SlideShare a Scribd company logo
1 of 110
Collusion and Fraud Detection on
Electronic Energy Meters
Cyber Security in Smart Metering
Collusion
• Collusion is a secret cooperation or deceitful
agreement in order to deceive others, although not
necessarily illegal, as is a conspiracy.
• A secret agreement between two or more
parties to limit open competition by deceiving,
misleading, or defrauding others of their legal
rights, or to obtain an objective forbidden by law
typically by defrauding or gaining an unfair
market advantage is an example of collusion.
Collusion
A secret agreement between two or more parties to limit open
competition by deceiving, misleading, or defrauding others
Collusion is a secret cooperation or deceitful
agreement in order to deceive others
Collusion
Collusion
• Collusion takes place when management,
employees, or third parties work together to
conceal fraud, thereby defeating the internal
controls and rendering them ineffective.
Introduction
• Smart meters (gas, electricity, water, etc.) play
a fundamental role on the implementation of
the Smart Grid concept.
• Nevertheless, the rollout of smart meters needed
to achieve the foreseen benefits of the integrated
network of devices is still slow.
• Among the reasons for the slower pace is the
lack of trust on electronic devices and new
kinds of frauds based on clever tampering and
collusion.
Smart Meters
Introduction
• In recent years, electric power systems have
been going through significant digital
growth thanks to utilization of techniques
previously used in information and
communication technologies (ITC).
• Remote management and monitoring of smart
grids is increasingly often encountered in
virtually every part of power grid
infrastructures.
Introduction
Introduction
• One of the challenging problems when it comes
to electric energy distribution is electricity
theft. Regardless of whether the deed is done
on a large scale or only by a single consumer, it
is a problem that generates losses and its
detection is not always easy.
• One of the crucial factors making the issue of
electricity theft still relevant is the common
physical access of the end users to the
installations or meters.
Electricity Theft
Introduction
• Almost gone are the times when a meter
could only measure active electrical energy
in one direction and in one time zone.
• Modern devices allow for programming in the
number of zones, determining what physical
quantities other than electric energy can be
measured and recorded in the memory, as well
as registering events.
Introduction
• More technologically advanced, also used in
advanced metering infrastructure (AMI)
solutions, they allow for controlling re-ception,
remotely programming the distribution of time
zones, realizing prepayment functions, etc
Advanced Metering Infrastructure
(AMI)
Introduction
• Today, meter boxes are put outside
premises. That is necessitated by having to
hinder the rather common phenomenon of
illegal energy consumption.
• Additionally, it decreases the number of
problems appearing in case a client has to be
force-fully disconnected from electric power.
Today, meter boxes are put outside
premises
Introduction
• Formerly, when meters were located inside
people’s flats, it was easier to illegally use
energy and more difficult to control the
metering system.
• In their home, the consumer could make their
own decisions on how to secure their
possessions and who to allow inside the house.
Formerly, when meters were located inside people’s
flats, it was easier to illegally use energy and more
difficult to control the metering system
Introduction
• These days, modern metering systems are located
outside residential premises or on the border of
properties.
• It makes things easier for the distribution company, as
its employees technicians, collectors and third parties
have easier access to the metering installation.
• In case the meter is installed in a key-locked box
outside the consumer’s premises(often in a collective
cabinet by the building’s entrance), it is difficult to
hold the energy consumer responsible.
Modern Metering Systems Are Located Outside
Residential Premises Or On The Border Of
Properties
Legal aspects of electric energy theft
• Illegal consumption of electric energy is
deemed to occur when: the energy is
consumed without a contract, the energy is
consumed with total or partial bypassing of the
counter, the metering system has been
tampered with to falsify the measurements.
Legal aspects of electric energy theft
Legal aspects of electric energy theft
• Illegal consumption of electricity is very
troublesome. It causes significant global
losses, but individual proceedings can only
recover relatively small amounts of money.
• It could therefore be said that the costs
related to pursuit of debt recovery from
illegal electricity consumption are dispro-
portionately high compared to hypothetical
profits.
Legal aspects of electric energy theft
The Main Reasons Of Electric Energy Theft
• The main motive is desire to save money.
• The experience of power plants tells us that
electric energy is not stolen by rich and
educated people, but mainly by those of low
and medium wealth. One can often read on
Internet forums that there is nothing wrong
in stealing from rich energy companies.
The Main Reasons Of Electric Energy Theft
The Main Reasons Of Electric Energy Theft
• The scale of the practice seems small, but its
effects can be tragic to us, both in terms of
finance and human life. Detection of theft does
not protect the victim from paying inflated
bills, and makeshift installations often cause
electrocutions and fires.
• The practice becomes more prevalent during
winter when energy consumption increases due
to heating, and many people wish to save
money.
The Main Reasons Of Electric Energy
Theft
The issue of illegal energy consumption
should be considered in three categories
• Safety- illegal consumption of electric energy
can cause electrocutions, fires or, in
combination with a gas installation, even a gas
explosion leading to destruction of property
and even death.
Illegal Consumption Of Electric Energy Can Cause
Electrocutions, Fires Or, In Combination With A Gas
Installation, Even A Gas Explosion
The issue of illegal energy consumption
should be considered in three categories
• Economy- an energy company protects the
economic interest of their own and their clients
by legal means.
• One should remember that a company’s losses
caused by illegal electricity consumption are
partly transferred to the clients in the form of
payments for electricity supply
The issue of illegal energy consumption
The issue of illegal energy consumption
should be considered in three categories
• Society- illegal consumption causes clients to
experience negative feelings in terms of
commonly understood social justice.
• They do not understand why honest people
have to pay bills for electricity, and
individuals illegally consuming it are not
burdened with these costs
The Issue Of Illegal Energy Consumption
The issue of illegal energy consumption
should be considered in three categories
• However, high prices of electricity are no
justification. It should be understood that
illegal electricity consumption is ordinary theft
and is registered as such in police statistics.
• Suppliers counteract the scourge of theft mainly
with increased controls. They also appeal to their
clients to look out for energy thieves.
• Energy suppliers launch special hotlines where
any noticed theft can be anonymously
reported. Suppliers all over the European
Union undertake similar actions.
It should be understood that illegal electricity
consumption is ordinary theft and is registered as
such in police statistics
The Magnitude of the Problem
• Threats to metering data in relation to electro
mechanical meters are non-computerized in
nature, and vulnerabilities to potential attack.
The Magnitude of the Problem
• 1) placing meters in commonly accessible areas with no
security measures for metering data confidentiality(most
commonly in multi-family buildings),
• 2) using poor security measures against access to
cabinets with meters (low quality locks and keys) and
widespread use of facilitations for reading the
measurements by collectors in the form of looking glasses
in the doors of meter cabinets,
• 3) using poor security measures against opening the
meters (seals),
• 4) lack of remote systems for monitoring attempts at
