0% found this document useful (0 votes)
14 views30 pages

Report PF

This seminar report addresses the issue of power system theft, detailing its causes, consequences, and management strategies. It highlights the significant financial losses incurred due to electricity theft, particularly in developing countries, and discusses various detection and prevention techniques, including advanced metering infrastructure and automation systems. The report aims to raise awareness and propose solutions to mitigate power theft and its impact on electricity distribution systems.

Uploaded by

imvidushi0908
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views30 pages

Report PF

This seminar report addresses the issue of power system theft, detailing its causes, consequences, and management strategies. It highlights the significant financial losses incurred due to electricity theft, particularly in developing countries, and discusses various detection and prevention techniques, including advanced metering infrastructure and automation systems. The report aims to raise awareness and propose solutions to mitigate power theft and its impact on electricity distribution systems.

Uploaded by

imvidushi0908
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

A

SEMINAR REPORT
ON

POWER SYSTEM THEFT AND MANAGEMENT

Submitted in partial fulfillment of the requirements for the award of degree of

BACHELOR OF TECHNOLOGY
in
EE

Submitted by:
Atmika Srivastava
2316816

Supervised by:
Dr. Jyotsna Singh

SCHOOL OF AUTOMATION
BANASTHALI VIDYAPITH, RAJASTHAN
October 2024
BANASTHALI VIDYAPITH, RAJASTHAN
SCHOOL OF AUTOMATION

CERTIFICATE

I hereby submit the seminar entitled POWER SYSTEM THEFT AND ITS MANAGEMENT
in the School of Automation of the Banasthali Vidyapith, under the supervision of Dr.
Jyotsna Singh, Assistant Professor at School of Automation, Banasthali Vidyapith, Rajasthan,
India.

Atmika Srivastava
(2316816)

The seminar report is hereby approved for submission.

Dr. Jyotsna Singh


(Mentor)

Date:

ii
ABSTRACT

This report gives an overview of power system theft. It is the practice of stealing Electrical
power by unfair means for selfish reasons. Generally, this goes unnoticed and it is also difficult
to detect it. It causes power shortages too, leading to loss of money and energy. So to prevent
this criminal offence, detection and control systems are built along with efficient meters to check
upon the customers depending on their power usage. For each house, an electric meter can be
designed which can periodically measure the value of current and then post it to the server
database. Technologies like Artificial Meter Reading (AMR) and installation of PLCs could also
be helpful. Hence, by using such techniques, power theft can be minimized, and also there will
be less scarcity for power utilization.

iii
ACKNOWLEDGEMENT

I am grateful to my institution Banasthali Vidyapith and my respected mentor Dr. Jyotsna


Singh who encouraged me and collaborated with me on this seminar report. Her expertise and
contribution have significantly enhanced the quality of this work.

I would also like to thank Prof. Shailly Sharma, Dean of Academics and Head of the
Automation Department, and my co-ordinator Mr. Sumit Nema, Assistant Professor. They
shared their knowledge and skills with me. Their guidance, support and encouragement fostered
a creative and productive environment, leading to the successful completion of this report.

Lastly, I would like to acknowledge the support received from my parents and the faculty for
providing the necessary resources.

iv
CONTENTS
Pg. No.
CERTIFICATE ii
ABSTRACT iii
ACKNOWLEDGEMENTS iv
CONTENTS v
LIST OF FIGURES vi
LIST OF SYMBOLS vii
LIST OF ABBREVIATIONS viii
LIST OF EQUATIONS ix
CHAPTER 1 INTRODUCTION 1
1.1 Overview 1
1.1.1 Why is electricity stolen illegally? 1
1.2 Motivation 2
1.3 Organization of the Report 2
CHAPTER 2 PROBLEM OF POWER THEFT WORLDWIDE 3
2.1 How is electricity billed in houses? 4
2.2 Electric Meter 4
2.3 How is electricity stolen? 7
2.4 Consequences of electricity theft 7
CHAPTER 3 WAYS TO PREVENT ELECTRICITY THEFT 8
3.1 Technical and Non-Technical issues 8
3.1.1 Technical losses 8
3.1.2 Non-Technical losses 8
3.2 Techniques to detect and prevent power theft 9
3.2.1 Advanced Metering Infrastructure using Smart Meters 9
3.2.2 Global Systems for Mobile Communications 12
3.2.3 Power Line Communication 13
3.2.4 Automation Detection Systems 15
CHAPTER 4 RESULTS AND DISCUSSIONS 17
CHAPTER 5 CONCLUSIONS AND FUTURE SCOPE 18
5.1 Smart Energy Meter Systems 18
5.2 Global Systems for Mobile Communications 18
5.3 Power Line Communication 18
5.4 Automation Detection Systems 18
REFERENCES 19

v
LIST OF FIGURES

Fig. No. Figure Description Pg. No.


