POWER THEFT IDENTIFICATION SYSTEM
A Seminar Report submitted in Partial fulfillment of the requirements
For
The Award of the Degree of
BACHELOR OF TECHNOLOGY
IN
ELECTRICAL ENGINEERING
Submitted By
1621206034 SATYABRATA JENA
(2016-2019 BATCH)
Under the Guidance of
Mr. CHANDAN MANDAL (LECTURER)
DEPARTMENT OF ELECTRICAL ENGINEERING
1
AJAY BINAY INSTITUTE OF TECHNOLOGY
CUTTACK-753014
DEPARTMENT OF ELECTRICAL ENGINEERING
AJAY BINAY INSTITUTE OF TECHNOLOGY
CERTIFICATE OF APPROVAL
The foregoing Seminar named “POWER THEFT IDENTIFICATION SYSTEM” is a
bonafide work carried out by
1621206034 SATYABRATA JENA
In the partial fulfillment for the award of the degree of Bachelor of Technology in
Electrical & Electronics Engineering, Ajay Binay Institute of Technology, Cuttack
of Biju Pattnaik University of Technology, Odisha in the year 2014 is an authentic
work carried out under my guidance and supervision.
The matter embodied in this project has not been submitted to any other
university/institute for the award of any degree to the best of our knowledge.
Chandan Mandal
Lecturer, Department of Electrical Engineering
Countersigned by:
Prof. Ashok Kumar Mahapatra
Head , Department of Electrical Engineering
ABIT, Cuttack-753014
2
DEPARTMENT OF ELECTRICAL ENGINEERING
AJAY BINAY INSTITUTE OF TECHNOLOGY
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task
would be incomplete without the mentioning of the people whose constant guidance
and encouragement made it possible. We take pleasure in presenting before you, our
project, which is result of studied blend of both research and knowledge.
We express our earnest gratitude to Mr. CHANDAN MANDAL, Department of EE,
our project guide, for his constant support, encouragement and guidance. We are
grateful for his cooperation and his valuable suggestions.
I feel to avail myself of this opportunity to express my deep sense of gratitude to
Prof. A.K.MAHAPATRA, HOD, Dept. of Electrical Engineering, for the facilities
made available and instructions given to us in accomplishing this project
successfully.
Finally, we express our gratitude to all other members who are involved
either directly or indirectly for the completion of this project
Date: - Satyabrata Jena
Place: - Regd No-1621206034
Branch-EE
3
DEPARTMENT OF ELECTRICAL ENGINEERING
AJAY BINAY INSTITUTE OF TECHNOLOGY
CUTTACK
DECLARATION
I do hereby declare that the seminar entitled, “POWER THEFT IDENTIFICATION
SYSTEM” submitted in the Department of Electrical Engineering, Ajay Binay
Institute of Technology, Cuttack of Biju Patnaik University of Technology, Odisha
in partial fulfillment of requirement for the award of 8th semester B.Tech Degree in
Electrical Engineering is an authentic work carried out by me during 2015-2019
under the supervision of Mr. Chandan Mandal. The matter presented in this report
has not been submitted by me in any other University/Institute for the award of
B.Tech Degree.
Submitted By
1621206034 SATYABRATA JENA
4
DEPARTMENT OF ELECTRICAL ENGINEERING
AJAY BINAY INSTITUTE OF TECHNOLOGY
CUTTACK
CERTIFICATE
This is to certify that the seminar report entitled “POWER THEFT
IDENTIFICATION SYSTEM” is the work done by:
1621206034 SATYABRATA JENA
Of B.Tech (Electrical Engineerning) of ABIT, Cuttack under BPUT, Odisha
submitted in partial fulfillment for the award of degree.
We are satisfied that he have worked sincerely and with proper care.
Signature of Supervisor/Guide Signature of External Examiner Signature of H.O.D
(Chandan Mandal) Prof. A.K.Mahapatra
5
ABSTRACT
Electricity Theft Identification System project is microcontroller based Electricity
Theft Identification system. This project will not only useful to electricity theft, and
also it will be useful the monitor and transfer energy, calculating the fare, and using
the prepaid card for paying the amount to an EB substation.
If suppose we implement the project for a complete network in an area, that will be
consuming very huge amount and it can calculate the energy transmission and
energy consumption. By using the above two values we can calculate the
transmission loses we are going to implement an energy meter with wireless
transmission for single house.
