You are on page 1of 26

Technical Seminar

An Internet Of Things Solution For Real-time


Identification Of Electricity Theft And Power Outrages
Caused By Fault In Distribution Systems

Aatir Mohammed Dept. of Electrical and Electronics Engineering


1DT15EE001
PHASE 1
An Internet of Things solution for real-time
identification of electricity theft and power outrages
caused by fault in distribution systems
Kumar Nalinaksh, Lokesh Pathak & Dr.Vinay Rishiwal

Abstract—Smart grids is currently one of the most prevalent buzzwords in the academia as
well as the industry. A lot of work has been done to devise various algorithms and optimize
power grids and consumption usages by end users. Even after a decade of high end
research and publications, the solutions proposed have not been adopted and implemented
by industry. The reason being that a complete overhaul of the existing infrastructure would
be required, which makes the cost of doing so astronomical high. Another thing that puts a
big drain on the electrical and cash resources of power discoms is electricity theft.
Detection and eradication of power theft in third world countries like India is extremely
difficult due to infrastructure and manpower restraints. This paper proposes an IoT solution
that can be applied as an add-on to the existing infrastructure of power grids and discoms to
monitor and eradicate power theft, identify faults in distribution system, and upgrade the
existing grids to smart grids.
IOT-INTERNET OF TIHNGS
The Internet of things (IoT) is the network of devices such as vehicles, and
home appliances that contain electronics, software, sensors, actuators, and
connectivity which allows these things to connect, interact and exchange data.
The IoT involves extending Internet connectivity beyond standard devices,
such as desktops, laptops, smartphones and tablets, to any range of traditionally
dumb or non-internet-enabled physical devices and everyday objects.
Embedded with technology, these devices can communicate and interact over
the Internet, and they can be remotely monitored and controlled.

SMART GRIDS
A smart grid is an electrical grid which includes a variety of operation and
energy measures including smart meters, smart appliances, renewable energy
resources, and energy efficient resources. Electronic power conditioning and
control of the production and distribution of electricity are important aspects
of the smart grid.
Improvement in electricity distribution
efficiency to mitigate pollution
IEEE ISEE (may 2008)
Aditya Pyasi and Vishal Verma

Abstract: For electricity distribution companies, power theft is a problem of alarming


proportions in developing nations. In addition to causing massive financial losses, it increases
the pollution level due to unrestrained usage of free(stolen) power. Current methods to curb
theft include the adoption of 11kV LT distribution, HVDS (High Voltage Distribution System)
employing pole-mounted transformers, etc. We have attempted to provide an economic and
flexible method of detecting power theft using pole mounted FM band radio telemetry, which
will allow distribution companies to find and fix such problems with greater ease.
The report of theft cases in real time will allow the regulators to take action on the causes of
theft. A reduction of even 10% in theft can lead to conservation of 83000 GWhr/yr of electric
power in India. This will reduce the greenhouse gas emissions by 9.2 million tonnes of carbon
dioxide annually. Though the implementation of laws and policy plays an important role in the
prevention of pilferage cases this project is a step to assist the policy makers.
COLLUSION AND FRAUD DETECTION ON ELECTRONIC
ENERGY METERS: A USE
CASE OF FORENSICS INVESTIGATION PROCEDURES
RUBENS ALEXANDRE DE FARIA AND SING KIONG NGUANG

Abstract— Smart meters (gas, electricity, water, etc.) play a fundamental role on the
implementation of the Smart Grid concept. Nevertheless, the rollout of smart meters
needed to achieve the foreseen benefits of the integrated network of devices is still slow.
Among the reasons for the slower pace is the lack of trust on electronic devices and new
kinds of frauds based on clever tampering and collusion. These facts have been
challenging service providers and imposing great revenues losses. This paper presents a
use case of forensics investigation procedures applied to detect electricity theft based on
tampered electronic devices. The collusion fraud draw our attention for the involved
amounts (losses) caused to the provider and the technique applied to hide fraud
evidences.
THE MOST FREQUENT ENERGY THEFT TECHNIQUES
AND HAZARDS IN PRESENT POWER ENERGY
CONSUMPTION
ROBERT CZECHOWSKI AND ANNA MAGDALENA KOSEK

