Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Design and development of an innovative smart metering

system with GUI-based NTL detection platform


K.K. Kee1, S. M.F. Shahab2and C.J. Loh3
13
School of Engineering & Technology, University College of Technology Sarawak,
1
kkkee@ucts.edu.my, 3davlll@hotmail.com
2
Electrical Inspectorate Unit, Ministry of Public Utilities Sarawak, 2mohamfs1@sarawak.gov.my

Keywords: NTL detection, smart metering, smart grid, transformers, converters, inverters and generators for
GUI, electricity theft substation automation purpose. Detection of source and
load side demands to manage the energy flow in an
Abstract extended decision circumstances [1,2].
To support the smart grid to monitor and manage the
Smart Grid is gradually adopted by most of the DERs and load demand, the AMI (Advanced Metering
countries. AMI (Advanced Metering Infrastructure) is Infrastructure) is employed to collect the timely data
one of the key enabler technologies which consists of and information from the consumer ends. The bi-
smart meters, communication network and MDMS directional flow of information and control signal
(Meter Data Management System). The timely between utility company and consumer ends may use
information, for example consumption data and event wired or/and wireless networks. AMI typically includes
logs are important for detection of NTL (non-technical the smart meter, communication network via hybrid
loss) such as electricity theft and other customer networks with different level of infrastructure
malfeasance. It contributes up to 40% of revenue loss hierarchy, and MDMS (Meter Data Management
of utility companies in some countries throughout the System). The timely data from the smart meters are
world. The proposed detection mechanisms include used for various purposes such as billing, load pattern
energy balance method, smart meters in AMI, physical analysis for electricity theft detection, management of
detection sensors and the AI (artificial intelligence) peak demand, monitoring and controlling of usage
methods namely fuzzy logic and SVM (support vector profile and pattern of consumers, and remote operation
machine). The problematic issue is that those of supply (disconnect and re-connection) of electricity
mechanisms are merely implemented separately with at the consumer ends.
dissatisfaction outcomes due to inherent limitations and
weaknesses. In this paper, a novel design of smart 1.1 Non-technical loss (NTL)
metering system is developed as GUI-based NTL
detection platform. A 3-tier design of detection The electrical losses happen during generation,
algorithm is proposed to combine three mechanisms to transmission and distribution of electricity throughout
complement each other for enhanced performance. The the power grid can be classified into TL (technical
triangulation technique facilitates validation of losses) and NTL (non-technical losses). TL is relatively
detection result through cross verification from three easier to analyse and calculate, whereas the NTL is
sources of measurement data. Furthermore, the system more difficult to detect and measure accurately. NTL
also support better flexibility with built-in or external refers to illegal consumption of electricity such as
developed AI methods and user-friendly GUI-based electricity theft and other customer malfeasances. It
platform to monitor and analyse NTL status in real time may contribute up to 40% loss of total energy generated
of power grid for revenue recovery. in both developing countries and even developed
countries. It is estimated that utility companies
1 Introduction worldwide suffer a sum of revenue loss more than
The advanced and intelligent smart grid offers bi- US$25 billion yearly due to NTL. Among the countries
directional flow of electricity and information with include India with US$ 4.5 billion [3], US$ 6.0 billion
greater responsive to consumer load and demand, for USA [4]. Peninsular Malaysia has reported a
DERs (distributed energy resources), power revenue loss ranging from RM150 to RM500 million
interruption management and NTL (non-technical between 2010 and 2011 [5,6] whereas SEB (Sarawak
losses) detection. The observation ability of entire grid Energy Berhad) from Sarawak has remarked RM150
with IEC-61850 standard enables those integrated million loss in 2010 but recorded RM43 million loss in
controllers to instantly communicate with each 2014 [7,8].
substation and energy conversion units such as
1.2 NTL detection mechanisms Though many algorithms proposed to analyse and
detect NTL, they are merely implemented separately
NTL includes many methods of stealing electricity with dissatisfaction outcomes due to inherent
namely the tapping of electricity directly from the limitations and weaknesses of respective mechanisms.
distribution feeder, tampering of energy meter or For example, the method of comparison of phase
bypassing, using physical methods to fraud the current readings at transformer feeder and consumer
metering and bill payment [9,10]. It is found that the ends is potentially good to detect the clusters or areas
meter tampering happened in both electromechanical but without any identification of “malicious” electricity
meter and smart meters. Furthermore, there are theft individually. Many proposed AI methods are still
numerous sophisticated ways of stealing electricity at developing stage and subject to the constraints of low
namely tampering of CT secondary side of energy detection hit-rate and time consuming of data mining
meter, internal calibration of energy meter and and computation.
grounding of neutral line at consumer end [10].