opening meter cabinets,
• 5) lack or superficiality of security audits.
The Magnitude of the Problem
The Magnitude of the Problem
• It is worth reminding that illegal electric
energy consumption is defined as:
• (1) consuming it without signing a contract,
• (2) with total or partial bypassing of the
metering and billing installation,
• (3) or by tampering with the installation,
falsifying the measurements performed by the
metering and billing installation.
Illegal Electric Energy Consumption
Tampering With The Installation, Falsifying The
Measurements Performed By The Metering And
Billing Installation
Techniques of Electric Energy Theft
• As electric energy suppliers inform us, the
ingenuity of so-called clients knows no
boundaries.
• Based on their many years of experience, they
assure us that there are about 300 different
theft techniques. Collectors and controllers
visiting the clients are alert to such ideas.
Techniques of Electric Energy Theft
The most important and most popular
theft techniques are
Tampering with meter and seals
Illegal Tapping through Bare Wires
Illegal Terminal Tapping
Wrong billing and fraud in bill
generation
Unpaid Electricity by individuals,
Government officials and untouchable VIPs
The most important and most popular
theft techniques are
• Hidden Connection In Front Of The Meter
• This technique is the most popular method of
electric energy theft. It is most often encountered
among clients of lower social standing, living in
old apartment building whose old electrical
installations facilitate performing illegal
modifications.
• This method involves connecting an additional
installation to the line in front of the metering
system.
Hidden Connection In Front Of The Meter
The most important and most popular
theft techniques are
• The basic version of this kind of theft assumes
total utilization of an illegal source, which is
quite easy to detect.
• A more sophisticated method involves only
partial use of an illegal source to make
detection harder. The theft is often
performed only on a seasonal basis, e.g. in
winter, for heating
Physical Tampering With The Terminals
Or Bridging
• The consumer has a three-phase meter at their
disposal.
• If they are knowledgeable in electrical
engineering and disconnect the N neutral wire,
taking care not to allow the installation’s N point
to be galvanically connected with the meter’s N
point, then, in case of asymmetrical energy
consumption, the meter will understate the energy
value, e.g. by 30%, as potential equalization
current will not flow through the N wire.
Physical Tampering With The Terminals
Or Bridging
• Does the recipient consume energy in
accordance with the contract?
• These days, some distribution companies
purchase meters that facilitate detection of
such actions
Physical Tampering With An Analog Meter’s
Mechanism
• Magnetic Field- influencing a meter with a
strong electromagnetic field by means of neo
dymium magnets, which is one of the most
popular methods of illegal energy consumption.
• That is because demagnetization of the
inhibitory magnets initially slows down the
counting wheel until it stops, but then it start
moving again and speeds up, which in turn
causes inflated readings and increased energy
bills
Physical Tampering With An Analog Meter’s
Mechanism
Physical Tampering With An Analog
Meter’s Mechanism
Physical Tampering With An Analog Meter’s
Mechanism
• Photographic Film- this fraud involves an
attempt to stop the moving counting wheel of
an analog meter by means of inserting
photographic film between the rear housing of
the meter and the glass front cover.
• This trick is popular because it does not
necessitate opening the meter and is easy to
perform.
Photographic Film
Tampering With A Digital Meter’s Software
• Tampering With A Digital Meter’s Software
• This technique involves making a logical change in
the state of variables we can refer to by means of so-
called OBIS (Object Identification System) codes.
• These variables are responsible for storing values based
on which the energy supplier bills a given client.
• Due to the process of breaking through many
security measures being exceptionally complex and
time-consuming, and the necessity to have highly
specialized knowledge, this method of fraud is
encountered extremely rarely
Tampering With A Digital Meter’s
Software
Tampering With A Digital Meter’s Software
• Tampering of electromechanical meters is not
uncommon for fraud goals (under-registering)
through security seal violation and direct or
indirect changes to the mechanical disc.
• The same is not easily accomplished on
electronic meters: built-in sensors are used to
report meter tampering, security sealing
violation, wiring changes, magnetic anomalies,
switched phases, abnormal clock settings, etc..
Tampering With A Digital Meter’s
Software
Security Mechanisms And Means To Detect
electric Energy Theft
• Contemporary electric power systems face a
significant challenge of both protecting their
own infrastructure and ensuring the continuity
of their services.
Security Mechanisms And Means To
Detect electric Energy Theft
• An especially big problem for the operator of an
electric power system involves financial losses
caused by electric energy theft.
• The theft pro-cess is facilitated by the
accessibility of the electric line itself and the
terminal metering devices. To prevent such
activity or significantly limit the practice,
operators use increasingly sophisticated
techniques to secure their own infrastructure.
financial losses caused by electric
energy theft
Tampering With A Digital Meter’s Software
• However, the experiences of electric power
systems’ operators show us that the thieves
themselves also employ increasingly
advanced techniques, often even reverse
engineering - sadly, used for illegal energy
consumption.
Security Mechanisms And Means To Detect
electric Energy Theft
• Electric energy meters installed these days
are usually placed inside common cabinets
located by a building’s entrance.
• Such a solution is, on one hand, convenient for
the energy supplier and the building’s
administrator, but, on the other, creates a
certain threat coming from the consumers
living there.
Electric energy meters installed these days are
usually placed inside common cabinets located by a
building’s entrance
Security Mechanisms And Means To Detect
electric Energy Theft
• Physical Security Measures- physical means
ensuring the housing’s integrity. They are most
often encountered in the form of: welding of
individual elements of the housing, seals,
screws made partially of soft and quickly
deforming material and plastic clips.
• Interference with the these security
measures clearly indicates an attempt at
tampering with the device.
Physical Security Measures
Security Mechanisms And Means To
Detect electric Energy Theft
• Physical Parameterization Switch
• this often en-countered technique among the
producers of energy meters involves protection
against local parameterization, a meter has no
opening or a knob, is sealed by default.
• Used in other models of meters which allow
for setting up a switch, soldered into the
laminated board, responsible for
parameterization (write access)
Security Mechanisms And Means To
Detect electric Energy Theft
• Motherboard Construction
• unusual construction of the motherboard and
arrangement of the electronic components can
be a significant impediment for someone
trying to make a connection to the micro-
processor or communication interface
Motherboard Construction
Security Mechanisms And Means To
Detect electric Energy Theft
• Magnetic Field Detector- practically all of
presently produced meters have a reed switch
which, when influenced by a magnetic field,
comprises a circuit on the electronic board,
which in turn makes it possible for the meter’s
software to register such an attempt at
tampering in the program’s memory.
Magnetic Field Detector
Security Mechanisms And Means To
Detect electric Energy Theft
• HASP key (Hardware Against Software
Piracy)- other security measures are typically
software-oriented. The most important one is
having to possess a program dedicated to
configuration with a specific meter model and an
original HASP hardware key.
• Moreover, proper authorization in the meter’s
system requires a password known only to the
producer, generated when the device’s
firmware is loaded onto the meter module’s
