Professional Documents
Culture Documents
GSM Based Power Theft Control System
GSM Based Power Theft Control System
JIMMA UNIVERSITY
JIMMA INSTITUTE OF TECHNOLOGY
SCHOOL OF ELECTRICAL AND COMPUTER ENGINEERING
INDUSTRIAL CONTROL ENGINEERING STREAM
Abstract
Electrical energy is very important for ever day life and a spine for the industry. Electricity is
indiscipline to our daily life with increasing need of electricity the power theft is also increasing
power theft is a problem that continues to plague power sector across the whole country. Electrical
power theft detection and control system is used to detect the consumer when they try to use the
power illegally. Electricity theft happens when the customer use energy meter tampering such as
placing magnet near to energy meter, disconnecting the neutral line and shorting the phase coil of
the current transformer. For this theft mechanism we designed a system to overcome this
challenges. Two current transformer is used to measure the reading of electricity one is for
measurement of phase current and the other is to measure the turning back or neutral current. Those
signals fed to micro controller through the bridge rectifier microcontroller will compare both
signals. Depend on the comparison made by the microcontroller decides whether theft is going on
the energy meter or not and the message will be sent to notify the authorterized power vendor using
GSM for that energy meter. Moreover when there is occurrence of theft the relay will disconnect
the load from the electricity power. That is GSM based power theft control system is developed.
We used protest software to analyze and estimate what the hardware will look like. Mainly this
system consists of microcontroller, energy meter, current transformers, LDR, relay, LCD and GSM
module.
JIT.ECE Page I
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
Acknowledgement
First of all we would like to thank Jimma Institute of Technology, School of Electrical and
Computer engineering department to give us this marvelous enlightening chance. Which enable to
build ourselves with both the theoretical and practical knowledge; Secondly our heartfelt
Gratitude goes to our advisor Solomon W.Tsadik (MSc) and co-advisor Mr. Mulegeta H. for his
unreserved suggestion, idea and motivation throughout the completion of this project
JIT.ECE Page II
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
Table of Contents
CHAPTER ONE .................................................................................................................................................... 1
1. INTRODUCTION .............................................................................................................................................. 1
1.1 Background Information....................................................................................................................... 1
1.2 Statement of the problem ...................................................................................................................... 3
1.3 Objectives................................................................................................................................................ 4
1.3.1 General objectives ........................................................................................................................... 4
1.3.2 Specific objectives ........................................................................................................................... 4
1.4 Methodology ........................................................................................................................................... 4
1.5 Scope of project ...................................................................................................................................... 5
1.6 Organizations of the Thesis ................................................................................................................... 5
CHAPTER TWO ................................................................................................................................................... 6
2.1. LITERATURE REVIEW .................................................................................................................... 6
CHAPTER THREE ................................................................................................................................................. 8
3. SYSTEM DESIGN AND ANALYSIS ..................................................................................................................... 8
3.1 System block diagram............................................................................................................................ 9
3.2.1 Block diagram description ............................................................................................................. 9
3.2 System Components and Operation ................................................................................................... 10
3.2.1 Current transformer ..................................................................................................................... 10
3.2.2 Electric energy meter .................................................................................................................... 11
3.2.3 GSM modem .................................................................................................................................. 13
3.3.4 Relay ............................................................................................................................................... 15
3.2.5 Microcontroller ............................................................................................................................. 17
3.2.6 LCD display ................................................................................................................................... 22
3.2.7 Light depending resistor (LDR)................................................................................................... 24
3.3. Ways of electricity theft .................................................................................................................. 24
3.3.1 Proposed solution for power theft ............................................................................................... 28
CHAPTER 4 ....................................................................................................................................................... 30
4. Result and discussion ................................................................................................................................... 30
4.1. System flow chart ................................................................................................................................ 30
4.2. Software simulation result.................................................................................................................. 32
4.3. Working principle of the system ........................................................................................................ 34
5. Conclusion and Recommendations.............................................................................................................. 36
JIT.ECE Page IV
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
JIT.ECE Page V
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
Acronym
D: Diode
I/O: Input/output
IT: Information Technology
JIT.ECE Page VI
DECLARATION
We declare that all the works included in this document are our own work and no copying or
Plagiarism is there with our work. We assure that we all agree with the information written
above with our signature as follows.
Signature________________________
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
CHAPTER ONE
1. INTRODUCTION
1.1 Background Information
The electricity is needed to be protected for efficient power delivery to the consumer
because electricity is indispensable to domestic and industrial development activity.
Generation, transmission and distribution of electrical energy involve many operational losses.