In a house to calculate the energy we have to monitor the existing energy meter
reading. The energy meter readings are taken by an optical sensor, which is kept in
between the slotted disk of the analog energy meter. Then the number of pulses will
be counted.
Then the microcontroller will display the energy output in seven segment LED
display. The accuracy of the meter depends on the existing meter.
6
CONTENTS
● INTRODUCTION 8-9
● HOW POWER THEFT OCCURS 9-10
● DIFFERENT WAYS OF MONITORING POWER THEFT 10-13
● PLC BASED ELECTRICITY THEFT DETECTION 13-18
● GSM BASED ELECTRICITY THEFT DETECTION 18-22
● ADVANTAGES & DISADVANTAGES 23
● CONCLUSION 23
7
INTRODUCTION:
Electricity generation , transmission and distribution involves operational
losses. Losses while generation of electricity can be technically defined, but losses
taking place while transmission and distribution cannot be only technical but also
nontechnical losses are involved .Technical losses which are occurring can be due
to power dissipation in transmission lines , transformers, leaking and loss of power
,overloading of lines.
Technical losses can be detected can be control to some extent and they are
computed with information about total load and total energy bill. Non technical
losses are occurred due to some immoral activities. Power Theft is the non ignorable
crime and also affects the economy of the nation adversely. For elimination of
electricity theft we have designed this system. Not completely but 95% of electricity
theft can be avoided. This system works independently without human intervention.
Implementation of this system will not only avoid the issue of electricity theft but
also will increase the number of consumers and will increase the economy of the
nation. Increasing economy is most important in developing country like INDIA.
ABOUT POWER THEFT:
It is the use of electrical power without a contract with a supplier with
total or partial bypassing of the metering system or interfering with this system in
such a way so as to adulterate its measurements or contract is understood here as a
valid oblingation to deliver power and to pay for it.
Electrical power by altering, slowing, resetting, swapping, or
disconnecting an electric meter. Theft also may occur by rewiring circuits to avoid
an electric meter, or by tapping into another customer’s electrical lines. The fraudster
might use devices to program the theft of power only during certain periods of theday
or week. A fraudster may rewire their property to illegally use power from cheaper
sources of power, or from meters that are billed at lower rates. The fraudster risks
8
electrocution and detection. Field employees of the power company are trained to
spot problems that result in persons not being billed for all the electricity they use.
Computerized billing systems are designed to detect erratic electricity use.
HOW POWER THEFT OCCURS:
It occours in many ways but the main reasons are
Slowing down the meter:
A common method of tempering older meters is to attach magnets to the outside of
the meter. When this happens, the rotor disc is exposed to a high magnetic field.
Hence the resultant is opposing magnetic field to the rotor highly increased leading
to slowing down of rotor or perfect stopping of the disc rotation.
The electricity meter is thus manipulated and ultimately power is consumed without
being paid.
Ex-Neodymium magnets
Inverting the meter:
Another common form of electricity theft is to invert the meter (pull the meter out
of the socket & plug the meter back in upside down, which causes the meter to run
backwards & the kWh register to count down instead of up).
Bypassing the meter:
Usually, the bypass supplies power to large and stable loads which will not trip fuses
in the case of overloads. Ex-jumpercables.
The rest of the circuits are supplied normally through the meter, so the bill, which is
close to average, does not suggest a theft.
Wires/ Cables:
Illegal tapping to bare wires or underground cables
Transformers:
Illegal terminal taps of overhead lines on the low side of the transformer
Billing irregularities made by meter readers.
9
FEW OTHER WAYS OF POWER THEFT:
● Unpaid bills by individuals, government institutions and “untouchable” VIPs.
● Useof single phasesupply from three phase supply.
● Disconnected neutral from both the ends.
● Used earth/separate neutral forreturn circuit.
● Connecting phase voltage to neutral of used single phase supply. Potential
difference w.r.t. neutral of used single phase supply is zero. Hence power
product of voltage and current, will be zero.
● Isolating neutral from both ends
DIFFERENT WAYS OF MONITORING POWER THEFT:
NON TECHNICAL SOLUTIONS:
Financial rewards:
Utility companies encourage consumers to report electricity theft.
Periodic checks:
Electricity theft frequently takes place after service has been disconnected. Some
utility companies periodically check disconnected meters if the customer has not
contacted them to reconnect service.