Abstract—One of the challenging problems when it comes to electric energy


distribution is electricity theft. Regardless of whether the deed is done on a large scale
or only by a single consumer, it is a problem that generates losses and its detection is
not always easy. One of the crucial factors making the issue of electricity theft still
relevant is the common physical access of the end users to the installations or meters.
The article presents not only the factors encouraging energy consumers to engage in
dishonest behavior and the techniques they use to achieve the intended result, but also
technical measures aimed at detecting such actions. The discussed technical issues can
prove useful in designing increasingly refined security measures and ways to detect
electricity theft.
PRIVACY VIOLATIONS IN CONSTRAINED
MICRO-GRIDS: ADVERSARIAL CASES
PACOME L. AMBASSA, ANNE V.D.M. KAYEM, STEPHEN D. WOLTHUSEN AND
CHRISTOPH MEINEL
Abstract—Smart micro-grid architectures are small scale electricity provision networks
composed of individual electricity providers and consumers. Supporting micro-grids with
computationally limited devices, is a cost-effective approach to service provisioning in
resource-limited settings. However, the limited availability of real time measurements and
the unreliable communication network makes the use of Advanced Metering Infrastructure
(AMI) for monitoring and control a challenging problem. Grid operation and stability are
therefore reliant on inaccurate and incomplete information. Consequently, data gathering
and analytics raise privacy concerns for grid users, which is undesirable. In this paper, we
study adversarial scenarios for the privacy violations on micro-grids. We consider two
types of privacy threats in constrained micro-grids, namely inferential and aggregation
attacks. The reason is that both attacks capture scenarios that can be used to provoke
energy theft and destabilize the grid. Grid destabilzation leads to distrust between
suppliers and consumers. This work provides a roadmap towards a secure and resilient
smart micro-grid energy networks.
AN INTERNET OF THINGS APPROACH TO
ELECTRICAL POWER
MONITORING AND OUTAGE REPORTING
DANIEL B. KOCH.

Abstract—The so-called Internet of Things concept has captured much attention


recently as ordinary devices are connected to the Internet for monitoring and control
purposes. One enabling technology is the proliferation of low-cost, single board
computers with built-in network interfaces. Some of these are capable of hosting full-
fledged operating systems that provide rich programming environments. Taken
together, these features enable inexpensive solutions for even traditional tasks such as
the one presented here for electrical power monitoring and outage reporting.
SOUTH SUDAN RURAL
ELECTRIFICATION PROJECT
MOU RIINY AND RONALD MOULTON.

