Вы находитесь на странице: 1из 8

Electricity Theft Concerns within Advanced Energy Technologies

Trevor J. Bihl Salam Hajjar


Biomedical, Industrial and Human Factors Engineering Weisberg Division of Engineering
Wright State University Marshall University
Dayton, OH 45431 Huntington, WV 25755
Trevor.Bihl@wright.edu hajjar@marshall.edu

Abstract —Developments in ambient energy and radio frequency (RF) energy harvesting have the potential to provide in situ power for
sensor systems; however, they also have the potential to illicitly collect generated energy. Additionally, new methods of electricity theft
have appeared with the introduction of smart grid components. This paper provides an understanding of electricity theft as it relates to
advanced energy applications, e.g. energy harvesting and the smart grid. A discussion is also provided of the interdisciplinary, ethical
and education issues of electricity theft as it relates to these domains.

Index Terms—Crime, education, electricity theft, energy harvesting, metering, non-technical losses, revenue protection,
smart meters, theft.

I. INTRODUCTION II. LOSSES IN T&D SYSTEMS

E LECTRICITY theft, defined herein as “intentional theft or


nonpayment for electrical services by way of a variety of
To understand electricity theft one necessarily needs a basic
understanding of losses in transmission and distribution (T&D)
technical or non-technical means,” is currently an important systems. Conceptually, total losses in a T&D system are the
economic and technical issue. Economically, worldwide difference between total produced kilowatt hours and total
electricity theft losses were most recently (2014) estimated to consumed kilowatt hours.
be $89.3 billion [1]. Technically, various approaches have been Total losses in a T&D system are generally of two types,
developed to detect and mitigate against theft. technical losses and non-technical losses [4]–[6]. Technical
The smart grid, one advanced energy technologies of interest losses are defined as calculable from known physical properties
herein, involves the widespread adoption of digital meters, of the T&D system and include resistance in transmission lines
sensors and controllers to provide improved quality and and components, inefficiencies in switching, electricity usage
resiliency of the electric grid by remote monitoring and control at generation plants, core losses in transformers and heat
of all aspects of electricity transmission and distribution (T&D). dissipation [4]–[9]. Nontechnical losses includes losses related
As a byproduct of the smart grid is that electricity theft can be to non-physical means, e.g. E-theft, accounting errors, and
mitigated to some degree by improved monitoring, improved faulty readings [4]–[8], [10], [11]. General examples of TL and
meters, and improved record keeping. NTL can be found in Table 1.
Energy harvesting is a discipline which aims to extract Table 1: Examples of Technical and
ambient energy from the environment. Through various Nontechnical Losses
approaches, energy harvesting enables the powering of devices Technical Losses
without relying on batteries that must be replaced. Energy Nontechnical Losses
Variable Fixed
harvesting thus have broad interest, ranging from applications load hysteresis accounting errors
such as remote weather monitoring stations to internet of things series core E-theft
faulty meters (inaccurate and
(IoT) technologies located throughout houses. However, copper eddy current
miscalibrated meters)
concerns arise due to recent, award winning, developments in transport
no-load faulty meter reading methods
energy harvesting include that of [2], work that extracts energy related
from the T&D without being billed. shunt incorrect meter readings
However, to understand the electricity theft implications of technical loss computation
iron
errors
energy harvesting and the limitations of smart meters, one must
have interdisciplinary knowledge since these concerns span
To estimate nontechnical losses, one must first estimate
domains. This requires some background knowledge in non-
general T&D system losses and then use knowledge of system
technical fields [3]. This paper aims to introduce such
components and operations to estimate technical losses [6].
interdisciplinary concerns as they relate to electricity theft
Rough estimates on general United States T&D losses range
concerns in the smart grid and energy harvesting.
from 6-9% [5] and include: 7.6% [12], 8% [13], and 10%
This paper will be organized as follows, Section II reviews
maximum of generated power [14]. These losses can be broken
and describes losses in T&D systems. Advanced energy
out into transmission and distribution pieces; with estimates
technologies are then discussed with Section III discussing the
(for Western Europe) of 1-3% for transmission and 4-9% for
smart grid and Section IV discussing energy harvesting. Section
distribution being reasonable [7].
V discusses electricity theft in particular. Section VI discusses
Due to the approximations inherent in these figures, it is
the electricity theft concerns in both the smart grid and energy
difficult to quantify the total losses due to E-theft since many
harvesting. Section VII will conclude the paper.
insufficient estimates exist from utilities arbitrarily estimating
technical losses [6] and companies rarely publishing loss or

978-1-5386-3200-0/17/$31.00 ©2017 IEEE 271


theft data [15]. Thus, Nesbit [7] reported that there is no known meter reading (AMR) unit [21]. Because digital meters are
true percentage loss, with various regional, technical and installed at the client’s level they are mostly vulnerable to
cultural differences driving disparate theft rates across a malicious attacks including electricity theft on which we focus
country. in this paper.

III. THE SMART GRID IV. ENERGY HARVESTING


The U.S. Department of Energy (DOE) defines the smart grid Energy harvesting is an approach to collecting energy in situ
as [16]: for remote applications rather than relying on batteries, which
“An automated, widely distributed energy delivery must be replaced, or paying for a connection to a distant
network, the Smart Grid will be characterized by a two- electrical T&D system [22]. Energy harvesting involves
way flow of electricity and information and will be extracting energy from the environment by a variety of
capable of monitoring everything from power plants to methods, e.g. solar, piezoelectric, vibrations, thermoelectric,
customer preferences to individual appliances. It electromagnetic (magnetic field and radio frequency (RF)), and
incorporates into the grid the benefits of distributed wind [22]–[28]. The advantage Energy harvesting provides is
computing and communications to deliver real-time that mobile, embedded and remote systems can collect energy
information and enable the near-instantaneous balance in situ rather than relying on batteries which need to be
of supply and demand at the device level” replaced.
In general, the Smart Grid is T&D system that integrates One basic example of an energy harvesting application is
sensing, monitoring, and communication technology for control seen in Figure 2 where both wind and solar harvesting is
of T&D systems to improve losses and reliability [17]. Smart employed. Here, a remote station operated by the US Forest
grids provide reliable electricity and prevent blackouts by Service’s and Bureau of Land Management in the Remote
means of computer technology. This made of smart grids a Automated Weather Station (RAWS) Network is seen. The
paradigm shift in electricity T&D systems to allow for RAWS network employs such remotely located solar and wind
pervasive monitoring and control to improve efficiency, powered stations to monitor weather conditions [29].
security and reliability [13], [18]. The Smart Grid dissipates less
electricity since it can reduce some problems like congestion
and other disturbances, which prevents electricity loss. The
Smart Grid enjoys the ability of hosting additional new
generators to the transmission system, which allows greater
incorporation of renewable energy sources [19].
It is of importance to indicate that a smart grid combines, not
only the conventional power generators such as gas turbines and
fossil fuel generators, but also the renewable energy generators
such as wind turbines and photovoltaic panels (PV). It provides
a bidirectional method of communication between generators,
clients and the grid controllers in order to cover the unit
commitment problem [20], observe the electricity flow, monitor
information and indicate any interruption in real time. An
example of a smart grid architecture is illustrated in Figure 1.

Figure 2, Example of the Remote Automated Weather


Station (RAWS) Station

Beyond remote installations, energy harvesting has been


proposed for power IoT devices [30]. The IoT involves
connecting more and more devices to the internet via wireless
personal area network (WPAN) devices, which are small and
low cost communication technologies which enable the IoT
[31]. However, due to many of devices being remote or
Figure 1, Smart Grid Architecture scattered throughout a facility, energy harvesting methods are
of great interest for the IoT [32].
To create a smart grid, digital sensing and communication
components, at the clients’ level, are needed throughout a T&D V. ELECTRICITY THEFT
system. One core component of smart grids is digital meters. Electricity theft is considered as the intentional nonpayment
Digital meters generally operate as presented in Figure 6, where for electrical services by way of a variety of technical or non-
current and voltage sensors monitor power flow. Analogue-to- technical means. Consistent with [7], [9], [33]–[35], the authors
digital (ADC) devices convert sensor readings to values for a contend that E-theft is of three types:
digital signal processor (DSP), with the result displayed A. Outright Theft, which is accomplished by:
visually and possibly transmitted to the utility via an automatic

272
o Tapping an overhead line to create a new, 2) Induction Coupling
illegal connection One method that appears in the public conscious is that of
o Induction Coupling whereby energy from a placing a large coil under a high voltage power line in order to
power line is collected by electromagnetic steal electricity [4]. Such an approach is inherently a form of
induction without physically connecting to the tapping by induction coupling. However, aside from a few
line. anecdotal reports of electricity theft by induction coupling, e.g.
B. Fraud, which is accomplished by [40]–[42], issues exist with such schemes. Primarily, it is
o Bypassing a meter to prevent it from measuring generally improbable to make a return on the investment due to
the power consumed the required large amount of copper need to create a sufficiently
o Tampering with a meter to cause it to output a large coil [43]. Although the actuality of induction coupling
more favorable reading for the customer. This electricity theft is low, there are instances of induction power
is subdivided into mechanical and digital/smart light bulbs as seen in artistic installations where fluorescent
meter methods lights are lit by induction [44].
C. Billing Issues
B. Fraud
o Deliberate non-payment of bills.
o Billing irregularities, both intentional (bribing Fraud in electricity theft involves performing an action to
officials to ignore use) and unintentional (poor record less consumption on an electricity bill or tampering with
record keeping practices) metering equipment, which is owned by the power utility, to
Although only one method is termed as explicitly theft, all of make it record less (or no) consumption than what was actually
these issues involve consuming electricity which is not paid for. consumed.
1) Bypassing Existing Meetings
A. Outright Theft Bypassing a meter extends the concept of tapping, but here a
Outright theft involves a one stealing electricity when they prior electric is accomplished by directly connecting the house
are not already a known customer to a utility. Here an wiring to the wires coming into the meter wiring around the
electricity theif aims to create a new, and illegal, connection to meter [14], [33], [36], [45], [46] (see Figure 4 for two examples
the T&D system without the approval of owner of the T&D of accomplishing this through the use of automotive jumper
system. cables and screwdrivers). This form of theft can either
1) Tapping completely disconnect the meter from the system [46] or leave
Tapping, as seen in Figure 3, involves creating an the meter connected in addition to the bypass so that the meter
unauthorized connection to overhead or buried line on the line records some amount of usage, though less than before [45],
side of the distribution transformer [33]. In operation, tapping [47]. An addition variation on bypassing includes using a
can be used to connect a premise, or equipment, to the electric second (spare) meter for part of the billing period to avoid all
grid where no prior connection to the grid existed. As a method usage being recorded [47].
of E-theft, tapping has been in use in the United States since at During whatever process a thief might use to bypass a meter,
least the 1890’s [36]. it would be counterproductive for a thief to notify a utility to
shutoff power to a premise and it is assumed that all connections
would therefore be made to live wires. Therefore, this method
of theft also offers a significant amount of personal risk.