There are two types of losses technical and Nontechnical losses overall technical losses occur
naturally and are caused because of power dissipation in transmission lines, transformers, and other
power system components. Technical losses in transmission and distributions computed with the
information about total load and the total energy billed. While nontechnical losses cannot be
precisely computed, but it can be estimated from the difference between the total energy supplied to
the customers and the total energy billed. Moreover non-technical losses are illegal utilization of
power by electricity consumers.
An electricity theft is one form of nontechnical loss, it can be in the form of meter tampering,
stealing or illegal connections, billing irregularities, and unpaid bills. The financial impacts of theft
are reduced income from the sale of electricity. This illegal electricity usage may indirectly affect
the utility company and the economic status of a country also.
Electricity theft, a common form of commercial losses, involves tampering with meter.
Commercial losses are nearly impossible to measure using traditional power system analysis tools.
This is due to the lack of information on both commercial and the legitimate loads in the system.
Despite the best efforts by utilities, the current results of commercial losses measurements are often
inaccurate at best, because the data rely heavily on the records of detected cases, rather than by
actual measurement of the electrical power system. Certainly utilities have some control over the
magnitude of commercial losses; but even with their best efforts, some commercial losses will still
continue.
JIT.ECE Page 1
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
A design of electricity theft monitoring system has been generated. It saves time as well as help to
maximize profit margin for utility company working in electrical distribution network. Utility
company can keep a constant eye on its costumer. This project provides an overview of GSM based
efficient and effective Power Management. As of days the problem of electricity theft has
increased in rural areas and in industrial parks. Also these thefts are quite noticeable in urban
houses too. As a solution to this problem, an electronic system that can control this is of great
requirement. This project adds a new security measure to such type of electricity theft control. The
design is compact enough to setup this system in houses and industries.
JIT.ECE Page 2
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
One of the rules that should respect might be legal usage of electrical power. But this rule might not
be respected due to inability to payback the used electricity to escape from huge utility bills, Weak
economic situation in many countries has implied its effect directly on common Man, Countries
with weak enforcement of law against electricity and Corrupt political leaders and employees of the
utility company are responsible for billing irregularities.
This usage of electricity could come up with sever negative effects. Primarily, electricity theft
affects the utility company and then its customers. In energy market, utility companies expect their
money back from the customers for the electricity supplied, most of which is lost by them due to the
NTL (Non-technical losses).Electricity theft is a serious concern for utility companies as they
are under threat of survival because of these incurring economic losses.
In order to exist the utility supplier the above effects should be eliminated. So that we designed a
system which overcome electricity theft. That is GSM based power theft control system. This
system detects theft without any human intervention. So that the vendor can simply notice via SMS
message and can also take corrective mechanism where the problem is occurred.
JIT.ECE Page 3
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
1.3 Objectives
1.3.1 General objectives
To design GSM based power theft control system in order to detect Electricity power theft and notify the
theft to electricity utility power supplier via SMS message.
1.4 Methodology
A development method may be regarded as a path or a procedure by which the developer proceeds from a
problem of a certain class to a solution of a certain class. A method, to be worthy of the name, must at least
decompose the development task into a number of reasonably well-defined steps which the developer can
take with some confidence that they are leading to a satisfactory.
Methodology of GSM based power theft control system involves the following steps:
System design
Coding, testing
JIT.ECE Page 4
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
We design the hard ware and we simulate the project with the help of protest software and Arduino
micro controller respectively.
Chapter 2: in this chapter literature reviews and comparing our work with others have been
discussed.
Chapter 3: discusses about the overall system description with block diagram; system component
and flow chart; way of power theft by energy meter and their proposed solution and overall system
design and analysis
Chapter 4: this chapter contains discussion and software simulation result of the design
Chapter 5: This chapter contains Conclusion and Recommendations for future work
JIT.ECE Page 5
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
CHAPTER TWO
2.1. LITERATURE REVIEW
Electricity theft, which is the practice of using electricity from the utility company without the
Company’s authorization or consent, is a major problem challenging power utilities worldwide.
Electrical theft could be inform of billing irregularities, meter tampering and unpaid bills. But the
most prominent include illegal Connection and meter tampering. Various ways of tampering the
meter has been elucidated. However, since electricity is indispensable to domestic and industrial
development activities of a Nation, thus it needs to be protected and monitored for effective and
efficient power delivery he Consumers. Basically, electricity theft often resulted to overloading of
the generation units and this adversely affects the utility company in terms of revenue. In addition,
electricity theft raises safety concerns Such as electric shocks leading to death and maiming of
personnel’s, hence the need to prevent and minimize the adverse impact of electricity theft has
attracted the interest of this study. An Electricity meter or Energy meter is a device that
measures the amount of electric energy consumed by a residence, commercial and industrial, or an
electrically powered device. Electricity meters are typically calibrated in billing units, the most
common one being the kilowatt hour. One of the major challenges in energy mater in recent
time, is the detection elimination electricity theft. However, the previous theft control system is
manual. That is moving from house to house in monitoring the power.
