Development of Electricity Theft Detection Using Smart Meter in Power Distribution Network Based On Wireless Technology

Similar documents
IOT BASED ENERGY METER RATING

Prototype Model of Li-Fi Technology using Visible Light Communication

ANALYSIS AND IMPLEMENTATION OF IOT BASED ENERGY METER

IOT BASED SMART ATTENDANCE SYSTEM USING GSM

Data Conversion and Lab (17.368) Fall Lecture Outline

PRINCIPLES AND APPLICATIONS

Design of Low Power and Area Efficient 64 Bits Shift Register Using Pulsed Latches

RF4432 wireless transceiver module

STA2051E VESPUCCI 32-BIT SINGLE CHIP BASEBAND CONTROLLER FOR GPS AND TELEMATIC APPLICATIONS 1 FEATURES. Figure 1. Packages

THE ASTRO LINE SERIES GEMINI 5200 INSTRUCTION MANUAL

Design and Implementation of Timer, GPIO, and 7-segment Peripherals

Embedded System Training Module ABLab Solutions

NS8050U MICROWIRE PLUSTM Interface

Design of Vision Embedded Platform with AVR

IOT Based Fuel Monitoring For Vehicles

Operating Instructions

RF4432F27 wireless transceiver module

BUSES IN COMPUTER ARCHITECTURE

VGA Controller. Leif Andersen, Daniel Blakemore, Jon Parker University of Utah December 19, VGA Controller Components

ADC Peripheral in Microcontrollers. Petr Cesak, Jan Fischer, Jaroslav Roztocil

UNIT V 8051 Microcontroller based Systems Design

Comparing JTAG, SPI, and I2C

Improved Synchronization System for Thermal Power Station

AIFA TECHNOLOGY CORP.

Watchman. Introduction: Door Lock Mobile MAX

Data Acquisition Networks. Installing and Configuring the DM01 Hardware

Counter/timer 2 of the 83C552 microcontroller

3. Configuration and Testing

ISSN (PRINT): , (ONLINE): , VOLUME-5, ISSUE-4,

Underground Cable Fault Distance Detector System Using IoT Wi-Fi Module & Microcontroller

Microcontrollers. Outline. Class 4: Timer/Counters. March 28, Timer/Counter Introduction. Timers as a Timebase.

IEFIS G3 Inputs, outputs and Alarms

Warranty Information

Combo Board.

ECE 372 Microcontroller Design

Digital Strobe Tuner. w/ On stage Display

Automatic Transfer Switch Control PLC Operator s Manual

A dedicated data acquisition system for ion velocity measurements of laser produced plasmas

NanoCom ADS-B. Datasheet An ADS-B receiver for space applications

LED7706/7/8. LED drivers for backlighting and lighting applications.

Internet of Things. a practical component-oriented approach. What is IoT (wikipedia):

B. The specified product shall be manufactured by a firm whose quality system is in compliance with the I.S./ISO 9001/EN 29001, QUALITY SYSTEM.

INTELLIGENT VEHICLE TO CONTROL THE ILLUMINATION IN HIGHWAYS TO AVOID ACCIDENTS

SAPLING MASTER CLOCKS

Toronto Hydro - Electric System

An Integrated EMG Data Acquisition System by Using Android app

Ocean Sensor Systems, Inc. Wave Staff III, OSSI With 0-5V & RS232 Output and A Self Grounding Coaxial Staff

Experiences of CESC in Smart Grid Initiatives LT Network Automation. Anjan Mitra / Arka Ghosh

Low-speed serial buses are used in wide variety of electronics products. Various low-speed buses exist in different

8-BIT MCU WITH SINGLE VOLTAGE FLASH MEMORY, DATA EEPROM, ADC, TIMERS, SPI

Ocean Sensor Systems, Inc. Wave Staff, OSSI F, Water Level Sensor With 0-5V, RS232 & Alarm Outputs, 1 to 20 Meter Staff

SDA 3302 Family. GHz PLL with I 2 C Bus and Four Chip Addresses

KARIN Operator manual WinKARIN 3.X

FPGA Laboratory Assignment 4. Due Date: 06/11/2012

Tools to Debug Dead Boards

Netzer AqBiSS Electric Encoders

C200H-AD002/DA002 Analog I/O Units Operation Guide

LED Array Board.

