This segment of the event logs is capturing all possible meter manipulations and abnormal environmental conditions. Detecting tamper is one of my favourite subjects.
Like for the other log books we have for tamper events also an DLMS OBIS code definition.
|Tamper event log||OBIS|
|Tamper event log, event object||188.8.131.52|
|Tamper event log||184.108.40.206|
You as utility staff know what a meter is capturing. My strong recommendation for the end users is: “Don’t try to manipulate the meter.”
Sometimes we receive comments like “Why is my meter in tamper mode?”
Actually the utility can tell you exactly, why. They simply look into the tamper log book and see what happened and when.
A small selection of possible tamper conditions
- Terminal cover removed
- Meter cover removed
- Communication module removed
- External meter box opened
- Strong magnetic DC field
- Current without voltage
- Voltage missing
- Unbalanced current in neutral
- Negative phase current
- Reverse energy
- Low power-factor
- Neutral disturbance
- Failed authentication on optical port for several times
- Decryption failure
- Replay attack
We can detect more, but we are not giving tampering guidelines. We assure that your utility revenue is protected and your losses are minimized. Take a look at our AMI meters and contact us for a more detailed discussion if you are interested in this topic. For certain reasons we will only reply on email addresses with utility domains.
We can not avoid tampering of energy meters. But we can detect it. Usually the utilities have set up a penalty catalogue to recover the cost.
We are continuously working on extended detection methods with and without external communication.
Detection of possible tamper for electromechanical meters need some more skills and experience. The meter installation on the photo looks at least suspicious. For such cases we have a nice tool. Take a look at our portable device for on-site test RS350.
Thank you for reading.