Session 2012-2016
Power Line communication based Antitheft system for electricity,
Load management and Auto billing
Group Members
Muhammad Usman Irshad
(BEE-FA12-020)
Muhammad Abbas
(BEE-FA12-027)
Jamil Ur Rehman
(BEE-FA12-042)
Project Supervisor
Engr. Awais Hussain Shah
Project Co-Supervisor
Engr. Khizar Arshad
(BEE-FA12-020)
MUHAMMAD ABBAS
(BEE-FA12-027)
JAMIL UR REHMAN
(BEE-FA12-042)
BSc Report
Project report submitted in
partial accomplishment of the requirements for the
Degree of Bachelor of Electrical Engineering
APPROVAL CERTIFICATE
This project thesis report titled Power Theft Line Communication Based Antitheft
System for Electricity, Load Management and Auto billing has been found adequate in
terms of possibility, eminence and demonstration as partial fulfillment of the requirement for
the Bachelors of Electrical Engineering (Electronics) in The University of Faisalabad.
Project Supervisor:
Engr. Awais Hussain Shah
Signature:_________________
Date:_________________
Signature:_________________
Date:_________________
Remarks:
..
....
Signature:__________________
Date:______________________
Stamp: ____________________
Group Members:
Muhammad Usman Irshad
(BEE-FA12-020)
Muhammad Abbas
(BEE-FA12-027)
Jamil Ur Rehman
(BEE-FA12-042)
vi
DECLARATION
We hereby assert that no portion of this project report has been submitted to any
other university or any other institution for the purpose of getting another degree. If any such
act found, we are liable to any punishment which will be given by the authorities. In severe
case our degree could be terminted if such act of plagiarim is found.
vii
COPYWRITE STATEMENT
Copywrite in the text of this report rests with the student authors. No copies of this
project report can be made without getting permission from the authors.
If any person wants to take advantage of this project report, he/she has to get written
permission from the University of Faisalabad. Before this he/she has to apply for this
permission, for this purpose he has to write to the librarian, who will put forward his
application to the higher authorities.
Any other information regarding the copyrights is available in the library of The
University of Faisalabad.
Before doing any act of plagiarism one must read the terms and condition of our
copyright statement.
viii
ACKNOWLEDGEMENTS
At first we are thankful to Allah Almighty for making this chance, a success. We
thanks our project supervisor Engr. Awais Hussain Shah for providing us with the essential
services and supervision required to complete this project. We are also very obliged to our
project co- supervisor Engr. Khizer Arshad for their valuable technical supervision
throughout this project. We are pleased to the staff members of department of Electrical
Engineering for their cooperation. It is because of their support and co-operation that we are
able to make this project. We are especially thankful to:
Dr.Shoaib Khalid (Head of Department)
For his co-operation and guidance.
ix
ABSTRACT
Electricity is the economic growth of any country, where electricity theft is occurred
daily. Power Line Communication is the latest power transmission technology in which the
electricity is transmitted over a communication line or we can say that the information is
transmitted over a power line and thats why this technology is called power line
communication system. Now our idea is about electricity theft detection using automatic
meter reading with power line communication. As we already know that the information can
be transmitted over a power line then if an automatic meter reading system is setup in the way
of
electrical
line,
we
can
prevent
the
electricity
theft.
In the AMR (automatic meter reading) a digital chip is used to store the electricity
energy and measures the consumed energy. The energy recorded by automatic meter reading
system is then compared with the energy recorded by the main KWH meter that is set in a
home for electricity unit measurement. If there is a difference between the reading s of both
energy meters then the automatic meter reading system generates an error signal and it is
transmitted via PLC (power line communication) network to the PLC control system and it
proves that some electricity theft has occurred.
Automatic meter reading system over power line communication system has become
a major equipment to stop the illegal use of electricity.
