Anda di halaman 1dari 5

2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON)

Development of a Cost-Effective Electricity Theft


Detection and Prevention System based on IoT Technology
R. E. Ogu and G. A. Chukwudebe
Dept. of Electrical and Electronic Engineering
Federal University of Technology Owerri, Nigeria
ogureginald@gmail.com, gloria_chukwudebe@ieee.org

Abstract— Electricity theft is one of the major challenges consumers often tamper with them. Some consumers go to the
faced by the power companies. It prevents the power companies extent of bypassing the energy meters in their homes, offices
from making adequate money from the sale of electricity. This or industries.
paper presents the development of a cost effective electricity theft
detection and prevention system using the Internet of Things Normally, if the consumers do not pay for electricity used;
(IoT) technology. The Arduino MKR1000 microcontroller board the distribution companies will not be able to pay for power
is employed as a bi-function element; to coordinate the activities generated and transmitted to them, the situation creates a
of the system and to connect the system to a WiFi network and vicious cycle that can cripple any electricity sector [2].
subsequently to the Internet. A Passive Infrared Sensor is
employed as the sensory element to detect when the sensitive part
Since there is no effective electricity metering system, it
of a meter is opened by a human being. A Solid State Relay with implies that the distribution companies cannot effectively bill
zero crossing capability is used to connect the loads to the the customers. The distribution companies will in turn not be
distribution network. The Thingspeak.com IoT Analytic able to pay the transmission company for the energy
platform is employed to create a webpage so that the status of the transmitted to them. As a result of this, the transmission
meter can be visualized on the Internet by the power company. company will not be able to pay for the energy that was
The result of this paper is a functional system for electricity theft generated. The generation companies will be faced with
detection and prevention whose mode of operation is based on difficulties both in the procurement of new equipment,
IoT concept. maintenance of the existing machines and payment of the
workers’ salary. The entire process contributes heavily to
Keywords-Arduino: Electricity theft prevention; IoT; IoT Data irregular electricity supply.
Analytics; Tamper Detection.
For this problem to be solved there is need for proper and
I. INTRODUCTION effective metering systems. If such metering systems are
Unstable electricity supply is one of the pressing problems installed, there is also need for constant monitoring of the
of Nigeria. Despite the level of privatization in the power meter to know when the consumer has tampered with it or
sector, the situation has worsened to the extent of the entire when the consumer has bypassed it. This will require the staff
country experiencing a total black-out on March 31, 2016. of the distribution companies to constantly visit the premises
While the nation has always been known for epileptic power of the consumer for both meter reading and tamper activity
supply, this unfortunate event marked the emergence of a new inspection; this is a lot of work for the staff and not feasible.
low in the country’s power supply system [1]. In a previous work, an attempt was made to prevent
Despite the fact that the Nigeria power sector had become electricity theft by making a meter to be tamper proof.
unbundled with private investors in the distribution and Although successful, the system connected the electricity
generating sectors, very trivial improvement is observed. This meter to the Internet so that the power company can monitor
can be because there is presently no competition in the the status of the meter from their office to know when the
distribution sector; since consumers have only one operator in meter is tampered with. In conjunction with other components,
their zone. Hence, the issues are still persisting; some two separate boards were utilized, one as a controller and the
electricity consumers get inflated bills of power not consumed, other as a network interface [2].
some are tapping electricity directly from the distribution In order to reduce the cost associated with the procurement
network while some bypass their prepaid meters. All these of two separate boards (a controller and a network interface),
activities constitute electricity theft [2]. an attempt is made here to use a single board to do the work
Electricity theft is one of the biggest problems damaging done by the two boards.
the power sector of Nigeria; it includes any activity done, in The primary objective of this study is to develop a cost
order for the consumers of electricity to use electric power effective Internet-of-Things (IoT) based Electricity Theft
without the proper consent of the utility so as not to pay for Detection and Prevention System.
the energy.
If electricity theft is curbed, there will be an improvement
The distribution companies are often discouraged from in the power sector. There will be reduction in electricity tariff
installing electricity devices (electricity meters) at the and the electricity companies (distribution, transmission and
consumers’ premises because when such devices are installed, generation) will make enough profit and begin to plan for