A constituency has been proposed to be created through effective communication with the
important stakeholders, institutionalization of new business processes that adopt modern
technology, and improvisation of management information systems. Periodic inspection of illegal
connections involves a lot of labor and strain for vigilant officials. The shunts detecting equipment
proposed is time efficient and helps in the detection of electricity theft in underground distribution
cables. Revenue Assurance and Audit Process (RAAP) is composed of macro-functions to detect
and analyze revenues involved in illegal consumption of electricity. Several technical measures
were also implemented in order to detect and help utilities in their battle against NTL. GE has
patented an energy meter that reads electricity consumption correctly, even if the in-going and out-
coming meter terminals are reversed. This invention stopped illegal consumers from using their
energy meter in the reverse direction to reduce their utility bill. Installation of a prepaid energy
JIT.ECE Page 6
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
meter can be a solution to monitor the distribution system and control electricity theft. Location of
electricity theft on a distribution feeder can be detected based on the values of the phase angle and
impedance of the transmission lines at two different operating frequencies respectively. The value
of energy read by the central observer meter is compared with the sum of energy consumption
values read by all energy meters in range. These two values of the current are compared to estimate
the total electricity that is being consumed illegally.
Vigilant Energy Metering System (VEMS) is a proposed energy metering system that can fight
electricity theft. It has the ability to collect, transfer and process data between other energy meters,
local station and base station. It also identifies probable locations of theft and helps the utilities to
control theft. A remote billing system can also be developed modifying this model. Illegal
consumption of electricity can be detected by using a remote check meter based on the amount of
losses and time stamp of the check meter. This method is implemented before inspecting the illegal
consumers personally by the vigilance officials, based on the data at the proper frequency of the
consumer measurements. A microcontroller based energy meter gives utilities the ability to monitor
and control the power supply of its spatially distributed consumers. This meter acts as a check meter
that helps detect maters that have been tampered.
This paper discusses the problem of electricity theft as well as proposed a new method for its
prediction and detection. The proposed method has the following advantages over the existing
schemes, which are out lined here under. The need for the disconnection of power supply before is
no longer taken care of by the electrical workers because the proposed theft control system
automatically disconnects it when the consumers steal electricity. GSM is applied in system
monitoring: Nowadays, GSM modules are used to transmit the information about power theft to
utility company. The main aim of this work is to use the GSM network alongside in reducing theft
and losses. This also can be used to disconnect the power supply to the house in case of electricity
theft. In case of tampering, it immediately sends signal to the central server of the utilities. Another
advantage of the GSM is that it enables the utility engineers efficiently plan for network expansion
while delivering.
JIT.ECE Page 7
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
CHAPTER THREE
SYSTEM DESIGN AND ANALYSIS
3.
JIT.ECE Page 8
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
JIT.ECE Page 9
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
Current transformers (CT's) provide a simple, inexpensive and yet accurate means of sensing
current flow in power conductors. They are available in 3 basic configurations:
1. Ring Core CT's are available for measuring currents from 50 to 5000 amps, with windows
(power conductor opening size) from 1" to 8" diameter.
2. Split Core CT's are available for measuring currents from 100 to 5000 amps, with
windows in varying sizes from 1" by 2" to 13" by 30". Split core CT’s have one end
removable so that the load conductor or bus bar does not have to be disconnected to install the CT.
3. Wound Primary CT's are designed to measure currents from 1 amp to 100 amps. Since the
load current passes through primary windings in the CT, screw terminals are provided for the load
and secondary conductors. Wound primary CT's are available in ratios from 2.5:5 to 100:5 (Models
189 and 190 are examples of wound primary CT's). CT's used with watt transducers enable the
owner to control demand as well as monitor building and/or tenant power consumption. When CT's
are used with Current Transducers, the results are an excellent method of diagnosing the
performance of fans, pumps, chillers, etc. The Model 4CMA and 4CTV Current Transducers
provide alarms for each motor so the owner is warned immediately of any abnormal operating
condition. Low pump flows will be alarmed if the strainer is dirty or the coupling is broken. Low
fan flows will be alarmed if filters are dirty, belts are slipping, or dampers (fire, smoke, etc.) are
closed. High motor loads will alarm if bearings are dry or worn, or belts are out of alignment. CT’s
are designed to handle motor inrush currents, so no extra precaution is needed to monitor motors.