In order to counteract the revenue loss due to NTL, In this paper, a novel design of smart metering system
many researchers and utility companies have proposed is developed to integrate smart meters, communication
and implemented various mechanisms or strategies to network and MDMS into a GUI (graphical user
detect NTL. M. Anas et al. has discussed many issues interface) based NTL detection platform. An algorithm
related to minimization of electricity theft by the use of of NTL detection is proposed to combine several
smart meter in AMI [11]. A simple energy balance detection mechanisms which complement each other
method is defined by the law of physics which utilises for enhanced performance. The operators utilise the
phase current readings measured at the distribution platform to analyse and identify the suspected
transformer feeder LV (low voltage) line and all the electricity theft cases by using the information received
electrically connected consumer ends. Those phase from the smart meters and stored data in database.
current readings are compared to estimate the total Furthermore, the proposed smart metering system also
electricity being lost at the distribution end [12]. E- assists the utility companies to automatically acquire
metering system was implemented to analyse real time electricity consumption data, power quality
consumption data and used to detect abnormalities in measurement, event logging and remote supply
load profiles for the purpose of electricity theft disconnection / re-connection. The remaining of the
identification [13]. Other researchers have also paper is organised as follows. In the next section, the
proposed the AI (artificial intelligence) methods based details of the design and implementation of the
on consumption data namely genetic algorithm – SVM proposed smart meter system is presented. In section 3
(support vector machine) with the detection hit-rate up the results are presented and discussed. The paper then
to 60% was achieved [14,15,16]. concludes making recommendations for future work
that needs to be carried out.
To counteract the problems of physical meter
tampering, various sensors are utilised to gauge the 2. Hardware and architectural design
physical condition of smart meter such as illegal
attempts of opening the enclosures, de-energise of 2.1 Overall architecture design
meter and power outages. The event logs can be
recorded for alerting and inspection by the utility The overall architecture of the proposed smart metering
companies. A proposed technique was the use of system as illustrated in Fig 1 which consists of the
remote meters installed at premises of LPC (large directional flows of both electrical power and
power consumer) by the correlation of the half-hourly information within the power grid. The electrical power
recorded load profile with abnormal meter events for flows within the network of generation, transmission
NTL detection with hitrate of 55% [17]. Another SVM- and distribution whereby the distribution transformers
based classification technique was proposed to use the are used to transform MV (medium voltage) to LV (low
correlation of consumption data and power loss area of voltage) before electrically connected to the consumer
the distribution area [18]. ends (or the smart meters). They are connected to LV
lines in bus topology.
1.3 Problem statement
Fig 1: Architecture of the proposed smart metering system

It is bi-directional flow of real-time information (data controlling, remote supply disconnection and re-
and control signals) within the power grid whereby the connection, displaying of consumption profile for
smart meters are connected to the end customers better load management etc. Five main internal
through home area network HAN. The smart meters, modules of a smart meter design are power supply,
CNTR (concentrator) and DAU (Data Aggregator Unit) microcontroller MCU, communication interface,
act as the networked devices to perform M2M measurement and data acquisition DAQ, and remote
(Machine-to-Machine) communication without further control module as illustrated in Fig 2.
human intervention. The system enables real-time
exchange of information between the customer ends
and generation facilities for monitoring and controlling
purpose. The real time information is then relayed to
MDMS for storage and analytical work of electricity
theft detection.