Figure 3 Contemporary Example of Tapping in America, Figure 4, Two Examples of Bypassing a Meter Using
using jumper cables to connect directly to the overhead Automobile Jumper Cables and Screwdrivers (printed
lines (printed with permission from Tom Erfert) with permission from Joseph Tedesco and Tom Erfert)
2) Meter Tampering
Tapping offers a significant amount of risk of electrocution Tampering with an electric meter has been a concern for over
and subsequent death from this form of electricity theft to both one hundred years and it is known that designing meters to
a perpetrator and to innocent bystanders [4], [37], [38]. avoid tampering was a primary consideration by the late 1890’s,
Additionally, damage to T&D equipment, including see [48], [49], and is still a contemporary concern [7]. Two
transformers, is also possible if the thief shorts a connection meter tampering issues are of interest, a) those concerning
[38]. Despite the inherent danger of this technique, it has been mechanical meters and b) those related to digital/smart meters
adapted and refined for field-use by US military engineers in a (which are not immune to tampering).
deployable system that can be thrown up to a power line to
charge equipment [39].

273
a) Mechanical Meter Tampering and consumer privacy [54], and big data problems of data
Methods of tampering with a meter and protection against storage and data mining. Additionally, the manpower reduction
tampering may have evolved over time, but where mechanical benefit can potentially facilitate theft by losing the frequent
meters are in use some methods have changed little in over one personal contact of meter readers [7].
hundred years. For example, the following methods have been In general there are two types of digital meters [55]: 1) hybrid
viable for mechanical meter tampering from the 1890s to digital-mechanical meters which employ a digital counter, but
contemporary times: otherwise measure usage mechanically and 2) wholly electronic
x mechanically stopping the disc from moving, thus meters. Digital meters generally operate as presented in Figure
stopping it from recording the amount of energy used 6, where current and voltage sensors monitor power flow into a
[4], [33], [36], [48], [50] premise, analogue-to-digital (ADC) devices convert sensor
x tampering with calibration screws [33], [48]. readings to values for a digital signal processor (DSP), with the
x placing magnets around the meter to disrupt the meter’s result displayed visually and possibly transmitted to the utility
operation [7], [49], [51]. via an automatic meter reading (AMR) unit [21].
x inserting foreign matter, such as honey, glue, insects
(such as ants and spiders), iron filings or grease to slow
the movement [7], [14], [33], [36], [47], [49], [50]
x contaminating the meter bearing [7]
x disconnecting the neutral conductor of a three-conductor
meter [33], [36], [50]
o mechanical meters do not register power
consumption under this condition
o all safety aspects of having a neutral conductor Figure 6, Conceptualization of Single-Phase Digital Watt-
are also lost hour Meter, adapted from [21]
x damaging the movement so that it fails to operate Digital meters have some general advantages over
properly [33], [36], [47] mechanical meters, a digital meter typically has no disc to
x reserved current tampering: physically turning the meter mechanically stop and few have moving parts that can be
upside-down (inverting) causing the meter to run interfered with [56]. Additionally, some digital meters have tilt
backwards [7], [14], [33], [47], [51] and magnetic interference sensors to record when a meter was
x placing the meter out of plumb [50] tampered with, possibly transmitting this data to the utility [57].
x altering the internal wiring of meters [14], [47]. In summary, digital meters have the following benefits:
The locations of where some of these methods are applicable x greater accuracy in some situations [55]
are highlighted in Figure 5. It is important to note that many x elimination of moving parts, thereby removing the
of these methods involve the thief being in contact with the viability of some electricity theft methods [56]
internal wiring of the meter or internal components. x real-time communication and monitoring of usage by
Therefore, this method of theft may provide no more safety utilities
than either bypassing or tapping. x AMRs record more detailed usage data and can transmit
such data to the utility.
However, digital meters also have multiple vulnerabilities
relative to electricity theft, including
x potential hacking concerns
x disconnecting the neutral wire prevents some digital
meters from recording usage [34].
Therefore, as with mechanical meters, a variety of issues and
benefits exist with digital meters. Although the impact of digital
meter tampering is unknown, Rengarajan and Loganathan [58]
posited that it was less than tapping because electronic meters
would transmit a warning once a seal was breached. However,
Figure 5, Single-Phase Mechanical Watt-hour Meter with this relies on the assumption that a thief cannot avoid tripping
Typical Locations Susceptible to Tampering Highlighted, that sensor, as mentioned above there are multiple methods to
from [4] hack a digital meter.
C. Billing Issues
b) Digital Meter Tampering
1) Nonpayment of Bills
Digital meters, considered herein as any smart, digital or
Deliberate non-payment involves 1) being a known customer
electronic meter, have been presented as a solution to many
of a utility and 2) refusing to pay an electric bill. Although this
problems in metering, such as manpower reductions [52],
is logically a particularly inefficient method of electricity theft
revenue protection [53], and economics. However, digital
because any utility would have records of nonpaying customers,
meters are not immune to electricity theft and introduce other
it is a concern since utilities cannot always collect unpaid bills.
tangential issues to electricity theft considerations, such as data

274
Thus, deliberate non-payment a contemporary problem [34], [9] and Rogowski coils have no magnetic elements thus they
with a history dating to as early as 1896 [35]. cannot be magnetically damaged. Basic power supplies such as
There is a causal relationship between this method and the resistive capacitive type are built without magnetics to
economic problems of customers [9]; possibly leading ensure uninterrupted system power during tampering, but lack
financially desperate customers to other forms of theft [9]. the capability to source large currents [59]. Reversed current
Thus, legal action against nonpaying customers may not yield tampering can only be detected if the utility detects negative
the losses incurred. One current practice to mitigate non- readings or installing firmware that detects negative values.
payment involves Continuous Service Agreements (CSAs),
B. Energy harvesting and theft
particularly with rental properties, where uninterrupted service
is provided to property owners between occupancies; non- Concerns regarding electricity theft with energy harvesting
payment of the final bill is considered electricity theft [59]. methods involve electromagnetic field energy harvesting
2) Billing Irregularities methods. Many electromagnetic field energy harvesting
In addition to nonpayment of bills, billing irregularities can methods are designed to collect power from T&D systems [25]
be a form of electricity theft. While billing irregularities can be [66]. Here, both legitimate, powering smart grid sensors [25]
due to poor quality record management at utilities, they can also [66], possibly legitimate [67], and illegitimate, power personal
be due to bribery of meter readers who agree to record a lower devices without utility permission [68], use cases exist.
amount for a customer [9]. However, bribery based A recent example of an energy harvesting system that aims to
irregularities can logically be mitigated by digital meters, which collect unauthorized energy from T&D systems is one
do not require a meter reader to manually record usage. developed by Siegel [69]. This device is advertised and
described by the developer as [2]:
VI. DISCUSSION “We are surrounded by electromagnetic fields which we
produce for information transfer or as a by-product of
Interdisciplinary considerations are key to identifying electric infrastructure. The system is meant to be an
problems to be solved through engineering development [60]. option for tapping into already existing but unnoted
And it is recognized that well educated engineers have the energy sources. By exploring these sources it can create
ability to apply their engineering knowledge to a variety of a new awareness of the invisible electromagnetic spaces
domains beyond what they studied [3]. Notably, while giving them a spatial dimension.”
interdisciplinary concerns exist in the smart grid and Energy In developing and exhibiting this system as a student, Siegel
Harvesting. For example, designing and operating the smart was given multiple awards, including one by the University of
grid requires abilities in engineering, finance, policy, and other Arts Bremem [2], [70]. Siegel’s device has been heralded as
domains [61]. Similarly, developing energy harvesting “free electricity” and as innovative, e.g. [71], [72], with some
solutions require broad skills in developing and finding expecting common use and strong acceptance is expected by
applications [62]. However, further interdisciplinary issues 2018 [72]. However, such an approach is really the
exist when the smart grid and energy harvesting intersect with unauthorized use of electricity and would be creating a load on
electricity theft. a given utility’s T&D system. More seriously, while
A. Electricity Theft Concerns within the Smart Grid individually a single Siegel Energy Harvesting device likely
While digital meters having some general advantages over steals an insignificant amount of electricity, if widespread
mechanical meters, e.g. there being no disc to mechanically acceptance and use is realized, then a significant amount of
stop and few have moving parts that can be interfered with [56], electricity could be stolen.
they have multiple vulnerabilities to electricity theft by The encouragement seen of Siegel’s electromagnetic
tampering, e.g. disconnecting the ground/neutral wire [34], and harvester might encourage other developers to create similar
by being bypassed. devices. This encouragement illustrates that limited knowledge
Ghajar and Khalife [10] reported on the costs and benefits of about electricity theft concerns might also exist. Rather than
installing AMRs for situations with large percentages of theft, critiquing and serving as technology referees, technologist have
approximately 50% of revenue, and showed a return on the championed a possibly illicit technology as being inventive. To
investment in 2.7 years [10]. However, published studies have alleviate this, technologists should become familiar with
yet to consider countries, e.g. USA, with a relatively low engineering ethical and legal concerns prior to advocating
percentage of theft and a large prior capital investment in technological approach, see [73], [74]. However, such
mechanical meters [7], [63]. Furthermore, studies have not concerns are notably interdisciplinary in nature, e.g. three
analyzed the cost of maintaining mechanical metering different domains of energy harvesting, electricity theft, and
infrastructures but incorporating data mining techniques, which engineering ethics, and challenging to critique given the ever
have been show viable in finding small unaccounted for losses, expanding and big data scope of academic research and
e.g. [4], [7], [64]. publishing [75].
Protecting digital meters against some types of tampering can C. Inter/Trans-Disciplinary and Ethical Concerns
be provided by means of hardware instruments. Anti-tamper Interdisciplinary knowledge and abilities are known as
approaches that involve hardware can range from placing hallmarks of well-educated and capable engineers [3].
crucial software code in FPGAs to characterizing emissions However, interdisciplinary education is not always pursued as
[65]. Magnetic tampering can be prevented by reducing the part of engineering educational programs that focus on “normal
magnetics in a meter. Current sensors such as shunt resistors professionalism,” defined by [76] as “the thinking, values,