JIT.ECE Page 10
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
CT Accuracy
A CT is most accurate at rated current with a low burden (load). Accuracy decreases with
increased burden (load) or low line current. In sizing CT's the conductor size and distance is
important. Improper sizing of current transformers or long secondary conductor runs with
undersized cable can result in poor accuracy. CT's that are used to monitor motor loads can be sized
from the nameplate full load motor amps.
Mounting CT's
CT's are generally located in the main breaker panel or in branch distribution panels where space
is always at a premium. Since CT's do not have to be installed 90 degrees to the conductor run (the
conductors can go through the CT at any angle) they are generally held in place with plastic tie
wraps. CT's with mounting feet are available if appearance is important and there is enough room to
accommodate this type of mounting arrangement.
JIT.ECE Page 11
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
1. ANALOG METER
The analog meter operates by counting the revolutions of an aluminum disc which is made to
show revolutions proportional to the energy consumption. CT (Current Transformer) measures
the phase current (IP) and PT (Potential Transformer) measures the phase voltage to calculate
energy consumption. The meter itself consumes a small amount of power, typically around 2 watts
for operation. At normal condition, current flowing from the phase (IP) should be equal to current
returning through the neutral (IN).
Digital signal processor or high performance microprocessors are used in digital electric meters.
Voltage and current transducers are connected to a high resolution ADC. Once it converts analog
signals to digital samples, voltage and current samples are multiplied and integrated by digital
circuits to measure the energy consumed. It is programmed in such a way that it calculates energy
according to the tariff and other parameters like power factor, maximum demand, etc. and stores all
these values in a nonvolatile memory EEPROM. It contains real time clock (RTC) for calculating
time for power integration, maximum demand calculations. Furthermore it interacts with liquid
crystal display (LCD), communication devices and other meter outputs. Battery is provided for
RTC and other significant peripherals for backup power.
Digital meters are advanced versions of the analog energy meters. They have more protective
options than analog meters have. It measures both IP and IN. IP is measured by taking the voltage
of a shunt resistor connected in series with the line and later converting it to current in the
microprocessor unit of the meter. IN is measured by the CT. At normal condition, IP and IN are of
equal value. This value along with the phase voltage value from the PT is provided to the
microprocessor unit inside the meter to calculate the amount of energy consumed and shown in
LCD (Liquid Crystal Display). So, the operation is digital here requiring no rotating disk.
JIT.ECE Page 12
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
This diagram shows the flow of the data via a GSM module. The first embedded device is the
microcontroller which sends the data to the module. The module then via wireless link will send the
data to the GSM receiver in mobile phone. The mobile phone here acts as a second embedded
device which reads the data more and more applications emerged with the rapid development of
wireless data services, such as meter navigation, remote monitoring, wireless Internet access,
wireless point of sale (POS) etc. Thus, more and more devices need to be able to do wireless
communication.
Basic commands are AT commands that do not start with "+". For example, D (Dial),
A (Answer), H (Hook control) and O (Return to online data state) are basic commands.
Extended commands are AT commands that start with "+". All GSM AT commands are
extended commands. For example, +CMGS (Send SMS message), +CMSS (Send SMS
message from storage), +CMGL (List SMS messages) and +CMGR (Read SMS messages)
are extended commands.
JIT.ECE Page 14
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
Operation of GSM
AT commands are used by the computers to control modems. Both the GSM modems and dial-
up modems support a fixed set of standard AT commands. GSM modem can be used like a dial-up
modem. Apart from the standard AT commands, GSM modems also support an extended set of AT
commands. These extended set of AT commands are defined in the GSM standards. With the
extended AT commands, several things are done:
GSM Network
Utilizing an existing cellular network for data transportation requires no additional equipment
or software, resulting in a significant savings in both time and capital. Cellular technology utilizes
an encryption technique to prevent an outside source from receiving the transmitted data. The
cellular network provides full two-way communications, allowing scheduled reads, demand reads,
alarm and event reporting, power outage reporting and power restoration reporting.
3.3.4 Relay
A relay is usually an electromechanical device that is actuated by an electrical current. Relays
are like remote-control switches and are used in many applications because of their relative
simplicity, long life, and proven high reliability. Relays are used in a wide variety of applications
throughout industry, such as in telephone exchanges, digital computers and automation systems.