Abstract— Electricity is a rare commodity in the two year old independent country of
South Sudan, in fact, less than one percent of the population have access. The use of
diesel generators is the norm in urban areas, whereas the rural areas are virtually absent
of electricity outside of flashlights, candles, and lamps. Without electricity, rural
residents endure personal hardships that are hard to imagine in societies that take
reliable and affordable electricity for granted. In South Sudan when it gets dark, students
cannot study, shops must close, and essential tasks like cooking must be performed in
the dark. Village Help for South Sudan seeks to contribute to the development and
advancement of South Sudan by supporting the delivery of electricity to rural off-grid
households with no current access to electricity.
THANK YOU
PHASE 2
ATTEMPTED SOLUTIONS FOR THEFT OF ELECTRICITY
State of the art:
• Bernard Cole et al. in 2004 proposed attaching a satellite linked Meter Smart unit, to the existing data collection
meters, in a cubical box (8*8*8) inches. This arrangement consisted of a trans receiver which was competent in
performing two-way communication with any overhead satellite. Once in every 15 minutes, the device sends
bursts which is responsible for transferring power usage information, after handshaking process is successfully
completed. Collected data is send to gateway earth station where messages are processed, sorted and rerouted.
This model is beneficial for load profiling and forecasting, as well as avoiding blackouts.
• To tackle the problem of power theft, Aditya pyasi and Vishal verma used a hall effect current sensor which
provides ac voltage output proportional to current for ac currents, followed by an ac-to-dc converter. This
method is more flexible and economic than other fraud detection techniques adoption of 11 kV LT distribution,
HVDS (High Voltage Distribution System) employing pole mounted transformers etc. In the current sensor, dc
voltage is used to vary the frequency of a VCO (Voltage Controlled Oscillator).
• Aryadevi Remanidevi et al. tried to provide a solution to increase the efficiency of electric transmissions during
transmission and distribution. The suggested architecture focuses on integrating wireless networks with pre-
existential electrical grids. Architecture consists of four modules namely, Smart Controlling Station (SCS),
Smart Wireless Transformer Sensor Node (SWTSN), Smart Transmission Line Sensor Node (STLSN), Smart
Wireless Consumer Sensor Node (SWCSN)
• Rong Jiang et al. explained that Advanced Metering Infrastructure (AMI) security is an important
issue as it is widely used but due to its complex network, privacy sensitive data, it is vulnerable to
energy thefts. AMI is a hierarchical structure comprised of various networks such as Home Area
Network (HAN), Neighbourhood Area Network (NAN), Wide Area Network (WAN) depending upon
the area.
• Peng Li et al. formulated a problem called cost minimization for meter data collection (CMM). The
system model is further classified into network model, pricing model. Network model consists on
HAN, NAN, WAN which are employed for meter data collection.
• Ming, Hsin, Chein present a wireless cable theft detection module GPRS, ZigBee, PLC (Power Line
Carrier) and voltage current acquisition circuit for detection of conducive theft in cables. Voltage
current comparison method is used to monitor simultaneously electricity carrying cable and non-
electricity-carrying cable. If any anomaly is detected a short message is displayed along with a mail
to assigned personnel as well as a CCTV camera is used be server host to capture it to provide a
strong evidence later.
PROPOSED SOLUTION
The solution proposed in this paper has been devised specially keeping in mind the state and
technology of the existing infrastructure of grids and power discoms present in the third world
countries like India, Pakistan, Nepal, Bhutan, Myanmar, Mexico and Brazil to name a few.
The solution is designed to be used as an add-on to the existing infrastructure and elevate them to
smart networks. The solution would empower existing electrical digital meters to record and send
its usage statistics without any manual intervention. It will also detect the theft of electricity that
occurs due to piggy-backing on existing connections or power lines from the electric poles.
The proposed solution creates an intranet among the consumer’s electricity meters, electricity poles
and substation. The connectivity is done using ipv6 over power lines. The internet connectivity is
done by making Substation as the hub.
HARDWARE DESIGN

Fig 1: Proposed hardware solution (add-on)


The hardware of the solution is built using “Arduino Nano” as the base. The Arduino UNO is an open-
source microcontroller board based on the Microchip ATmega328P microcontroller and developed by
Arduino.cc. The board is equipped with sets of digital and analog input/output (I/O) pins that may be
interfaced to various expansion boards (shields) and other circuits.
It is connected to an ethernet shield which fits right on top of it. To measure the current, we use a minimal
invasive approach and utilize the SCT 013 series AC current sensor.
ARDUINO NANO
The Arduino Nano is a small, complete, and breadboard friendly board based on the ATmega328
(Arduino Nano 3.x). It has more or less the same functionality of the Arduino Duemilanove, but in a
different package. It lacks only a DC power jack, and works with a Mini-B USB cable instead of a
standard one. Arduino Nano 3.0 is a small, complete, and breadboard-friendly surface mount
embedded version of Arduino with integrated USB.
The Nano 3.0 works with a Mini-B USB cable, and can be powered via the Mini-B USB connection.
The Nano has the breadboard-ability of the Boarduino and the Mini+USB, with a smaller footprint
than either, so users have more breadboard space.

