Power Theft
Power Theft
Project review on
IOT BASED POWER THEFT DETECTION
BACHELOR OF TECHNOLOGY
ELECTRICAL AND ELECTRONICS ENGINEERING
by
B.Sai Ram Reddy(15701A0271) G.Ruthvik Harsha(15701A0269)
V.Manjunath Reddy(16705A0224) E.Madhu Mohan Reddy(16705A0222)
IV B TECH II SEM
Under the esteemed guidance of
Dr.M.Padma Lalitha M.Tech,Ph.D.,
Professor, HOD.
In developing countries like India, power theft is one of the most prevalent
issues which not only cause economic losses but also irregular supply of
electricity. It hampers functioning of industries and factories, due to shortage
of power supplied to them. It causes shortage of power supply to homes. It
leads to loss of revenue by Government as individual enterprises may opt to
install their own power generators, increases corruption in form of bribes and
many more. Ultimately it is the country’s economy which suffers along with
the country’s political reputation.
3
Objectives
4
POWER
Connection Diagram
SUPPLY
CURRENT
TRANSFORMER 1 IOT
THEFT LOAD
ARDUINO CONTROLLER GSM
CURRENT
TRANSFORMER 2
LCD
ACTUAL LOAD
Components
1) Arduino UNO
2) ESP8266
3) GSM module
4) Liquid crystal display
5) Current transformer
6) Bridge rectifier
7) Voltage Regulator (LM1117)
8) Load
9) Resistor
10) Capacitor
6
Existing method
An 8051 family of microcontroller is used to continuously monitor the load
consumption before and after the energy meter. Any difference noticed between the
input power and the output power from the meter is detected by a special CT
feeding a signal to a through an Opto-coupler. In demonstrating the project function
, a fixed load of 100 watt lamp is connected duly from the output of a standard
energy meter and a provision is kept with a lamp holder that is wired before the
meter connection.
The moment any load is connected to this lamp holder the sensing takes
place for action as described as above. It triggers the generation of an SMS, and
then the status of the system is also displayed on an LCD.The information, in the
form of a message fed from the microcontroller via a level shifter IC and RS232
7
link, is sent to any cell phone through a GSM modem.
Proposed method
The main component in this circuit is Arduino controller. It receives current signal from two
current transformers by the means of bridge rectifier. Then it compares those two current
magnitudes by the conditional operator. The Arduino cannot access current signal. So we have
to interface the C.T. by means of voltage only. Here we have to convert the current signal into
voltage signal. This voltage signal is given to the Arduino and the corresponding current can be
calculated by the calibration. If any tapping is done, i.e, power theft is happened. Then two
transformers shows different values. The source current is more than the actual load current. If
there is any deviation more than the specified value then controller sends the signal to LCD,
GSM and Internet of things.
The GSM is used for sending text message to the substation members by placing their mobile
number in the code. IoT is used for sending tweet to the officials through internet. By using this
we can find the exact location of the theft in which line the theft is going on an alert message is
sent to the authorized person as well as consumers also this can be done by using IOT Software
8
Applications
9
Advantages
Security is automated.
Economy of country is saved.
Alert can be generated through GSM even in the case of failure
of internet.
Does not affect the power transfer capability of line.
10
Disadvantages
• Installation cost is very high
• Complexity increases as load increases
11
Conclusion
Using IoT, power theft detector kit has been
implemented and the same also done using GSM for the
purpose of backup protection. In case of internet failure
the alert will be made through text message.By using above
GSM and IoT techniques the crime of stealing power may
be brought to an end, thereby a new bloom may be
expected in the economy of our motherland and also there
will be less scarcity for power utilisation.
12
Future Expansion
This work can be further expanded to detect the fault location
and necessary action can be taken.
13
References
https://www.google.co.in/?gfe_rd=cr&dcr=0&ei=pNQ8W
qeAPaudX66gr4AG
https://www.slideshare.net/nikhilhiware/final-ppt-copy
https://en.wikipedia.org/wiki/Theft_of_electricity
14
15
16