Security measures taken by utilities have been added to existing communication infrastructure in response to attacks, such as theft. We have read, from unverified online sources, that consumers have paid disgruntled utility employees or former employees a fee to help them compromise their own smart meters. Many individuals who cannot afford paying the electricity bills often run wires directly to circuit breakers, tamper with meters or steal meters from vacant houses. Moreover collecting the meter readings for billing processes from all consumers is a difficult and time consuming task which requires a great number of labours. Description Electricity theft is the practice of stealing electrical power from a provider. First, since the capacitor must be able to withstand the full ac line voltage across it and the deliverable current is proportional to the capacitance value, it must have both a high voltage rating and a high capacitance value.
We plan to investigate the minority of scenarios where our methods do not work well, and to develop solutions for those scenarios. Theft of electricity may result in higher fees for legitimate electricity customers, who must make up for the lost revenue so that the utility provider can continue to operate. This consumption is unmeasured and procured with or without switches. Electric utilities that begin deploying smart meters with these underlying technologies will see a decreased rate of electricity theft and an increase in their long-term revenue. The capacitive-drop topology is cheaper than a transformer-based design and takes up less space. When the applied magnetic flux density exceeds a defined threshold, regardless of polarity, the open-drain output goes low to alert a microcontroller.
The presence of electricity theft can be determined if the current entering the system is not the same as the current returning from the system. A slower rotating disk signals less energy consumption. One or more examples of these embodiments are illustrated in the accompanying drawings. Foreign material is placed inside the meter to obstruct the free movement of the disc. Utility profile: ComEd uses data analytics for theft detection The Commonwealth Edison Company, better known as ComEd and one of the U. In this project we will use remote monitoring method to prevent electricity theft.
The basic procedure for power supply includes power generation, power transmission and power distribution to the destinations. The difference in readings indicate the error and this error signal is given to a controller which in turn controls the secondary voltage of the transformer, thus causing the transformer to stop the supply of power. Automated methods, however, are more practical and scalable, and are able to detect theft methods that might not be found by visual inspection. Once the end user destination has utilized enough electricity to have depleted the prepaid credits, the power to that end user destination will be terminated by the microgrid controller 120 using the corresponding switch 122 a- 122 e associated with that end user. If the primary is a wire carrying a current I, the current in the secondary is I divided by N, the number of turns of the secondary coil.
This is done by installing an electronic energy meter at the load side and the meter readings are send wirelessly to the distribution unit. The bulk of these losses are caused by electricity theft, rather than other possibilities such as poor maintenance and calculation and accounting mistakes, though some power systems may suffer from both. We will use Radio technology to monitor wirelessly meter reading. During the last several decades, many governments have privatized energy infrastructure and improved energy policy so utilities must operate efficiently and optimize profits. There are two important differences between shoplifters and electricity thieves. The proposed work in this paper aims on the design and implementation model of electrical energy theft detection aspect in Sri Lanka.
In this modern era electricity is the major component of human life. To avoid theft, infrared sensor is placed in the screw portion of energy meter seal. Multiple households may have power delivered by a single microgrid controller unit, and each household may have its power individually monitored and managed. For a three-phase meter, the neutral current should ideally be zero if loads are balanced for all phases. Shoplifting penalties are typically less severe than penalties for other types of theft, and apprehension and prosecution often are difficult.
For example, from meter data alone, we would not be able to tell whether a consumer has gone on vacation leading to abnormally low consumption or whether the consumer is under-reporting meter readings. The project, , is the first to combine fundamental mathematical methods to identify and detect attacks that can lead to electricity theft. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Q: What were the biggest challenges you faced when defining parameters or conditions that would be flagged as possible illegal activity? Nothing else needs to be in place, and therein lies the reason why our work has been well received- it is readily implementable with existing technologies. The input circuit for each phase consists of three components: the input capacitor C39 for Phase 1 that drops the line voltage down to a value based on the capacitive reactance; a series resistor R92 that limits current; and a Zener diode D21 that clamps the input voltage on the positive ac cycle and discharges C39 on the negative ac cycle. In addition to or in place of the connection to the grid 102, the microgrid controller 120 may be connected via the power interface 126 to one or more alternate power sources 104, such as a fuel cell, wind turbine, solar power system, or other energy source.
It causes shortage of power supply to homes. Power Theft in Developing Countries In developing countries like India, power theft is one of the most prevalent issues which not only cause economic losses but also irregular supply of electricity. In other words, the potential for economic harm is concentrated at the utility, and the beneficiaries are widely dispersed and challenging to catch. This test can be conducted during a time that the suspect end user destination 440 is suspected of using electricity, which may not be during peak electricity usage. This labour-intensive, manual process has little chance of success. The superintendent of the electrical company responded by connecting extra electrical dynamos into the system in an attempt to burn out the illicit coils and motors.