![]() ![]() Intrusive tampering methods include current bypassing, reversing connections and bypassing leads. ![]() Figure 1įigure 1 shows an example singlephase e-meter and its connections, with a shunt used as the current sensor. ![]() The e-meter accumulates the voltage and current product to actively calculate the energy used. ![]() A smart e-meter measures the active energy and bills customers for it by measuring the current drawn by the customer’s load (using a current sensor) and the mains voltage (using a voltage divider). In this article, we’ll look at how to prevent and detect intrusive tampering methods.įirst, let’s review how a smart e-meter works. Meter tampering has led to greater requirements in new smart e-meters in order to make them more tamper-resistant. There are multiple ways to tamper with an e-meter, including intrusive methods, where individuals modify components inside the meter case and nonintrusive methods, where the tampering occurs outside the meter. One type of nontechnical loss is meter tampering, where individuals hack electricity meters (e-meters) to slow or stop the accumulation of usage statistics. These revenue losses not only affect utility providers but also customers, since a utility provider may try to make up for its losses by increasing prices. You have access to our digital magazine here.Īccording to the Research and Markets report, Electricity Theft and Non-Technical Losses: Global Markets, Solutions and Vendors, total nontechnical losses are an estimated US$96 billion annually, and a significant portion occurs in emerging market countries. This article was originally published in Smart Energy International 5-2018. Each year, utility providers around the world lose billions in revenue from nontechnical losses – losses not related to technical operation of the grid but caused by external factors. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |