GSM Based Model to Detect Electricity Theft and Irregular usage Across Globe

DOI : 10.17577/IJERTCONV9IS04008

Download Full-Text PDF Cite this Publication

Text Only Version

GSM Based Model to Detect Electricity Theft and Irregular usage Across Globe

Ms. Dhimahi Mahesh Walendra 1 Department of Electrical Engineering, Shri Bhagubhai Mafatlal Polytechnic, Mumbai, India.

Mst. Jay Dilip Patel 2 Department of Electrical Engineering, Shri Bhagubhai Mafatlal Polytechnic,

Mumbai, India.

Abstract:- Science and technology with all its astounding developments has spellbound impact on human life. This impact has reached to such an extent that imagining a world without these innovations is nearly impossible. India, is on a road of rapid growth in economy as energy in form of Electricity, is a key input for fast- tracking financial development.

While technology is on levitation utilization, one should also make a note of the increasing immoral activities.

In India, year after year increase in the numberof electricity thefts across domestic as well as industrial electricity supply, finally results inloss of electricity companies energy due to which we face the frequent problems of load shading in urban as well as rural area. In orderto overcome the need of electricity for whole country, detecting and eradicating such crimes with the assistance of the developing scientific field is the "Need of the Hour".

In this paper, we are trying to find the power theft in house or in industries by many ways.

We would like to propose an electricity theft detection system to detect the theft where the proposed system will be hidden in such meters and as soon as an attempt is made for the theft, it will send an SMS to the registered mobile number and email address as well as to the control unit of electricity board.

In this paper, the input and output current of a particular pole is compared by using current transformer. If there is any negative value means it is indicated that the particular polehas drawn more current as theft/problem. Here one current transformer is placed in input part of the post line. Other current transformers are located at the inbuilt ADC converter. After that PIC compares the input current and the sum of output currents. If compared result has any negative value then this particular post is detected as theft point. This compared value is conveyed through RF transmitter. RF receiver is placed in electricity board office. This RF receiver receives this value and given as input to PIC. PIC displays this value in LCD display. Theinformation will then be quickly processed by the microcontroller and a SMS will be sent through the GSM technology.

Key words: Current sensor, voltage sensor, liquid crystal LCD display, GSM 16bit PIC16F877A, Relay Energy Meter.

  1. INTRODUCTION

    We would like to propose an electricity theft detection system to detect the theft where the proposed system will be hidden in such meters and as soon as an attempt is made for the theft, it will send an SMS to the registered mobile numberand email address as well as to the control unit ofelectricity board. In this paper input and output current of a particular pole is

    compared by using current transformer. If there is any negative value means it is indicated that the particular pole has drawn more current as theft/problem. Here one current transformer is placed in input part of the post line. Other current transformers are located at the inbuilt ADC converter. After that PIC compares the input current and the sum of output currents. If compared result has any negative value then this particular post is detected as theftpoint. This compared value is conveyed through RF transmitter. RF receiver is placed in electricity board office. This RF receiver receives this value and given as input to PIC. PIC displays this value in LCD display. The information will then be quickly processed by the microcontroller and a SMS will be sent through the GSM technology.

    Fig. 1.Block Diagram of Power Theft

    ERROR SIGNAL= MAXIMUM DEMAND- UTILIZATION LOAD

  2. EXISTING METHODS

    As we come to the existing methods wireless communication system of energy meter used with Zigbee, relay control and GPRS. The cryptographic method is utilized to protect the communication channel and Zigbee for the transmission of data in a serial method.

  3. PROPOSED METHODS

    Now in the projected method GSM technology used to communicate the meter reading to the government with the essential cost. Fig 1 given above demonstrates the schematic diagram ofpower theft.