A MISSILE INSTRUMENTATION ENCODER

SAPLING WIRED SYSTEM

LM16X21A Dot Matrix LCD Unit

Colour Detection For Blind Using Zigbee

The University of Texas at Dallas Department of Computer Science CS 4141: Digital Systems Lab

Design and analysis of microcontroller system using AMBA- Lite bus

ANALOG I/O MODULES AD268 / DA264 / TC218 USER S MANUAL

V6118 EM MICROELECTRONIC - MARIN SA. 2, 4 and 8 Mutiplex LCD Driver

Home Monitoring System Using RP Device

Chapter 9 MSI Logic Circuits

Contents Circuits... 1

TV Character Generator

THE NEXT GENERATION OF CITY MANAGEMENT INNOVATE TODAY TO MEET THE NEEDS OF TOMORROW

Pattern Based Attendance System using RF module

Alice EduPad Board. User s Guide Version /11/2017

Design, Development and Fabrication of Impact Load Testing Machine For COT

A 400MHz Direct Digital Synthesizer with the AD9912

ex 800 Series ematrix System

Efficient Architecture for Flexible Prescaler Using Multimodulo Prescaler

User Guide UD51. Second encoder small option module for Unidrive. Part Number: Issue Number: 5.

PICOSECOND TIMING USING FAST ANALOG SAMPLING

Bringing an all-in-one solution to IoT prototype developers

Application of Internet of Things for Equipment Maintenance in Manufacturing System

HEART ATTACK DETECTION BY HEARTBEAT SENSING USING INTERNET OF THINGS : IOT

M89 FAMILY In-System Programmable (ISP) Multiple-Memory and Logic FLASH+PSD Systems for MCUs

Gated Driver Tree Based Power Optimized Multi-Bit Flip-Flops

A Modern Approach of Vehicular Pollution Monitoring and Speed Control

Combinational vs Sequential

SWITCH: Microcontroller Touch-switch Design & Test (Part 2)

1ms Column Parallel Vision System and It's Application of High Speed Target Tracking

M4000 Diagnostic Test System For Power Apparatus Condition Assessment

Copyright 2018 Xi an NovaStar Tech Co., Ltd. All Rights Reserved. No part of this document may be copied, reproduced, extracted or transmitted in any

IoT Based Controlling and Monitoring of Smart City

SUBSYSTEMS FOR DATA ACQUISITION #39. Analog-to-Digital Converter (ADC) Function Card

16 Dec Testing and Programming PCBA s. 1 JTAG Technologies

Vorne Industries. 87/719 Analog Input Module User's Manual Industrial Drive Itasca, IL (630) Telefax (630)

Full Disclosure Monitoring

Sensor Development for the imote2 Smart Sensor Platform

Logic Devices for Interfacing, The 8085 MPU Lecture 4

Digital Stopwatch Timer Circuit Using 555timer and CD4033

DX100 OPTIONS INSTRUCTIONS

DLP Pico Chipset Interface Manual

Transcription:

Development of Electricity Theft Detection Using Smart Meter in Power Distribution Network Based On Wireless Technology M.DINESHSUNDAR 1, MRS.R.RATHIKA 2 1, PG Scholar, Department of EEE, BIHER. 2, Assistant Professor, Department of EEE, BIHER CHENNAI ABSTRACT: It is realized that the innovative headways are expanding at a speedier pace. However, the usage of advances in different segments is low. It is realized that power burglary frequently happens in different spots. So we propose a framework where we ceaselessly screen the power theft utilizing sensors. The Input voltage to the framework and the yield voltage drawn by the load is additionally checked. The sensor esteems are continually checked. On the off chance that power burglary is recognized, at that point an alarm message is given to the client utilizing GSM Module. The alarm message gives the time when burglary happens and furthermore the present sensor esteems. I. INTRODUCTION: In intelligent energy metering framework as proposed in examine with the capacity to convey remotely, command data s are sent to the meter by means of SMS and the meter answers with the pertinent vitality utilization readings again through SMS. Along these lines it permits both the power supply organizations and the client to have a superior observing of the energy extracted by the load. Energy has been a vital calculated worldview for future vitality utilize. Step by step instructions to influence vitality to utilize more productive and viable is exceptionally basic for future social and financial improvements because of constrained accessibility of non-sustainable power source assets and costly methods for securing sustainable power sources [1]. In the course of the most recent couple of years, Smart Energy Meter has been proposed as an imaginative arrangement went for encouraging moderateness and diminishing the cost of utilities [2]. The past energy meter has mechanical development with different wrong, tedious and unreliable meter perusing strategies. The issue with this framework is that it requires more human work, timing and causes blunder. So there is a need of vitality meter which will give bill to user both as an SMS alongside other inbuilt highlights, for example, tamper proof, blame discovery and so forth [3]. Furthermore, the online approach produces cautions about utilizations of energy as and when required by a predefined estimating structure through a call/email/short instant message. Operational misfortunes bring about with vitality appropriation which is essentially arranged into either specialized or non-specialized in nature. The creators in depicted power robbery control by computing NTL > 5%, anyway the outer control area disengagement of legitimate customers is a major issue. The key inspiration of this examination is the vitality emergency of our nation since long time. One of the principle explanations for power lack in Pakistan is the Power Theft. In spite of knowing the whereabouts of the people and associations who are engaged with carrying out this wrongdoing, the power organizations are defenseless to stop this threat. In the event that the line men attempt to remove the power supply, they are annoyed and debilitated. An essential part in regards to brilliant lattice, is played by Advanced Metering Infrastructure (AMI) related with layman's life. As of late, numerous clever electronic gadgets like computerized blame recorders, defensive transfers and so forth are acquainted with be 25

connected to keen meters. These IEDs screen the status of operational exercises ceaselessly. In case of an issue, the user responds speedily and confines the effects to a base by disconnecting the framework. II. TYPES OF DIFFERENT COMMERCIALLY USED ENERGY METERS: 1. Electromechanical Energy Meter It is the most broadly utilized energy meter which ascertains the electrical energy or units consumed by load based on the mechanical energy of the plate or rotor. 2. Digital Energy Meter The vast majority of the old electro-mechanical meters are being supplanted by new electronic meters which are more exact in taking the readings. The advanced energy meter has tackled a significant number of the issues with electro-mechanical energy meters. The significant weakness of the computerized vitality meter is that it does not address the charging which is a work expending process. III. SYSTEM DESIGN AND ARCHITECTURE: This system displaying the information about the energy consumed in terms of units, and if any theft occurs that will be displayed in the website. Hence every user can check the information anywhere globally. Thing speak web page is used for displaying the information of the system. In this IOT based meter reading system is designed to continuously monitor in the meter reading and service provider. The system consists of voltage sensor to monitor the incoming voltage. And also the voltage and current consumed by the loads are monitored using the Voltage sensor and the Current sensor. The sensor values are monitored and if the variation between the voltage and current sensor in the incoming and outgoing is very large, then the theft message is provided to the concerned person. Fig.1. Block representation of System Architecture 26