Fig. 2.1 Unaccounted power loss in India 3
Fig. 2.2 Electricity theft rates worldwide 3
Fig. 2.3 Electromechanical meters 5
Fig. 2.4 Electronic meters 6
Fig. 3.1 Electricity theft detection framework 9
Fig. 3.2 Advanced Metering Infrastructure 10
Fig. 3.3 Smart Meter 11
Fig. 3.4 Schematic diagram of Smart Metering infrastructure 11
Fig. 3.5 GSM based Smart energy meter 13
Fig. 3.6 General block diagram of Power Line Communication 15

vi
LIST OF SYMBOLS

The symbols used in the text have been defined at appropriate places, however for easy
reference. The list of principle symbols is given below.

Symbol Explanation
& Ampersand

vii
LIST OF ABBREVIATIONS

kWh Kilowatt-hour
PLC Power Line Communication
GSM Global System for Mobile communications
NTL Non-Technical Losses
EB Electricity Board

viii
LIST OF EQUATIONS

Eq. no. Equation


3.1 XL = 2ΠfL
3.2 XC = 1/(2ΠfC)
3.3 Attenuation = 20 log(Vin/Vout)

ix
CHAPTER 1
INTRODUCTION

1.1 OVERVIEW

Since early ages, man has always looked forward to an easier life, and electricity has made life
much easier. It is used in our home appliances and is also running our giant industries. People
pay their hard-earned money on electricity bills on a regular basis to light up their houses and to
live a comfortable life. But not all energy is actually billed. For various personal reasons, some
of the customers do not pay for all the energy they absorb from the distribution network. Every
year, electrical providers lose a significant amount of money due to customer fraud.

Electricity theft is the practice of using electrical energy free of charge through illegal means. It
is a common problem in developing countries and energy worth billions of Rupees is stolen
annually from electricity grids. The electricity grid is a complex network of power lines and
transformers that delivers electricity from power plants to consumers. The unlawful connections
overload the grids, causing not only financial losses to the Electricity Board (EB) but they are
also the main reasons for frequent blackouts.

One of the earliest electricity theft events was documented in 1886, which was accomplished by
people tapping into Edison Electricity in New York. In traditional power systems, people
performed physical attacks, such as bypassing meters and directly hooking from power lines, to
steal electricity. After ICTs are introduced into power systems (especially in smart grids),
besides these physical attacks, adversaries can also launch cyber-attacks to tamper with readings.

1.1.1 WHY IS ELECTRICITY STOLEN ILLEGALLY?

People steal electrical energy for various reasons, like high cost of electricity bills, lack of
access, lack of awareness, generating illegal income for employees etc.

1
1.2 MOTIVATION

Theft of electricity is a critical and growing global problem. India is one of t he many
developing countries affected by the problem of electricity theft. It affects the economy and
power usage of the country and also the lives of common people. Power theft has always
troubled the government and the Electricity Companies in carrying out their activities. It affects
the power quality of every legitimate customer.

Electrical power theft detection systems are used to find unauthorized tapping on distribution
lines. Meter tampering, unauthorized connections, and unpaid bills are all examples of
electricity. They cover all these issues by using simple devices to send a message whenever
there is power theft in a particular area.

Electricity theft has a major impact on the Electrical Board and its management systems. It
causes various problems in our daily lives. To prevent these problems, several power theft
systems are used in modern day.

1.3 ORGANIZATION OF THE REPORT


This report is about the rising problem of power theft in developing countries in this busy world.
The report also discusses the steps that can be taken to tackle this issue. It addresses the general
public and young minds capable and willing to solve this world-wide issue.

