Prevention of Power Theft Using Concept of Multifunction Meter and PLC
DOI:
https://doi.org/10.26438/ijcse/v6i12.443447Keywords:
Intrusion detection system, Anomaly based system, Electricity theft, IntrudersAbstract
In the system and networks, abnormal behavior is detected by anomaly-based IDS (Intrusion Detection System). If the working of a computer system is different from normal working is considered as an attack. The difference of comparison relies on traffic rate, a variety of packets for every protocol etc. Malicious traffic or data on a system is detected by intrusion detection process. To detect illegal, suspicious and malicious information and data, IDS can be a part of the software or a device. First is Detection of an attack then using different method to stop, Prevent an attack and disaster is the user’s highest priority. Anomaly-based IDS satisfy their requirement and demand.In present scenario electricity theft isa major hurdle in front of government. This problem affects Indian economy. The loss on quantity of theft is mirrored in the electricity company.People are affording more charges because intruders steal electricity by many ways.
References
[1] D. Alahakoon and Xinghuo Yu, “Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey” , IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 1, FEBRUARY 2016 .
[2] Q. Sun, H. Li, Z. Ma, “A Comprehensive Review of Smart Energy Meters in Intelligent Energy Networks” , January 2015.
[3] B.Saikiran, R.Hariharan, “Review of methods of power theft in Power System” ,International Journal of Scientific & Engineering Research, Volume 5, Issue 11, November-2014.
[4] N. Mohammad , A. Barua and M.Arafat,“ A Smart Prepaid Energy Metering System to Control Electricity Theft”, 2013 International Conference on Power, Energy and Control (ICPEC).
[5] S. McLaughlin, D. Podkuiko, and P. McDaniel, “Energy Theft in the Advanced Metering Infrastructure”, International Conference on Critical Information Infrastructures Security, 2016.
[6] R. Berthier, W. H. Sanders, and H. Khurana, “Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions” , 2010 First IEEE International Conference on Smart Grid Communications.
[7] Victor C. M. Leung, “Electricity Theft Detection in AMI Using Customers` Consumption Patterns”, IEEE Transactions on Smart Grid • May 2015.
[8] J. Nagi, K. S. Yap, S. K. Tiong,” Detection of Abnormalities and Electricity Theft using Genetic Support Vector Machines”, IEEE paper on march 1, 2009.
[9] Thomas B.Smith, “Electricity theft: a comparative analysis” Elesvier 2004.
[10] R.Rashed, M.AlanFung, F.Mohammadi, K.Raahemifar, “A survey on Advanced Metering Infrastructure”,International Journal of Electrical Power & Energy Systems, Volume 63, December 2014.
[11] A. Rial and G. Danezis, “Privacy-Preserving Smart Metering”, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011.
[12] K. Laeeq, W.Laeeq, “A comparative study among possible wireless technologies for smart grid communication networks”, In: First international conference on modern communication & computing technologies; 2014.
[13] R.Kalaivani, M.Gowthami,S.Savitha, N.Karthick, S.Mohanvel,” GSM Based Electricity Theft Identification in Distribution Systems”, International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 10- Feb 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