ETHERNET SHIELD
An Ethernet shield is a computer component commonly used with Arduino technologies. These
components allow a device to connect to the Internet through the use of an Ethernet cable and a local
access network (LAN). They may be used to both receive and send information over the Internet.
Arduino technologies commonly use Ethernet shields as a part of their design. The main use for these
components is to send programs from one device to others or over the Internet. In Arduino devices, a
program can be written on one device and sent to be used on another. A simple way to transmit the
programming information between Arduino devices is to connect them through the use of an Ethernet
shield
SCT 013 000 AC CURRENT SENSOR
A current sensor is a device that detects electric current in a wire, and generates a signal proportional to that
current. The generated signal could be analog voltage or current or even a digital output. The generated
signal can be then used to display the measured current in an ammeter, or can be stored for further analysis in
a data acquisition system, or can be used for the purpose of control. It has no internal burden resistor, but a
transient voltage suppressor limits the output voltage in the event of accidental disconnection from the
burden. It is capable of developing sufficient voltage to fully drive a 5 V input.
SOFTWARE DESIGN
The software is designed on the basis of following flowcharts:

Fig 2: Flowchart for consumer module


The module installed on the consumer end, as an addon to their existing meters, would have just
two steps. After initializing the module would read the real-time readings and then transmit the
same to its counterpart installed on the electricity pole.
Fig 3: Flowchart for electric pole module
The electric pole module would act as a sort of check and balance and intermediate information relay
system. It would measure the units being provided to the consumer. Whenever it receives a message
from consumer module, it compares the readings according to the timestamps. If the error is more than
a pre-determined value, an alarm is sounded for sub-station, and the authorities would come to know
about real-time electricity theft occurrences. It also has mechanism to check whether the lines (power,
ipv6) are down, and if a particular amount of consumption doesn’t take place, or messages are not
received for a pre-determined set of time, an alarm would be sounded to the authorities in the sub-
station indicating that some fault has occurred and needs correction.
SIMULATION
All the modules were simulated using the Unity 3D 2017.1.1f1 (64-bit). Unity or Unity 3D 2017 software
is a complete set of computer game design and development, featuring a powerful game engine as well as
advanced programming and development environment. Easy-to-use software makes it easy for many
companies and users to take advantage of more graphic-intensive gaming and low-level codecs.
A graphical representation of a number of houses along with the connection to the substation is made using
the software. All the entities were programmed to replicate real world behaviour by implementing load
generation via replicating real world metrics using published algorithms.

Fig: 4 Normal setup of simulation grid


The thief was modelled as the external agent, and could be controlled by user. The user has the choice
to move the thief freely in the simulated environment and choose the target. The simulation has been
made modular enough to incorporate various situations like theft from houses, from poles and even
from substation.

Fig 5: Simulation of electricity theft


The simulation was run successfully and the electricity theft was identified in real time.
CONCLUSION AND FUTURE WORK
All of the existing solutions available in the market to upgrade the grids and its infrastructure to that of
Smart Grids is costly beyond measure. A detailed comparison between existing and proposed solution is
mentioned below:
Sl.no Criteria Proposed Solution Existing solution

1. Cost (consumer module) $40 $231

2. Complete overhaul of NO YES


infrastructure required?

3. Theft Detection YES NO

4. Networking ability Wired ipv6, Ad-Hoc Wi-Fi required.

5. Robust YES NO

6. Easy to use YES NO

7. Power Consumption Low High


(Comparatively)

8. Maintenance Low High

9. Deployable in 3rd world Yes, very easy No, specialized skill


countries is needed.
From the table it is clear that the proposed solution is extremely cheap and easy to deploy and
maintain in the third world countries such as India and Brazil etc. It would make sense to switch to
the proposed solution, then to implement the available solution on large scale. It would save huge
amount of revenue.

FUTURE WORK
Future work can be done to make the solution more:
• Modular, and
• incorporate self-networking, node discovery and inter-device communication.
• Gamification is also one of the aspects where meaningful work can be done, consumers could
be divided into groups and given certain tasks such as saving some % of energy, and be
rewarded with discounts.
• Targeted sales could also be done after mining the user statistics.
THANK YOU

You might also like