The message consists of the current sensor value and the time when the theft is occurred. This indicates the theft of power in home. IV. NEED FOR INTERNET OF THINGS: The IOT module here acts as a source of internet for the microcontroller. The IOT module here has a set of format for updating the data. The IOT consist of an ESP8266 module for establishing Wi-Fi connectivity between the Smartphone and the ESP-8266 module. Whenever a personal-hotspot is established, then the mobile data is shared to the controller. The system here continuously transmits the sensor data (Voltage Sensor and the Current Sensor) using UART protocol. Whenever the data is received by the IOT module, it pushes the sensor data to the cloud. So whenever a user wants to monitor his energy meter readings, then the user can view the data from the Webpage dedicated to the particular IOT module. V. MICROCONTROLLER - PIC16F877A: The term PIC, or Peripheral Interface Controller, is the name given by Microchip Technologies to its single chip microcontrollers. PIC micros have grown to become the most widely used microcontrollers in the 8- bit microcontroller segment. The PIC16F877A CMOS FLASH-based 8-bit microcontroller is upward compatible with the PIC16C5x, PIC12Cxxx and PIC16C7x devices. It features 200 ns instruction execution, 256 bytes of EEPROM data memory, self-programming, an ICD, 2 Comparators, 8 channels of 10-bit Analog-to- Digital (A/D) converter, 2 capture/compare/pwm functions, a synchronous serial port that can be configured as either 3-wire SPI or 2-wire I2C bus, a USART, and a Parallel Slave Port. Special Microcontroller Features Flash Memory: 14.3 Kbytes (8192 words) Data SRAM: 368 bytes Data EEPROM: 256 bytes Self-reprogrammable under software control In-Circuit Serial Programming via two pins (5V) Watchdog Timer with on-chip RC oscillator Programmable code protection Power-saving Sleep mode In-Circuit Debug via two pins 10-bit, 8-channel A/D Converter Brown-Out Reset Analog Comparator module Peripheral Features 33 I/O pins; 5 I/O ports Timer0: 8-bit timer/counter with 8-bit prescaler Timer1: 16-bit timer/counter with prescaler o Can be incremented during Sleep via external crystal/clock Timer2: 8-bit timer/counter with 8-bit period register, prescaler and postscaler Two Capture, Compare, PWM modules o 16-bit Capture input; max resolution 12.5 ns o 16-bit Compare; max resolution 200 ns 27

o 10-bit PWM Synchronous Serial Port with two modes: o SPI Master o I2C Master and Slave USART/SCI with 9-bit address detection Parallel Slave Port (PSP) o 8 bits wide with external RD, WR and CS controls Brown-out detection circuitry for Brown-Out Reset The simplest microcontroller architecture consists of a microprocessor, memory, and input/output. The microprocessor consists of a central processing unit (CPU) and the control unit (CU).The CPU is the brain of a microprocessor and is where all of the arithmetic and logical operations are performed. The control unit controls the internal operations of the microprocessor and sends control signals to other parts of the microprocessor to carry out the required instructions. Memory is an important part of a microcomputer system. Depending upon the application we can classify memories into two groups: program memory and data memory. Program memory stores all the program code. This memory is usually a read-only memory (ROM). Other types of memories, e.g. EPROM and PEROM flash memories are used for low-volume applications and also during program development. Data memory is a read/write memory (RAM). VI. CIRCUIT DIAGRAM: Fig.2. Circuit Diagram 28