Highly sophisticated relays are utilized to protect electric power systems against trouble and power
blackouts as well as to regulate and control the generation and distribution of power. Although
relays are generally associated with electrical circuitry, there are many other types, such as
pneumatic and hydraulic. Input may be electrical and output directly mechanical, or vice versa.
JIT.ECE Page 15
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
The working of a relay can be better understood by explaining the following diagram given below.
The diagram shows an inner section diagram of a relay. An iron core is surrounded by a control
coil. As shown, the power source is given to the electromagnet through a control switch and
through contacts to the load. When current starts flowing through the control coil, the electromagnet
starts energizing and thus intensifies the magnetic field. Thus the upper contact arm starts to be
attracted to the lower fixed arm and thus closes the contacts causing a short circuit for the power to
the load. On the other hand, if the relay was already de-energized when the contacts were closed,
then the contact move oppositely and make an open circuit. As soon as the coil current is off, the
movable armature will be returned by a force back to its initial position. Relays are mainly made for
two basic operations. One is low voltage application and the other is high voltage. For low voltage
applications, more preference will be given to reduce the noise of the whole circuit. For high
voltage applications, they are mainly designed to reduce a phenomenon called arcing.
JIT.ECE Page 16
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
3.2.5 Microcontroller
Microcontroller is a small computer on a single integrated circuits containing processor core, memory
and programmeble input/output referance. For our project we choose Arduino UNO3 microcontroller.
Because it can easily interface with the system. Moreover it is easily programmed for opertaion of desired
performance.
Arduino microcontroller
Arduino is a tool for making computers that can sense and control more of phisical world than our
desktop computer. It is an open source physical computing platform based on simple microcontroller board
and a development environment for writing software for the board. Arduino can be used to develope
interactive objects taking point from a variety of switches or sensors an controlling a variety of lights, motor
and other physical output. Arduino projectscan be standalone or they can be communicated with software
running on our computer (eg. Flash, proessing, MAX MSp). The boards can be assembled by hand or
purhased preassembled; the opensource IDE can be downloaded free.
The Arduino programming language is an implementation of Wiring, a similar physical computing plat
form, which is based on the Processing multimedia programming environment.The Arduino Uno is a mic
ro controller board based on ATmega 328.it has 14 digital input /out put pin (of which 6 can be
used as PWM outputs,6 analog inputs a 16 MHZ ceramic resonator a USB connection,a power jack
an ICSP haeder and a reset button. It contains every thing needed to support the micro controller
;simply connevt it a computer with a USB cable or power it with a AC to DC adapter or battery to
get started.
JIT.ECE Page 17
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
JIT.ECE Page 18
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
Pin description
Modulation) from which analog output can be taken from the Arduino board. There
is an inbuilt LED on pin 13.
Arduino can be powered using power jack, USB port. Apart from this it can also be
powered by using an external battery or AC to DC adaptor through pin VIN 5V, 3.3V:
there is a inbuilt regulator on the board. Through this regulator a constant DC
Supply of 5V, 3.3V is provided
JIT.ECE Page 19
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
parameter of Arduino
Operating voltage 5V
SRAM 2kb
EEPROM 1kb
Length 68.6 mm
Width 53.4 mm
Weight 25 g
JIT.ECE Page 20
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
I. pin Mode
Configures the specified pin to behave either as an input or an output. Pin Mode (pin, mode) pin:
the number of the pin whose mode you wish to set. Mode: either input or output.
Reads the value from a specified digital pin, either HIGH or LOW. Digital Read (pin) pin: the
number of the digital pin you want to read (int)
Reads the value from the specified analog pin. The Arduino board contains a 6 channel, 10-bit
analog to digital converter. This means that it will map input voltages between 0 and 5 volts into
integer values between 0 and 1023. This yields a resolution between readings of: 5 volts / 1024
units or, 4.9 mV per unit.
V. Analog Write
Writes an analog value (PWM wave) to a pin. After a call to analog Write, the pin will generate
a steady square wave of the specified duty cycle. The frequency of the PWM signal is
approximately 490 Hz.The Arduino IDE comes with a C / C++ library called “Wiring” (from the
project of the same name), which makes many common input/output operations much easier.
Arduino programs are written in C/C++, although users only need to define two functions in order
to make a runnable program: setup () – a function run once at the start of a program which can be
used for initializing settings, and loop () – a function called repeatedly until the board is powered
off. The code written in Arduino not be seen by a standard C++ compiler as a valid program, so
when the user clicks the “Upload to I/O board” button in the IDE, a copy of the code is written to a
temporary file with an extra include header at the top and a very simple main () function at the
bottom, to make it a valid C++ program. Since the IDE is pin oriented, we can quickly achieve our
desired logic and build a working model
JIT.ECE Page 21
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
The LCD display consists of command registers such as RS, RW (read and write), E(enable), data
bus(D0, D1, D2,…..D7) and a 5V VDD and others pin is describe table blow.
JIT.ECE Page 22
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
4 RS 0 = Instruction input
1 = Data input
6 EN Enable signal
JIT.ECE Page 23
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
A light dependent resistor works on the principle of photo conductivity. Photo conductivity is an
optical phenomenon in which the materials conductivity (Hence resistivity) reduces when light is
absorbed by the material when light falls i.e. when the photons fall on the device, the electrons in
the valence band of the semiconductor material are excited to the conduction band. These photons
in the incident light should have energy greater than the band gap of the semiconductor material to
make the electrons jump from the valence band to the conduction band. Hence when light having
enough energy is incident on the device more & more electrons are excited to the conduction band
which results in large number of charge carriers. The result of this process is more and more current
starts flowing and hence it is said that the resistance of the device has decreased. This is the most
common working principle of L
JIT.ECE Page 24
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
When, a consumer shorts the current coil of the meter the total current flows through the
shorted path, so the meter cannot detect the current flow through it. We know that electrical
power is given by the equation:
I: for current through and V for voltage across the device So, if the
current coil of the meter is shorted here I=0 ultimately leading to P=0. Therefore, the illegally
connected load is not detected by the meter.
JIT.ECE Page 25
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
A more common method of tampering analog meter is disconnecting the neutral line. In this
condition, the meter cannot detect any voltage difference across the supply line and neutral line. As
V=0 here, power will be zero by according to P=VI formula. So, no energy consumption will be
shown by the meter.
JIT.ECE Page 26
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
JIT.ECE Page 27
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
We used CT1 in series with in phase side and CT2 in neutral side. If phase coil is shorted, the
current flows through the shorted path so the CT1 current is zero but CT2 current is not zero. The
output of the two current transformer enter bridge rectifier and a regulated current will enter to the
microcontroller. Our device works with the value of the difference between the readings of two
CTs. If the difference is occur between the two transformers microcontroller will notify to power
supplier via GSM.SMS message will send to Power Company by GSM modem.
When the neutral line of the meter is opened with intention to tamper, no current flows through
the neutral line. So CT2 has no voltage. But CT1 has current. The difference between these two
voltage is transferred to the enter bridge rectifier and a regulated voltage will enter to the
microcontroller. If the difference is occur between the two transformers microcontroller will notify
to power supplier via GSM. SMS message will send to Power Company by GSM modem.
The aluminum disc of the meter is divided into four sectors each occupying same amount of
surface area. Two sectors are painted in black and rests are kept as they were before.
Among these four sectors two opposite sectors are of same color and the other two are without any
color in the proposed device an additional LED (Light Emitting Diode) and an LDR (Light
Dependent Resistor) were used to prevent magnetic tampering. The LED will always be on and the
light will fall upon the disc and the reflected light will be received by the LDR. LDR will convert
the received light into electrical voltage and transfer it to the microcontroller. The microcontroller
receives the voltage value thereafter. At normal condition, the disc keeps rotating and the LDR
output voltage is always changing. If someone attempts to tamper the meter by placing a
magnet the received voltage of microcontroller will not change. The disc will not rotate in this
case and therefore there will be no change in the voltage from LDR to microcontroller.
JIT.ECE Page 28
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
When microcontroller will not find any change in the voltage from the LDR, then SMS message
will send to Power Company by the help of GSM modem and indicate the occurrence of theft.
JIT.ECE Page 29
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
CHAPTER 4
4. Result and discussion
4.1. System flow chart
JIT.ECE Page 30
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
Current transformer(TRAN-2P2S)
Diodes (1N4001)
Capacitor
Voltage regulator(U1 7805)
Potentiometer (POT-HG)
Virtual terminal
LCD( 16*2 ,LM016L)
LED (LED-RED)
Load (lamp and motor)
Microcontroller (ARDUINO UNO R3)
Resistor (300 ohm)
Relay (RL1)
JIT.ECE Page 31
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
JIT.ECE Page 32
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
For this project we have write the source code on of electricity theft control system on special IDE
namely arduino.cc. This IDE consist of Writes an analog value (PWM wave) to a pin. After a call to
analog Write, the pin will generate a steady square wave of the specified duty cycle. The Arduino
IDE comes with a C / C++ library called “Wiring” (from the project of the same name), which
makes many common input/output operations much easier. Arduino.cc programs are written in
C/C++, although users only need to define two functions in order to make a runnable program:
Void setup () – a function run once at the start of a program which can be used for initializing
settings for this project we have initialize;
Pin Mode (7,OUTPUT);//This indicates connect the output pin of 7 to relay driver used to
open and close according we want
pin Mode(A0,INPUT);// this will indicates the input pin of AO of the microcontroller for
comparison system
Void loop () – a function called repeatedly until the board is powered off. For this project we have
used
CT1=analog Read(A0); //this will read all the inputs of the current transformer pin Ao
lcd.setCursor (0, 0);//telling the microcontroller to set the cursor of the LCD on the first line.