275
methods and behavior dominant in a profession or discipline.” [4] D. Suriyamongkol, Non-technical losses in electrical
Thus, many capable engineers may not have knowledge across power systems, MS Thesis: Ohio University, 2002.
disciplines, which can result in them missing opportunities and [5] C. A. Dortolina and R. Nadira, "The loss that is unknown
key concerns as technology is developed. Thus, in the United is no loss at all: a top-down/bottom-up approach for
States, in order to create well rounded engineers ABET estimating distribution losses," IEEE Transactions on
encourages development of both technical and non-technical Power Systems, vol. 20, no. 2, pp. 1119-1125, May 2005.
skills such that engineers can function in interdisciplinary
environments and understand the impact of engineering across [6] I. E. Davidson, A. Odubiyi, M. O. Kachienga and B.
global, economic, environmental and societal contexts [77]. Manhire, "Technical loss computation and economic
As presented, electricity theft concerns exist in both the smart dispatch model for T&D systems in a deregulated ESI,"
grid and energy harvesting. The results of increasing electricity Power Engineering Journal, vol. 16, no. 2, pp. 55-60,
theft losses include reduced planning abilities, required Apr. 2002.
additional generation abilities, and thus added waste and [7] B. Nesbit, "Thieves lurk, the sizable problem of stolen
pollution. However, these concerns and possible outcomes are electricity," Electrcial world, pp. 31-35, Sep./Oct. 2000.
non-obvious in nature and require exposure to various technical [8] L. C. Van Ness, "Lost and unaccounted-for current," 26th
and nontechnical issues. Additionally, the accolades given to Convention, National Electric Light Association, pp. 513-
energy harvesting technology illustrate a failure of engineering 522, May 1903.
ethical education, which requires students to be aware of ethical [9] T. B. Smith, "Electricity theft: a comparative analysis,"
standards and ethical implications of their work [78]. Energy policy, vol. 32, pp. 2067-2076, 2004.
VII. CONCLUSIONS [10] R. F. Ghajar and J. Khalife, "Cost/benefit analysis of an
AMR system to reduce electricity theft and maximize
Electricity theft is a major concern for utilities, despite being revenues for Électricité du Liban," Applied Energy, vol.
lightly reported and discussed. Recent advances in the 76, pp. 25-37, 2003.
advanced energy systems both improve resiliency to electricity
theft and introduce new vectors and methods for electricity [11] I. E. Davidson, "Evaluation and Effective Management
of Non-technical losses in power networks,"
thieves to operate. Within the smart grid, advances in digital
Transactions of the SA Institute of Electrical Engineers,
metering should improve their resiliency to electricity theft.
pp. 39-42, Sep. 2003.
However, the electronic aspect of digital meters introduce new
susceptibilities to electricity theft and meter tampering, which [12] M. Gustafson and J. Baylor, "Approximating the system
must be overcome by cyber security methods. While energy losses equation [power systems]," IEEE Transactions on
harvesting developments have ignored electricity theft Power Systems, vol. 4, no. 3, pp. 850-855, 1989.
concerns, and even awarded designs that steal electricity from [13] H. Farhangi, "The path of the smart grid," IEEE Power
utilities, caution is needed in this area and technologists should and Energy Magazine, vol. 8, no. 1, pp. 18-28, 2010.
act as stewards to ensure that ethical and legal concerns are [14] J. Weslowski, "Utilities launch assault to halt theft of
considered in engineering education to avoid developing tools power," Electric Light and Power, vol. 54, no. 10, pp. 25-
that are unethical, but not obviously so, in nature. The authors’ 26, 1 Oct 1976.
conclusion is that sound interdisciplinary and ethical education
of engineers would alleviate some of these issues by training [15] A. J. Donziger, "The underground economy and the theft
students to be aware of cross-domain issues and be able to of utility services," Public Utilities Fortnightly, pp. 23-
provide ethical judgements and technological stewardship. 27, 22 Sept. 1979.
[16] A. Bari, J. Jiang, W. Saad and A. Jaekel, "Challenges in
VIII. ACKNOWLEDGEMENTS the Smart Grid Applications: An Overview,"
The authors would like to thank Tom Erfert and Joe Tedesco, International Journal of Distributed Sensor Networks,
for permission to print their pictures of actual theft; and Dan vol. 10, no. 2, 2014.
Suriyamongkol and Bud Russell for permission to use Figure 5. [17] Energy Future Coalition , Challeng and Opportunity:
Charting a new energy future, Washington, D.C., 2015.
IX. BIBLIOGRAPHY [18] A. P. D. Nath, F. Amsaad, M. Choudhury and M.
Niamat, "Hardware-based novel authentication scheme
[1] Northeast Group, "Emerging Markets Smart Grid: for advanced metering infrastructure," National
Outlook 2015," Northeast Group, Washington, DC, 2014. Aerospace and Electronics Conference (NAECON) and
Ohio Innovation Summit (OIS), pp. 364-371, 2016.
[2] D. Siegel, "Electromagnetic Harvester," [Online].
Available: http://dennissiegel.de/works/electromagnetic- [19] A. C. Graab, "The smart grid: a smart solution to a
harvester/#more. [Accessed 10 Jun. 2017]. complicated problem," William and Mary Law Review,
pp. 2051-2076, 2010.
[3] G. Gereffi, V. Wadhwa, B. Rissing and R. Ong, "Getting
the numbers right: International engineering education in [20] S. Hajjar, A. Bratcu and A. Hably, "A Day-ahead
the United States, China, and India," Journal of Centralized Unit Commitment Algorithm for A Multi-
Engineering Education, vol. 97, no. 1, pp. 13-25, 2008. agent Smart Grid," Federated Conference on Computer