TABLE OF CONTENTS
Approval Certificate .............................................................................................. v
English Proficiency Certificate ............................................................................ vi
Declaration ........................................................................................................... vi
Copywrite Statement .......................................................................................... viii
Acknowledgements .............................................................................................. ix
Abstract ................................................................................................................. x
List of Figures ..................................................................................................... xv
List of Tables..................................................................................................... xvii
List of Acronyms.............................................................................................. xviii
Chapter 1
Introduction ............................................................................ 1
1.1
BACKGROUND: ............................................................................................................. 1
1.2
1.3
1.4
1.5
1.6
1.6.1
1.7
REPORT OUTLINE.......................................................................................................... 7
1.7.1
Chapter 1 .............................................................................................................. 7
1.7.2
Chapter 2 .............................................................................................................. 7
1.7.3
Chapter 3 .............................................................................................................. 7
xi
1.7.4
Chapter 4 .............................................................................................................. 7
1.7.5
Chapter 5 .............................................................................................................. 7
Chapter 2
2.1
OBJECTIVES .................................................................................................................. 8
2.2
2.3
2.4
2.5
Chapter 3
3.1
HARDWARE ................................................................................................................ 11
3.2
3.2.1
3.2.2
3.3
PC INTERFACE ............................................................................................................ 15
3.3.1
3.3.2
Picture of PC Interface....................................................................................... 17
3.4
3.5
MICROCONTROLLER ................................................................................................... 19
3.5.1
3.5.2
3.5.3
3.6
IC MAX232 ............................................................................................................... 21
3.6.1
3.6.2
3.6.3
3.7
3.7.1
3.7.2
3.8
3.8.1
3.8.2
3.9
3.9.1
3.9.2
3.9.3
xiii
Chapter 4
Software ............................................................................... 39
4.1
4.2
4.2.1
4.2.2
4.2.3
CONCLUSION .............................................................................................................. 45
5.2
References ........................................................................................................... 48
xiv
LIST OF FIGURES
Figure 0-1 Methods of Stealing Electricity ................................................................................ 6
Figure 0-2 Methods of Stealing Electricity ............................................................................... 6
Figure 3-1 Block Diagram of Energy Meter ........................................................................... 13
Figure 3-2 Energy Meter .......................................................................................................... 14
Figure 3-3 Block Diagram of PC Interface .............................................................................. 16
Figure 3-4 Picture of PC Interface ........................................................................................... 17
Figure 3-5 Pin Configuration of PIC18F452 ............................................................................ 20
Figure 3-6 External Clock ....................................................................................................... 20
Figure 3-7 Power on Reset Circuit .......................................................................................... 21
Figure 3-8 External View of MAX232 ................................................................................... 22
Figure 3-9 Pin Configuration of MAX232 .............................................................................. 22
Figure 3-10 Pin Connections of MAX232 .............................................................................. 23
Figure 3-11 External View of LCD ......................................................................................... 24
Figure 3-12 Pin Configuration of LCD .................................................................................... 25
Figure 3-13 Internal Structure of PC817 .................................................................................. 26
Figure 3-14 Pin Configuration of PC817 ................................................................................. 26
Figure 3-15 External View of LM358 .................................................................................... 27
Figure 3-16 Pin Configuration of LM358 .............................................................................. 27
Figure 3-17 Pin Configuration of LM7805 ............................................................................. 29
Figure 3-18 Internal Block Diagram of LM7805 .................................................................... 29
Figure 3-19 Pin Configuration of BD140................................................................................ 30
Figure 3-20 Internal Architecture of BD140 ........................................................................... 30
Figure 3-21 External View of TVS Diode .............................................................................. 32
Figure 3-22 External View of BC548 .................................................................................... 34
xv
xvi
LIST OF TABLES
Table 3-1 Hardware Components............................................................................................ 18
Table 3-2 Maximum Operating Conditions of MAX232 ......................................................... 23
Table 3-3 Maximum Ratings of LM358 ................................................................................. 28
Table 3-4 Maximum Ratings of BD140 .................................................................................. 31
Table 3-5 Electrical Characteristics of BD140........................................................................ 31
Table 3-6 Maximum Ratings of TVS Diode ............................................................................ 32
Table 3-7 Electrical Characteristics of TVS Diode ................................................................. 33
xvii
LIST OF ACRONYMS
PLCC
PIC
Modem
Modulator Demodulator
IC
Integrated circuit
TBD
TVS
CT
Current Transformer
PT
Potential Transformer
ZCD
GUI
AMR
KWh
Pot.
Potentiometer
OFDM
xviii
CHAPTER 1
INTRODUCTION
1.1 Background:
Different technologies are used for the communication of information from one end
to another. There are many kinds of information transmission technologies, these include
wireless technology, and wired networks like Ethernet cables, fiber optics cables, coaxial
cables and power lines.
Power lines can be used as a medium for transmitting the data from one end to the
other. The concept is that, the power lines can also be used to transmit data signals, and these
are not only built for transferring electrical power. This idea is the essence of our project.