electronic processor.
HASP key
(Hardware Against Software Piracy)
Communication Encryption
• Another security measure aimed at preventing
unauthorized parameterization or listening-in
to the device.
• Apart from the fact that an attacker, in order to be
successful in their attempts, has to have a
communication module with a specific
technology at their disposal and a physical access
to a transmission medium, they will not achieve
their intended goal without knowing the
encryption key of that specific meter.
Communication Encryption
Communication Encryption
• All of the above-mentioned (physical)
mechanisms operate based on sensors
which, after an event has been initiated or
detected by the meter’s software, send
information about the attempt to the
concentrator or directly to the operator.
Communication Encryption
• The operator, thanks to dedicated management
and monitoring software, sends service
technicians to the indicated address to perform a
site inspection. The event history, even when the
operator cannot prove a fraud or tampering, is
stored in the system and assigned to a given
consumer.
• By analyzing such events, it can be concluded
in time that a given client has a tendency for
illegal electricity consumption and thus
cheating the system operator.
Methods of Energy Theft Detection
• There are methods allowing to detect and
locate a specific dishonest energy consumer
without the need to perform a site
inspection.
The Most Popular Methods Include
• A method based on calculating the balance
difference-
• The balance difference is an actual amount.
• Methods based on comparing the total
readings of meters with the control (balance)
meter are convincing when it comes to
narrowing down the circle of suspects and
checking a specific consumer’s meter readings.
The balance difference is the basic and most
important component indicating that theft of
energy took place
A method based on calculating the
balance difference
The most popular methods include
• Control Meter Method (Traditional) - this
method involves installing an additional
control meter to demonstrate that the
consumer’s meter shows a de-creased kWh
value.
Control Meter Method
The most popular methods include
• The metering system allows for reading meters in
a 15-minute cycle. Based on the collected data, it
is possible to see if the meters perform balancing
correctly. If not, a meter sub group, like risers or
staircases, is attempted to be balanced by means
of additional meter.
• If there is a riser in which the meters do not
balance each other out, the additional meter is
switched and balances out with e.g. individual
floors. By doing that, the meter with suspicious
readings can be reached.
The most popular methods include
• Reflecto meter testing- (using the wave
effect) it is a device which detects not only
illegal electricity consumption but also
discontinuity or non-uniformity of the wire.
This method is nothing new. What is new,
however, it its utilization. The wave effect is
used to detect wire discontinuity.
Reflecto Meter Testing
The Most Popular Methods Include
• Short test impulses are sent to a pair of wires
connected to the device. If there is no break in
the wire, the signal energy will be consumed.
If there is a break in the wire’s integrity or
even a breach of its factory insulation, then
the entirety or part of the signal energy will
be reflected back the device.
The most popular methods include
• provoking method- if a consumer suspected
of energy theft lives in a house, an ampere
meter is installed outside, on the line leading to
the client.
• Then, the distribution company’s car is
ostentatiously parked outside the house,
several employees of the company, dressed
in work wear, leave the car and “hang
around” the neighborhood.
Provoking Method
The Most Popular Methods Include
• Sometimes they knock on the suspect’s door
and talk about things completely unrelated to
energy theft. The ampere meters readings are
observed all the while.
• If, resulting from thus improvised event, the
consumer’s energy consumption is clearly
decreased, it can be assumed they have an
illegal connection
The most popular methods include
• Confidential Phone Call - the most common
assistance in detecting electricity theft are...phone calls
from people who, willing to perform their “civic duty”,
inform distribution companies. However, it can be
sensed from the tone of conversation that a common
motive for making the phone call and exposing a
neighbor is: why should he have it better than me? Or
just disputes between neighbors.
• Experience shows that information on energy theft
is not always true. Sometimes it is just a form of
settling grudges
Confidential Phone Call
Conclusion
• Clients of the current electric power system, also
being consumers of electricity, at times make
attempts, with varying degrees of success, at stealing
that energy. The main reason behind the theft
phenomenon is the desire to save money.
• Moreover, the practice is facilitated by the power line
and meters being physically accessible.
• Financial losses caused by dishonest clients incline
electric energy distributors to employ increasingly
sophisticated methods aimed at detection of illegal
connection to the network and attempts at tampering
with the meter’s metrological properties.
Financial losses caused by dishonest clients incline
electric energy distributors to employ increasingly
sophisticated methods
Conclusion
• Among the many known methods of theft, the most
popular ones are: making a concealed connection
and a mechanical blockade of the analog
mechanism.
• Energy theft by tampering with a digital smart
meter is much more difficult and requires
specialized knowledge, which greatly narrows the
circle of clients whose specialized knowledge enables
them to perform unauthorized parameterization of the
meter. Regardless the of theft technique, the system
operator has a wide variety of effective methods to
detect frauds at their disposal.
Energy theft by tampering with a digital smart
meter is much more difficult and requires specialized
knowledge
Conclusion
• From the network metrological properties’
analysis, dividing the network into fragment
by use of a meter, to histogram and
consumer profiling-based analysis.
• It should be noted that energy theft is not a
new phenomenon, and the development of
smart software.
DNA: Analysis of electricity theft in
India
• https://youtu.be/DrkfZ9Pjwuk
Punishments for Electricity Theft In
India
• Section 135 to section 150 talks about the penalties.
• Section 136 – Punishment when the theft of electric materials or lines occurs
• Section 137 – Punishment for receiving stolen property
• When a person dishonestly receives any stolen electric material or wire shall
be liable to Imprisonment which may exceed up to 3 years, or, Fine, or Both
• Section 138 – Punishment for having a malafide intention
• Section 139 – Negligently damaging or breaking works
• Section 140 – Penalty for intentionally causing harms to works
• Section 141 – Demolishing public lamps
• Section 142 – Penalty for not complying with the directions given by
the Appropriate Commission
• Section 146 – Punishment for not complying with the directions or orders
• Section 148 – Penalty for the work which belongs to the Government
• Section 149 – Offences by Companies
• Section 150 – When a person abets or instigates the commission of an offence
• When the member of the Electricity Board or supplier enters into an
agreement to restrain, to conceal some information related to the power theft,
is liable to the punishment of imprisonment up to 3 years or fine or both.
https://saubhagya.gov.in
References
• Are smart meters safe from hackers?
• https://www.telegraph.co.uk/property/smart-living/what-do-you-know-about-
smart-meters/
• Collusion and fraud detection on electronic energy meters: a use case of
forensics investigation procedures
• https://www.ieee-security.org/TC/SPW2014/papers/5103a065.PDF
• Cyber Security Issues in Smart Meter and Their Solutions
• http://paper.ijcsns.org/07_book/201803/20180314.pdf
• Saubhagya Dashboard
• https://saubhagya.gov.in/
• The Most Frequent Energy Theft Techniques and Hazards in Present Power
Energy Consumption
• http://www.salvage-project.com/uploads/4/9/5/5/49558369/cpsr-
sg2016_paper_15.pdf
• Theft of electricity
• https://en.wikipedia.org/wiki/Theft_of_electricity
Prevent Electricity Theft…

More Related Content

What's hot

Power line communication
Power line communicationPower line communication
Power line communicationAnkit Srivastava
 
electronics engineering project topics for final year, iot projects
electronics engineering project topics for final year, iot projectselectronics engineering project topics for final year, iot projects
electronics engineering project topics for final year, iot projects1000kv technologies
 
Thesis power theft detection ch 1
Thesis power theft detection ch 1Thesis power theft detection ch 1
Thesis power theft detection ch 1Faraz Ahmed
 
smart street light system using IOT
smart street light system using IOTsmart street light system using IOT
smart street light system using IOTKarthikeyan T
 
automatic room light controller
automatic room light controllerautomatic room light controller
automatic room light controllertakoradi polytechnic
 
automatic streetlight control using ldr ppt
automatic streetlight control using ldr pptautomatic streetlight control using ldr ppt
automatic streetlight control using ldr pptanand kumar maurya
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Intruder alarm/bulgar alarm, shadow sensing circuit.
Intruder alarm/bulgar alarm, shadow sensing circuit.Intruder alarm/bulgar alarm, shadow sensing circuit.
Intruder alarm/bulgar alarm, shadow sensing circuit.Zaid Masood
 
Earthing or Grounding
Earthing or GroundingEarthing or Grounding
Earthing or GroundingAswin KP
 
Electrical maintenance and its relationship to safety
Electrical maintenance and its relationship to safetyElectrical maintenance and its relationship to safety
Electrical maintenance and its relationship to safetyEngr. Ashikur Rahman
 
Rain detector alarm circuit
Rain detector alarm circuitRain detector alarm circuit
Rain detector alarm circuitRizwanShah68
 
Iot based fire alarm system
Iot based fire alarm systemIot based fire alarm system
Iot based fire alarm systemoluwatobiomotayo2
 
LASER SECURITY SYSTEM (PPTx) PRESENTATION
LASER SECURITY SYSTEM (PPTx) PRESENTATIONLASER SECURITY SYSTEM (PPTx) PRESENTATION
LASER SECURITY SYSTEM (PPTx) PRESENTATIONKUNALDUTTA36
 
IOT in security camera and door unlock system
IOT in security camera and door unlock systemIOT in security camera and door unlock system
IOT in security camera and door unlock systemSHAIK TARANNUM
 
Smart surveillance monitoring system using raspberry pi and
Smart surveillance monitoring system using raspberry pi andSmart surveillance monitoring system using raspberry pi and
Smart surveillance monitoring system using raspberry pi andJEEVA ARAVINTH
 
smart street light ppt
smart street light pptsmart street light ppt
smart street light pptSurya Karan
 

What's hot (20)

Power line communication
Power line communicationPower line communication
Power line communication
 
electronics engineering project topics for final year, iot projects
electronics engineering project topics for final year, iot projectselectronics engineering project topics for final year, iot projects
electronics engineering project topics for final year, iot projects
 
Thesis power theft detection ch 1
Thesis power theft detection ch 1Thesis power theft detection ch 1
Thesis power theft detection ch 1
 
Electrical safety
Electrical safetyElectrical safety
Electrical safety
 
smart street light system using IOT
smart street light system using IOTsmart street light system using IOT
smart street light system using IOT
 
automatic room light controller
automatic room light controllerautomatic room light controller
automatic room light controller
 
automatic streetlight control using ldr ppt
automatic streetlight control using ldr pptautomatic streetlight control using ldr ppt
automatic streetlight control using ldr ppt
 
Smoke detector
Smoke detectorSmoke detector
Smoke detector
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Intruder alarm/bulgar alarm, shadow sensing circuit.
Intruder alarm/bulgar alarm, shadow sensing circuit.Intruder alarm/bulgar alarm, shadow sensing circuit.
Intruder alarm/bulgar alarm, shadow sensing circuit.
 
Earthing or Grounding
Earthing or GroundingEarthing or Grounding
Earthing or Grounding
 
Electrical maintenance and its relationship to safety
Electrical maintenance and its relationship to safetyElectrical maintenance and its relationship to safety
Electrical maintenance and its relationship to safety
 
Rain detector alarm circuit
Rain detector alarm circuitRain detector alarm circuit
Rain detector alarm circuit
 
Iot based fire alarm system
Iot based fire alarm systemIot based fire alarm system
Iot based fire alarm system
 
Fire alarm
Fire alarmFire alarm
Fire alarm
 
Smoke Detection System
Smoke Detection SystemSmoke Detection System
Smoke Detection System
 
LASER SECURITY SYSTEM (PPTx) PRESENTATION
LASER SECURITY SYSTEM (PPTx) PRESENTATIONLASER SECURITY SYSTEM (PPTx) PRESENTATION
LASER SECURITY SYSTEM (PPTx) PRESENTATION
 
IOT in security camera and door unlock system
IOT in security camera and door unlock systemIOT in security camera and door unlock system
IOT in security camera and door unlock system
 
Smart surveillance monitoring system using raspberry pi and
Smart surveillance monitoring system using raspberry pi andSmart surveillance monitoring system using raspberry pi and
Smart surveillance monitoring system using raspberry pi and
 
smart street light ppt
smart street light pptsmart street light ppt
smart street light ppt
 

Similar to Collusion and Fraud Detection on Electronic Energy Meters

Wp 7-elect-theft
Wp 7-elect-theftWp 7-elect-theft
Wp 7-elect-theftAgam Deep
 
Electricity theft (1)
Electricity theft (1)Electricity theft (1)
Electricity theft (1)sharique_64
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptArjit Rajwal
 
Power Theft Detection (1) [Autosaved].pptx
Power Theft Detection (1) [Autosaved].pptxPower Theft Detection (1) [Autosaved].pptx
Power Theft Detection (1) [Autosaved].pptxrahulsawant200325
 
Under Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
Under Lock & Key; Theft Protection in Today's Utility Marketplace - WebinarUnder Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
Under Lock & Key; Theft Protection in Today's Utility Marketplace - WebinarAshleyw2m
 
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace IUSTechnologies
 
Power theft detection
Power theft detectionPower theft detection
Power theft detectionAravind Shaji
 
Sritish-powertheftdetection.ppt.pptx
Sritish-powertheftdetection.ppt.pptxSritish-powertheftdetection.ppt.pptx
Sritish-powertheftdetection.ppt.pptxSouravSahoo48
 
WIRELESS Power theft DETECTION
WIRELESS Power theft DETECTION WIRELESS Power theft DETECTION
WIRELESS Power theft DETECTION MACLEANIMMANUEL
 
IRJET- Advanced Metering Infrastructure Tripping System
IRJET-  	  Advanced Metering Infrastructure Tripping SystemIRJET-  	  Advanced Metering Infrastructure Tripping System
IRJET- Advanced Metering Infrastructure Tripping SystemIRJET Journal
 
wireless energy meter
wireless energy meterwireless energy meter
wireless energy metersheefa kauser
 
Detection and Instantaneous Prevention of Power Theft
Detection and Instantaneous Prevention of Power TheftDetection and Instantaneous Prevention of Power Theft
Detection and Instantaneous Prevention of Power TheftIOSR Journals
 
Smart Anti Power Theft System
Smart Anti Power Theft SystemSmart Anti Power Theft System
Smart Anti Power Theft SystemIRJET Journal
 
IRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET Journal
 
Issues faced by developer for net metering
Issues faced by developer for net meteringIssues faced by developer for net metering
Issues faced by developer for net meteringAnkur Tyagi
 
AMI Site Verification - Protocols & Tools for Complex Metering Installations
AMI Site Verification - Protocols & Tools for Complex Metering InstallationsAMI Site Verification - Protocols & Tools for Complex Metering Installations
AMI Site Verification - Protocols & Tools for Complex Metering InstallationsTESCO - The Eastern Specialty Company
 
Prakash_Seminar (electricity billing system)
Prakash_Seminar (electricity billing system)Prakash_Seminar (electricity billing system)
Prakash_Seminar (electricity billing system)Prakash Deora
 