VII. SIMULATION DIAGRAM: VIII. CASE STUDIES: Fig.3. Simulation Diagram Theft of electricity is the criminal practice of stealing electricity. It is a crime and is punishable by fines and/or incarnation. It belongs to the non-technical Losses.Non-specialized losses which are caused by the activities of the outer influence framework and comprise fundamentally of Electricity Thefts and as well as by non-payment of bills by the customers. As Due to the increment in the theft of electricity, India is on the run of losing billions of Rupees, in the year 2012, the World Bank assessed, that the electricity theft diminishes, India s GDP by approximately 1.5%. An investigation by NDTV India also presumed that 40% of the electricity in India is unpaid. Theft of Electricity deals with IE Act 2003, Amended Act 2007 U/s Section 135 of the Electricity Act. Tapping Wire: By Causing or Making any connection with Overhead or Underground cables or service wires; or Tampering Meter:- Which can be done by Simply Installing or Using a Tampered Meter, or a Current Reversing Transformer, Loop Connection or Any other Device or Method which interferes with the Accurate or Proper Calibration, Registration, or Metering of the Electric Current or Otherwise Which results in a way where the electricity is stolen or wasted; or, Damaging the Meter:- Damaging or otherwise Destroying of an Electric Meter, Equipment, or Apparatus, causes or allows any of them to be at the stage of being damaged which can be the reason of interference with the accurate metering of the electricity; or, Unauthorized Use: - The Usage of electricity for the purpose other than for which the usage of electricity was authorized. 29

TNEB reveals that electricity, worth several crores of rupees, is stolen every year. TNEB usually hits the headlines when it opens new power stations or when power outages during peak summer, attracting consumers ire. But what not many know is that its Enforcement wing, which is on the job round the clock, brings to book errant consumers who indulge in power theft.in the financial year 2016-2017, the enforcement wing detected 3,833 power thefts, leading to a provisional assessment of Rs.28.83 crore and compounding fees of Rs.3.20 crore. In the financial year 2017 2018, Enforcement inspection led to detection of 1.23 crore stolen units of power resulting in provisional assessment of Rs.32.76 crore and Rs.3.56 crore compounding fees. In the same period, the 4881 thefts detected, the highest was in domestic connections, followed by commercial services with the Low Tension industrial and agricultural thefts respectively. In contrast, only 2 thefts were recorded in the High Tension sector. Power theft methods include direct hook, direct tapping, bypassing meter, meter tampering, meter tilting, seal tampering, affixing bogus seals, reversing Connections, neutral cut/neutral by-pass, damaging meters and metering equipment, illegally restoring disconnected supply, un-authorized use of electricity and malfunctioning of meter reading through external applications. Chennai Enforcement Division in 2016-2017, Inspected 43363 number of services and detected 1091 nos of thefts leading to a provisional assessment of Rs.763.62 lakhs and compounding fees of Rs.86.54 lakhs. In the financial year 2017-2018, Inspected 45361 number of services and detected 1315 nos of thefts leading to a provisional assessment of Rs.869.16 lakhs and compounding fees of Rs.100.195 lakhs. IX. EXPERIMENTAL SETUP: Fig.4. Meter Tampering An electricity meter is used to measure the amount of electricity supplied to a residential or commercial building. Meter tampering or bypassing is when you make the meter to either stop functioning, under-register or even stop registering how much electricity your house/building consumes. This is usually done by people to avoid paying for the electricity that they use. This is theft and is very dangerous because the risk of injury or even death by electrocution while doing it is high, as tampers do not apply the same safety measures that Eskom does. Meter tampering shall be defined as tampering with or bypassing the Cooperative s meter or equipment, or other instances of electric service diversion such as physically disorienting the meter, attaching objects to the meter to divert or bypass electric service or, insertion of objects into the meter and other electrical. 30

Fig.5. Meter Bypass and mechanical means of tampering with, bypassing, or diverting electric service. Once a meter is bypassed it immediately stops operating normally, meaning that if there is an electrical fault inside your premises it will not be picked up and the electricity supply will stay on without tripping. This is a serious safety hazard to people and animals in the building, and can result in electrocution or fire. The tampering and bypassing of meters by electricity customers remains one of the reasons Meters gives for their failure to reduce collection losses in metered areas. Meter tampering and bypass refers to the practice of interfering with meters such that the readings are not reflective of the actual electricity consumed by the customers. Fig.6. Direct Tapping In Single Phase Meter Tapping is the most used method. 80% of global power theft is by direct tapping from the line. The consumer taps into a power line from a point ahead of the energy meter. This energy consumption is unmeasured and procured with or without switches. Many times it is not possible to inspect all the areas where hook line is there or not. Many people use electricity years after year s illegal way (using hook lines). Now a days there are more modern techniques to steal electricity. Many times in outskirt /sensitive areas, it is not possible to go there for hook line inspection. In this way a huge amount of electricity has been used without paying a bill. This is one of the most important reasons for running State Electricity Corporation running in loss. 31

