0% found this document useful (0 votes)
38 views

Prevention of Power Theft Using Concept of Multifunction Meter and PLC

The document discusses electricity theft as a major issue and proposes using multifunction meters and programmable logic controllers to help prevent theft. It outlines common ways that theft occurs and explains how automated metering and monitoring systems could detect theft and losses more accurately than traditional meters.

Uploaded by

Muhammad Farhan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Prevention of Power Theft Using Concept of Multifunction Meter and PLC

The document discusses electricity theft as a major issue and proposes using multifunction meters and programmable logic controllers to help prevent theft. It outlines common ways that theft occurs and explains how automated metering and monitoring systems could detect theft and losses more accurately than traditional meters.

Uploaded by

Muhammad Farhan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/332687508

Prevention of Power Theft Using Concept of Multifunction Meter and PLC

Research · December 2018

CITATIONS READS
0 27

2 authors, including:

Uma Kumari
Mody University of Science and Technology
30 PUBLICATIONS   15 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Salesforce View project

Steganography View project

All content following this page was uploaded by Uma Kumari on 27 April 2019.

The user has requested enhancement of the downloaded file.


International Journal of Computer Sciences and Engineering Open Access
Survey Paper Vol.-6, Issue-12, Dec 2018 E-ISSN: 2347-2693

Prevention of Power Theft Using Concept of Multifunction Meter and


PLC
Uma Soni1 Uma Kumari2
Mody University of Science and Technology, Lakshmangarh, Indore

Available online at: www.ijcseonline.org

Accepted: 06/Dec/2018, Published: 31/Dec/2018


Abstract:- In the system and networks, abnormal behavior is detected by anomaly-based IDS (Intrusion Detection System). If
the working of a computer system is different from normal working is considered as an attack. The difference of
comparison relies on traffic rate, a variety of packets for every protocol etc. Malicious traffic or data on a system is detected by
intrusion detection process. To detect illegal, suspicious and malicious information and data, IDS can be a part of the software
or a device. First is Detection of an attack then using different method to stop, Prevent an attack and disaster is the user’s
highest priority. Anomaly-based IDS satisfy their requirement and demand.In present scenario electricity theft isa major hurdle
in front of government. This problem affects Indian economy. The loss on quantity of theft is mirrored in the electricity
company.People are affording more charges because intruders steal electricity by many ways.

Keywords: - Intrusion detection system, Anomaly based system, Electricity theft, Intruders.

I. INTRODUCTION automation technology then why not to use automation for


electricity distribution. If we are implementing the
Using different techniques of detection we are just automation technology in this field then we can get an
guaranteed sure levels of security and can't decide received amazing return and result both. So this was the major
information is actual and precise [5]. For security, we tend motivation behind this idea. If somebody steal electricity in
to use ADS (Anomaly based system) algorithms. ADS a building then every honor that lives in that building have
algorithms use the system status data knowledge received to to pay extra money [10]. I choose this idea by comparative
make a decision whether the working of the system is study of different idea of different authors. In this project
reliable or not. So we tend to set up investigation of various present a comprehensive view of smart electricity meters
ADS algorithms to dissect their conduct utilizing least and their utilization to remove intruders attack. We explain
knowledge to accomplish objective and check discovery in brief that how to meter process and what technologies and
ability [7]. Verification and privacy issue are solved with software are used to increasing more security and reliability.
cryptographic arrangements and avoid integrity attacks.
Checksums and Message Authentication Codes used for Ways of Theft:-
unmarked alterations of bundles in transmission. The goal There are various types of electrical power theft include:-
hub disposes of the parcel if they got the bundle and also the Direct hooking from line
code created by the message trait system does not It is the maximum used approach for theft of energy. Eighty%
coordinate. IDS techniques looking for signatures for of total energy theft anywhere in the global is done through
database assault. An attack signature could be a succession manner of direct tapping from line. The customer taps into a
of activities that are typically recorded in a security log. In direct energy distribution line from ahead of the electricity
the event that a grouping of events matches with known meter. This strength supply consequently is unmeasured in its
signatures then it will give an alarm. Within the event that a consumption and procured without or with switches [3].
grouping of occasions matches with known marks then a
caution has arisen. This type of detection is useful to Bypassing the electromechanical meter
acknowledge assaults with standard conduct or exceedingly In this method the input terminal and output terminal of the
dependable administrations. Intrusion detection methods energy meter has been shorten by a wire. So energy cannot
ways looking for irregularities will acknowledge changes be registered in the energy meter.
within the framework that don’t coordinate the traditional or
normal behavior. When we see towards the power Injecting foreign element into the electromechanical
distribution sector of our country then we will get to know meter:-Sometimes professional individuals inject foreign
that, a major part of power in getting theft in many manners. factors along with transistors, resistors or IC chips into the
Now we could not do much to stop it. The old system is still electric meter which reasons a lower consumption of power.
as it is. In present time we are very much advance in

© 2018, IJCSE All Rights Reserved 443


International Journal of Computer Sciences and Engineering Vol.6(12), Dec 2018, E-ISSN: 2347-2693

Drilling holes into electromechanical energy meter: - This countries are using Intelligent modeling scheme for
sort of tampering is accomplished to electromechanical type's detection of line losses in power distribution system [11].
meters. The person inserts overseas material within the meter All the methods are using these methods to control theft but
to obstruct the free motion of the rotating disc. some problems are still there.