We have 5 chapters in total. Along with these chapters, the report also contains introduction,
certificate, acknowledgement, lists of symbols, abbreviations, equations and figures and
references.

Chapter 1 discusses overview of the topic of report (power theft) and the organization and
motivation behind this report. Chapter 2 discusses Problem of power theft. Chapter 3 discusses
the ways to prevent power theft. Chapter 4 discusses Results and Discussions. Chapter 5
discusses Conclusions and future scope.

2
CHAPTER 2

PROBLEM OF POWER THEFT WORLDWIDE

Power theft is the process of using electricity free of cost via illegal means. This problem is
difficult to identify and solve. It has been an issue for both urban and rural power supply
organizations. It affects the stability of the power distribution grid and could also cause safety
issues in many cases. The unaccounted and illegal power loss all over India over various past
years is represented in the form of histogram shown below:

Fig 2.1 Unaccounted power loss in India over the decade [2]

Fig 2.2 Electricity theft rates worldwide [3]

3
2.1 HOW IS THE ELECTRICITY BILLED IN HOUSES?
Electricity is billed in several steps in household systems. Following are the steps followed:

a) Meter Reading- An electric meter is a device that measures the electricity usage in a house
in kilowatt-hours (kWh).
b) Billing Cycle- At the end of each month, utility companies take the meter reading from
houses to calculate electricity usage for that period.
c) Calculation of usage- The electricity bill usually shows previous and current meter readings
to determine total kWh consumed during that period.
d) Rate structure- There are 3 ways to calculate the rate of electricity used:
 Flat rate- A set amount of kWh is paid, regardless of the usage.
 Tiered rate- Different rates are paid based on consumption levels. For example, first
500kWh may be at one rate and any usage above that may be charged at a higher rate.
 Time-of-use rates- Cost per kWh varies depending on the time of day, with high rates
during peak hours and low rates during off-peak hours.
e) Total amount- Final bill shows the total amount due including all taxes & fees.

2.2 ELECTRIC METER

Electricity meters keep evolving with technological advancements. These can be roughly
classified into electromechanical and electronic meters.

An electromechanical meter measures parameters such as pH, temperature, conductivity etc. On


the other hand, an electrical meter measures the amount of electrical energy being consumed.

1) Electromechanical meter

An electromechanical meter consists of two silicon steel laminated electromagnets, called shunt
magnet and series magnet, respectively. The shunt magnet carries a highly inductive voltage coil
connected across the supply and some copper shading bands on the middle limb. The series
magnet carries two current coils with a few turns connected in series with the load. The voltage
coil and current coils produce two time-varying (sinusoidal) fluxes, respectively, which lag at
90◦ due to the inductive nature. The two fluxes further induce eddy currents in the aluminum

4
disk, which interacts with the magnetic fields of the two laminated electromagnets, exerting a
driving torque in the disk to make it rotate. A braking torque on the disk is produced by the
interaction between eddy currents and the magnetic field of a brake magnet (which is a kind of
permanent magnet) over one side of the disk. When the driving torque and braking torque are
equal, the disk of electromechanical meters rotates steadily, with speed proportional to the load
power. The revolutions of the disk are counted via a gearing mechanism and displayed on dial in
watt-hours.

Fig 2.3 Electromechanical meters [7]

2) Electronic meter

Electronic meters have three generations. The first generation is called primary electronic meters,
which consists of current and voltage measuring circuits connected in serial and parallel with
loads, respectively. Current transformers are usually applied for measuring the current due to its
economic price and efficiency. For measuring the voltage, we usually apply a voltage divider in
the case of 220 V but a potential transformer under the case of high voltage (like more than 500
V) to isolate the sensitive circuits. Analog signals from current and voltage measuring circuits
are sampled and converted into digital values using an analog-to-digital converter (ADC). These
digital values are immediately sent to the microcontroller unit (MCU) and multiplied for
instantaneous powers. By integrating the instantaneous powers over a specified period, the MCU
can obtain electricity consumption (kWh). A liquid crystal display (LCD) or light-emitting diode
(LED) panel displays the electricity consumption. The data recorded by sensors or calculated by

