一种高效的基于物联网的电力盗窃检测框架

Kuldeep Sharma, A. Malik, I. Isha
{"title":"一种高效的基于物联网的电力盗窃检测框架","authors":"Kuldeep Sharma, A. Malik, I. Isha","doi":"10.1109/ICCS54944.2021.00055","DOIUrl":null,"url":null,"abstract":"The framework is designed for the electricity power trading companies for detecting any electricity theft by unauthorized means. The framework is based on the (Internet of Things) IoT techniques. The Data for all consumers tagged to specific geographical area is required to be analyzed by the framework. The framework in first part is analyzing the data of the past consumption of the specific area, this area may be Distribution Transformer level or Feeder Level or any portion of the electricity supply which is suspected of such electricity theft. In the second part, the IoT devices are added to the metering units of the specific sources. From this source, all the electricity supplied to the specific region will be accumulated on real-time basis. Rest IoT devices will be added to different parts of the Electricity Supply Line. Based on the analysis of real-time data accumulated via these IoT devices through Global System for Mobile (GSM) technology at the server located at either Data Center or Cloud Storage as the case may be. The framework will pinpoint the specific area where the theft of electricity is affected. Another vigilance IoT device is used to capture the images of the scenes for monitoring the naked wire for prevention from the electricity theft. The Real-Time reporting of this devices is generating alert to the power distribution company representatives to take necessary steps to reduce the losses occurred due to energy theft. The advanced infrastructure, now a days, is more prone to electricity theft, the Advanced Metering Infrastructure (AMI), is fully machine to machine (M2M) functioning, if such system is compromised, the theft may occur, to stop such electricity theft, since last two decades, various researchers are proposing their expert algorithms to minimize the same. The current paper proposes the additions in the existing literature of electricity theft detection and prevention.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"5 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Efficient IoT Based Electricity Theft Detecting Framework For Electricity Consumption\",\"authors\":\"Kuldeep Sharma, A. Malik, I. Isha\",\"doi\":\"10.1109/ICCS54944.2021.00055\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The framework is designed for the electricity power trading companies for detecting any electricity theft by unauthorized means. The framework is based on the (Internet of Things) IoT techniques. The Data for all consumers tagged to specific geographical area is required to be analyzed by the framework. The framework in first part is analyzing the data of the past consumption of the specific area, this area may be Distribution Transformer level or Feeder Level or any portion of the electricity supply which is suspected of such electricity theft. In the second part, the IoT devices are added to the metering units of the specific sources. From this source, all the electricity supplied to the specific region will be accumulated on real-time basis. Rest IoT devices will be added to different parts of the Electricity Supply Line. Based on the analysis of real-time data accumulated via these IoT devices through Global System for Mobile (GSM) technology at the server located at either Data Center or Cloud Storage as the case may be. The framework will pinpoint the specific area where the theft of electricity is affected. Another vigilance IoT device is used to capture the images of the scenes for monitoring the naked wire for prevention from the electricity theft. The Real-Time reporting of this devices is generating alert to the power distribution company representatives to take necessary steps to reduce the losses occurred due to energy theft. The advanced infrastructure, now a days, is more prone to electricity theft, the Advanced Metering Infrastructure (AMI), is fully machine to machine (M2M) functioning, if such system is compromised, the theft may occur, to stop such electricity theft, since last two decades, various researchers are proposing their expert algorithms to minimize the same. The current paper proposes the additions in the existing literature of electricity theft detection and prevention.\",\"PeriodicalId\":340594,\"journal\":{\"name\":\"2021 International Conference on Computing Sciences (ICCS)\",\"volume\":\"5 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computing Sciences (ICCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS54944.2021.00055\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing Sciences (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS54944.2021.00055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

该框架是为电力交易公司设计的,用于检测未经授权的偷电行为。该框架基于(物联网)IoT技术。该框架需要分析标记为特定地理区域的所有消费者的数据。第一部分的框架是分析特定区域过去的用电量数据,该区域可能是配电变压器级或馈线级或任何部分的电力供应,涉嫌此类窃电。在第二部分中,将物联网设备添加到特定源的计量单元中。从这个源,所有的电力供应到特定区域将实时积累。其余物联网设备将被添加到供电线路的不同部分。根据对这些物联网设备通过位于数据中心或云存储的服务器上的全球移动系统(GSM)技术积累的实时数据的分析,视情况而定。该框架将确定受电力盗窃影响的具体区域。另一种警惕物联网设备用于捕捉场景图像,监控裸露的电线,防止盗窃电力。该设备的实时报告正在向配电公司代表发出警报,以采取必要措施减少因能源盗窃而发生的损失。先进的基础设施,现在一天,更容易发生电力盗窃,先进的计量基础设施(AMI),是完全机器对机器(M2M)的功能,如果这样的系统被破坏,盗窃可能发生,为了阻止这种电力盗窃,在过去的二十年里,各种研究人员都提出了他们的专家算法,以尽量减少同样的情况。本文提出了在现有文献中对窃电检测和预防的补充。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Efficient IoT Based Electricity Theft Detecting Framework For Electricity Consumption
The framework is designed for the electricity power trading companies for detecting any electricity theft by unauthorized means. The framework is based on the (Internet of Things) IoT techniques. The Data for all consumers tagged to specific geographical area is required to be analyzed by the framework. The framework in first part is analyzing the data of the past consumption of the specific area, this area may be Distribution Transformer level or Feeder Level or any portion of the electricity supply which is suspected of such electricity theft. In the second part, the IoT devices are added to the metering units of the specific sources. From this source, all the electricity supplied to the specific region will be accumulated on real-time basis. Rest IoT devices will be added to different parts of the Electricity Supply Line. Based on the analysis of real-time data accumulated via these IoT devices through Global System for Mobile (GSM) technology at the server located at either Data Center or Cloud Storage as the case may be. The framework will pinpoint the specific area where the theft of electricity is affected. Another vigilance IoT device is used to capture the images of the scenes for monitoring the naked wire for prevention from the electricity theft. The Real-Time reporting of this devices is generating alert to the power distribution company representatives to take necessary steps to reduce the losses occurred due to energy theft. The advanced infrastructure, now a days, is more prone to electricity theft, the Advanced Metering Infrastructure (AMI), is fully machine to machine (M2M) functioning, if such system is compromised, the theft may occur, to stop such electricity theft, since last two decades, various researchers are proposing their expert algorithms to minimize the same. The current paper proposes the additions in the existing literature of electricity theft detection and prevention.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信