Inserting film: - By inserting the film inside meter will Smart meters are used or installed in homes and in other
slow down the speed of the disc, that will slow the meter region of world [1]. USA and Europe have been using
readings. smart meters. Australia and Canada are also using this.
About all countries of the world like Eastern Europe
Depositing a highly viscous fluid: - The America, North Africa, South Africa and Asia using
friction causes the fluid to flow very slowly so consumption meters. Use of smart meters more in 2018 than previous
of electricity became lower. years. Now if we talk about present scenario all countries
using smart meters to save energy and cost from intruders
Using strong magnets like neodymium magnets: -Strong attack. It include easier Billing , processing automatic
magnets are used to slow the meter down. These types reading, detection of energy losses and early warning of
of magnet put both the sides of meter. So it become intrusion and fast detection of disturbances in energy
slow and show lower consumption. supply[2]. In these meters we cannot find exact location of
theft. On the basis of readings we decide there may be
Changing the incoming and outgoing terminals of the possibility of theft.
meter: - Changing the input output terminals will change
the direction of electromagnetic field and that will change To overcome these ways of theft we use different idea of
the rotating direction of disc, so the reading digits will move save energy and intrusion detection in energy by using
in reverse direction. MFM meters, profibus cable, PLC and SCADA to take
exact readings on every second and give information about
Damaging the coil of the meter: - Injecting excess current consumption of energy daily, weekly, monthly and yearly.
in meter current coil will damage the coil and due to that We find out energy stealing point at that time when intruder
meter will not get the current input that will affect the meter steal energy [9]. Take action according to type of intrusion
readings. as soon as possible. So chances of theft decease. It creates
easy billing, reduce man power cost and safe and secure
Resetting electromechanical meter reading: - By physical system than others.
damaging the meter they will rotate and reset the digits of
the meter. A meter is used to record various parameters in an Proposed Algorithm:-
electrical circuit. It can be used to record values like voltage, We propose an algorithm to control and overcome these
current, resistance, frequency, and extra factors depending ways of theft and save energy and reduce cost. So these
on the meter. It is the process of meter that takes analog steps are using for further procedure to control theft
signal as an input signal and then change into digital signal completely.
as an output. These output signals represent binary digits [1]. Install MFM meter on lighting pole.
read by microprocessor. The processor can be programmed [2]. Connect input (current and voltage) to MFM meter.
to interpret the incoming information which is shown at the [3]. Install PLC and computer system in working office of
screen [3][8]. electrical board.
[4]. Install software (simatic manager and SCADA
Damage by mechanical shock:-A meter is damaged software) in computer system.
bymechanical shock. A mechanical shock is a unexpected [5]. Connect PLC to system by Ethernet cable.
acceleration caused, as an example, by means of impact, [6]. Communicate PLC and system (PLC to SCADA).
drop, kick, and explosion. Shock is a brief bodily excitation. [7]. Assign node address to MFM.
[8]. Communicate MFM to PLC with profibus DP cable.
II. METHODS OF POWER THEFT CONTROL [9]. Specify about MFM in PLC and assign address to input.
[10]. Create point configuration in SCADA and assign
To control power theft HVDS system. If someone tries to address for each signal as specify in PLC.
steal electricity from meter by any type of theft method then [11]. Now all information about a node will display on
it controls them and damage machines [3]. Neural networks screen (output).
using SVM model and smart meters use to control theft. [12]. If there is any hurdle in communication and I/O
Now a day’s all the countries are using advanced metering then check again step 3.
infrastructure and power theft control via plc system [8]. All

© 2018, IJCSE All Rights Reserved 444


International Journal of Computer Sciences and Engineering Vol.6(12), Dec 2018, E-ISSN: 2347-2693

Flowchart:-

Installation and communication:- define communication protocol. Then Specify the MFM
First Install MFM meter on lighting pole and Connect input hardware details in the hardware configuration through GSD
(current and voltage) to MFM meter. Install PLC and file. After installing GSD we will find catalog box where we
computer system in working office of electrical board. can find hardware and model no. detail of MFM which we
Install software (simatic manager and SCADA software) in are communicating.
computer system. Connect PLC to system to Communicate
and Assign node address to MFM. Communicate MFM to Select the particular MFM meter with correct model no.
PLC with profibus DP cable and Specify about MFM in from catalog box and Specify the memory address in CPU
PLC and assign address to input. Then Create point and data required from MFM. In the same manner we can
configuration in SCADA and assign address for each signal add multiple meters in the same network through profibus
as specify in PLC. Now all information about a node will cable. For showing the input values on computer screen
display on screen (output). which is sent by MFM to PLC, we need to create point
After installation we defining Hardware Configuration and configuration in SCADA. By the help of this proposal we
Specify the CPU hardware details in the program and also track online and save energy and money both.