    1. Energy Meter

      Energy meter is a device that analyses the cost of

      electricity consumed by a household, commercial, or electrically powered device. In this paper our meter box made of current transformer, IR sensor and magnetic reed switch. According to the energy meter calculates the reading with the help of the current transformer. IR sensor and magnetic reed switch are used to detect the theft in energy meter. Fig 2 shows the maximum demand of load

      START

      INITIALISATION OF PORTS AND SET THE

      INITIALISATION OF PORTS AND SET THE

      SET THE DELAY

      SET THE DELAY

      TAKE THE DATA FROM WIRELESS DATA

      TAKE THE DATA FROM WIRELESS DATA

      TAKE THE DATA FROM POLE BASED METER

      TAKE THE DATA FROM POLE BASED METER

      COMPARE THESE TWO

      COMPARE THESE TWO

      SEND A SIGNAL TO UTILITY COMPANY ABOUT POWER THEFT WITH LINE NUMBER

      SEND A SIGNAL TO UTILITY COMPANY ABOUT POWER THEFT WITH LINE NUMBER

      Is D2 >D1+ t

      END

      END

      Fig. 2. Maximum Demand

  4. POWER SUPPLY

    The input to the circuit is applied from the controlled power supply. The AC input i.e., 230V from the mains supply is step down by the transformer to 12V and is fed to a rectifier. The output attained from the rectifier is a pulsating DC voltage. So, in order to get a pure DC voltage, the output voltage from the rectifier is fed to a filter to remove any AC components present even after rectification.

    Now, this voltage is given to a voltage regulator to obtain a pure constant dc voltage.

  5. CURRENT TRANSFORMER Current Transformers (CT's) can be used for monitoring current or for transforming primary current into reduced secondary. Current used for meters, relays, control equipment and other instruments. CT's transform current insulates the high voltage primary, permit grounding of the secondary, and step-down the magnitude of the measured current to a standard value that can be safely held by the instrument.

  6. GSM TECHNOLOGY

    GSM was designed with a moderate level of service security. The system was designed to validate the subscriber using a pre-shared key and challenge- response. The development of UMTS introduces an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user – whereas GSM only authenticates the user to the network (and not vice versa). Communications between the subscriber and the base station can be encoded. The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non- repudiation.

  7. PIC PROCESS OF THE SYSTEM

    The PIC is the main part of theft control. It is based on low power 16bit PIC16F877A processor. PIC consists of high performance and low cost of network technology. The memory organization of PIC consists of three memory blocks. The program memory organization consists of 13bit program count memory space. Data memory split into number of banks and it consist of GPR and SFR. The general-purpose register file ca be accessed in a straight line or in some way through the file select register. SFR is used in the processor and peripheral for controlling the system.

  8. FLOWCHART

    To program a micro-controller to detect a power theft on one-line following flowchart as shown in Fig 3 is used. Firstly, initialize ports of micro- controller as input or output as per required. Set the tolerance in program depending on the lossof line for which this system is installed. Setting of the delay time (say 10min) which is depending on after how much time interval system scan the line for theft detection. Take the data from wireless data

    receiver at present time interval (10min). It represents power consumed by load over given time. Take the data from meter installed on pole at the same time. It will represent the power sent over that line for present value (10min). If power sent on line is more than power consumed by that load over a given time considering tolerance the power theft or the problem which is occurring on that line. Send the signal of power theft with the line number and its area to utility company. For this wireless transmission or power line communication can be used. If power theft is not occurring on that line then again take the data after say 0min. ts an endless program that goes on and on.

  9. CONCLUSION & FUTURE SCOPE

The project model lessens the manual manipulation work and theft. With the use of GSM in the system there are numerous advantages as it use wireless network systems. The government not only saves money by the control of theft in energy meter but it is also advantageous for customers. The metering IC ensures the accuracy and provides a reliable measurement of power consumed. Cost wise low when compared to other energy meter that are not automatic and have theft controlfeatures.

ACKNOWLEDGEMENT

This paper represents not only our work at the keyboard, it is a milestone in itself. Our experience is amazing. We have been given unique opportunities throughout these days we have learned that there are those who build and those who use them; our passion is in creating equipment that can used in cutting edge research.

First and foremost, we wish to thank all our advisor, Professor Ajayshree Kinhekar at Shri Bhaghubhai Mafatlal Polytechnic providing us assistantship academically and emotionally through the rough road to finish this paper presentation.

Thank you Mrs. Meghal Walendra for being our major backbone, an inspiration in many ways on how to make things 'perfect. We thank our parents too. Lastly, it is with true pleasure that I acknowledge the contributions of my wonderful friend and co- author of this paper presentation. Both of us have been an amazing help to each other all this time.