The smart meters communication through the


concentrator represents the basic configuration of the
architecture network. It is particularly used for urban or
semi-urban scenarios with LV network. The CNTRs
are located at the IEC-61850 compliant transformer
feeders which monitor electrical power parameters
through each LV line. They are used to aggregate the
data traffic from the smart meters and electrical
parameters from the feeders for communications with
the MDMS. Each CNTR is exclusively dedicated to be
responsible to one NAN (neighbourhood area network)
which consists of a number of customers with the
connected smart meters. Fig 2: The hardware design of smart meter unit

2.2 Smart Meter Unit The power supply module has built-in switched mode
power supply and battery backup with charger to ensure
The smart meter unit is used to generate timely data that the unit remains powered even when the main line
(consumption and information) which relays back to is disabled. The microcontroller MCU has built-in
MDMS for storage and monitoring. It has other ADC (Analog-to-Digital Converter) to digitise the
functionalities such as communication with HAN acquired measurement data (consumption data, power
(home area network) for load scheduling and quality and event logs) from DAQ unit. The authors
have proposed the use of low-cost non-invasive YHDC 2.3 Concentrator and data aggregator unit
SCT-013-000 AC Current Sensor Transformer as (DAU)
shown in Fig 3, to measure the phase current, energy
consumption kWh and other parameters. The hardware architecture designs for both
concentrator and DAU are similar as shown in Fig 5.
They perform as networked device to relay information
(data and control signals) within the communication
network. The hardware consists of four main modules
i.e. (it) MCU (microcontroller) (ii) power measurement
(iii) power supply and (iv) communication interface
module.

Fig 3: YHDC SCT-013-000 AC Current Sensor


Transformer

Each installed smart meter at the consumer end has a


unique meter ID. The communication interface module
provides both wired and wireless communication of the
meter to interact with the rest of the grid. The Nordic
NRF24L01 RF Transceiver IC as shown in Fig 4, is Fig 5: The architectural design of the concentrator or
used for wireless communication between the smart data aggregator unit DAU
meter and concentrator due to low-cost and ultra-low
power features. The smart meter also has a built-in RTC The power measurement unit is used to acquire the
(real-time clock) which may drift as much as 60 electrical data of LV side of the distribution transformer
minutes/year. Due to connection to the main network, feeder such as phase current, voltage and other
it is periodically re-synchronised with the master clock. parameters. The collected data is then relayed back to
The remote supply disconnection and re-connection MDMS through wired or wireless network for further
module is responsible to remotely control the analytical works, for example, power quality
connection of metering supply to the customer end by monitoring and improvement, detection of non-
the utility company due to specific reasons such as late technical losses such as electricity theft and other
payment of electricity bill or disconnection of service. purposes.

2.4 NTL Detection Framework

In order to facilitate an effective NTL detection


platform, the authors have proposed an algorithm of
NTL detection which combines three detection
mechanisms to complement each other for enhanced
performance.

The proposed 3-tier design of detection framework


integrates three different mechanisms such that the
detection hit-rate can be theoretically increased while
reducing the computation time and load. In fact, the
newly proposed algorithm is based on the triangulation
technique which facilitates validation of data through
Fig 4: Nordic nRF24L01 transceiver module cross verification from three sources of convergence
measurement data for better validity of detection result.
Fig 6: The flow chart of 3-tier NTL detection framework design

The flow chart of the proposed NTL detection three-phase AC 415V or industrial use with minimal
framework is illustrated in Fig 6 and explained as modification of hardware design. The concentrator /
follows. DAU unit is constantly communicate with the Smart
Meters for relaying of consumption data of customer
(1) Detection of the NTL status of the clusters or ends.
areas by using the comparison of phase currents
at both transformer feeder and LV lines
connected to the smart meters. Once abnormality
is found, the cluster or area will be tagged.
(2) Applying the built-in AI-method of detection to
analyse consumption load profile of the users
within the tagged cluster or area found from step
(1). The consumption data of users from the
specific tagged cluster can also be exported as
.csv format file for further analysis by other AI
detection algorithms which are externally
developed by the academia or consultants. Once
abnormality is found, the customer ID will be
tagged.
(3) Correlation of the result of tagged customer IDs
found from step (2) with the event logs in
database. Once abnormality is found, the user ID
will be identified as “suspected” customer ID in
the list for the enforcement team to take further Fig 7: Overall structure layout of smart meter system
action.
3.1 Graphical User Interface (GUI) Design and
3. System Testing and Results Evaluation
As a proof of concept, a working model of the proposed The graphical panel of NTL detection as shown in Fig
smart metering system is developed which consists the 8 is designed for Windows-based computer and tested
smart meters, concentrator and GUI application using the Microsoft Visual Studio development suite.
software with MDMS. The overall hardware layout of The main purpose of GUI software is to provide a user-
smart metering system is illustrated in Fig 7. friendly graphical platform for the operators to perform
monitoring and analysis of power grid and NTL
For demonstration purpose, single-phase AC 240V of detection. The software displays energy consumption
domestic use is considered to illustrate the operational data in real time or archived data for visualisation and
procedure of smart metering system in NTL detection. also able to remotely connect or disconnect the supply
Nevertheless, the same principle can be applied for of customer end without any physical operation on site
by the operators. The half-hourly received data (energy 3.3 Real time chart plotting of energy
consumption and event logs) will be stored in MySQL consumption
database server through Internet. The consumption data
can be retrieved for visualisation and analysis or The real time chart plotting of energy consumption in
exported as .csv file for external verification by other bar chart is illustrated in Fig 10. The feature allows the
AI-based NTL detection software. operator to monitor and analyse the energy
consumption of households based on the collected data
from the smart meters.

Fig 10: Real time chart plotting of energy


Fig 8: The graphical panel of GUI for NTL detection consumption

3.4 The Proposed Detection Algorithm of


3.2 General page of GUI program NTLs

The general page of GUI program illustrates the The following steps are performed to demonstrate the
connection to the smart meters at the consumer ends working principle of NTL detection algorithm as
which the information (consumption data and control proposed.
signals) is relayed bi-directionally within the
communication networks. The real time consumption Step 1: Comparison of phase current
data (kWh, current and voltage) are displayed and
remote supply connection or re-connection can be The operator selects the specific date of inspection to
accomplished by the operators on the general page of retrieve the phase current data of transformer feeder and
GUI program as illustrated in Fig 9. the associated smart meters at the consumer ends. The
listed analytical data has shown that ClusterID with
100123 has 3 clients with the connected smart meters
as shown in Fig 11.

Fig 9: The main page of GUI detection platform Fig 11: Comparison of phase current data
The readings of phase current shown 65.8% of validity. It is conceptually expected that the detection
deviation and it is tagged as “HIGH” for NTL status. It hit-rate will be increased while reducing the
implies that the tagged cluster has high possibility of computation time of AI-based detection mechanism. As
NTL which the electricity theft may possibly exist. a proof of concept, a prototype of working model is
developed to demonstrate its functionalities.
Step 2: Apply AI-method of NTL detection
With implementation of the proposed system, the utility
Once the tagged ClusterID has been identified, the company will gain benefit of revenue recovery from the
energy consumption data of each customer within the NTL by utilizing the user-friendly and flexibility GUI-
tagged cluster will be used for NTL detection. The based detection platform to monitor and analyse NTL
operator can select either the built-in or external status in real time with the support of externally
developed artificial intelligent (AI) method of NTL developed AI-method of detection algorithms. As
detection as shown in Fig 12. The output shows the list future improvement, the developed system will be
of connected customers within the tagged cluster. tested with actual smart meter data of consumers from
According to the results, the CustomerID with 200103 a pilot project site. For performance analysis purpose,
has identified and tagged as “HIGH” for NTL status the system will be evaluated and assessed by using the
with high possibility of NTL may exist. selected AI methods of NTL detection for efficiency
and hit-rate comparison for different scenario cases.

Acknowledgements
The authors would like to thank Electrical Inspectorate
Unit (EIU), Ministry of Public Utilities Sarawak for the
technical advice and recommendations on project
design and the contribution of statistical data.

