Open Access   Article Go Back

Prevention of Power Theft Using Concept of Multifunction Meter and PLC

Uma Soni1 , Uma Kumari2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 443-447, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.443447

Online published on Dec 31, 2018

Copyright © Uma Soni, Uma Kumari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Uma Soni, Uma Kumari, “Prevention of Power Theft Using Concept of Multifunction Meter and PLC,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.443-447, 2018.

MLA Style Citation: Uma Soni, Uma Kumari "Prevention of Power Theft Using Concept of Multifunction Meter and PLC." International Journal of Computer Sciences and Engineering 6.12 (2018): 443-447.

APA Style Citation: Uma Soni, Uma Kumari, (2018). Prevention of Power Theft Using Concept of Multifunction Meter and PLC. International Journal of Computer Sciences and Engineering, 6(12), 443-447.

BibTex Style Citation:
@article{Soni_2018,
author = {Uma Soni, Uma Kumari},
title = {Prevention of Power Theft Using Concept of Multifunction Meter and PLC},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {443-447},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3358},
doi = {https://doi.org/10.26438/ijcse/v6i12.443447}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.443447}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3358
TI - Prevention of Power Theft Using Concept of Multifunction Meter and PLC
T2 - International Journal of Computer Sciences and Engineering
AU - Uma Soni, Uma Kumari
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 443-447
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
407 258 downloads 211 downloads
  
  
           

Abstract

In the system and networks, abnormal behavior is detected by anomaly-based IDS (Intrusion Detection System). If the working of a computer system is different from normal working is considered as an attack. The difference of comparison relies on traffic rate, a variety of packets for every protocol etc. Malicious traffic or data on a system is detected by intrusion detection process. To detect illegal, suspicious and malicious information and data, IDS can be a part of the software or a device. First is Detection of an attack then using different method to stop, Prevent an attack and disaster is the user’s highest priority. Anomaly-based IDS satisfy their requirement and demand.In present scenario electricity theft isa major hurdle in front of government. This problem affects Indian economy. The loss on quantity of theft is mirrored in the electricity company.People are affording more charges because intruders steal electricity by many ways.

Key-Words / Index Term

Intrusion detection system, Anomaly based system, Electricity theft, Intruders

References

[1]. D. Alahakoon and Xinghuo Yu, “Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey” , IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 1, FEBRUARY 2016 .
[2]. Q. Sun, H. Li, Z. Ma, “A Comprehensive Review of Smart Energy Meters in Intelligent Energy Networks” , January 2015.
[3]. B.Saikiran, R.Hariharan, “Review of methods of power theft in Power System” ,International Journal of Scientific & Engineering Research, Volume 5, Issue 11, November-2014.
[4]. N. Mohammad , A. Barua and M.Arafat,“ A Smart Prepaid Energy Metering System to Control Electricity Theft”, 2013 International Conference on Power, Energy and Control (ICPEC).
[5]. S. McLaughlin, D. Podkuiko, and P. McDaniel, “Energy Theft in the Advanced Metering Infrastructure”, International Conference on Critical Information Infrastructures Security, 2016.
[6]. R. Berthier, W. H. Sanders, and H. Khurana, “Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions” , 2010 First IEEE International Conference on Smart Grid Communications.
[7]. Victor C. M. Leung, “Electricity Theft Detection in AMI Using Customers` Consumption Patterns”, IEEE Transactions on Smart Grid • May 2015.
[8]. J. Nagi, K. S. Yap, S. K. Tiong,” Detection of Abnormalities and Electricity Theft using Genetic Support Vector Machines”, IEEE paper on march 1, 2009.
[9]. Thomas B.Smith, “Electricity theft: a comparative analysis” Elesvier 2004.
[10]. R.Rashed, M.AlanFung, F.Mohammadi, K.Raahemifar, “A survey on Advanced Metering Infrastructure”,International Journal of Electrical Power & Energy Systems, Volume 63, December 2014.
[11]. A. Rial and G. Danezis, “Privacy-Preserving Smart Metering”, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011.
[12]. K. Laeeq, W.Laeeq, “A comparative study among possible wireless technologies for smart grid communication networks”, In: First international conference on modern communication & computing technologies; 2014.
[13]. R.Kalaivani, M.Gowthami,S.Savitha, N.Karthick, S.Mohanvel,” GSM Based Electricity Theft Identification in Distribution Systems”, International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 10- Feb 2014.