5
the MCU regularly (for example, every 30 min) are stored in an electrically erasable
programmable read-only memory (EEPROM). MCU serves as the brain of the whole system by
performing all the necessary operations. The second and third generations of electronic meters
are smart meters applied in AMR and AMI, respectively. Compared to primary electronic
meters, which support just one-way power flows from utility companies to customers, AMR-
enabled smart meters are equipped with a one-way communication module, allowing them to
send electricity consumptions to utility companies automatically. Compared to AMR-enabled
smart meters, AMI-enabled smart meters support two-way power and communication flows, i.e.,
from customers to utility companies and vice versa, which endows AMI-enabled smart meters
with functions of net metering, remote disconnect, and tariff distribution. The net metering unit
allows AMI-enabled smart meters to measure the surplus power, which is the difference between
power generated by customers’ electricity generation equipment and their demands, exported
back to the power grid.

Fig 2.4 Electronic meters [7]

2.3 HOW IS ELECTRICITY STOLEN?

1) Meter Tampering- A registered customer can tamper the meter by attaching magnets outside
the meter. Due to this, the rotor disc is exposed to a high magnetic field. So, the resultant
opposing magnetic field to the rotor is increased leading to slowing down of rotor or total
stopping of the disc rotation. The electricity meter is thus manipulated and power is
consumed at zero cost.
2) Line Tampering- In this method, electricity meter is interfered to prevent it from accurately
measuring energy usage, or it is bypasses entirely.

6
3) Modern electronic meters generally use current transformers for current measuring. The
cores of current transformers are magnetic components that can be saturated by strong
external magnet. Hence, if someone places strong magnets outside the meter, he/she can
reduce the electricity bill by 50%–75%.

2.4 CONSEQUENCES OF ELECTRICITY THEFT

4) Loss of money
5) Disturbance in local area supply
6) Overloading of the transformer of that particular area
7) Frequent blackouts
8) Damage to property
9) Losses due to tampering of wires

Electricity Board is committed to serving people with consistent and reliable power. To achieve
this vision, the utility must also solve the problem of power theft. It is necessary to identify the
theft in order to eliminate it. But government laws and regulations are not powerful enough to
prevent its power theft. So researchers develop various electricity theft detection methods. To
prevent these problems and to prevent the wastage of electrical energy, Power system theft
management and its solutions are very important. Unlawful activities should be stopped and the
guilty should be punished.

7
CHAPTER 3

WAYS TO PREVENT POWER THEFT

3.1 TECHNICAL AND NON-TECHNICAL LOSSES

Technical and Non-Technical losses are two types of losses that occur in power systems.

3.1.1 TECHNICAL LOSSES

These losses are caused by physical factors like the circulation of electric current and voltage in
networks. They are unavoidable and are a result of issues with equipment and infrastructure
during transmission and distribution. Examples of technical losses include thermal losses in
cables and transformers, and magnetic losses in transformers.

3.1.2 NON-TECHNICAL LOSSES

Non-Technical Losses (NTL) are the transmission and distribution losses originating from power
theft and other illegal use of electricity. These losses differ from Technical losses as these cannot
be detected or measured accurately. The problem of NTLs is not only faced by the least
developed countries in the Asian and African regions, but also by developed countries such as
the United States of America and the United Kingdom.

There are two techniques to prevent these Non-Technical losses:

(a) Wireless techniques-

 GSM technique
 Wireless-Fidelity (Wi-Fi)
 Infrared
 Bluetooth

(b) Wired techniques-

 Electrical cables
 Coaxial cable

8
 Optical fibre

There are several problems associated with these techniques to control power theft. Wired
techniques have problems related to installation and cost. They are also very complex in nature.
Wireless techniques lack range and efficiency. But with proper use of devices and technologies,
we could stop electricity theft wirelessly.

Fig 3.1 Electricity theft detection framework [4]

3.2 TECHNIQUES TO PREVENT AND DETECT POWER THEFT


3.2.1 ADVANCED METERING INFRASTRUCTURE USING SMART METERS

Advanced Metering Infrastructure (AMI) refers to the complete infrastructure of meters,


communication networks and data management systems required for advanced information to be
measured, collected and used.

A smart energy meter is a device that monitors and records the consumption of electricity, gas, or
water in real time. It sends these readings to the energy supplier automatically through a secure
network. Companies use software to analyze this data. If the usage suddenly drops or spikes, it
can indicate possible tampering or theft.