Fig.7. Direct Tapping in Three Phase Meter One way is, we can install a smart meter the transformer at the substation and on everything it connects to. Except for a few losses, it is simple matter to see when there is more electricity delivered to the substation than the sum of all the smart meters. The consumer taps into a power line from a point ahead of the energy meter and energy consumption is unmeasured and procured with or without switches. The images explain the three phase and single phase tapping of the EB meters. The above image (Fig.6) shows the tampering in Three phase. The bottom image (Fig.7) shows the tampering of Single phase EB meters. The tapping here is performed by directly connecting the power lines from main to the Loads to the home. X. SIMULATION RESULT: Fig.8. Simulation Result The images explain the three phase and single phase tapping of the EB meters. The above image (Fig.6) shows the tampering in Three phase. The bottom image (Fig.7) shows the tampering of Single 32

phase EB meters. The tapping here is performed by directly connecting the power lines from main to the Loads to the home. The output is visible in the LCD display circuit. The controller checks for the sensor values. As the controller detects the change in the source & load voltage and current, it displays the LCD as CURRENT THEFT DET. And also the connection to the load is disconnected using the driver circuit IV.CONCLUSION: The point of this exploration was to acquire change the current power frameworks of the nation by presenting another shrewd metering framework. For this reason, a GUI based shrewd vitality checking and controlling framework was proposed. The results talked about, and perceptions made in this exploration presumed that brilliant metering framework with IOT correspondence capacities will make the present power administration better and proficient from numerous points of view. This will empower the vitality providers to have the capacity to take fundamental activities against the offenders. References: [1] D. Alahakoon, X. Yu, Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey, IEEE Transactions on Industrial Informatics, vol. 12, No. 1, February 2016. [2] Prabhu. R, Geetha. A, Vadivelan. P, Ilayabharathy. L, Smart Energy Meter with GSM Technology and Self Thermal Printing Technology, IJETCSE, vol. 12, issue 1, pp. 58-66, December 2014. [3] J. Jose, L. Mohan, Nijeesh U, T. C. Benny., Smart Energy Meter, IJETT, vol. 22 No. 4, April 2015. [4] Q. Sun, H Li, Z. Ma, C. Wang, J. Campillo, Q. Zhang, F. Wallin, J. Guo, A Comprehensive Review of Smart Energy Meters in Intelligent Energy Networks, IEEE Internet of Things Journal, Vol. 3, No. 4, August 2016. [5] B. Morvaj, L. Lugaric, S. Krajcar, Demonstrating Smart Buildings and Smart Grid features in a Smart Energy City, IYEC, 3rd International Youth Confrence, July 2011. [6] P. Mallet, P.-O. Grahstrom, P. Hallberg, G. Lorez and P. Mandatova, Power to the people, IEEE Power & Energy Magazine, vol. 12, no. 2, pp. 51-64, 2014. [7] V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella,C. Cecati and G. P. Hancke A Survey on Smart Grid Potential Applications and Communication Requirements, IEEE Transactions on Industrial Informatics, Vol 9, No 1, Feb 2013 [8] V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella,C. Cecati and G. P. Hancke, Smart Grid Technologies: Communication Technologies and Standards, IEEE Transactions on Industrial Informatics, Vol 7, No 4, Nov 2011 [9] J. Zhang, D. W. Gao and L. Lin, Smart meters in smart grid: An overview, Proceedings of 2013 IEEE Green Technologies Conference, pp. 57-64, April 2013. 33