© 2018, IJCSE All Rights Reserved 445


International Journal of Computer Sciences and Engineering Vol.6(12), Dec 2018, E-ISSN: 2347-2693

III. RESULTS monitor every meter. If there is any problem related to bus
communication and distribution line then easily monitored
We generate result of all meters in this way. We track all and repaired to save energy.
meters regularly to know where theft is. So we can easily

Fig:-1Showing the report on voltage, current and power factors of meter.

We generate power report according to result daily, weekly, monthly and yearly basis.

Fig:-2 Daily and monthly basis report.

© 2018, IJCSE All Rights Reserved 446


International Journal of Computer Sciences and Engineering Vol.6(12), Dec 2018, E-ISSN: 2347-2693

IV. CONCLUSION Journal of Electrical Power & Energy Systems, Volume


63, December 2014.
[11]. A. Rial and G. Danezis, “Privacy-Preserving Smart Metering”,
Using this algorithm we reduce the ways of electricity theft.
Proceedings of the 10th annual ACM workshop on Privacy in
To control power theft smart meters are used. Energy the electronic society, 2011.
Consumption is calculated by using electronic smart meters. [12]. K. Laeeq, W.Laeeq, “A comparative study among possible
it’s a two-way communication any power theft or problem wireless technologies for smart grid communication networks”,
in power system it recognizes. Here in this method we are In: First international conference on modern communication &
going to use smart meters to control power theft. Generally computing technologies; 2014.
[13]. R.Kalaivani, M.Gowthami,S.Savitha, N.Karthick, S.Mohanvel,”
consider an apartment consists of ‘n’ number of users. In the GSM Based Electricity Theft Identification in Distribution
middle we need to set up an inspector box and another two Systems”, International Journal of Engineering Trends and
meters from transmission & receiving side. The current Technology (IJETT) – Volume 8 Number 10- Feb 2014.
flows through head, inspector & users. If there is any type of
theft occurs, it creates difference in flow. So inspector gives
an alarm to control power theft who regularly monitor.

Here we have reviewed some methods of power theft and


control over power system .This consists of methods &
controlling techniques of power theft loses occurring in
transmission are of two types technical& non-technical
losses. Technical loses are common but these non-technical
losses cannot be controlled. To control theft, there are so
many techniques like smart meters, HVDS system, neural
networks and PLC system. These controlling methods are
reviewed in this paper with the comparison of proposed
method . We have thoroughly studied and compared
different types of power theft and methods to control them.

REFERENCES

[1]. D. Alahakoon and Xinghuo Yu, “Smart Electricity Meter Data


Intelligence for Future Energy Systems: A Survey” , IEEE
TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL.
12, NO. 1, FEBRUARY 2016 .
[2]. Q. Sun, H. Li, Z. Ma, “A Comprehensive Review of Smart
Energy Meters in Intelligent Energy Networks” , January 2015.
[3]. B.Saikiran, R.Hariharan, “Review of methods of power theft in
Power System” ,International Journal of Scientific &
Engineering Research, Volume 5, Issue 11, November-2014.
[4]. N. Mohammad , A. Barua and M.Arafat,“ A Smart Prepaid
Energy Metering System to Control Electricity Theft”, 2013
International Conference on Power, Energy and Control
(ICPEC).
[5]. S. McLaughlin, D. Podkuiko, and P. McDaniel, “Energy Theft
in the Advanced Metering Infrastructure”, International
Conference on Critical Information Infrastructures Security,
2016.
[6]. R. Berthier, W. H. Sanders, and H. Khurana, “Intrusion
Detection for Advanced Metering Infrastructures: Requirements
and Architectural Directions” , 2010 First IEEE International
Conference on Smart Grid Communications.
[7]. Victor C. M. Leung, “Electricity Theft Detection in AMI Using
Customers' Consumption Patterns”, IEEE Transactions on Smart
Grid · May 2015.
[8]. J. Nagi, K. S. Yap, S. K. Tiong,” Detection of Abnormalities
and Electricity Theft using Genetic Support Vector Machines”,
IEEE paper on march 1, 2009.
[9]. Thomas B.Smith, “Electricity theft: a comparative analysis”
Elesvier 2004.
[10]. R.Rashed, M.AlanFung, F.Mohammadi, K.Raahemifar, “A
survey on Advanced Metering Infrastructure”,International

© 2018, IJCSE All Rights Reserved 447

View publication stats

You might also like