Enforcement of law:
Fines should be imposed by the government for stealing electricity
TECHNICAL SOLUTIONS:
Plastic meter encasements
Electronic tamper detection meter
Pre payment meters
Anti theft cable
Using GSM
Using PLCs
10
Plastic Meter Encasements:
Hard plastic encasements are a type of a meter seal. These transparent plastic covers
serve as a warning and therefore reduce electricity theft
Pre-Payment Meters:
Credit added to the meter on a keypad. Credit is purchased on a rechargeable token
or a card and entered into the meter with disconnection ability. It help in the
reduction of non paid bills and meter reading iregularities
11
Automatic Meter Reading (AMR):
The AMR system starts at the meter. Some means of translating readings from
rotating meter dials, or cyclometer style meter dials, into digital form is necessary in
order to send digital metering data from the customer site to a central point. In most
cases, the meter that is used in an AMR system is the same ordinary meter used for
manual reading but the difference with conventional energy meter is the addition of
some device to generate pulses relating to the amount of consumption monitored, or
generates an electronic, digital code that translates to the actual reading on the meter
dials. One such technique using optical sensor is shown in above figure.
The three main components of AMR system are,
1. Meter interface module: with power supply, meter sensors, controlling electronics
and a communication interface that allows data to be transmitted from this remote
device to a central location.
2. Communications systems: used for the transmission, or telemetry, of data and
control send signals between the
meter interface units and the central office.
3. Central office systems equipment: including modems, receivers, data
concentrators, controllers, host upload links, and host computer.
12
FUNCTONS OF AMR SYSTEM:
Every user has two PLC modems; one is for AMR and the other is used to send the
data from second energy meter chip to host PLC modem.
An energy meter must be connected in the connection box between a home line and
main power lines.
The host PLC unit must be placed in the distribution transformer and the
configuration of the addressing format of PLC signaling must be designed carefully.
PLC BASED ELECTRICITY THEFT DETECTION:
Power Line Communication (PLC):
Power line carrier communications take place over the same lines that deliver
electricity. This technique involves injecting a high frequency AC carrier onto the
power line and modulating this carrier with data originating from the remote meter
or central station. Power line communications has many new service possibilities on
the data transferring via power lines without use of extra cables. AMR is a very
important application in these possibilities due to every user connected each other
via power lines. In this power network, every user connected to each other via
modems with data originating from the remote meter or central station.
Electrical power systems vary in configuration from country to country depending
on the state of the respective power sources and loads. The practice of using medium-
voltage (11-to-33kV) and low-voltage (100-to-400V) power distribution lines as
high-speed PLC communication means and optical networks as backbone networks
is commonplace.
Under normal service conditions, they can be broadly divided into open-loop
systems, each with a single opening, and tree systems with radial arranged lines. In
the case of tree systems, connection points for adjacent systems are provided in order
that paths/loads may be switched when necessary for operation. Additionally, in
terms of distribution line types, there are underground cables and overhead power
distribution lines. Where transformers are concerned, they can be divided into pole-
mounted transformers, pad-mounted transformers and indoor transformers.
High-speed PLC applications of the future include Automatic Meter Reading
(AMR), power system fault detection, power theft detection, leakage current
13
detection, and the measurement/control/energy-management of electrical power
equipment for electrical power companies, as well as home security, the remote-
monitoring/control of electrical household appliances, online games, home
networks, and billing.
Detection and Control System:
The proposed control system for the detection of illegal electricity usage is shown
in above figure. PLC signaling is only valid over the low voltage VAC power lines.
The system should be applied to every low-voltage distribution network. The system
given in above figure belongs only one distribution transformer network and should
be repeated for every distribution network. Although the proposed system can be
used uniquely, it is better to use it with automatic meter reading system. If the AMR
system will be used in any network, the host PLC unit and a PLC modem for every
subscriber should be contained in this system.
In above figure, the host PLC unit and other PLC modems are named PLC1A,
PLCNA and are used for AMR. These units provide communication with each other
and send the recorded data in kilowatt-hour meters to the PLC unit. In order to detect
illegal usage of electrical energy, a PLC modem and an energy meter chip for every
14
subscriber are added to an existing AMR system. As given in above figure, PLC1B,
PLCNB and energy meter chips belong to the detector.
The detector PLC s and energy meters must be placed at the connection point
between distribution main lines and subscriber’s line. Since this connection point is
usually in the air or at underground, it is not suitable for anyone to access, such that
its control is easy. The main procedure of the proposed system can be summarized
as follows.
PLC signaling must be in CENELEC standards. In Europe, CENELEC has formed
the standard EN-50 065-1, in which the frequency bands, signaling levels, and
procedures are specified. 3–95 kHz are restricted for use by electricity suppliers, and
95–148.5 kHz are restricted to consumer use.