Similar to Collusion and Fraud Detection on Electronic Energy Meters (20)

Wp 7-elect-theft
Wp 7-elect-theftWp 7-elect-theft
Wp 7-elect-theft
 
Electricity theft (1)
Electricity theft (1)Electricity theft (1)
Electricity theft (1)
 
ELECTRICITY THEFT
ELECTRICITY THEFTELECTRICITY THEFT
ELECTRICITY THEFT
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-ppt
 
Power Theft Detection (1) [Autosaved].pptx
Power Theft Detection (1) [Autosaved].pptxPower Theft Detection (1) [Autosaved].pptx
Power Theft Detection (1) [Autosaved].pptx
 
Under Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
Under Lock & Key; Theft Protection in Today's Utility Marketplace - WebinarUnder Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
Under Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
 
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
Sritish-powertheftdetection.ppt.pptx
Sritish-powertheftdetection.ppt.pptxSritish-powertheftdetection.ppt.pptx
Sritish-powertheftdetection.ppt.pptx
 
WIRELESS Power theft DETECTION
WIRELESS Power theft DETECTION WIRELESS Power theft DETECTION
WIRELESS Power theft DETECTION
 
IRJET- Advanced Metering Infrastructure Tripping System
IRJET-  	  Advanced Metering Infrastructure Tripping SystemIRJET-  	  Advanced Metering Infrastructure Tripping System
IRJET- Advanced Metering Infrastructure Tripping System
 
Customer Perceptions of New AMI Meters
Customer Perceptions of New AMI MetersCustomer Perceptions of New AMI Meters
Customer Perceptions of New AMI Meters
 
wireless energy meter
wireless energy meterwireless energy meter
wireless energy meter
 
A010120103
A010120103A010120103
A010120103
 
Detection and Instantaneous Prevention of Power Theft
Detection and Instantaneous Prevention of Power TheftDetection and Instantaneous Prevention of Power Theft
Detection and Instantaneous Prevention of Power Theft
 
Smart Anti Power Theft System
Smart Anti Power Theft SystemSmart Anti Power Theft System
Smart Anti Power Theft System
 
IRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional AreaIRJET- Overloading Detection in Residentional Area
IRJET- Overloading Detection in Residentional Area
 
Issues faced by developer for net metering
Issues faced by developer for net meteringIssues faced by developer for net metering
Issues faced by developer for net metering
 
AMI Site Verification - Protocols & Tools for Complex Metering Installations
AMI Site Verification - Protocols & Tools for Complex Metering InstallationsAMI Site Verification - Protocols & Tools for Complex Metering Installations
AMI Site Verification - Protocols & Tools for Complex Metering Installations
 
Prakash_Seminar (electricity billing system)
Prakash_Seminar (electricity billing system)Prakash_Seminar (electricity billing system)
Prakash_Seminar (electricity billing system)
 

More from GAURAV. H .TANDON

Suicide Prevention through Architecture (Building) and City Planning
Suicide Prevention through  Architecture (Building) and City PlanningSuicide Prevention through  Architecture (Building) and City Planning
Suicide Prevention through Architecture (Building) and City PlanningGAURAV. H .TANDON
 
Suicide Prevention through Architecture (Building) and City Planning
Suicide Prevention through  Architecture (Building) and City PlanningSuicide Prevention through  Architecture (Building) and City Planning
Suicide Prevention through Architecture (Building) and City PlanningGAURAV. H .TANDON
 
Digital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesDigital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesGAURAV. H .TANDON
 
Digital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesDigital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesGAURAV. H .TANDON
 
Premerital Sceening .pptx
Premerital Sceening .pptxPremerital Sceening .pptx
Premerital Sceening .pptxGAURAV. H .TANDON
 
Polymath(Renaissance man)
Polymath(Renaissance man)Polymath(Renaissance man)
Polymath(Renaissance man)GAURAV. H .TANDON
 
Crash for Cash-Organized Crime (COC).pptx
Crash for Cash-Organized Crime (COC).pptxCrash for Cash-Organized Crime (COC).pptx
Crash for Cash-Organized Crime (COC).pptxGAURAV. H .TANDON
 
Ecological Footprint (1).pptx
Ecological Footprint (1).pptxEcological Footprint (1).pptx
Ecological Footprint (1).pptxGAURAV. H .TANDON
 
Urban Heat Island Effect
Urban Heat Island EffectUrban Heat Island Effect
Urban Heat Island EffectGAURAV. H .TANDON
 
The unethical practice of gift giving to doctors by pharma companies
The unethical practice of gift giving to doctors by pharma companiesThe unethical practice of gift giving to doctors by pharma companies
The unethical practice of gift giving to doctors by pharma companiesGAURAV. H .TANDON
 
Gamification of Smart Cities
Gamification of Smart Cities Gamification of Smart Cities
Gamification of Smart Cities GAURAV. H .TANDON
 
Anti-Microbial Copper
Anti-Microbial Copper Anti-Microbial Copper
Anti-Microbial Copper GAURAV. H .TANDON
 
Cyber Security in Smart Buildings
Cyber Security in Smart Buildings Cyber Security in Smart Buildings
Cyber Security in Smart Buildings GAURAV. H .TANDON
 

More from GAURAV. H .TANDON (20)

Suicide Prevention through Architecture (Building) and City Planning
Suicide Prevention through  Architecture (Building) and City PlanningSuicide Prevention through  Architecture (Building) and City Planning
Suicide Prevention through Architecture (Building) and City Planning
 
Suicide Prevention through Architecture (Building) and City Planning
Suicide Prevention through  Architecture (Building) and City PlanningSuicide Prevention through  Architecture (Building) and City Planning
Suicide Prevention through Architecture (Building) and City Planning
 
Digital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesDigital Detoxing in Smart Cities
Digital Detoxing in Smart Cities
 
Digital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesDigital Detoxing in Smart Cities
Digital Detoxing in Smart Cities
 
Premerital Sceening .pptx
Premerital Sceening .pptxPremerital Sceening .pptx
Premerital Sceening .pptx
 
Polymath(Renaissance man)
Polymath(Renaissance man)Polymath(Renaissance man)
Polymath(Renaissance man)
 
Crash for Cash-Organized Crime (COC).pptx
Crash for Cash-Organized Crime (COC).pptxCrash for Cash-Organized Crime (COC).pptx
Crash for Cash-Organized Crime (COC).pptx
 
Voting Age .pptx
Voting Age .pptxVoting Age .pptx
Voting Age .pptx
 
Ecological Footprint (1).pptx
Ecological Footprint (1).pptxEcological Footprint (1).pptx
Ecological Footprint (1).pptx
 
Urban Heat Island Effect
Urban Heat Island EffectUrban Heat Island Effect
Urban Heat Island Effect
 
Communication Skills
Communication SkillsCommunication Skills
Communication Skills
 
The unethical practice of gift giving to doctors by pharma companies
The unethical practice of gift giving to doctors by pharma companiesThe unethical practice of gift giving to doctors by pharma companies
The unethical practice of gift giving to doctors by pharma companies
 
Compassionate Cities
Compassionate CitiesCompassionate Cities
Compassionate Cities
 
Gamification of Smart Cities
Gamification of Smart Cities Gamification of Smart Cities
Gamification of Smart Cities
 