276
Science and Information Systems (FedCSIS) Position implementation of a novel protection device to prevent
Papers, pp. 265-271, 2015. tampering and electricity theft in commercial energy
[21] G. Sreenivasan, Power Theft, New Delhi: PHI Learning meters," Journal of Computer and Information
Private Limited, 2011. Technology, vol. 1, no. 1, pp. 88-94, 2010.
[22] S. Chalasani and J. M. Conrad, "A survey of energy [35] R. S. Hale, "Charging for electric current on the wright
harvesting sources for embedded systems," IEEE demand system – how to adjust rates so that every class
Southeastcon, pp. 442-447, 2008. of customer shall be profitable to the company," The
Electrical Engineer, vol. 22, no. 442, pp. 392-393, 21
[23] X. Lu, P. Wang, D. Niyato, D. I. Kim and Z. Han,
Oct. 1896.
"Wireless networks with RF energy harvesting: A
contemporary survey," IEEE Communications Surveys & [36] J. H. Hallberg, "Theft of current: how to detect, prosecute
Tutorials, vol. 17, no. 2, pp. 757-789, 2015. and prevent II," Electrical World and Engineer, vol. 45,
no. 19, pp. 884-886, 1905.
[24] M. A. Weimer, T. S. Paing and R. A. Zane, "Remote area
wind energy harvesting for low-power autonomous [37] A. J. Taylor, G. McGwin, R. M. Brissie, L. W. Rue and
sensors," IEEE Power Electronics Specialists G. G. Davis, "Death during theft from electric utilities,"
Conference, pp. 1-5, 2006. The American Journal of Forensic Medicine and
Pathology, vol. 24, no. 2, pp. 173-176, June 2003.
[25] R. Moghe, Y. Yang, F. Lambert and D. Divan, "A
scoping study of electric and magnetic field energy [38] V. Kim, "Father and daughter burned in alleged electrical
harvesting for wireless sensor networks in power system theft," 17 Sep. 2011. [Online]. Available:
applications," IEEE Energy Conversion Congress and http://latimesblogs.latimes.com/ lanow/2011/09/father-
Exposition, pp. 3550-3557, 2009. daughter-burns.html. [Accessed 19 Sep. 2011].
[26] N. T. Blach, R. A. Lake and R. A. Coutu, "Design of [39] J. Ohab, "The bat hook: harvesting energy from power
FerroElectric MEMS energy harvesting devices," lines," 29 June. 2010. [Online]. Available:
National Aerospace and Electronics Conference http://science.dodlive.mil/2010/06/29/the-bat-hook-
(NAECON) and Ohio Innovation Summit (OIS), pp. 16- harvesting-energy-from-power-lines-labtv/. [Accessed 13
22, 2016. Feb. 2011].
[27] R. Kumar, G. Subramanyam and V. Chodavarapu, [40] A. Bennett, "HUMOR: He wound half a mile of copper
"Energy harvesting flexible regenerative power source cable around his garage.," 16 Jan. 1997. [Online].
for wearable devices," National Aerospace and Available: http://diswww.mit.edu/tla/humor/1819.
Electronics Conference (NAECON) and Ohio Innovation [Accessed 28 Sept. 2015].
Summit (OIS), pp. 129-132, 2016. [41] Editor, "Catching electricity thieves via the internet," 2
[28] V. Bhagavatula, W. Wesson and J. C. Rudell, "Integrated Oct. 2006. [Online]. Available:
CMOS transceivers applied to defense applications in a http://www.metering.com/catching-electricity-thieves-
Wide Area Radio Network for Sensor (WARNS) via-the-internet/. [Accessed 28 Aug. 2015].
communication," National Aerospace and Electronics [42] "Electromagnetic Harvesters: Free Lunch or Theft!," 27
Conference (NAECON), pp. 344-347, 2011. Feb. 2013. [Online]. Available:
[29] J. Zachariassen, K. F. Zeller, N. Nikolov and T. http://www.industrytap.com/electromagnetic-harvesters-
McClelland, A review of the forest service remote free-lunch-or-theft/1805?ModPagespeed=noscript.
automated weather station (RAWS) network, United [Accessed 28 Aug. 2015].
States Department of Agriculture, 2003. [43] D. L. Deardorff, "A Solution to the RWP for Exam 1 -
[30] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, Stealing Power," Summer 2006. [Online]. Available:
"Internet of Things (IoT): A vision, architectural http://user.physics.unc.edu/~deardorf/phys25/rwp/exam1
elements, and future directions," Future generation rwpsolution.html. [Accessed 28 Aug. 2015].
computer systems, vol. 29, no. 7, pp. 1645-1660, 2013. [44] BBC News, "Power lines spark light show," 21 Feb.
[31] T. Bihl, M. Temple and K. Bauer, "An Optimization 2004. [Online]. Available:
Framework for Generalized Relevance Learning Vector http://news.bbc.co.uk/2/hi/uk_news/england/bristol/.
Quantization with Application to Z-Wave Device [Accessed 15 Feb. 2011].
Fingerprinting," Proceedings of the 50th Hawaii [45] J. H. Hallberg, "Theft of current: how to detect, prosecute
International Conference on System Sciences, 2017. and prevent I.," Electrical World and Engineer, vol. 45,
[32] A. Iera, C. Floerkemeier, J. Mitsugi and G. Morabito, no. 17, pp. 794-796, 1905.
"2010. The internet of things [guest editorial]," IEEE [46] H. D. Morton, "Protective system for electric meters". US
Wireless Communications, vol. 17, no. 6, pp. 8-9, 2010. Patent 2,019,866, 20 Oct. 1933.
[33] R. L. D. Wilson, "Utility revenue protection," APPA [47] K. A. Seger and D. J. Icover, "Power theft the silent
Accounting, Finance Rates & Information Systems crime," FBI Law Enforcement Bulletin, pp. 20-25, Mar.
Workshop, 18-20 Oct. 1988. 1988.
[34] H. S. Dey, M. ul-Mamun, M. Shahadat, A. Ahamed, S. [48] Electricity Metering Subcommittee of the IEEE, Progress
U. Ahamed and K. S. Arefin, "Design and in the art of metering electric energy, T. Edition, Ed.,