The technology which we are using is not firsthand technology, but it was widely
used by the grid stations in 1950s to transmit data signals and control signals to the other grid
stations. Largely the power line communication technology was used by grid stations for the
telephony purposes.
The idea of transmitting data signals over the existing carrier infrastructure is not a
new idea; it became patent in the 1920s when two scientists worked on it to make it possible.
Characteristics of the power lines are not suitable for the data transmission. It was the
limiting factor in our project. But researchers did not loosed there heart, but they tried to make
a better technology by working on the spread spectrum and OFDM, which means orthogonal
frequency division multiplexing.
1.2
economic crisis and load shedding. If we are able to stop illegal usage of electricity, we can
avoid several problems, like load shedding, etc. Power Line Communication is the latest
1
1.4
which means that now we can send huge amount of data to very large distances. Another
example of this technology being used in the industries is the SCADA system which stands
for supervisory control and data acquisition system. Due to this technology all the instruments
in the industry are connected to a control system, which can instruct them to perform the
given task in a good manner.
The power line communication technology is also used in various fields of life an
example is home automation as well as providing internet network which works on PLCC.
In this type of communication, power line modules are used to send and receive the
data. These modules work on the principle that whenever a zero crossing is reached in the sine
wave, it will generate a burst of data bits. It means that it will send data only at zero crossing.
consumed by the user. This energy meter will automatically tell the grid station about its
readings. This is the working of automatic meter reading.
The grid station will compare the output energy with the consumed energy, if there
comes some difference, then it will alerts the system that some power theft has occurred.
To ensure that it was power theft, the system can shut down the consumers energy
meter, if by doing so the difference is not removed then it is clear that theft is occurring.
There are different methods through which automatic meter reading can be done are:
1.6
Electricity Theft
As we have already discussed about the power theft but now we are discussing about
the methods of electricity theft. The most common method of theft is connecting the
consumers home with the overhead power lines without connecting them to the energy
meter. In this case the energy meter will be unable to record any energy because it was not
connected. So it becomes a simplest method for doing this. Another method of power theft is
energy meter tampering, it can be tampered in different ways, and it can be reversed so that it
tells less amount of consumed energy.
1.7.1 Chapter 1
1.7.2 Chapter 2
1.7.3 Chapter 3
1.7.4 Chapter 4
1.7.5 Chapter 5
CHAPTER 2
2.1 Objectives
The main objectives of this project are as follows:
PCB designing
Embedded C program
PLC modules
PC
Since the procedures employed in this module are based on simple electronics, the
chances of making the system defective are greater. But, if a microcontroller chip is used
for feeding the modulating input, we can make the system more effective and efficient.
Wide range of frequencies is required to facilitate large number of users. To overcome this
problem, carrier signal can be changed from one region to the other.
Presently, it requires a power supply of 230V for its operation, but a small battery with
automatic charging can be provided in real time.
Signal attenuation is also the limiting factor in our projects efficiency, but we have
overcome this problem by using a carrier signal of 125-135 KHz frequency.
CHAPTER 3
Our project works by sending data signals and command which are superimposed on
the power lines this arrangement allows us to perform power theft and automatic meter
reading. In the start of this project, we had to make a choice that what protocol should we use,
because there are a large number of protocols available for use. Another option is that, we can
built our own protocol for this project, but after working onto this option we come to know
that this option will be of no use, because it will be like that we are inventing a new wheel in
todays world which is a global village, so we decided to use an existing protocol. This works
on the principle of zero crossing detection. We will later discuss this protocol in detail.
After deciding the protocol, we started to work on the projects different parts, keeping some
points in mind:
Hardware
Software
10
3.1 Hardware
Our projects hardware consists of two main parts; one part is the energy meter
which is located at consumers house and other is located at the substation. Both parts acts as
transceiver i.e. these parts can send and receive information at the same time. When one part
is sending data, other is acting as receiver and vice versa.
Energy Meter
PC Interface
11
3.2
Energy Meter
Energy meter is the main part of our project. This meter is used to measure the
consumed energy at the consumer side. The soul of the energy meter is the power line
module, this module is used to send and receive data via power lines. This module is powered
by 5V, which is given to it with the help of 5V power adapter. Potential transformer is the
step down transformer, which takes input of 220V and gives an output of 12V AC.
After coming out from the transformer, AC current is then entered into the
Wheatstone bridge rectifier which converts it into 5V DC. This current is used to give power
supply to the microcontroller PIC18F452 and LCD.