756

978-1-5090-6422-9/17/$31.00 ©2017 IEEE


2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON)

expansion of their businesses. For example, if the Generation brown field approach of Internet-of-Things implementation.
companies expand their businesses, it means that more power Also, this system does not detect meter tampering.
will be generated and supplied to the Transmission Company.
An IoT based transformer power theft detection and
At the end of the day, there will be an increase in the amount
of power available for the consumers to use. protection was presented in [6]. In order to sense the power
theft, a current sensor was used. The messages regarding the
maintenance of the transformer are sent to the maintenance
department, using a GSM-module [6]. This study failed to
II. LITERATURE SURVEY connect the transformer to the Internet; which is the main
concept of Internet-of-Things.
The Internet of Things (IoT) is a technological concept that
connects things to the Internet for data exchange. It is used in An IoT based metering system with electricity theft
this study to connect the electricity meter to the Internet in detection to measure energy consumption in the house and
order to prevent the meter from being tampered with. generate its bill automatically using telemetric communication
was reported in [7]. The electricity bill calculations are
Presented below are some works which used IoT in
performed automatically and the bill is updated on the Internet
electricity theft prevention.
by using a network of Internet-of-Things. The bill amount can
A tamper proof system for the smart meters using IoT be checked by the owner anywhere globally. If the consumer
technology was developed in [2]. Although this system is fails to pay the bill on time, the electricity supply can
applicable to both the green field and brown field approach of automatically be turned off. Also power theft can be detected
the Internet of Things, it utilized two separate boards, one as a if any tampering happens; the system will send the
controller and the other as network interface. The cost information to the server and cut the electricity automatically
associated with the procurement of the Arduino Mega 2560 [7]. This system is only applicable to the green field approach
and Arduino WiFI Shield 101 boards is high, relative to the of IoT implementation.
cost of a single board, hence; there is need for a cheaper and
An IoT based embedded system that checks electricity
effective system.
theft and enables the remote control of appliance was
In [3], a tamper proof electricity meter with IoT presented in [8]. In this system, reference energy consumption
technology was developed with Raspberry pi embedded is set and once the energy consumption rises above the
system module. This system is costly because of the cost of threshold, the system considers the activity as electricity theft
the Raspberry pi board relative to other embedded system [8].
boards like the Arduino. Also, the Raspberry pi is not an open
It can be seen that most of the electricity theft prevention
source platform. The board is manufactured by only one
systems are targeting the smart meter while neglecting the
vendor unlike other platforms like Arduino. Hence, there is
electromechanical meter.
need to develop a system that will utilize an open source
platform whose boards can easily be manufactured by various Also, most of the existing electricity theft prevention
companies. systems (at the meter level) have to do with the development
of new smart meters with theft prevention except the device
An IoT based system that consists of Power Line
developed in [2]. Meter tampering has been neglected by most
Communication (PLC) modem, a theft detection unit and a
of the works not minding the fact that it is a delicate form of
WI-FI unit was proposed in [4]. Two separate systems were
electricity theft.
proposed to make up a working system. One of the systems is
to be installed at the point of entrance of electricity in a Therefore, there is need to develop a cost effective system
consumer’s premises while the other unit is to be installed at that will prevent meter tampering.
the utility company. Generally, three microcontrollers were
proposed to be used in the project; two of such will be used in III. METHODOLOGY
the system installed at the consumers end for IoT and theft A. System Block Diagram
detection capabilities. The remaining microcontroller will be
used in the system located at the utility office [4]. Figure 1 shows the block diagram of the electricity theft
detection and prevention system. The system simply connects
However, the proposed system is not cost effective as it the meter to the Internet so that the utility company can be
involves the operation of two separate systems to form a aware of the status of the electricity meter, in order to
functional system. determine when the meter is tampered with; hence the IoT
An IoT metering system that prevents electricity theft by concept.
disconnecting any consumer who has an outstanding One good thing about the system is that the controller and
electricity bill to be paid has been developed in [5]. Energy the network interface units are packed in a single module so as
consumption calculation is based on readings from voltage to reduce cost, associated with the procurement of two
and current sensors [5]. This system is only applicable to the separate boards, one as the controller and the other as the
green field approach of Internet-of-Things technology because network interface.
it requires the construction of a new meter but the system to be
developed in this paper will suit both the green field and

757
2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON)