REFERENCES

  1. A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. S. Sastry, yber security analysis of state estimators in electric power systems, in Decision and Control (CDC), 2010 49th IEEE Conference on. IEEE, 2010, pp. 59915998.

  2. M. Kezunovic, L. Xie, and S. Grijalva, The role of big data in improving power system operation and protection, in Bulk ower System Dynamics and Control-IX Optimization, Security and Control of the Emerging Power Grid (IREP), 2013 IREP Symposium. IEEE, 2013, pp. 19.

  3. N. Yu, S. Shah, R. Johnson, R. Sherick, M. Hong, and K. Loparo, Big data analytics in power distribution systems, in nnovative Smart Grid Technologies Conference (ISGT), 2015 IEEE Power & Energy Society. IEEE, 2015, pp. 15.

  4. S.-C. Huang, Y.-L. Lo, and C.-N. Lu, Non-technical loss detection using state estimation and analysis of variance, EEE Transactions on Power Systems, vol. 28, no. 3, pp. 2959 2966, 2013.

  5. W. Luan, G. Wang, Y. Yu, J. Lin, W. Zhang, and Q. Liu, Energy theft detection via integrated distribution state estimation based on ami and scada measurements, in Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), 2015 5th International Conference on. IEEE, 2015, pp. 751756.

  6. R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen, and X. S. Shen, Energy theft detection issues for advanced metering infrastructure in smart grid, Tsinghua Science and Technology, vol. 19, no. 2, pp. 105120, 2014.

  7. J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, and M. Mohamad, Nontechnical loss detection for metered customers in power utility using support vector machines, EEE transactions on Power Delivery, vol. 25, no. 2, pp. 11621171, 2010.

  8. I. Monedero, F. Biscarri, C. Le´on, J. I. Guerrero, J. Biscarri, and

    R. Mill´an, Detection of frauds and other non-technical losses in a power utility using pearson coefficient, bayesian networks and decision trees, nternational Journal of Electrical ower & Energy Systems, vol. 34, no. 1, pp. 9098, 2012.

  9. S.C. Yip, K. Wong, W.-P. Hew, M.-T. Gan,R. C.-W. han, and

    S.W. Tan, Detection of energy theft and defective smart meters in smart grids using linear regression, nternational Journal of Electrical Power & Energy Systems, vol. 91, pp. 230240, 2017.

  10. Y. Zhou, X. Chen, A. Y. Zomaya, L. Wang, and S. Hu, dynamic programming algorithm for leveraging probabilistic detection of energy theft in smart home, EEE Transactions on Emerging Topics in Computing, vol. 3, no. 4, pp. 502513, 2015.

  11. P. Glauner, A. Migliosi, J. Meira, E. A. Antonelo, P. Valtchev, R. State,and F. Bettinger, s big data sufficient for a reliable detection of nontechnical losses? arXiv preprint arXiv:1702.03767, 2017.

[ 2] W. H. Kersting, Radial distribution test feeders, in ower Engineering Society Winter Meeting, 2001. IEEE, vol. 2. IEEE, 2001, pp.908912.

[ 3] D. W. Bunn, orecasting loads and prices in competitive power markets, roceedings of the IEEE, vol. 88, no. 2, pp. 163169, 2000.

  1. F. L. Quilumba, W.-J. Lee, H. Huang, D.Y. Wang, and R. L. Szabados, Using smart meter data to improve the accuracy of intraday load forecasting considering customer behavior similarities, EEE Transactions on Smart Grid, vol. 6, no. 2, pp. 911918, 2015.

  2. . Bahrammirzaee, comparative survey of artificial intelligence applications in finance: artificial neural networks, expert system and hybrid intelligent systems, Neural omputing andApplications,vol.19,no.8,pp.11651195, 2010.

[ 16] H. Huang, Y. Hu, S. Liu, and L. Xie, recursive bayesian approach to load phase detection in unbalanced distribution system, in Power and Energy Conference (TPEC), IEEE Texas. IEEE, 2017, pp. 14. View publication stats.

[17] International Journal of Advanced Research Trends in Engineering and Technology (IJARTET) Vol. 1, Issue 3, November 2014.

Leave a Reply