Anti-Microbial Copper
Anti-Microbial Copper Anti-Microbial Copper
Anti-Microbial Copper
 
Smart Forest City
Smart Forest City Smart Forest City
Smart Forest City
 
Smart forest cities
Smart forest cities Smart forest cities
Smart forest cities
 
Automotive Hacking
Automotive Hacking Automotive Hacking
Automotive Hacking
 
Cyber Security in Smart Buildings
Cyber Security in Smart Buildings Cyber Security in Smart Buildings
Cyber Security in Smart Buildings
 
Internet Addiction
Internet Addiction Internet Addiction
Internet Addiction
 

Recently uploaded

2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfAmir Saranga
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
No.1 Call Girls in Basavanagudi ! 7001305949 â‚ą2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 â‚ą2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 â‚ą2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 â‚ą2999 Only and Free Hotel Delive...narwatsonia7
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
Start Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnoolStart Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnoolSERUDS INDIA
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...Amil baba
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...yalehistoricalreview
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILChristina Parmionova
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 

Recently uploaded (20)

2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdf
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
No.1 Call Girls in Basavanagudi ! 7001305949 â‚ą2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 â‚ą2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 â‚ą2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 â‚ą2999 Only and Free Hotel Delive...
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
Start Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnoolStart Donating your Old Clothes to Poor People kurnool
Start Donating your Old Clothes to Poor People kurnool
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 