Lcd. print ("CT1 :");// display the word that is found on the under question mark.
The code that we have write in Arduino not be seen by a standard C++ compiler as a valid
program, so when we clicks the “Upload to I/O board” button in the IDE, a copy of the code is
written to a temporary file with an extra include header at the top and a very simple main () function
at the bottom, to make it a valid C++ program. Since the IDE is pin oriented, we can quickly
achieve our desired logic and build a working model.
JIT.ECE Page 33
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
JIT.ECE Page 34
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
(parallel capacitors can be used) and the load current is not too large, the output voltage will be almost as
smooth as pure DC. As a general rule of thumb, we are looking to have a ripple voltage of less than 100mV
peak to peak. Bridge Rectifier Ripple Voltage can be calculated
V ripple=current load (I)/ f*C
Where: I is the DC load current in amps, ƒ is the frequency of the ripple or twice the input
frequency in Hertz, and C is the capacitance in Farads.
VO=1.44*Vs=311.8
Ripple factor=Ripple/Vo*100=7/311.08*100=3%
From the data sheet 0f capacitor for 3% 0f ripple factor capacitor value is 0.01f
Where: I is the DC load current in amps, ƒ is the frequency of the ripple or twice the input
frequency in Hertz, and C is the capacitance in Farads.
The main advantages of a full-wave bridge rectifier is that it has a smaller AC ripple value for
a given load and a smaller reservoir or smoothing capacitor than an equivalent half-wave rectifier.
Therefore, the fundamental frequency of the ripple voltage is twice that of the AC supply frequency
(100Hz) where for the half-wave rectifier it is exactly equal to the supply frequency (50Hz). The
amount of ripple voltage that is superimposed on top of the DC supply voltage by the diodes can be
virtually eliminated by adding cheaper alternative is to use an off the shelf 3-terminal voltage
regulator IC, here we have used as a LM7805 (where “05” stands for the output voltage rating) for a
positive output voltage or its inverse equivalent the LM7905 for a negative output voltage which
can reduce the ripple by more than 70dB (Datasheet) while delivering a constant output current of
over 1 amp. The same is true for the second current transformer. Therefore ARDUINO UNO R3
will read the two analog signals then will compare and if there is a difference in reading of the two
microcontroller putting the two values of the current transformer and if and only if the electricity
theft cannot occur if both current transformers are equal unless otherwise reading difference in both
current transformers electricity theft is happened as a result the ARDUINO UNO R3 will tell by
send short message to power supplier electricity theft is happened using GSM modem consequently
ARDUINO UNO R3 will disconnect the load using relay. Red LED will glow when electricity theft
is happening.
JIT.ECE Page 35
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
CHAPTER FIVE
Electricity theft, a common form of commercial losses, involves tampering with meters to
distort the billing information of the power system. Commercial losses are nearly impossible to
measure using traditional power system analysis tools. This is due to the lack of information on
both commercial and the legitimate loads in the system, which translates to insufficient inputs for
any meaningful loss calculations. By this design it can be concluded that power theft can be
effectively curbed by detecting where the power theft occurs and informing the authority. Also an
automatic relay is integrated to the unit so as to remotely cut off the power to the house or customer
when someone try to indulge in power theft. The ability of the proposed system to inform or send
data digitally to a remote station using GSM adds a large amount of possibility to the way the
power supply is controlled by the electricity board.
JIT.ECE Page 36
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
5.2 Recommendations
Errors in accounting and record keeping that distort technical information though the
project was completed fairy and successfully there are still some that need to take place in order for
it to achieve its goal completely. It is better if the pick hour penalizing system is add to this GSM
power meter reader for minimizing the power usage at pick hour. It is better to deploy the GSM
power meter reader with GPS system that have virtually full coverage of all housing and building
areas across the country. We recommend to someone who want to do on this GSM based power
theft monitoring system by using GPS to the whole distribution system area to localize which
region, zone and specific area that power theft is occurred. Additionally, we have design GSM
based power theft monitoring on the popular tampering ways but we recommend to someone to
design better and wonderful system including all the power theft mechanisms such as direct taping
we have not included in this project.
