Development of ARM Processor based Electricity Theft Control System using GSM Network

被引:0
作者
Dineshkumar, K. [1 ]
Ramanathan, Prabhu [1 ]
Ramasamy, Sudha [1 ]
机构
[1] VIT Univ, Sch Elect Engn, Vellore 632014, Tamil Nadu, India
来源
2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015) | 2015年
关键词
GSM; Electricity theft; Smart meter; Non-technical losses;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Electricity theft is a common practice in developing countries which cannot be controlled by the governments due to lack of technology. Emerging trends such as Automatic Meter Reading (AMR) eliminate the need of person visiting each house but this advancement further increases Non-Technical losses (NTL) because of no regular inspection at the residence. However traditional meter reading by human operator is inefficient to meet the future residential development needs. This paper proposes a new system based on ARM-Cortex M3 processor to protect the energy meter from phase line bypassing, neutral line disconnection, whole meter bypassing and meter tampering. A SMS automatically send to utility server through Global System for Mobile (GSM) network when these measures detected. In this paper a novel method is proposed to solve the problem with AMR systems without affecting its major advantage of remote monitoring. Integrating this new feature into smart meters provides a robust metering solution.
引用
收藏
页数:6
相关论文
共 12 条
[1]  
Ashna K, 2013, 2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), P65, DOI 10.1109/iMac4s.2013.6526385
[2]   Identification of energy theft and tampered meters using a central observer meter: A mathematical approach [J].
Bandim, CJ ;
Alves, JER ;
Pinto, AV ;
Souza, FC ;
Loureiro, MRB ;
Magalhaes, CA ;
Galvez-Durand, F .
2003 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE & EXPOSITION, VOLS 1-3, CONFERENCE PROCEEDINGS: BLAZING TRAILS IN ENERGY DELIVERY AND SERVICES, 2003, :163-168
[3]   Classification and trend analysis of threats origins to the security of power systems [J].
Bompard, Ettore ;
Huang, Tao ;
Wu, Yingjun ;
Cremenescu, Mihai .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2013, 50 :50-64
[4]   High performance computing for detection of electricity theft [J].
Depuru, Soma Shekara Sreenadh Reddy ;
Wang, Lingfeng ;
Devabhaktuni, Vijay ;
Green, Robert C. .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2013, 47 :21-30
[5]   Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft [J].
Depuru, Soma Shekara Sreenadh Reddy ;
Wang, Lingfeng ;
Devabhaktuni, Vijay .
ENERGY POLICY, 2011, 39 (02) :1007-1015
[6]  
Dick A.J., 1995, P EUR CONV SEC DET M, V90, P16
[7]  
Mohammad N, 2013, 2013 INTERNATIONAL CONFERENCE ON POWER, ENERGY AND CONTROL (ICPEC), P562, DOI 10.1109/ICPEC.2013.6527721
[8]   Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines [J].
Nagi, Jawad ;
Yap, Keem Siah ;
Tiong, Sieh Kiong ;
Ahmed, Syed Khaleel ;
Mohamad, Malik .
IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (02) :1162-1171
[9]  
Nizar A.H., 2009, P IEEE PES POW SYST, P1
[10]   A solution to remote detecting of illegal electricity usage based on smart metering [J].
Pasdar, A. ;
Mirzakuchaki, S. .
SOFA 2007: 2nd IEEE International Workshop on Soft Computing Applications, Proceedings, 2007, :163-167