Collusion and Fraud Detection on Electronic Energy Meters

  • 1. Collusion and Fraud Detection on Electronic Energy Meters Cyber Security in Smart Metering
  • 2. Collusion • Collusion is a secret cooperation or deceitful agreement in order to deceive others, although not necessarily illegal, as is a conspiracy. • A secret agreement between two or more parties to limit open competition by deceiving, misleading, or defrauding others of their legal rights, or to obtain an objective forbidden by law typically by defrauding or gaining an unfair market advantage is an example of collusion.
  • 3. Collusion A secret agreement between two or more parties to limit open competition by deceiving, misleading, or defrauding others
  • 4. Collusion is a secret cooperation or deceitful agreement in order to deceive others
  • 6. Collusion • Collusion takes place when management, employees, or third parties work together to conceal fraud, thereby defeating the internal controls and rendering them ineffective.
  • 7. Introduction • Smart meters (gas, electricity, water, etc.) play a fundamental role on the implementation of the Smart Grid concept. • Nevertheless, the rollout of smart meters needed to achieve the foreseen benefits of the integrated network of devices is still slow. • Among the reasons for the slower pace is the lack of trust on electronic devices and new kinds of frauds based on clever tampering and collusion.
  • 9. Introduction • In recent years, electric power systems have been going through significant digital growth thanks to utilization of techniques previously used in information and communication technologies (ITC). • Remote management and monitoring of smart grids is increasingly often encountered in virtually every part of power grid infrastructures.
  • 11. Introduction • One of the challenging problems when it comes to electric energy distribution is electricity theft. Regardless of whether the deed is done on a large scale or only by a single consumer, it is a problem that generates losses and its detection is not always easy. • One of the crucial factors making the issue of electricity theft still relevant is the common physical access of the end users to the installations or meters.
  • 13. Introduction • Almost gone are the times when a meter could only measure active electrical energy in one direction and in one time zone. • Modern devices allow for programming in the number of zones, determining what physical quantities other than electric energy can be measured and recorded in the memory, as well as registering events.
  • 14. Introduction • More technologically advanced, also used in advanced metering infrastructure (AMI) solutions, they allow for controlling re-ception, remotely programming the distribution of time zones, realizing prepayment functions, etc
  • 16. Introduction • Today, meter boxes are put outside premises. That is necessitated by having to hinder the rather common phenomenon of illegal energy consumption. • Additionally, it decreases the number of problems appearing in case a client has to be force-fully disconnected from electric power.
  • 17. Today, meter boxes are put outside premises
  • 18. Introduction • Formerly, when meters were located inside people’s flats, it was easier to illegally use energy and more difficult to control the metering system. • In their home, the consumer could make their own decisions on how to secure their possessions and who to allow inside the house.
  • 19. Formerly, when meters were located inside people’s flats, it was easier to illegally use energy and more difficult to control the metering system
  • 20. Introduction • These days, modern metering systems are located outside residential premises or on the border of properties. • It makes things easier for the distribution company, as its employees technicians, collectors and third parties have easier access to the metering installation. • In case the meter is installed in a key-locked box outside the consumer’s premises(often in a collective cabinet by the building’s entrance), it is difficult to hold the energy consumer responsible.
  • 21. Modern Metering Systems Are Located Outside Residential Premises Or On The Border Of Properties
  • 22. Legal aspects of electric energy theft • Illegal consumption of electric energy is deemed to occur when: the energy is consumed without a contract, the energy is consumed with total or partial bypassing of the counter, the metering system has been tampered with to falsify the measurements.
  • 23. Legal aspects of electric energy theft
  • 24. Legal aspects of electric energy theft • Illegal consumption of electricity is very troublesome. It causes significant global losses, but individual proceedings can only recover relatively small amounts of money. • It could therefore be said that the costs related to pursuit of debt recovery from illegal electricity consumption are dispro- portionately high compared to hypothetical profits.
  • 25. Legal aspects of electric energy theft
  • 26. The Main Reasons Of Electric Energy Theft • The main motive is desire to save money. • The experience of power plants tells us that electric energy is not stolen by rich and educated people, but mainly by those of low and medium wealth. One can often read on Internet forums that there is nothing wrong in stealing from rich energy companies.
  • 27. The Main Reasons Of Electric Energy Theft
  • 28. The Main Reasons Of Electric Energy Theft • The scale of the practice seems small, but its effects can be tragic to us, both in terms of finance and human life. Detection of theft does not protect the victim from paying inflated bills, and makeshift installations often cause electrocutions and fires. • The practice becomes more prevalent during winter when energy consumption increases due to heating, and many people wish to save money.
  • 29. The Main Reasons Of Electric Energy Theft
  • 30. The issue of illegal energy consumption should be considered in three categories • Safety- illegal consumption of electric energy can cause electrocutions, fires or, in combination with a gas installation, even a gas explosion leading to destruction of property and even death.
  • 31. Illegal Consumption Of Electric Energy Can Cause Electrocutions, Fires Or, In Combination With A Gas Installation, Even A Gas Explosion
  • 32. The issue of illegal energy consumption should be considered in three categories • Economy- an energy company protects the economic interest of their own and their clients by legal means. • One should remember that a company’s losses caused by illegal electricity consumption are partly transferred to the clients in the form of payments for electricity supply
  • 33. The issue of illegal energy consumption
  • 34. The issue of illegal energy consumption should be considered in three categories • Society- illegal consumption causes clients to experience negative feelings in terms of commonly understood social justice. • They do not understand why honest people have to pay bills for electricity, and individuals illegally consuming it are not burdened with these costs
  • 35. The Issue Of Illegal Energy Consumption
  • 36. The issue of illegal energy consumption should be considered in three categories • However, high prices of electricity are no justification. It should be understood that illegal electricity consumption is ordinary theft and is registered as such in police statistics. • Suppliers counteract the scourge of theft mainly with increased controls. They also appeal to their clients to look out for energy thieves. • Energy suppliers launch special hotlines where any noticed theft can be anonymously reported. Suppliers all over the European Union undertake similar actions.
  • 37. It should be understood that illegal electricity consumption is ordinary theft and is registered as such in police statistics
  • 38. The Magnitude of the Problem • Threats to metering data in relation to electro mechanical meters are non-computerized in nature, and vulnerabilities to potential attack.
  • 39. The Magnitude of the Problem • 1) placing meters in commonly accessible areas with no security measures for metering data confidentiality(most commonly in multi-family buildings), • 2) using poor security measures against access to cabinets with meters (low quality locks and keys) and widespread use of facilitations for reading the measurements by collectors in the form of looking glasses in the doors of meter cabinets, • 3) using poor security measures against opening the meters (seals), • 4) lack of remote systems for monitoring attempts at opening meter cabinets, • 5) lack or superficiality of security audits.
  • 40. The Magnitude of the Problem
  • 41. The Magnitude of the Problem • It is worth reminding that illegal electric energy consumption is defined as: • (1) consuming it without signing a contract, • (2) with total or partial bypassing of the metering and billing installation, • (3) or by tampering with the installation, falsifying the measurements performed by the metering and billing installation.
  • 42. Illegal Electric Energy Consumption
  • 43. Tampering With The Installation, Falsifying The Measurements Performed By The Metering And Billing Installation
  • 44. Techniques of Electric Energy Theft • As electric energy suppliers inform us, the ingenuity of so-called clients knows no boundaries. • Based on their many years of experience, they assure us that there are about 300 different theft techniques. Collectors and controllers visiting the clients are alert to such ideas.
  • 45. Techniques of Electric Energy Theft
  • 46. The most important and most popular theft techniques are
  • 47. Tampering with meter and seals
  • 50. Wrong billing and fraud in bill generation
  • 51. Unpaid Electricity by individuals, Government officials and untouchable VIPs
  • 52. The most important and most popular theft techniques are • Hidden Connection In Front Of The Meter • This technique is the most popular method of electric energy theft. It is most often encountered among clients of lower social standing, living in old apartment building whose old electrical installations facilitate performing illegal modifications. • This method involves connecting an additional installation to the line in front of the metering system.
  • 53. Hidden Connection In Front Of The Meter
  • 54. The most important and most popular theft techniques are • The basic version of this kind of theft assumes total utilization of an illegal source, which is quite easy to detect. • A more sophisticated method involves only partial use of an illegal source to make detection harder. The theft is often performed only on a seasonal basis, e.g. in winter, for heating
  • 55. Physical Tampering With The Terminals Or Bridging • The consumer has a three-phase meter at their disposal. • If they are knowledgeable in electrical engineering and disconnect the N neutral wire, taking care not to allow the installation’s N point to be galvanically connected with the meter’s N point, then, in case of asymmetrical energy consumption, the meter will understate the energy value, e.g. by 30%, as potential equalization current will not flow through the N wire.
  • 56. Physical Tampering With The Terminals Or Bridging • Does the recipient consume energy in accordance with the contract? • These days, some distribution companies purchase meters that facilitate detection of such actions
  • 57. Physical Tampering With An Analog Meter’s Mechanism • Magnetic Field- influencing a meter with a strong electromagnetic field by means of neo dymium magnets, which is one of the most popular methods of illegal energy consumption. • That is because demagnetization of the inhibitory magnets initially slows down the counting wheel until it stops, but then it start moving again and speeds up, which in turn causes inflated readings and increased energy bills
  • 58. Physical Tampering With An Analog Meter’s Mechanism
  • 59. Physical Tampering With An Analog Meter’s Mechanism
  • 60. Physical Tampering With An Analog Meter’s Mechanism • Photographic Film- this fraud involves an attempt to stop the moving counting wheel of an analog meter by means of inserting photographic film between the rear housing of the meter and the glass front cover. • This trick is popular because it does not necessitate opening the meter and is easy to perform.
  • 62. Tampering With A Digital Meter’s Software • Tampering With A Digital Meter’s Software • This technique involves making a logical change in the state of variables we can refer to by means of so- called OBIS (Object Identification System) codes. • These variables are responsible for storing values based on which the energy supplier bills a given client. • Due to the process of breaking through many security measures being exceptionally complex and time-consuming, and the necessity to have highly specialized knowledge, this method of fraud is encountered extremely rarely