Microcontroller takes information from PLC module. This information is the data
which is sent by the control room from substation. Microcontroller gives its feedback to the
substation i.e. consumed energy, current and voltage ratings.
The main purpose of the energy meter is the measurement of electrical energy which
is consumed by the user. It measures this energy by getting voltage from potential transformer
and current from current transformer. The product of voltage and current is the energy.
Microcontroller does this calculation and sends this data to the substations control room.
12
13
14
3.3
PC Interface
This part of the project is built for the control room which is located at the substation.
Personal computer is attached with this interfacing part so that all the information can be
collected on the computer.
In the same manner, the control room can send different commands to the energy
meters in order to stop power theft. This circuit is connected to the PC with the help of
MAX232 integrated circuit. This IC uses the TTL and RS logic to connect computer with the
circuit. MAX232 IC gives all the data to the microcontroller. The microcontroller then
decides what to do. Microcontroller not only gets information from the computer but it also
gives information to the computer, i.e. the information of delivered watts and used watts, if
there comes difference which is beyond the limit, the computer will tell that some power theft
is occurring.
Now, we will discuss the structure of circuit, in the circuit we can see a current
transformer which is connected in series with the power lines. This current transformer is used
to measure the total current given by the substation. Microcontroller uses this current and
voltage rating to measure the energy in watts.
Microcontroller needs 5V DC to operate, this voltage is provided to it with the help
of power adapter. This power adapter not only gives power supply to the microcontroller but
also to the PLC Module. We used this power adapter because, PLC module needs 5V,
300mA.While, and the voltage regulator provides 5V, 100mA. Resultantly, there is a shortage
of 200mA. To overcome this problem, we decided to use 5V power adapter.
15
16
17
Components
Details
8.2K, 1.8M, 8.2K, 10K, 15K, 1M VAR, 82,470K, 1K,
10K, 2.2K, 10
Resistors
F, 10 F, 100 F
Transistors
Integrated Circuits
Display
Relay
12V, 5A relay
Transformer
Power supplies
220V AC
PLCC Module
KQ330
18
3.5
Microcontroller
The microcontroller used is PIC18F452. It has 40 pins which are used for different purposes.
Peripheral Features:
PIC microcontroller has addressable UART module which also supports RS232 logic
It has very fast sampling rate, which makes it very high speed microcontroller
It has oscillator timer, as well as power timer and power on reset timer.
It can operate up to the range of 2.0 V to 5.0 V which is very wide range
25 A at 3 V, 32 KHz
19
20
3.6
IC MAX232
IC MAX232 is used for connecting the PCB circuit with the personal computer. It is
used to convert the TTL logic into the RS232 logic. Both are the protocols which are used for
data transmission. TTL logic is that logic which has operating range of 0v to 5 V.
On the other hand RS logic is that logic which has an operating range which is very
wide range i.e. -25 v to +25 v. these are the data encapsulation protocols, in TTL 5V means
1 and 0V means 0. While in RS logic it is inverse -25V is for 1 and +25V are for 0.
This IC is connected with single 5V supply, so to provide -25 and +25V it uses
capacitors to provide large voltage.
21
22
3.6.3
23
3.7
These are the simplest electronic devices which are easily available in the market. We are
using 16x2 LCD; it can display all kinds of integers as well as characters of any kind. It has
got no limitations regarding its operation. It is very reliable device, thats why we used this
device.
As stated earlier, we are using 16x2 LCD, which means that it can display 16
characters on a line and it can display maximum 2 lines, which are sufficient for our
displaying purpose.
It has got two internal registers named as command register and data register.
Command register is mainly used to save the commands given to the LCD.
Data registers are those registers which are used to store the data which is to be
displayed on the screen. This data is very important. So data register stores this data.
25
26
3.9.1
27
The integrated circuit LM358 is basically used in order to convert the electrical
analogue signal into digital signal, the current or voltage coming from current transformer and
potential transformer respectively are converted into digital form, so that they can be fed into
the microcontroller.
The microcontroller then decides and reads the energy coming from the source. This
circuitry is basically designed to measure the input power, which is the product of voltage and
current. In this way LM358 is used with current and potential transformers so as to provide
data conversion and conditioning functions.
28
3.10.1
3.10.2
3.11.1
3.11.2
30
3.11.3
3.11.4
31
32
3.12.3
33
which the base current is provided all the time, when base current is removed, transistor turns
off thus switching off the circuit which is connected to it.