277
New York, NY: Institute of Electrical and Electronics [64] M. Anderson, "How to identify electricity theft in
Engineers Inc., Dec., 1969. apartments without hardware or software investmnets,"
[49] C. D. Haskins, "Electric metering from the station BluTrend LLC, 2006.
standpoint," Transactions, American Institute of [65] S. Pope, "Trusted integrated circuit strategy," IEEE
Electrical Engineers, pp. 265-274, 27 July 1897. Transactions on components and packaging
[50] T. R. Hay, "Detection and remedy of current theft from technologies, vol. 31, no. 1, pp. 230-234, 2008.
central stations," Electrical Review, vol. 74, no. 15, pp. [66] K. S. Chang, S. M. Kang, K. J. Park, S. H. Shin, H. S.
588-589, 12 Apr 1919. Kim and H. S. Kim, "Electric field energy harvesting
[51] R. Targosz, "Electricity theft – a complex problem," 13 powered wireless sensors for smart grid," Journal of
July 2009. [Online]. Available: http://www.leonardo- Electrical Engineering and Technology, vol. 7, no. 1, pp.
energy.org/print/5494. [Accessed 23 Feb. 2011]. 75-80, 2012.
[52] H. Tan, C. Lee and V. Mok, ""Automatic power meter [67] P. Marshall, "High voltage power line multi-sensor
reading system using GSM network," International system". U.S. Patent 8,767,071, 1 July 2014.
Power Engineering Conference (IPEC), pp. 465-469, [68] S. Anthony, "German student creates electromagnetic
2007. harvester that gathers free electricity from thin air,"
[53] I. H. Cavdar, "A solution to remote detection of illegal ExtremeTech, 12 Feb. 2013.
electricity usage via power line communications," IEEE [69] D. Siegel, "Dennis Siegel," [Online]. Available:
Power Engineering Society General Meeting, pp. 896- http://dennissiegel.de/. [Accessed 10 Jun. 2017].
900, 2004. [70] "Hochschule für Künste Bremen verleiht
[54] P. McDaniel and S. McLaughlin, "Security and Privacy Hochschulpreise 2013," Hochschule für Künste Bremen,
Challenges in the Smart Grid," IEEE Security & Privacy 2013. [Online]. Available: http://www.hfk-
Magazine, vol. 7, no. 3, pp. 75-77, 2009. bremen.de/t/auszeichnungen/n/hochschule-f%C3%BCr-
[55] J. Driesen, T. van Craenenbroeck and D. van Dommelen, k%C3%BCnste-bremen-verleiht-hochschulpreise-2013.
"The registration of harmonic powers by analogue and [Accessed 10 Jun. 2017].
digital power meters," IEEE Instrumentation and [71] m. dansie, "Free Electricity From Thin Air," 28 Jun.
Measurement Technology Conference, pp. 291-296, 2013. [Online]. Available: http://revolution-
1997. green.com/free-electricity-from-thin-air/. [Accessed 10
[56] S. Singhal, "The role of metering in revenue protection," Jun. 2017].
IEE Metering and Tariffs for Energy Supply Conference, [72] H. von der Gracht, M. Salcher and N. Graf Kerssenbrock,
25-28 May 1999. The Energy Challenge, München: Redline Verlag,
[57] Gas Industries, "“Gas theft: prevention is the only cure," Münchner Verlagsgruppe GmbH, 2016.
Gas Industries, vol. 39, no. 9, pp. 25-26, 1995. [73] C. E. Harris Jr, M. S. Pritchard, M. J. Rabins, R. James
[58] S. Rengarajan and S. Loganathan, "Power theft and E. Englehardt, Engineering ethics: Concepts and
prevention and power quality improvement using fuzzy cases, Cengage Learning, 2013.
logic," International Journal of Electrical and [74] C. E. Harris, M. Davis, M. S. Pritchard and M. J. Rabins,
Electronics Engineering (IJEEE), vol. 1, no. 3, pp. 106- "Engineering ethics: what? why? how? and when?,"
110, 2012. Journal of Engineering Education - Washington, vol. 85,
[59] CSA Secure Team, "CSA Secure white paper," BluTrend pp. 93-96, 1996.
LLC, 2007. [75] T. J. Bihl, W. A. Young II and G. R. Weckman,
[60] D. Grasso and J. J. Helble, "Holistic engineering and "Defining, Understanding, and Addressing Big Data,"
educational reform," 2007 IEEE Meeting the Growing International Journal of Business Analytics (IJBAN), vol.
Demand for Engineers and Their Educators 2010-2020 3, no. 2, pp. 1-32, 2016.
International Summit , vol. 50, pp. 1-16, 2007. [76] R. Chambers, "Poverty and livelihoods: whose reality
[61] J. A. Momoh, "Smart grid design for efficient and counts?," Environment and urbanization, vol. 7, no. 1,
flexible power networks operation and control," Power pp. 173-204, 1995.
Systems Conference and Exposition (PSCE) , pp. 1-8, [77] L. J. Shuman, M. BesterfieldǦSacre and J. McGourty,
2009. "The ABET “professional skills”—Can they be taught?
[62] S. C. Stanton, C. C. McGehee and B. P. Mann, Can they be assessed?," Journal of engineering
"Reversible hysteresis for broadband education, vol. 94, no. 1, pp. 41-55, 2005.
magnetopiezoelastic energy harvesting," Applied Physics [78] C. Abaté, "Should engineering ethics be taught?,"
Letters, vol. 95, no. 17, 2009. Science and Engineering Ethics, vol. 17, no. 3, pp. 583-
[63] R. E. Abbott, "Is the emperor naked? AMR myths, 596, 2011.
function, folklore, fantasy – what is real? And what
isn’t," AMRA international symposium, 27 Sep. 2000.

278

Вам также может понравиться