  • 63. Tampering With A Digital Meter’s Software
  • 64. Tampering With A Digital Meter’s Software • Tampering of electromechanical meters is not uncommon for fraud goals (under-registering) through security seal violation and direct or indirect changes to the mechanical disc. • The same is not easily accomplished on electronic meters: built-in sensors are used to report meter tampering, security sealing violation, wiring changes, magnetic anomalies, switched phases, abnormal clock settings, etc..
  • 65. Tampering With A Digital Meter’s Software
  • 66. Security Mechanisms And Means To Detect electric Energy Theft • Contemporary electric power systems face a significant challenge of both protecting their own infrastructure and ensuring the continuity of their services.
  • 67. Security Mechanisms And Means To Detect electric Energy Theft • An especially big problem for the operator of an electric power system involves financial losses caused by electric energy theft. • The theft pro-cess is facilitated by the accessibility of the electric line itself and the terminal metering devices. To prevent such activity or significantly limit the practice, operators use increasingly sophisticated techniques to secure their own infrastructure.
  • 68. financial losses caused by electric energy theft
  • 69. Tampering With A Digital Meter’s Software • However, the experiences of electric power systems’ operators show us that the thieves themselves also employ increasingly advanced techniques, often even reverse engineering - sadly, used for illegal energy consumption.
  • 70. Security Mechanisms And Means To Detect electric Energy Theft • Electric energy meters installed these days are usually placed inside common cabinets located by a building’s entrance. • Such a solution is, on one hand, convenient for the energy supplier and the building’s administrator, but, on the other, creates a certain threat coming from the consumers living there.
  • 71. Electric energy meters installed these days are usually placed inside common cabinets located by a building’s entrance
  • 72. Security Mechanisms And Means To Detect electric Energy Theft • Physical Security Measures- physical means ensuring the housing’s integrity. They are most often encountered in the form of: welding of individual elements of the housing, seals, screws made partially of soft and quickly deforming material and plastic clips. • Interference with the these security measures clearly indicates an attempt at tampering with the device.
  • 74. Security Mechanisms And Means To Detect electric Energy Theft • Physical Parameterization Switch • this often en-countered technique among the producers of energy meters involves protection against local parameterization, a meter has no opening or a knob, is sealed by default. • Used in other models of meters which allow for setting up a switch, soldered into the laminated board, responsible for parameterization (write access)
  • 75. Security Mechanisms And Means To Detect electric Energy Theft • Motherboard Construction • unusual construction of the motherboard and arrangement of the electronic components can be a significant impediment for someone trying to make a connection to the micro- processor or communication interface
  • 77. Security Mechanisms And Means To Detect electric Energy Theft • Magnetic Field Detector- practically all of presently produced meters have a reed switch which, when influenced by a magnetic field, comprises a circuit on the electronic board, which in turn makes it possible for the meter’s software to register such an attempt at tampering in the program’s memory.
  • 79. Security Mechanisms And Means To Detect electric Energy Theft • HASP key (Hardware Against Software Piracy)- other security measures are typically software-oriented. The most important one is having to possess a program dedicated to configuration with a specific meter model and an original HASP hardware key. • Moreover, proper authorization in the meter’s system requires a password known only to the producer, generated when the device’s firmware is loaded onto the meter module’s electronic processor.
  • 80. HASP key (Hardware Against Software Piracy)
  • 81. Communication Encryption • Another security measure aimed at preventing unauthorized parameterization or listening-in to the device. • Apart from the fact that an attacker, in order to be successful in their attempts, has to have a communication module with a specific technology at their disposal and a physical access to a transmission medium, they will not achieve their intended goal without knowing the encryption key of that specific meter.
  • 83. Communication Encryption • All of the above-mentioned (physical) mechanisms operate based on sensors which, after an event has been initiated or detected by the meter’s software, send information about the attempt to the concentrator or directly to the operator.
  • 84. Communication Encryption • The operator, thanks to dedicated management and monitoring software, sends service technicians to the indicated address to perform a site inspection. The event history, even when the operator cannot prove a fraud or tampering, is stored in the system and assigned to a given consumer. • By analyzing such events, it can be concluded in time that a given client has a tendency for illegal electricity consumption and thus cheating the system operator.
  • 85. Methods of Energy Theft Detection • There are methods allowing to detect and locate a specific dishonest energy consumer without the need to perform a site inspection.
  • 86. The Most Popular Methods Include • A method based on calculating the balance difference- • The balance difference is an actual amount. • Methods based on comparing the total readings of meters with the control (balance) meter are convincing when it comes to narrowing down the circle of suspects and checking a specific consumer’s meter readings. The balance difference is the basic and most important component indicating that theft of energy took place
  • 87. A method based on calculating the balance difference
  • 88. The most popular methods include • Control Meter Method (Traditional) - this method involves installing an additional control meter to demonstrate that the consumer’s meter shows a de-creased kWh value.
  • 90. The most popular methods include • The metering system allows for reading meters in a 15-minute cycle. Based on the collected data, it is possible to see if the meters perform balancing correctly. If not, a meter sub group, like risers or staircases, is attempted to be balanced by means of additional meter. • If there is a riser in which the meters do not balance each other out, the additional meter is switched and balances out with e.g. individual floors. By doing that, the meter with suspicious readings can be reached.
  • 91. The most popular methods include • Reflecto meter testing- (using the wave effect) it is a device which detects not only illegal electricity consumption but also discontinuity or non-uniformity of the wire. This method is nothing new. What is new, however, it its utilization. The wave effect is used to detect wire discontinuity.
  • 93. The Most Popular Methods Include • Short test impulses are sent to a pair of wires connected to the device. If there is no break in the wire, the signal energy will be consumed. If there is a break in the wire’s integrity or even a breach of its factory insulation, then the entirety or part of the signal energy will be reflected back the device.
  • 94. The most popular methods include • provoking method- if a consumer suspected of energy theft lives in a house, an ampere meter is installed outside, on the line leading to the client. • Then, the distribution company’s car is ostentatiously parked outside the house, several employees of the company, dressed in work wear, leave the car and “hang around” the neighborhood.
  • 96. The Most Popular Methods Include • Sometimes they knock on the suspect’s door and talk about things completely unrelated to energy theft. The ampere meters readings are observed all the while. • If, resulting from thus improvised event, the consumer’s energy consumption is clearly decreased, it can be assumed they have an illegal connection
  • 97. The most popular methods include • Confidential Phone Call - the most common assistance in detecting electricity theft are...phone calls from people who, willing to perform their “civic duty”, inform distribution companies. However, it can be sensed from the tone of conversation that a common motive for making the phone call and exposing a neighbor is: why should he have it better than me? Or just disputes between neighbors. • Experience shows that information on energy theft is not always true. Sometimes it is just a form of settling grudges
  • 99. Conclusion • Clients of the current electric power system, also being consumers of electricity, at times make attempts, with varying degrees of success, at stealing that energy. The main reason behind the theft phenomenon is the desire to save money. • Moreover, the practice is facilitated by the power line and meters being physically accessible. • Financial losses caused by dishonest clients incline electric energy distributors to employ increasingly sophisticated methods aimed at detection of illegal connection to the network and attempts at tampering with the meter’s metrological properties.
  • 100. Financial losses caused by dishonest clients incline electric energy distributors to employ increasingly sophisticated methods
  • 101. Conclusion • Among the many known methods of theft, the most popular ones are: making a concealed connection and a mechanical blockade of the analog mechanism. • Energy theft by tampering with a digital smart meter is much more difficult and requires specialized knowledge, which greatly narrows the circle of clients whose specialized knowledge enables them to perform unauthorized parameterization of the meter. Regardless the of theft technique, the system operator has a wide variety of effective methods to detect frauds at their disposal.
  • 102. Energy theft by tampering with a digital smart meter is much more difficult and requires specialized knowledge
  • 103. Conclusion • From the network metrological properties’ analysis, dividing the network into fragment by use of a meter, to histogram and consumer profiling-based analysis. • It should be noted that energy theft is not a new phenomenon, and the development of smart software.
  • 104. DNA: Analysis of electricity theft in India • https://youtu.be/DrkfZ9Pjwuk
  • 105. Punishments for Electricity Theft In India • Section 135 to section 150 talks about the penalties. • Section 136 – Punishment when the theft of electric materials or lines occurs • Section 137 – Punishment for receiving stolen property • When a person dishonestly receives any stolen electric material or wire shall be liable to Imprisonment which may exceed up to 3 years, or, Fine, or Both • Section 138 – Punishment for having a malafide intention • Section 139 – Negligently damaging or breaking works • Section 140 – Penalty for intentionally causing harms to works • Section 141 – Demolishing public lamps • Section 142 – Penalty for not complying with the directions given by the Appropriate Commission • Section 146 – Punishment for not complying with the directions or orders • Section 148 – Penalty for the work which belongs to the Government • Section 149 – Offences by Companies • Section 150 – When a person abets or instigates the commission of an offence • When the member of the Electricity Board or supplier enters into an agreement to restrain, to conceal some information related to the power theft, is liable to the punishment of imprisonment up to 3 years or fine or both.
  • 106.
  • 108. References • Are smart meters safe from hackers? • https://www.telegraph.co.uk/property/smart-living/what-do-you-know-about- smart-meters/ • Collusion and fraud detection on electronic energy meters: a use case of forensics investigation procedures • https://www.ieee-security.org/TC/SPW2014/papers/5103a065.PDF • Cyber Security Issues in Smart Meter and Their Solutions • http://paper.ijcsns.org/07_book/201803/20180314.pdf • Saubhagya Dashboard • https://saubhagya.gov.in/ • The Most Frequent Energy Theft Techniques and Hazards in Present Power Energy Consumption • http://www.salvage-project.com/uploads/4/9/5/5/49558369/cpsr- sg2016_paper_15.pdf • Theft of electricity • https://en.wikipedia.org/wiki/Theft_of_electricity
  • 109.