The recorded data in kilowatt-hour meters for every subscriber are sent to host PLC
modem via PLC modems, which is placed in subscriber’s locations. On the other
hand, energy meter chips are located at the connection points and read the energy in
kilowatt-hours and also send the data to host PLC unit.
This proposed detector system has two recorded energy data in host PLC unit, one,
which comes from the AMR-PLC, and the other, which comes from the PLC modem
at the connection points. These two recorded energy data are compared in the host
PLC; if there is any difference between two readings, an error signal is generated.
This means that there is an illegal usage in the network.
After that, the subscriber address and error signal are combined and sent to the
central control unit. If it is requested, a contactor may be included to the system at
subscriber locations to turn off the energy automatically, as in the case of illegal
usage.
15
Simulation:
The system model and simulation of the detection system of illegal electricity usage
is shown in above figure. It contains a host PLC modem, an energy meter chip and
its PLC modem, an electromechanical kilowatt-hour meter and its PLC modem, and
an optical reflector sensor system is loaded at the same phase of the power grid. The
energy value at the electromechanical kilowatt-hour meter is converted to digital
data using by optical reflector sensor. Disk speed of the kilowatt-hour meter is
counted and obtained data is sent to PLC modem as energy value of the kilowatt-
hour meter. At the system model, an illegal load may be connected to the power line
before the kilowatt-hour meter via an S switch. While only a legal load is in the
system, two meters are accorded each other to compensate for any error readings.
The host PLC unit reads two recorded data coming from metering PLC units. If the
S switch is closed, the illegal load is connected to the system, and therefore two
recorded energy values are different from each other.
The host PLC unit is generated when it received two different records from the same
subscriber. This is the detection of the illegal usage for interested users. In these
tests, the carrier frequency is selected at 132 kHz, which is permitted in the
CENELEC frequency band. In real applications, the AMR system may be designed
in all CENELEC bands. The data rate between the host and other PLC modems is
2400 b/s.
16
Data signaling between PLC modems has a protocol, which includes a header,
address, energy value data, error correction bits, and other serial communicati
changed according to the properties of the required system and national power grid
architecture.
Below figure shows the detection system for an electromechanical kilowatt-hour
meter system. In the digital energy meter system, the recorded energy may be
received in the digital form directly using the port of the meter. Therefore, there is
no need for an optical reflector system in digital meters. The results of the tests show
that this system may solve this problem economically because the budget of the
proposed system is approximately U.S. $ 20–25 per subscriber. It is very economical
and is a reliable solution when it is compared with the economic loss caused by
illegal usage
Overview of the proposed Detector System
The proposed detector system is the equipment and procedure for controlling more
remote stations from a master control station. It includes PLC modems, energy
meters, control logics, and the system software. The PLC modems are host and target
modems for two-way communications to and from the host station and the remotely
controlled targets. The energy meters include on bits such as parity and stop bits.
17
Metering chips and some circuit elements; the control and logic units compare
and generate the error signal in the illegal usage. The system software has two parts:
assembler program for the micro controller and the operating software for the
management of the overall system. Operating software may be downloaded from a
PC and should be placed in the main center of the system.
1) Every user has two PLC modems; one is for AMR and the other is used to
send the data from second energy meter chip to host PLC modem.
2) An energy meter must be installed in the connection box between a home line
and main power lines.
3) The host PLC unit must be placed in the distribution transformer and the
configuration of the addressing format of PLC signaling must be designed carefully.
4) The host PLC modems and its controller must include two addresses per every
user: one is the AMR and the other for the energy meter. These two addresses must
be selected sequentially.
5) Operating software must be designed for the information of every subscriber
in every sub power network: subscriber identification number, billing address, etc.
6) The system has two values of the energy consumption for every user, so if
there is a difference between them, an error signal is generated for the illegal user,
7) The proposed equipment is the only one distributed in the power network. So
this system should be repeated for all distribution power networks. All host units in
each distribution transformer may be connected to only one main center station via
phone lines, fiber-optic cable, or RF links.
GSM BASED ELECTRICITY THEFT DETECTION:
Proposed System:
In this proposed system GSM technology used to transmit the meter reading to the
customer and government with the required cost. This process will be happen when
needed that means if SMS is received from authorized server mobile transmission
between customer and government. Then the energy theft controlled by IR sensor,
Bypass detection. Also cut the power supply automatically as per request of
authorized server mobile.