JIT.ECE Page 37
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
References
[1] Terry Chandler,” The Technology Department of Automated Metering and Monitoring System”,
the 7th International Power Engineering Conference, pp.147-150, Nov.2005
[2] M.A.O liveira and C.C. Barioni, “Technical loss calculation by distribution system segment
with corrections from measurements”, Proc.20th international Conference and Exhibition on
Electricity Distribution, Prague, Czech Republic, June 2009,
[3] H.G.Rodney, Tan IEEE, C.H.Lee and V.H.Mok, 2007. Automatic Power Meter Reading System
using GSM Network. The 8th International Power Engineering Conference, PP: 465-469
[4] T.Chandler, The Technology Development of automatic metering and monitoring systems,
IEEE International Power Engineering Conference, Dec 2005
[6] C. J. Bandim, E. R. Alves ., A. V. Pinto, F. C. Souza, M. R. B. Loureiro, C. A. Magalhges and
F. Galvez-Durand, “Identification of Energy Theft and Tampered Meters Using a Central Observer
Meter: A Mathematical Approach”, Transmission and distribution conference and exposition, 2003
IEEE PES, vol. 1, pp. 163-168,2003.
[7] T. B. Smith, “Electricity Theft: a ComparativeAnalysis”, Energy Policy, Volume 32, Issue 18,
December 2008; 2003,
[8] http://www.arduino.cc
Source code
#include <LiquidCrystal.h>
#include<SoftwareSerial.h>
SoftwareSerial mySerial(9,10);
JIT.ECE Page 38
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
int ldrPin=A2;
float v;
void setup() {
Serial.begin(9600);
mySerial.begin(9600);
pinMode(A2,INPUT);
pinMode(6,OUTPUT);
JIT.ECE Page 39
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
//pinMode(10,OUTPUT);
pinMode(7,OUTPUT);
lcd.begin(16,2);
void loop() {
v=analogRead(A2);
v=map(analogRead(A2),0,1023,0,1);
lcd.setCursor(3,0);
lcd.print("LDR:");
lcd.print(v);
JIT.ECE Page 40
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
if(v==0){
lcd.setCursor(2,1);
digitalWrite(6,LOW);
delay(100);
digitalWrite(7,LOW);
delay(100);
delay(2000);
mySerial.println("POWER THEFT IS
HAPPENNED!!");
delay(2000);
JIT.ECE Page 41
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
else if (v==1 ) {
{lcd.setCursor(2,1);
digitalWrite(6,HIGH);
delay(100);
digitalWrite(7,HIGH);
delay(100);
JIT.ECE Page 42
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
Tampering code
#include <LiquidCrystal.h>
#include<SoftwareSerial.h>
SoftwareSerial mySerial(9,10);
int voltagePin=A0;
int currentPin=A1;
float CT1,CT2;
JIT.ECE Page 43
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
void setup()
Serial.begin(9600);
mySerial.begin(9600);
pinMode(6,OUTPUT);
//pinMode(10,OUTPUT);
pinMode(7,OUTPUT);
pinMode(A0,INPUT);
pinMode(A1,INPUT);
lcd.begin(16,2);
void loop()
{ CT1=analogRead(A0);
JIT.ECE Page 44
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
CT1=map(analogRead(A0),0,1023,0,5);
lcd.setCursor(0,0);
lcd.print("CT1:");
lcd.print(CT1);
CT2=analogRead(A1);
CT2=map(analogRead(A1),0,1023,0,5);
lcd.setCursor(9,0);
lcd.print("CT2:");
lcd.print(CT2);
if(CT1==CT2){
lcd.setCursor(2,1);
digitalWrite(6,HIGH);
delay(100);
JIT.ECE Page 45
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
digitalWrite(7,LOW);
delay(100);
else if(CT1>=CT2)
{lcd.setCursor(2,1);
lcd.print("power theft");
digitalWrite(6,LOW);
delay(100);
digitalWrite(7,HIGH);
delay(100);
delay(2000);
mySerial.println("POWER THEFT IS
HAPPENNED!!");
JIT.ECE Page 46
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
delay(2000);
else if(CT1<=CT2)
{lcd.setCursor(2,1);
lcd.print("power theft");
digitalWrite(6,LOW);
delay(100);
digitalWrite(7,HIGH);
delay(100);
delay(2000);
mySerial.println("POWER THEFT IS
HAPPENNED!!");
delay(2000);
JIT.ECE Page 47
GSM BASED POWER THEFT CONTROL SYSTEM 2015 GC
JIT.ECE Page 48