9
Architecture of smart meter

The meter is connected to the supplier and to appliances in the home through the Home Area
Network (HAN). Smart meters collect data from the end consumers and transmit it through the
Local Area Network (LAN) to the data collector. This process is executed at regular intervals,
mainly every 15 minutes or at most once a day, based on the requirements. The collector then
recovers the data and re-transmits it. The utility companies further process the data by using the
Wide Area Network (WAN).

How do smart meters work?

There is a digital metering device at the center of a smart meter, which is equipped with sensors.
This device measures electricity, gas, or water consumption. Also, these sensors record usage
data at regular intervals, typically every 15 minutes or hourly, depending on the utility’s
configuration. Then, they send this data to the utility company through a communication
network. These communications can be near real-time or scheduled at intervals.

Local data from usage can be stored in the meter. It continues to work even if communication is
temporarily interrupted. Smart meters have two-way communications, which means the
electricity board can send data to the meter as well as receive data from it.

Smart meters remove estimated bills by giving the actual usage data. So they reduce conflicts
over billing. Outages can be detected with smart meters as well, and they automatically report
these outages, which helps in rapid response times and better service. In this way, they can
distribute energy and monitor the health of the grid more effectively.

In case any attempted tampering is detected, the electricity board can take quick action.

Fig 3.2 Advanced metering infrastructure [6]

10
Fig 3.3 Smart meter

Fig 3.4 Schematic diagram of Smart Metering Infrastructure [1]

By introducing automated meter reading (AMR) systems into distribution networks, utility
companies can automatically get metering data, such as consumption records, alarms, and status
from customers’ premises remotely. However, due to its one-way communication system, the
AMR system does not allow utility companies to take corrective actions based on the received
information. To solve the issue of demand-side management, advanced metering infrastructure
(AMI), which provides two-way communications between customers and utility companies, is
further incorporated into power systems. Through AMI, utility companies can get instantaneous
information about individual and aggregated demand and can enact various revenue models to
control their costs.

By analyzing measurements from sensors and readings of customers’ smart meters, companies
can constantly narrow down the search zone of fraudsters until they finally pinpoint them.

11
3.2.2 GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS (GSM)

The Global System for Mobile Communication (GSM) module is used to prevent power theft in
electrical distribution networks. Power theft causes significant financial losses for utility
companies and can lead to safety hazards. GSM technology is connected with smart metering
systems and other utility systems to prevent this problem.

Smart Meters with GSM Module

GSM enabled smart meters can read meters remotely and retrieve data from them. These devices
periodically transmit data to the utility supplier.

In case any irregularities or attempted tampering are detected, electricity board can disconnect
the electricity supply from a distance.

Real-Time Monitoring and Alarms

GSM-based systems can monitor an electrical network around the clock without disruption.
Utilities can specify their thresholds for patterns of consumption; points above and below this
threshold raise alarms. A pre-defined limit of 200W is set as the threshold for theft detection.
Once a theft is detected, the prevention process disconnect all legal consumers from the line, and
then through the tapping transformer, high voltage is provided to the line to eliminate illegal
connections.

Location Monitoring

Devices with GSM module enabled in them are connected to GPS so that the system can locate
the places where there is a chance of power theft and can take GSM enabled devices can take
action. Theft hotspots can also be mapped and can be monitored using various resources.

Security Features

Using GSM module, data can be encrypted. So, only the authorized user has access to it.
Advanced meters can be connected to sensors for detecting any tampering.

12
Fig 3.5 GSM based Smart energy meter

3.2.3 POWER LINE COMMUNICATION (PLC)

Though several methods are available, the percentage of power theft is not reduced because of
the fact that these methods have their disadvantages.

 While considering the Energy meter method, the installation cost is very high as every
pole has to be installed with an energy meter.

 With the use of the Automatic Metering Interface technique, transmission, and reception
of Meter readings is tough since digital signals are involved and maintenance costs are
also high.

In this system, along with the normal power frequency signal, an additional signal is transmitted
based on the principle of Power line Communication (PLC). It is a technology that enables data
transmission over existing electrical power lines. It allows the use of the power grid
infrastructure for communication purposes, without needing additional wiring. It uses the same
wiring that delivers electricity to transmit information. This reduces electrical wiring, making
installation easier.