18
Block Diagram Description:
PIC 18F4520:
The PIC is the main part of automatic reading and theft control. It is based on low
power 16 bit microcontroller. PIC 18F4520 consist of high performance and low
cost of network technology. PIC 18f4520 belongs to a class of microcontroller of
RISC architecture. It has internal 10 bit analog to digital converter.
POWER
Byp ass
Detection LCD
PIC
Se al 18F4520
Tempering
M AX232
Detection
Current,
voltage GSM
measurement
Rel ay
Power Supply:
The input to the circuit is applied from the regulated power supply. The AC input
that is 230V from the main supply is step down by the transformer to 12V and is
fed to a rectifier. The output obtain from the rectifier is a pulsating DC voltage. So
in order to gate a pure DC voltage, the output voltage from the rectifier is fed to a
filter to remove any AC components present even after rectification. Now this is
given to a voltage regulator to obtain a pure constant dc voltage.
Seal Tempering Circuit:
19
If the person theft the power in energy meter like, if he remove the seal which on
energy meter then IR sensor will send the signal to PIC microcontroller then it will
send the message to substation controller mobile through GSM modem.
Bypass detection unit:
If the person use a the power without connecting to energy meter, that means if he
is bypassing the connection in energy meter without any reading in energy meter
the person use power in houses at time our circuit send a message to substation
controller through GSM with help of PIC controller and cut the power supply
automatically by using relay.
Power Measurement Unit:
In the power measurement unit, the one CT is used to measure total current used
and measuring voltage, we use bridge of diode for converting AC to DC and then
voltage divider circuit reduce voltage level at measurable scale.
GSM Modem &MAX232 IC
GSM Modem-Max 232 is built with dual band GSM engine-SIM 900A. As
mentioned in the above sensing circuit there is power theft then it will send
message to microcontroller as per our program and it will send message to GSM
through Max 232. Also if mobile received SMS from authorized mobile phone to
cut the supply, then supply is off by using relay.
LCD Display:
The commonly used 16x2 LCD display custom made characters, numbers,
alphabets, and special characters. When there is no theft occur in energy meter then
the LCD will display voltage current and power. If theft is occurs then it display
THEFT IS DETECTED.
Flow chart:
To program a PIC controller to detect a power theft on following flow chart as
shown in figure
20
ST A RT
Bypass or seal
tampered
i ?
Display msg. on LCD Display msg. “NO
“THEFT DETECTED” THEFT
A lso send it to DETECTED” on
MOBILE LCD
Relay Cut the Power
Supply
Is SMS Received
on server mobile
to cut Supply?
Relay Cut the Power Supply
STOP
Flow chart
Hardware Design:
The hardware of the automatic meter reading and theft control system by using GSM
module our project at designing such a system which will automatically collect the
reading and also detect the theft. Current transformer is used to measure the total
power consumption for house or industrial purpose. This recorded reading is
transmitted to the electricity board as per his demand for transmitting the reading of
21
energy meter GSM module is used. The energy theft is control by IR sensor, IR is
placed in the screw portion of energy meter seal. If the screw is removed from the
meter message is send to the electricity board. The measuring of energy meter and
monitoring of IR sensor is done with a PIC microcontroller. Then bypass of meter is
detected by using to CT. One is in energy meter another is placed on electricity pole.
22
ADVANTAGES:
● The proposed system provides the solution for some of the main problems
faced by the existing Indian grid system, such as wastage of energy, power
theft, mannual billing system, and transmission line fault.
● This method will reduce the energy wastage and save a lot of energy for future
use.
● We can detect the location from where the power is being stolen which was
not possible before.
● Optimized use of energy.
DIADVANTAGES:
● One major disadvantage of this project is that it is not capable of detecting the
exact location from where the power is being stolen giving only a
approximation to that place.
● Cannot determine who is stealing, but even no other existing system is capable
of doing this.
● If implemented on a large scale it may take a lot of time and maual input.
CONCLUSION:
This method reduce the heavy power and revenue losses that occur
due to power theft by the customers. By this design it can be concluded
that power theft can be effectively curbed by detecting where the power
theft occours and informing the authorities. Also an automatic circuit
breaker may be integrated to the unit so as to remotely cut off the power
supply to the house or consumer who tries to indulge in power theft.
The ability of the proposed system to inform or send data digitally
to a remote station using wireless radio link adds a large amount of
possibilities to the way the power supply is controlled by the electricity
board.This system will reduce the energy wastage and save a lot for future
use.
23