Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Abdulhamid Musa
DOI Link: https://doi.org/10.22214/ijraset.2023.50476
Certificate: View Certificate
This study is about implementing a power line vandalism monitoring system over the Internet of Things. The device is a tamper-resistant electronic security device for high-voltage transmission lines, specifically designed for remote monitoring and protection of the lines against vandals. This system detects when the transmission line is vandalized and when the vandals invade the environment where the transmission line tower, transformer, or any infrastructure is installed. The development involves different sections ranging from the power supply to the alarm unit. The power supply was designed by selecting the components based on the required specification for the transformer, diodes, capacitor, and voltage regulator. Based on its unique characteristics, the microcontroller unit was developed using the ATMEGA 328P IC. The communication and the sensor unit were designed considering their different specifications. An ultrasonic sensor and SIM900 for the Global System For Mobile Communications module were chosen. The study was implemented so that the motion sensor detects when vandals litter the restricted area of the power line or substation and communicates with the microcontroller, which triggers the alarm and the Global System for Mobile Communications module to send Short Message/Messaging Service.
I. INTRODUCTION
Powerline vandalism is a serious threat to the security and reliability of power grids. Criminals often target power lines, transformers, and other components of the grid, causing power outages and significant economic losses. Traditional methods of powerline monitoring and security have proven to be inadequate, and there is a growing need for more advanced and efficient systems. In recent years, the Internet of Things (IoT) has emerged as a promising solution for powerline vandalism monitoring.
The power grid is the backbone of modern society, providing electricity to homes, businesses, hospitals, and schools. However, this critical infrastructure is vulnerable to various threats, including natural disasters, equipment failures, and cyber-attacks. One of the lesser-known threats to the power grid is vandalism, the intentional destruction, or damage of power equipment, such as transformers, switches, and power lines. Vandalism can be motivated by a variety of reasons, from theft of copper wire to acts of terrorism. Regardless of the motive, the impact of powerline vandalism can be severe, causing power outages, property damage, and even loss of life. Moreover, repairing and replacing vandalized equipment can be time-consuming and costly, disrupting the lives of thousands of people who rely on electricity. It is important for communities to take action to prevent powerline vandalism, such as increasing security measures and reporting suspicious activity. Education and awareness campaigns can also help to discourage individuals from engaging in this destructive behavior. By working together to prevent powerline vandalism, we can ensure the safety and well-being of our communities and minimize the negative impact on our daily lives.
For powerline vandalism prevention, IoT technology can be used to create a monitoring system that can detect and respond to any potential threats. This system can integrate sensors, and other devices to monitor the electrical infrastructure and detect any unusual activity. The IoT technology can also provide remote access to the monitoring system, allowing operators to respond quickly to any incidents.
II. LITERATURE REVIEW
Reference [1] shows Internet of Things (IoT) research is of great interest and a very active research community. IoT is the connection of machines that share data and report necessary information. Many apps, sensors, remote devices, avatars, and robots have made everyday life easier. Most things are at our fingertips, like communication and transportation. Besides, the importance of eliminating power theft cannot be overstated, especially given our power generation and transmission deficit and the need to attract significant capital investment to improve the industry's availability, access, and service delivery. Electricity theft poses significant risks for everyone involved. It can damage devices and cause power outages, costing everyone who pays for their electricity. However, the paper in [2] discusses the impact, consequences, and measures to control electricity theft to improve power quality.
According to [3], IoT-based power monitoring systems and controls involve designing wireless networks to monitor electronic device power consumption. A sensor detects current, a circuit calculates voltage, and power is calculated using both. Control qualities are stored in a cloud database, and commands can be received through an Android app. The Raspberry Pi board transmits commands to change the device status. This system allows energy readings and gadget control from anywhere in the world.
The electrical power system is becoming more complex, with systems like generation, transmission, distribution, and load becoming more intricate. To maintain and protect this system, faults on power lines must be located and repaired. Sensors can continuously measure voltage and amperage on transmission lines, detecting brownouts or overloads and tripping the wire if necessary. The Internet of Things can also identify thefts and report their location automatically. Programming Arduino UNO and Arduino MEGA can detect transmission line faults by detecting changes in current and voltage and sending information to the LCD. The system can be protected through quick monitoring using the impedance technique defect detection system [4]. The paper in [5] discusses a new monitoring system for high-voltage power lines that aims to monitor atmospheric conditions and sag status continuously. It uses sensors to collect data and transmit it to a central controller, which then sends it to a control for display. The system uses the Internet of Things (IoT) and Global Positioning System (GPS) technologies to provide locations and improve the quality of service. The experiment results were reliable and correct, showing that using an IoT monitoring system for transmission lines improves maintenance planning and saves lives. This paper aims to develop a power line vandalism monitoring system that utilizes an electronic system to detect and report any vandalism on the power line. The primary goal is ensuring the safety and security of power system equipment, enabling the distribution company to transmit high-quality and reliable mass flow practically and efficiently.
III. DEVELOPMENT OF THE MONITORING SYSTEM USING IoT.
The development of a powerline vandalism monitoring system via the Internet of Things (IoT) relies on several factors. The first step is to identify the specific requirements of the monitoring system, such as the range, accuracy, and frequency of data collection. Next, the hardware and software components of the system need to be selected and configured.
Thus, this study aims to evaluate the effectiveness and feasibility of this system in real-world scenarios, with the ultimate goal of improving the reliability and resilience of the power grid. Figure 1 depicts a block diagram of an IoT-based power line vandalism monitoring system, which is the focus of this research.
6. Microcontroller Unit - The microcontroller unit is the heart of the design for this study. It is the control unit where all activities of the system are coordinated. It interacts with both the exit and the entrance. The input comes from the user in the form of a command sent through the passive infrared motion sensor to the microcontroller for processing; The output signal comes from the microcontroller to the alarm unit (buzzer), which can attract the attention of people around. A coded message from the GSM phone unit is sent to the microcontroller, where the message is decoded. The performance and overall behavior of the system depend on the program stored in the program memory.
The ATMEGA328p microcontroller serves as the control component in the block diagram. Microchip Technology manufactures the ATMEGA328p, a microcontroller in the ATMEGA series. It is a nano-watt technology 8-bit CMOS microcontroller. The controller features 16 kB of flash memory, which is enough for most applications. The system can connect multiple peripherals thanks to 24 programmable input and output pins rated for 20mA of current (direct LED drive capabilities). The controller, which has an automated watchdog timer reset on failure, can be utilized to design applications for permanent installation.
IV. METHODOLOGY
This section covers the design and the selection of components used for this study. Thus, designing and developing a power line monitoring system to combat vandalism is a cutting-edge technology that can significantly reduce the financial losses incurred by this illegal activity. Power line vandalism costs millions of dollars annually, making this design a cost-effective solution that provides round-the-clock security. The system is affordable to design, install, and maintain and can be easily installed on transformers, transmission lines or any infrastructures, where it remains undetectable to vandals. In the future, suppliers should consider designing transformers to accommodate this monitoring system. By implementing this innovative technology, we can protect our power lines and save valuable resources.
5. Selection Of Bridge Rectifier - The rectification circuit used in the design is a full wave bridge rectifier that comprises four diodes. The four-diode full wave bridge rectification is used for its added advantage over a two-diode center-tapped full wave rectifier and diode half wave rectification.
The choice of diode used was based on the following.
a. Forward Current: The diode forward current is the maximum current it can conduct before it fails. The diode is chosen so that the current flowing through it is less than the forward current.
b. Sufficient Peak Inverse Voltage: The greatest reverse voltage that a diode can endure without damaging the junction is known as the peak reverse voltage (PIV). When employing the diode as a rectifier, PIV is crucial because when the reverse voltage across the diode is more than this amount, the reverse current spikes rapidly and fractures the junction owing to excessive heat. While using rectifiers, ensuring that the reverse voltage across the diode does not go above its PIV during the AC voltage's negative half cycle is essential.
Hence, 2500 uF is chosen as a standard capacitor value.
7. Selection Of Voltage Regulator - The regulator used is the IC voltage regulator LM7812. A positive fixed 12 Volts regulator gave the circuit the requisite positive voltage level. The rating of the LM7812 voltage regulator from the data sheet is as follows. The input voltage range is between 12 and 35 Volts, a maximum current rating of 1 Ampere, an output voltage range of 12 Volts, and an operating temperature between - 40 to 125 degrees centigrade. The current consumptions in milliamperes by the microcontroller (Imic), GSM module (Igsm), motion sensor (Ims), and Buzzer (Ibz) were given as 200, 500, 150, and 63, respectively.
8. Selection of a Microcontroller - The requirements for selecting the microcontroller include the following.
a. The microcontroller must have enough general-purpose input and output to interface all the system units.
b. A Universal Asynchronous Receiver-Transmitter(UART) module to interface the Universal Serial Bus (USB) to the Transistor-Transistor Logic (TLL) module.
c. Analog To Digital Converter (ADC) module to interface the voltage monitor module.
d. The microcontroller should be easy to use in terms of hardware interface and software (programming).
However, the ATMEGA328p is an 8-Bit CMOS microcontroller with nano-watt Technology, and it was selected due to the following.
9. Flow Chart: The software components of the monitoring system consist of data analysis algorithms, machine learning models, and a user interface. The data analysis algorithms analyze the data collected from the devices, while machine learning models help identify any potential threats. The user interface provides operators with easy-to-use tools to monitor the electrical infrastructure and respond to incidents. Figure 2 illustrates a flow chart of a cutting-edge Internet of Things (IoT) powered system designed to monitor power line vandalism. This innovative technology utilizes advanced sensors and data analytics to detect and prevent malicious activity on power lines. With this system, power companies can ensure their infrastructure's safety and reliability while minimizing downtime and repair costs. This cutting-edge solution is a testament to the power of IoT and its ability to revolutionize how we monitor and manage critical infrastructure.
10. Detection Unit: This unit access information without specific synchronization with the sender. The purpose of this detection unit is to check the presence of an intruder within the map-out range; the ultrasonic sensor is used. Hence, the unit's operating Voltage is between 5 to 12 Volts, the current consumption of 65 milliamperes, and the output Voltage ranges between 0 and 3.3 Volts.
11. Buzzer Selection: This help to inform the nearby people and workers when there is an intruder within the map-out range. An electromagnetic buzzer is used for the following reasons. The electromagnetic buzzer is simple, compatible, and small; sound pressure is high and less expensive. The buzzer selected for the implementation of this study has a frequency range is 3300 Hz, an operating voltage of 3 to 24 Volts, and a sound pressure level of 10 cm with 65 milliampere supply current.
12. Communication Interface Unit: This unit enables the controller to transmit signals via Short Message Service (SMS) to the operators. The requirements of a communication interface unit include the following. It should be able to transmit data within a reasonable range, and easy operation, and SIM900 GSM and GPRS shield MOD900 is a wireless modem because its application supports writing and sends messages to all phone numbers depending on the number keyed-in in the program.
Thus, the communication interface unit specification is given as follows.
a. Quad-Band of 850/900/1800/1900 Mega Hertz.
b. GPRS multi-slot class 10/8.
c. Class-4 (2 W 850/ 900 MHz).
d. Single Antenna Interference Cancellation (SAIC) support.
e. Dimensions: 24 by 24 by 3 mm3.
f. Control via AT commands for Global System for Mobile Communications.
V. IMPLEMENTATION OF THE STUDY
In this study, a system that is used for implementing a powerline vandalism monitoring system via the Internet of Things is implemented. When the circuit is activated, the power supply unit provides the power requirement for the entire system.
An AC source powers the circuit, but the electronic components require DC power. Therefore, the AC power is rectified and filtered to provide a 12 V and 5 V DC supply to the electronic components and microcontroller.
It takes roughly 70 milliseconds for the ultrasonic sensor to go from zero to one when motion is sensed within its hardware and software setups to zero instantly. The transmitted signal changes state to one, and the system starts loading setup files as the microcontroller receives a signal state.
When no motion is detected, the ultrasonic sensor is inactive, and its output pin has no output. Only the microcontroller receives a signal that drops from one to zero, indicating that the microcontroller has been powered on. The microcontroller continuously checks the state of the ultrasonic sensor. If it senses a high, it immediately sends messages to the SIM900 after completing the setup files' loading from its memory, which takes about 70 milliseconds. If it senses a low, the loop continues. However, if it senses a high, the device repeats sending a message.
When the ultrasonic sensor outputs a high signal, the microcontroller commences software serial communication with the SIM900 module through "AT commands." Depending on the sensor, these commands are transferred from the microcontroller's Tx pin to the Rx pin of the SIM900 module, which transmits a pre-written text message to pre-assigned phone numbers with the words "Vandal Alert" on line one.
This study is developed on hardware and software configurations. To achieve the desired result, various parts of the hardware are connected, such as the power section, the alarm section, and the detection section, and then connected with the software section, which includes the software program that runs the whole process.
As IoT technologies continue to advance, the future of power grid security looks promising. It is crucial to continue research and development in this area to ensure the safety and reliability of power grids. In conclusion, implementing an IoT-based powerline vandalism monitoring system significantly advances the security and resilience of power grids. By leveraging the power of sensors, data analytics, and real-time alert systems, we can detect and prevent powerline vandalism more effectively than ever before. With the continuing advancements in IoT technologies, we can expect to see even more innovative solutions for power grid security in the future.
[1] Parashar, A.K. and R.R. Parashar, IOT in Education. JETIR (ISSN - 2349-5162), December 2018. 5(12). [2] Olaoluwa, O.G., Electricity Theft and Power Quality in Nigeria. International Journal of Engineering Research & Technology (IJERT), June 2017. 6(6). [3] Raju, D.P.V.R., et al., IOT Based Power Monitoring System and Control. JETIR (ISSN-2349-5162), November 2017. 4(11). [4] Powalkar, S., et al., Transmission Line Monitoring System Using IoT. International Research Journal of Modernization in Engineering Technology and Science, June 2022. 04(06). [5] Suliman, A.S., et al., Monitoring System for Overhead Power Transmission Lines in Smart Grid System Using Internet of Things. UofKEJ, February 2022. 12(1): p. 1 - 5.
Copyright © 2023 Abdulhamid Musa. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET50476
Publish Date : 2023-04-15
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here