3.13.1
3.13.2
34
3.14
Current Transformer
CT is the acronym of current transformer. Current transformers are basically used
for the measurement of current in a given circuit. By measuring the current through current
transformer it is possible to measure the total power drawn through the circuit, because
voltages can be found by using potential transformer, and their product is the power. Current
transformers come in 3 different shapes, according to their configuration.
35
3.15.1
36
3.15.2
KHz and modulated with 50 Hz AC signal (Frequency Modulation). The modulated signal
can travel up to long distance through live AC 230V power line. The modulated AC signal is
given to this module at AC terminals.
Capacitors allows only carrier frequency and blocks 50Hz signals, as XC= 1/2fC
(capacitor allows high frequency signal). Two level capacitor based demodulation is done.
Inductors/coils are used to block the high frequency signal, and bypasses the low frequency
signals and derives 5V, 2A DC power source required for the modem.
Inductor blocks high frequency signals and allows low frequency signals as we know that
XL= 2fL.
At first the PLC Modem senses the zero crossing of sine wave 220V with the help of
optocoupler. After detection it injects the burst of 400-1200 bps data at 125 KHz- 135 KHz
having 5V. Burst is counted as 0 and non-burst is counted as 1. PLC modem has a high
pass filter to accept the high frequency burst.
3.15.3
37
3.15.4
38
CHAPTER 4
SOFTWARE
In this chapter we will discuss our projects flow chart and the GUI software. So, we
can divide this chapter in two portions:
Flow Chart
GUI Software
Flow chart is the graphical representation of any process occurring in the project. It
uses blocks and different closed shape boxes to represent the flow of data and process. It uses
a round shaped box in order to show the START/END of the process. It has diagonal shaped
boxes to show the decision making in the process. In the same ways it has many other shapes
for different purposes.
39
Output Watts
Used Watts
Difference
Energy Meters ID
Switching Controls
41
This is the view of dial box which is displayed on the GUI. We can see on the
display that normal operation is being done, and energy meter is recording 1 watt of energy,
while grid station says that it is delivering 10 Watts of energy. So difference becomes 9
Watts. But we dont have to worry, this energy is being used to overcome line losses, or in
simple words we can say that these are lines losses.
We have given a limit of line losses, beyond which it tells the operator that theft is
occurring. Due to these losses we put 25 Watts limit for these losses. If the difference
becomes greater than the limit, then red light will automatically blink, which means that
power theft is occurring.
42
In this case we can see that output power is 84 Watts and consumed power is 73
Watts. And difference is 11 Watts. As this difference is smaller than the limit so green light is
on, this shows that no power theft is occurring.
We are also recording the total number of KWh so that we do automatic meter
reading. So, the system identifies this load as legal load.
43
In this case system is recording 153 Watts as output and energy meter is recording
74 Watts. Difference becomes 79 which are far beyond the limit of 25 Watts. So the systems
red light turns on automatically, which shows that some power pilfering is occurring.
44
5.1 Conclusion
Our purpose in this project was to design a system which detects power theft as well
as performs automatic meter reading. We used power line carrier communication for this
project, and this is done by using PLC module KQ330. This PLC module works on the
principle of zero crossing detectors. It transmits the data by encapsulating the data signal into
125-135 KHz modulated signal. This data signal travels on the power line and reaches the
grid station, where it is analysed and automatic meter reading is done. If any theft is occurring
on the transmission line, this system alerts the grid station about this theft.
This system will allow grid stations to reduce the man effort required for the billing
process and also for checking the faults on the transmission line. Now, it is possible to locate
where the power theft is occurring. Also a circuit breaker in the form of relay is connected to
our circuit to allow the grid station to remotely cut off the power supply for the consumer who
tries to indulge in power theft.
In this project we developed a wise and intelligent system due to which the power
theft can be controlled and automatic meter reading can be done. The fruit of this project
comes in the form of revenue collection.
45
46
47
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Microcontrollers,
by
Texas
Instruments,
[Online].
Available:
http://www.microcontroller.ti.com
[8]
Clocks
and
Timers,
by
Texas
Instruments,
[Online].
Available:
http://www.ti.com/clocks
[9]
[10]
Data
Converters,
by
Texas
Instruments,
[Online].
Available:
http://www.dataconverter.ti.com
[11]
International Journal of research in advent technology, vol 2, no.4, April 2014 EISSN: 2321-9637.
[12]
[13]
48
[14]
[15]
[16]
[17]
[18]
Electricity
thefts
at
its
http://www.wikipedia.com/electricitythefts
49
peak,
[Online].
Available: