View
13
Download
0
Category
Preview:
Citation preview
Smart IOT Enabled Power Theft Detection
and Transformer Health Monitoring System
Sowmya.S
M.Tech- VLSI & ES, Student
Department of Electronics and Communication Engineering
B.N.M Institute of Technology, Bangalore, Karnataka, India
Yasha Jyothi M Shirur
Professor
Department of Electronics and Communication Engineering
B.N.M Institute of Technology, Bangalore, Karnataka, India
Abstract- In the current scenario it is very difficult to imagine the human life without electricity. Almost all the daily
appliances are powered by electricity and is the most important factor in everyone’s life. In developing countries like
India where there is huge population the demand for electricity is drastically increasing to satisfy the human needs.
Power theft is one of the major concerns for Government, public and utility. The existing methods are not capable enough
to detect the power theft and there is a huge demand for the smart system which can detect the power theft and enable to
monitor and protect the health of the transformer. Developing such a smart system is the need of the hour. In this paper a
prototype is developed and discussed which is capable enough to detect the power theft, monitor the oil level and detects
the dynamic variations of the temperature and alerts the BESCOM Officials wherever the intruder tries to steal the
power by various means using IOT.
Keywords – Power theft, GSM, IOT
I. INTRODUCTION
The advancements in Science and Technology such as the invention of computers, production of electricity etc has
fascinated the human life to the greater extent such that imagining the world without all these innovations is hardly
possible. As the technology is getting upgraded, the immoral activities are also increasing.
In developing countries like India, power theft is the serious factor which will not only lead to economic losses but it
will also affect the correct functioning of factories, and it will also cause irregular supply of electricity to homes.
Due to this immoral activity it is the country’s economy that will suffer along with the country’s political reputation.
Figure 1. Electric Power Generation, Transmission, and Distribution [1]
The above Figure 1 shows how the electricity will get generated, transmitted and distributed. When the potential
difference will be around 33,000volts then only the electric power will begin at the power plant. After generating
the electric power, step-up transformers are used to raise the voltage which will be convenient for the transmission
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 79
i.e, from 44kV to 765kV. Later it will go to the step-down substation where the step down transformer decreases
the voltage to 35kV, which will be utilized by the large factories and then it will go to the distribution substation
where again the voltage gets reduced to 220V which will then get distributed to the homes [1].
Power theft is said to happen whenever someone is stealing the electric power other than the authorized person.
According to section135 of Electricity Act2003, electricity theft will occur when a person taps the lines of
electricity, or when direct hooking is done, or when a device is used to damage the electric meter. Hence, it is
identified that there is a need for developing a system which will be able to detect the power theft.
From the literature survey it is observed that the existing systems does not have the following features:
a) Information System[2]
b) Voice announcement to BESCOM officials in case of power theft and also regarding the voice
announcement for monitoring the maintenance of the transformer[3]
c) Detection of location in case of power theft[4]
d) Plotting of co-ordinates using Google cloud[5]
e) Transformer protection system[6]
f) Intruder detection system and voice alarm[7]
g) Temperature detection of transformer and information to the substations[8]
h) Transformer oil level detection and information to the substations[9]
i) Photographic proof system for further queries[10]
Hence, here a system is designed which is capable of overcoming all the above mentioned features so that the
developed system will be capable of detecting the power theft as well as it will detect the location where the theft is
happening and it will also identify who is doing the power theft by capturing the images so that the crime can be
proved and it will also provide protection to the transformers regarding the maintenance using the IOT.
II. PROPOSED SYSTEM
In the proposed method GSM technology is used to communicate with the BESCOM officials regarding whether the
power theft is taking place or not and also in-order to protect the transformer, it will also communicate regarding the
transformer oil level and temperature of the transformer.
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 80
Figure 2. Block diagram of a proposed smart power theft and transformer health monitoring system
The design methodology used here is as follows:
1) The system will detect whether the power theft is happening or not and if there is power theft happening then the
message will be sent to the BESCOM officials.
2) For providing the transformer protection system following steps are carried out:
a) Capturing of data
b) Processing of data
c) Communicating the data
d) Analysis of the data
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 81
2.1. Flow Chart
Figure 3.Flowchart for power theft detection Figure 4. Flowchart for oil level detection
Figure 5.Flowchart for temperature detection Figure 6. Flowchart for intruder detection
Pseudo code:
a) Initialize all the sensors to the different pins of port1.
b) Initialize the count.
c) If the intruder sensor output is high then display on the LCD that “INTRUDER DETECTED”.
d) Send the SMS to the registered mobile number that the intruder is detected.
e) If the oil level sensor output is high then display on the LCD that “OIL LEVEL LOW”.
f) Send the SMS to the registered mobile number that the oil level is low.
g) If the temperature sensor output is high then display on the LCD that “TEMP HIGH”.
h) Send the SMS to the registered mobile number that the temp is high.
i) If the current pulse becomes equal to 1 then initialize the two parameters x and y.
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 82
j) While x is greater than or equal to 6000 and when y is less than 180, check whether within this range an
extra unit of current is occurring or not.
k) If the extra unit of current is occurring then the count will become greater than one.
l) Once the count becomes greater than one then on the LCD it will display as “POWER THEFT”.
2.2. Working
The block diagram of the proposed system is as shown in figure.2. Here 200W bulb will represent the extra load
used to do the power theft. When the normal power is consumed i.e, whenever the 60W bulb is on it will indicate
that there is no power theft but whenever someone tries to do direct hooking to make a power theft then that extra
load will be detected with the help of the 200W bulb.
Current sensor will sense the amount of flow of current and then the current sensor output will be given as the input
to the MCT2E optocoupler, then one of the output of the optocoupler will be given as the input to the HJR-3FF-S-Z
relay in-order to count the current pulses and the other output of the optocoupler will be given to the 5V of the
microcontroller. Hence, the power theft detection will take place depending upon the rate at which the current
pulses are counted and that will get displayed on the LCD as “Power Theft” and simultaneously the alert message
will be sent to the BESCOM officials through the GSM and voice announcement will also be made as “Power
Theft”.
In-order to monitor the health of the transformer the temperature sensor and the oil level detection sensors are used
to indicate the low oil level and high temperature and when the oil level of the transformer goes low and the
temperature of the transformer goes high then that information will get displayed on LCD and then the respective
message will be sent to the BESCOM officials through GSM module and voice announcement will also be made
respectively.
In-order to provide the proof for the power theft taking place the intruder sensor is used so that whenever a person
comes near the transformer will get detected and it will get displayed on the LCD as “Intruder Detected” and then
the alert message will be sent to the BESCOM officials through the GSM module and voice announcement will be
made as “INTRUDER DETECTED”.
III. TOOLS USED
a) Hardware Components:
i)Rogowski Coil Current Sensor : These sensors are used for measuring the alternating current , high
speed transient pulse current. These sensors will work on the principle of Faraday’s law[12]. These sensors
are similar to the AC current transformer, but the difference is that an air core will be used in the Rogowski
Coil whereas the steel core will be used in the current transformers. A magnetic field gets created whenever
the current will flow through the conductor and as a result of this voltage will get induced between the
terminals of the Rogowski coil. The output of these sensors will be given to the integrator. Because of the
properties such as the no magnetic saturation, no over heating or no hysteresis loss these types of current
sensors are often used. The output of these sensors will not saturate for large currents.
ii) MCT2E Optocoupler : It is a 6 pin IC . This will have a transistor which will be controlled based on
the light. Whenever an IR LED is ON, light from that will fall on the transistor and thereby it will start
conducting. MCT2E optocoupler can be used in two modes and they are phototransistor mode and
photodiode mode and among the two the most commonly used one is the phototransistor mode. In the
phototransistor mode , when the input is low , IR LED will not conduct and the transistor will be turned off
and therefore the logic output will be high. But whenever the logic input is made high, then the IR LED
will conduct and hence the phototransistor gets turned on.
iii) 7805 voltage regulator : It is a 3 pin IC which consists of input pin for accepting incoming DC voltage,
ground pin for establishing ground for regulator and output pin which will supply +5V. Voltage regulator
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 83
will provide a constant output for a varied input voltage. The advantage of this regulator is that to handle its
output voltage it does not require any other extra components and also to protect from over voltage it will
include built in protection.
iv)LM35 Temperature Sensor : It is a 3 pin IC which will consist of Vcc , Vout, and the Gnd. Vcc will be
connected to the 5V , ground pin will be connected to 0V or ground, Vout will be connected to analog pin
of the microcontroller[15]. The voltage across the diode terminals is the basic principle on which this
sensor will work.As the voltage increases the temperature of the sensor will also increase. This sensor can
be used to measure temperature anywhere between -55degree celsius to 150degree celsius and for each
degree celsius raise in temperature there will be raise of 0.01V. The most important feature of this sensor is
that it will draw just 60microampere from its supply and will acquire a low self-heating capacity.
v)IR Sensor : IR sensor is the electronic device that will emit the light to sense the objects surrounding it.
Infrared sensors can emit and detect the infrared radiation and it will have two parts namely LED receiver.
Emitter is just the IR LED and detector is the IR photodiode. Whenever the objects comes close to the
sensor, infrared light from LED will reflect the object and that is detected by the receiver. When IR light
will fall on photodiode, output and resistance will change in proportion to magnitude of IR light received.
vi)Oil Level Sensor: This sensor is similar to the oil float switch and depending upon whether the oil
level will raise or fall down the oil level controller will open and close the circuit. In order to measure the
oil level these oil level sensors will use the magnetic reed switches which will be sealed in the plastic stem
or stainless steel.
vii)16*2 LCD: LCD will support the English and digital text. It has the driver voltage of 5V. The viewing
angle is of 6H.This LCD display is used to display whether the power theft is happening or not, if the oil
level is low, if the temperature is high and if incase the intruder is detected then that will also be displayed
in the LCD[14].
viii) GSM SIM900A: The cheapest and smallest module for GSM communication is GSM SIM 900A.It is
a 68pin IC. In this module using the mobile SIM the communication will take place. It will use 900 and
180MHz frequency band. The applications can be established by making use of the keypad and the display
interface. This module can operate in the two modes and they are command mode and the data mode.
According to the requirements the settings are required to be changed by the developers and that can be
done using the command mode.
ix) P89V41RD2 Microcontroller: The reason for choosing this microcontroller is that it has the ability to
program them through the UART and 8051 microcontroller is the CPU of P89V51RD2 microcontroller
[13]. It is a DIP 40 package. It has four, 8 bits I/O ports namely Port0.0 to Port0.7 , Port1.0 to Port1.7 ,
Port2.0 to Port2.7, Port3.0 to Port3.7.Out of 32 I/O ports , two are used for the communication purpose and
they are Port3.1 which is used for the transmission purpose and Port3.0 which will be used for the
receiving purpose. The remaining pins are +Vcc, Gnd, Reset,EA ,ALE,XTAL1,XTAL2,PSEN.EA pin is
used to check whether the program is executing internally or externally. When EA =1,execution will start
from external memory and when EA = 0 , execution will start from the internal memory. ALE pin will say
whether the execution has to happen internally or externally. Frequency for the oscillator is 11.0592MHz
which will be generated using the crystal oscillators. It has three 16 bit timers/counters and we can set the
timer or counter in 4 modes namely Mode0, Mode1, Mode2, Mode3.It has serial peripheral interface which
is used to establish the communication between P8V951RD2 microcontroller to peripheral devices or
between P89V51RD2 to P89V51RD2.Watchdog timer is used to release the software deadlock, whenever
the software crashes then it will give the software deadlock. It is the second DPTR register and this DPTR
is used to display on the LCD about what data has to be displayed will be pointed out by the DPTR.
Operating voltage is 5V from 0MHz to 40MHz.
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 84
b) Software Used
The software tools used are as follows:
i)Embedded C
ii)Flash Magic
iii)Kiel Compiler
iv)Android Studio
Embedded C, flash magic and kiel compiler are used for integrating all the various embedded components
and the Android Studio is used for the establishing the IOT application for sending the information to the
BESCOM officials and then providing the respective voice announcements. The codes written using the
Embedded C language will be executed using the Kiel compiler which will generate the hex file which is to
be burnt into the IC and in-order to perform this operation flash magic software is used.
Android Studio: This software will support all the programming languages such as the Java, C++. Using this we can
develop the apps for Android phones ,tablets and Android TV. The language with which the Android
Studio can be used is Java. The main feature of this Android Studio is that auto save feature cannot be
turned off manually.
IV. EXPERIMENT AND RESULTS
Case1: When there is no power theft
Figure 7. No power theft
When an authorized person is using the actual power then the rate at which the relay counts the current pulses will
be slow and hence upon the LCD there is no display regarding the power theft happening and this will indicate that
there is no power theft taking place as shown in figure 7 .
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 85
Case2: When there is power theft
Figure 8. Power theft detection
When an unauthorized person is using the actual power then the rate at which the relay counts the current pulses will
increase and hence upon the LCD it gets displayed as the “POWER THEFT” and this will indicate that the power
theft is taking place as shown in figure 8 and simultaneously the voice announcement will be received by the
BESCOM officials as “POWER THEFT”.
Case3: When the oil level is low
Figure 9.Detection of low oil level
When the oil level of the transformer goes low then the reed switches of the oil level sensor will move down
indicating that the oil level of the transformer is low and it gets displayed on the LCD as “OIL LEVEL LOW” as
shown in figure 9 and simultaneously the voice announcement will be received by the BESCOM officials as “OIL
LEVEL LOW”.
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 86
Case4: When temperature of the transformer is high
Figure 10. Detection of high temperature of the transformer
When the temperature of the transformer goes above the ambient temperature then it gets displayed on the LCD as
“HIGH TEMPERATURE” as shown in figure 10 and simultaneously the voice announcement will be received by
the BESCOM officials as “TEMPERATURE HIGH”.
Case5: When an intruder is detected
Figure 11. Intruder Detection
Whenever an intruder is trying to do the power theft then the intruder sensor will detect that and upon the LCD it
gets displayed as the “INTRUDER DETECTED” as shown in figure 11 and simultaneously the voice announcement
will be received by the BESCOM officials as “INTRUDER DETECED”.
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 87
Case6: Power theft app
Figure 12. Power theft app
The android app developed has the facility for detecting the location of power theft, for capturing the photo of the
person who is doing the power theft which is required for further queries as the proof, to register the compliant to
the nearest police station regarding the power theft. The BESCOM officials will have the power theft application in
his phone as shown in figure 12.
Case 7: Messages received by BESCOM officials
Figure 13. Messages received by the BESCOM officials
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 88
Whenever there is a power theft happening or when the temperature of the transformer goes above the ambient
temperature or whenever an intruder is detected or when the oil level of the transformer goes low then the respective
messages will be received by the BESCOM officials as shown in figure.13.
Case 8: Location detection
Figure 14. Detection of power theft location
When the BESCOM officials click upon the LOC as shown in figure 12 the location of the place where the power
theft is happening will be displayed on the BESCOM official phone as shown in figure 14.
Case 9: Capturing of photo during power theft
Figure 15. Capturing of the photo during the power theft
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 89
When the BESCOM official click upon the photo as shown in figure 12 then the photo of the person who is trying to
do the power theft will get displayed on the BESCOM official as shown in figure 15.
Case 10: Compliant registration to the nearest police station
Figure 16. Compliant registration to the nearest police station
When the BESCOM officials click upon the EMERGENCY INFO as shown in figure 12 then immediately a
message will be sent to the nearest police station regarding the power theft and the location of the power theft will
also be sent to the nearest police station so that the actions can be taken immediately as shown in figure 16.
V.CONCLUSION
The prototype developed is cost effective and measures the required parameters accurately and communicates to the
concerned officials immediately. In order to avoid the power theft the proposed system has been implemented and
the expected results for the power theft detection, oil level detection and temperature detection and also the intruder
detection has been obtained accordingly. The future scope of this project is that whenever the temperature of the
transformer goes high then in-order to reduce this temperature a fan can be in-built to the prototype system.
REFERENCES
[1] A Bright Future for Electric Transmission and Distribution, June16, 2020.
[2] M J Jeffin, Madhu G M, Akshayata Rao, Gurpreet Singh and C. Vyjayanthi, “Internet of Things Enabled Power Theft Detection and Smart Meter Monitoring System”, International Conference on Communication and Signal Processing, July 28 - 30, 2020, India.
[3] Rohit Grewal, Tushar Sharma, Rajbir Mourya, Anil Kumar, Karamjit Kaur, “Cost Effective Overload and Theft Detection for Power Distribution System”, 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT-2018), MAY 18th & 19th 2018.
[4] Ms. AISHWARYA P. KAMATAGI, Ms. RAJESHWARI B. UMADI, Mr. SUJITH V, “Development of Energy Meter Monitoring System (EMMS) for Data Acquisition and Tampering Detection using IoT”, IEEE 2020.
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 90
[5] Mr. Sannidhan M S, Mr. Sunil Kumar Aithal S, Mr. Jason Elroy Martis, Mr. Abhir Bhandary, “A Cost-Effective Approach for Detecting Electricity Theft using Raspberry Pi Board”, International Conference on Current Trends in Computer, Electrical, Electronics and Communication (ICCTCEEC-2017).
[6] Weixian Li, Member, IEEE, Thillainathan Logenthiran, “A Novel Smart Energy Theft System (SETS) for IoT based Smart Home”, IEEE 2018.
[7] Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi, “Energy Theft Detection in Advanced Metering Infrastructure”, IEEE 2018.
[8] Nilesh Mohite, Rinkuraj Ranaware , Prakash Kakade, “GSM Based Electricity Theft Detection”, International Journal of Scientific Engineering and Applied Science (IJSEAS) – Volume-2, Issue-2, February 2016 ISSN: 2395-3470
[9] Manojkumar M. Patole, Prasanna R. Mane, Shakti Lohar, Sneha Sadalagi, Prof.Chandrakant Umarani, “GSM Based Power Theft Detection System Using Android”, IJESC- Volume-6 Issue No.5,2016.
[10] Kalaivani.R, Gowthami.M, Savitha.S, Karthick.N and Mohanvel.S,” GSM Based Electricity Theft Identification in Distribution Systems”, International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 10- Feb 2014.
[11] Amar Pawade, Nadeem Shaikh,Bhushan Chowdhri, Ansari Shariq, “POWER THEFT DETECTION USING WIRELESS SYSTEM: A DISTRIBUTED APPROACH FOR POWER THEFT PREVENTION”, International Journal of Student Research in Technology & Management Vol 1(1).
[12] Texas Instruments ,”High Accuracy AC Current Measurement Reference Design Using PCB Rogowski Coil Sensor”, July2016.
[13] Vikrant Verma, Vivek Kumar and Naveen Yadav “PC Configurable P89V51RD2 based Digital Clock Displaying the Day, Date, Time and Temperature on a 128*64 Graphical LCD Module” , IJCA Journal December2013.
[14] Kashish Talwar, Harhit Tiwari and Nishant Malhotra, “HEAD AND HAND OPERATION OF 3 AXIS PICK AND PLACE SENSORY ROBOT” , International Journal Of Engineering Research & Management Technology,March2014.
[15] Mya Thandar Phyu, Nan Myint Myint Htwe and Nan Sandar Thin, “TEMPERATURE MONITORING SYSTEM USING LM35 AND PIC MICROCONTROLLER”, International Research Journal of Modernization in Engineering Technology and Science, Volume: 02/Issue: 07/July-2020.
BULLETIN MONUMENTAL - ISSN / e-ISSN 0007-473X
Volume 22 : Issue 7 - 2021
http://bulletinmonumental.com/
Page No : 91
Recommended