Mains Supply This is a backup power supply unit for the system. It
8.4V,
makes the system functional even when there is no power
5600mAh from the utility company. A small 8.4V, 5600mAh
LiPo DC
Power Supply Unit rechargeable battery is used here.
Power
Supply Unit
B. Circuit Connection
As a reminder, the controller and the network interface are
Human Solid already connected on one board. The output of the PIR sensor
Controller
(Presence) State is connected to the pin A1 of the Arduino MKR1000 board.
Detector and Relay The positive pin of the Solid State Relay is connected to pin1
Network Interface of the MKR1000 while the Ground pin of the solid state relay
is connected to ground of the MKR1000 board. Figure 2
Loads shows the pictorial diagram of the connections between the
boards.
Figure 1: Block Diagram of the Electricity Theft Detection
and Prevention System.
The system comprises of the following blocks:
1. Electricity Theft Detection Unit
For the purpose of this study, any attempt to open the
sensitive part of the meter is considered a theft activity. In
order to detect when the sensitive part of the meter is opened,
a passive infrared sensor is chosen as the sensory element to
detect the presence of a human whenever the meter enclosure
is opened.
2. Controller and Network Interface
The controller coordinates the functions of all other parts
of the system while the network interface is responsible for
connecting the system to a WiFi network and subsequently to
the Internet for data exchange. Figure 2: Connections between the boards.
To reduce cost, a single module is selected to act as a C. System Algorithm
controller and a network interface, instead of choosing
separate units for the controller and network interface. For this The following steps illustrate the algorithm of the
purpose, the bi-functional Arduino MKR1000 board is chosen electricity theft detection and prevention system.
to reduce cost and also reduce the number of components. 1. Once the device is powered, all components will be
3. Electricity Theft Prevention Unit initialized.

To prevent electricity theft, it will be wise to disconnect 2. The system will connect the loads to the distribution
the loads of a suspected electricity thief from the distribution network.
network. A Solid state relay is utilized in connecting the loads 3. The system then checks if the meter is tampered with.
of a consumer to the distribution network in normal operation
and in disconnecting the affected consumer from the 4. After the check, the system will update the Internet
distribution network, when the meter is tampered with. with the status of the meter.

4. Power Supply Unit 5. The system continues to monitor the meter, once the
meter is tampered with, the load connected to the
This block provides the entire power needed by the system meter is disconnected from the distribution network.
to function. The 220V AC mains supply is reduced to 9V AC
by a step down transformer, rectified using a pair of diodes
that formed a bi-phase full wave rectifier. A capacitor is The Flow chart of Figure 3 represents the algorithm of
employed as a filter to remove the ripples in the signal while electricity theft detection and prevention system. It shows the
the LM7805 monolithic Integrated Circuit is employed for mode of operation of the system.
voltage regulation to produce a constant 5V DC.
Also this power supply charges the DC Backup so that
when there is no power from the utility company, the DC
Backup can energize the system.
5. DC Backup

758
2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON)

IV. RESULTS AND DISCUSSION


Figures 4 and 5 show the snapshot of a web browser during
the testing stage of the system. Figure 4 is a snapshot of a web
browser displaying the Thingspeak channel for the system. At
this point, the system has not been powered ON. The system
has not sent any data to the Internet.

Figure 4: Snapshot of the Thingspeak channel, when the system has


not sent any data to the Internet.

Also, displayed on the channel is the location of the meter.


This information enables the power company to identify the
particular meter that has been tampered with.

Figure 3: Flow chart of the electricity theft detection and prevention


system.

D. IoT Analytics
Data analytics examine big/large data sets in order to draw
inference about the content of the data. In this study, a data
analytic platform is used to gather the data sent by the
connected meter so as to determine when the meter is
tampered with.
A utility company may have several meters under its watch
and may not be able to effectively monitor the meters at the
same time but with the use of a data analytic several meters
can be monitored at the same time effectively.
The Thingspeak.com IoT Data Analytic is used to
visualize the status of the meter on the Internet. The PIR
sensor senses when the meter has been tampered with, sends
signal to the controller and network interface units. The Figure 5: Snapshot of the Thingspeak channel, after several tamper
network module connects the meter to the Internet by first activities.
connecting to an Internet-ready WiFi network and
Figure 5 is showing the snapshot of a web browser displaying
subsequently uploads the status of the meter to the Internet.
the Thingspeak channel for the system. At this time, the

759
2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON)

system has been powered ON and has sent the status of the This paper has succeeded in designing a cost effective
meter to the Internet. The chart beside the Google map shows electricity theft detection and prevention system using the
the status of the meter. Internet-of-Things technology by using a single board to act as
Initially the meter enclosure was not opened and the chart a controller and a network interface.
remained on a low level. Immediately the meter enclosure was The paper also verified the designed system by constructing
opened the system updated the Internet and the chart toggled and testing a prototype of the system using the components
from its low-level to a high-level. outlined in this paper.
Several attempts of opening and closing of the meter enclosure
resulted in the toggling of the chart as seen in Figure 5.
VI. RECOMMENDATION
In the chart, the numerical values on the vertical signify the
output of the PIR sensor. When there is no human detection, This study only developed a system that detects the
the output of the sensor is approximately 0 while when there is presence of humans tampering with the meter,
human detection the output of the sensor is about 635 (this recommendation is made on any study that will develop a
corresponds to 3.1V of the output of the PIR sensor when it is system to detect both humans and robots tampering with the
HIGH). meter. This is necessary because robots can also be
On the horizontal axis, the date and time in which a data was programmed to tamper with the meter, in such a case; this
sent to the Internet are displayed. All the data sent by the system becomes almost useless.
system to the Internet are logged for reference purposes and
can be downloaded as a spreadsheet document.
Immediately the system was powered ON, the loads connected REFERENCES
to the GRID came ON. Once the first tampering activity was
carried out, the loads were switched OFF and never came ON [1] I. Ifedobi. “Practical solutions to Nigeria’s electricity crisis”. Retrieved
again until the entire testing process. from Vanguarg: http://www.vanguardngr.com/2016/07/practical-
soutions-nigerias-electricity-crisis/.(2016).
[2] R. E. Ogu, G. A. Chukwudebe and I. A. Ezenugu, “An IoT Based
V. CONCLUSION Tamper Prevention System for Electricity Meter,” American Journal of
Engineering Research (AJER), Volume-5, Issue-10, pp-347-353, (2016).
Checking electricity theft will drastically affect the power
[3] M. Singh and E. V. Sanduja, “Minimizing Electricity Theft by Internet-
sector positively, as power companies will make adequate of-Things”, International Journal of Advanced Research in Computer
money from the sale of electricity and plan to improve the and Communication Engineering, Vol. 4(8), pp.326-329, (2015).
system. [4] I. N. Darshan and K. A. R. Radhakrishna, “IoT Based Electricity Energy
The only existing system that closely relates to the system Meter Reading, Theft Detection and Disconnection using PLC modem
developed in this paper, is the system developed in [2]. For and Power optimization”, International Journal of Advanced Research in
Electrical, Electronics and Instrumentation Engineering, Vol. 4(7),
analytical purposes, in order to actualize the system of [2], the pp.6482-6491, (2015).
Arduino Mega 2560 and Arduino WiFi Shield 101 cost $35.00 [5] S. V. Anushree and T. Shanthi, “IoT Based Smart Energy Meter
and $49.95 respectively; this gives a total of $84.95. Monitoring and Theft Detection Using ATMEGA”, International Journal
of Innovative Research in Computer and Communication Engineering,
In this work, a single board (Arduino MKR1000) performs Vol. 4(11), Pp.19801-19805. (2016).
the functions done by the two separate boards above (the [6] S. Sridhar, H. Bharath, V. Vishvesh, K. V. Gowtham and H. Girish,
Arduino Mega 2560 and the Arduino WiFi shield 101). “IoT based-Transformer power theft detection and protection”,
International Journal of Engineering Research, Vol. 5 (4), pp: 992-1128,
The cost of Arduino MKR1000 is $44.95. Comparing the (2016).
total cost of the Controller and the network interface of [2], [7] P. D. Talwar and S. B. Kulkarni, “IoT Based Energy Meter Reading”,
which is $84.95 to $44.95 which is the cost of an amalgamated International Journal of Recent Trends in Engineering and Research,
board that has a controller and the network interface together, Vol.2(6), (2016).
it can be clearly understood that the cost has been drastically [8] L. K. Lekha, G. Jegan and M. D. Ranganathan, “IoT Based Household
reduced. Appliances Control And Tampering Detection Of Electricity Energy
Meter”, ARPN Journal of Engineering and Applied Sciences, Vol.
11(11), pp7376-7379, (2016).

760

Anda mungkin juga menyukai