References
[1] Fang X, Misra S, Xue G, Yang D, “Smart grid –
the new and improved power grid: a survey” ,
IEEE Commun Surv Tutor, pp.944–980, (2012)
[2] De Blasio R, Tom C, “Standards for the smart
Fig 12: Applying AI-method of NTL detection grid”, Proceedings of the IEEE energy 2030
conference (ENERGY).Abu Dhabi, pp. 1-7,
Step 3: Correlation of result with event logs (2008)
[3] “Overview of power distribution”, Ministry of
For verification reason, the tagged CustomerID result power, Govt. of India. Available:
from Step 2 will be correlation with the event logs http://www.powermin.nic.in.
stored in database. Once the tagged CustomerID has [4] “Reducing revenue leakage”, Electric Light and
been confirmed, the customer will be put in the list of Power Magazine [Online]. Available:
“suspected” CustomerID for the enforcement team to http://uaelp.pennnet.com/
take further action. [5] http://www.bernama.com.my/bernama/v5/
newsindex.php? id=617926
[6] Y.N. Zuhrin, A.Raman, The Star Newspaper,
4. Conclusion
Malaysia, December, 31, 2010.
[7] http://www.theborneopost.com/2011/12/17/
NTL remains as a problematic issue of utility sesco-clamps-down-on-meter-tampering/
companies in most of the countries. It has been shown [8] http://www.newsarawaktribune.com/news/
that NTL may cause revenue loss up to 40% of total 42393/sesco inspection-team-trained-on-
energy generated in some countries. This paper handling-meter-tampering exhibits-by-police/
presents a novel design of smart metering system with [9] Dick AJ., “Theft of electricity – how UK
user-friendly GUI-based detection platform for NTL. electricity companies detect and deter”, Proc
European convention security and detection.
The authors have proposed a 3-tier design of detection Brighton, UK, pp. 90-95, (1995)
algorithm by integration of three different detection [10] Depuru SS, Wang L, Devabhaktuni V, Gudi N.,
mechanisms into one operational platform. The “Measures and setbacks for controlling electricity
triangulation technique is applied to facilitate theft”, Proc IEEE North American power
validation of detection result through cross verification symposium, Arlington, TX, (2010)
from three convergence of measurement data for better
[11] M. Anas, N. Javaid, A. Mahmood, S. M. Raza, U.
Qasim and Z. A.Khan, “Minimizing Electricity
Theft using Smart Meters in AMI”, IEEE Seventh
International Conference on P2P, Parallel, Grid,
Cloud and Internet Computing, pp. 176-182,
(2012)
[12] Buda EG., “System for accurately detecting
electricity theft”, US Patent 12/ 351,978, (2009)
[13] S. De, R. Anand, A. Naveen, and S. Moinuddin,
“E-metering solution for checking energy thefts
and streamlining revenue collection in India”,
Transmission and Distribution Conference and
Exposition IEEE PES, Volume 2, pp.654-658,
(2003)
[14] Nagi J, Yap KS, Tiong SK, Ahmed SK,
Mohammad AM. “Detection of abnormalities and
electricity theft using genetic support vector
machines”, Proc IEEE region 10 conf. TENCON,
Hyderabad, India, pp. 1-6, (2009)
[15] Nagi J, Yap KS, Tiong SK, Ahmed SK,
Mohammad AM. “Nontechnical loss detection for
metered customers in power utility using support
vector machines”, IEEE Trans Power Delivery,
pp. 25:1162, (2010).
[16] J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed and
F. Nagi, “Improving SVM-Based Nontechnical
Loss Detection in Power Utility Using the Fuzzy
Inference System”, IEEE Transactions on Power
Delivery, vol.26, no. 2, pp. 1284-1285, 2011.
[17] J. Nagi, K. S. Yap, F. Nagi, S. K. Tiong, S. P. Koh
and S. K.Ahmed, “NTL detection of electricity
theft and abnormalities for large power consumers
In TNB Malaysia”, 2010 IEEE Student
Conference on Research and Development
(SCOReD), pp. 202-206, 2010.
[18] Paria Jokar, Nasim Arianpoo And Victor C. M.
Leung, “Electricity Theft Detection in Ami Using
Customers’ Consumption Patterns”, IEEE
Transactions On Smart Grid, pp. 216-226, 2016.

You might also like