With the addition of load, there will be a voltage drop across the load. But this voltage drop will
be momentary to make the system stable. Because of the compensation, there cannot be any
measurement of the voltage drop across the load in a very short time. As there is no
compensation in this signal, there will be changes in the amplitude of this high-frequency signal
due to the changes in the load.

13
With the change in the load, there will be a change in the normal power frequency signal (230V,
50 Hz).

Components of PLC Systems

PLC Modem- This device takes digital data converts it into a modulated signal and sends it
across the power line and vice versa.

Couplers- These are meant to couple the PLC signal onto the power line while at the same time
differentiating the high voltage from low voltage communication. They ensure the successful
transmission of the signal without interfering with electricity distribution.

Repeaters- They can be used to amplify and extend the PLC signal over longer distances or
through multiple phases of the power distribution system.

Working Principle

Based on the principle of PLC, initially, the high-frequency signal is added along with the
normal power frequency signal using inductive and capacitive components.

By the property of the inductive and capacitive components, the inductive component will block
the high-frequency signal and allow the low frequency signal because the inductive impedance is
directly proportional to the frequency.

XL = 2ΠfL (3.1)

The capacitive component will allow the high frequency signal and block the low frequency
signal because the inductive impedance is inversely proportional to the frequency. This will
protect the respective circuitry without causing any damage.

XC = 1/(2ΠfC) (3.2)

This added signal is then passed through the transmission line. At each pole, the added signal is
isolated into individual signals using analog filters and the power frequency signal is supplied to
authorized consumers.

If any illegal consumption of electricity is detected in the transmission line, there will be
attenuation in the high frequency signal which can be detected due to the inductive nature of the
load.

14
Attenuation = 20 log(Vin/Vout) (3.3)

where Vin = input voltage

and Vout = output voltage

By measuring this attenuation, the theft of electricity can be detected.

Applications of PLC

PLC allows utilities to read meters and monitor consumption without direct visitation, even
detect outages. It is capable of connecting various smart devices in houses, controlling and
automating them without any new wiring.

PLC is also used for monitoring and managing electrical grids. Smart meters can send usage data
back to the utility company over power lines.

Some Internet Service Providers (ISPs) use PLC to extend broadband internet access over
existing power lines.

Fig 3.6 General block diagram of Power Line Communication

3.2.4 AUTOMATED DETECTION SYSTEMS (ADS)

Automated detection systems are are built to identify and monitor irregularities in cases of power
theft. These systems use data analytics and machine learning to spot unauthorized electricity
usage.

These detection systems collect data from various sources, such as smart meters, sensors, and
control systems, and transmit the data to servers and databases where the collected data is stored
and analyzed. These automatic systems can also monitor the electricity consumption in real-time
and continuously undertake action leading to the detection of the theft, if any.

15
When unusual behavior is discovered, the system also provides alarm signals for further
investigation.

Applications of Automated Detection Systems

Power Theft Detection- Unauthorized connections or tampering with meters is identified by


monitoring abnormal consumption patterns or sudden changes in usage.

Grid Management- Monitors grid performance, discovers faults, and makes sure that supply
meets demand.

Maintenance- Determines potential failures before they happen.

16
CHAPTER 4
RESULTS AND DISCUSSIONS

The act of stealing electrical power is known as power theft. It costs Indian utilities billions of
rupees each year.

Electricity theft is defined by Section 135 of the Electricity Act of 2003 as using electricity for
non-authorized purposes, tampering with electricity meters or transformers, tampering with
electricity lines, or using a device that makes it difficult to read or damages equipment like
electric meters. The electric utility can immediately cut off the electricity supply if theft of
electricity is discovered. If the offense is repeated, the person will not be able to get electricity
for at least three months, but it could be up to two years.

The main reason behind the power theft is illiteracy and dishonesty. People are not well informed
and aware of the power crisis going on in the world and the problems caused by it. New
processes of theft are coming with the latest techniques of detection. It is really hard to keep
people away from corruption by applying force or rule. If public awareness could be increased,
there would be no need to detect power theft. So by increasing public awareness, power theft
could be prevented.

