better and proficient from numerous points of view. This will empower
the vitality providers to have the capacity to take fundamental activities against the offenders.
References:
[1] D. Alahakoon, X. Yu, “Smart Electricity Meter Data Intelligence for Future Energy Systems: A
Survey”, IEEE Transactions on Industrial Informatics, vol. 12, No. 1, February 2016.
[2] Prabhu. R, Geetha. A, Vadivelan. P, Ilayabharathy. L, “Smart Energy Meter with GSM Technology
and Self Thermal Printing Technology”, IJETCSE, vol. 12, issue 1, pp. 58-66, December 2014.
[3] J. Jose, L. Mohan, Nijeesh U, T. C. Benny., “Smart Energy Meter”, IJETT, vol. 22 No. 4, April 2015.
[4] Q. Sun, H Li, Z. Ma, C. Wang, J. Campillo, Q. Zhang, F. Wallin, J. Guo, “A Comprehensive Review
of Smart Energy Meters in Intelligent Energy Networks”, IEEE Internet of Things Journal, Vol. 3, No. 4,
August 2016.
[5] B. Morvaj, L. Lugaric, S. Krajcar, “Demonstrating Smart Buildings and Smart Grid features in a Smart
Energy City”, IYEC, 3rd International Youth Confrence, July 2011.
[6] P. Mallet, P.-O. Grahstrom, P. Hallberg, G. Lorez and P. Mandatova, “Power to the people,” IEEE
Power & Energy Magazine, vol. 12, no. 2, pp. 51-64, 2014.
[7] V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella,C. Cecati and G. P. Hancke A Survey on
Smart Grid Potential Applications and Communication Requirements, IEEE Transactions on Industrial
Informatics, Vol 9, No 1, Feb 2013
[8] V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella,C. Cecati and G. P. Hancke, Smart Grid
Technologies: Communication Technologies and Standards, IEEE Transactions on Industrial Informatics,
Vol 7, No 4, Nov 2011
[9] J. Zhang, D. W. Gao and L. Lin, “Smart meters in smart grid: An overview”, Proceedings of 2013
IEEE Green Technologies Conference, pp. 57-64, April 2013.
33