CHALLENGES:

1. Electronic meters are equipped with low tamper-resistant, so fraudsters can launch cyber
attacks to falsify the meter readings almost anywhere and anytime. FBI reported that
fraudsters can hack into electronic meters with just a moderate level of computer
knowledge, using low-cost tools and software readily available on the Internet.
2. Utility companies cannot afford the enormous economic losses alone, they usually pass
on these losses to all customers via higher tariffs. Due to the huge revenue losses, utility
companies have to decrease the investment in advanced equipment and technologies.
This slows down the expansion of generation capacity and the development of smart
grids.

17
CHAPTER 5
CONCLUSIONS AND FUTURE SCOPE

5.1 SMART ENERGY METER SYSTEMS

This technology is newly developed to prevent illegal loss of electricity and to improve the
quality of power. It reduces human labor as the meter readings are automatically sent to the
board for regular monitoring. Smart meters are efficient and time saving and also less prone to
meter tampering compared to normal meters.

These systems have a bright future ahead with potential to improve energy efficiency, reduce
costs and contribution to a sustainable future.

5.2 GLOBAL SYSTEMS FOR MOBILE COMMUNICATIONS

GSM based smart meter modules are on their way to provide more security to energy
transmission and consumption. They provide an extra layer of security when combined with IoT
technology.

GSM modules have a promising future in the tech industry and making electricity transmission
easier.

5.3 POWER LINE COMMUNICATION


With technologies like smart grids, power line communication is becoming a strong force to
prevent power theft in coming future. This technology has a bright future indeed.

5.4 AUTOMATED DETECTION SYSTEMS


With more cyber threats and devices needing protection, automation has become very important.
The future of security automation will likely include AI and machine learning to improve threat
detection and response. Automated threat detection systems monitor network traffic, logs, and
security events in real time.

18
REFERENCES

Journal papers:
[1] Enrique Rodriguez-Diaz1, Emilio J. Palacios-Garc´ıa2, Mehdi Savaghebi1,Juan C.
Vasquez1, Josep M. Guerrero1, Antonio Moreno-Munoz2, “Advanced Smart Metering
Infrastructure for Future Smart Homes”, 2015 IEEE 5th International Conference on
Consumer Electronics Berlin (ICCE-Berlin).

[2] Sreemoyee Bose, Supriyo Das, Arijit Dey, Jyotirmoy Das, Syamasree Biswas Raha,
“Power Theft Detection in Low Voltage Distribution Network”, 2020 IEEE International
Conference for Convergence in Engineering.

[3] Rajib Hassan Raju; Md. Sajedul Islam, “Design and Fabrication of Power Consumption
Network to Prevent Energy Pilferage”, 2nd Int'I Conf. on Electrical Engineering and
Infonnation & Communication Technology (ICEEICT) 2015 lahangirnagar University,
Dhaka-1342, Bangladesh, 21-23 May 2015.

[4] Kuldeep Sharma, Arun Malik, Isha, “An Efficient IoT Based Electricity Theft Detecting
Framework For Electricity Consumption”, 2021 International Conference on Computing
Sciences (ICCS).

[5] Arango Q. Chen, K. Zheng, C. Kang, and F. Huangfu, ‘‘Detection methods of abnormal
electricity consumption behaviors: Review and prospect,’’ (in Chinese), Automat. Electr.
Power Syst., vol. 42, no. 17, pp. 189–199, 2018.

[6] Hazem Zubi, Ahmed Alrmaih, “Smart Energy Meter System Design & Simulation
Presenting Electricity Theft Methods, Detection and Protection”, Smart Energy Meter
System Design & Simulation Presenting Electricity Theft Methods, Detection and
Protection.

[7] Xiaofang Xia, Yang Xiao, Wei Liang, Jiangtao Cui, “Detection Methods in Smart Meters
for Electricity Thefts: A Survey”, Vol. 110, No. 2, February 2022 .

[8] Guhesh Swaminathan, Maheedar Subramanian, PravinThangaraj, Alwin Vinifred


Christopher, “Distribution Line Monitoring System for the Detection of Power Theft
using Power Line Communication”, 978-1-4799-4848-2/14/$31.00 ©2014 IEEE.

19
20
21

You might also like