A Solar-Powered Multimodal IoT Framework for Real-Time Transformer Theft Detection

Authors

  • Promise Ojokoh Federal University of Technology
  • Olaide Agbolade Federal University of Technology

DOI:

https://doi.org/10.62411/jcta.14901

Keywords:

Edge computing, Energy autonomy, Internet of Things (IoT), Multimodal detection, Power transformer, Raspberry Pi, Solar-powered system, Theft detection

Abstract

Power transformer theft, a pervasive issue disrupting critical infrastructure, necessitates the development of cost-effective and energy-autonomous security solutions. This paper presents the design and implementation of a detection-focused anti-theft framework that integrates a Raspberry Pi Zero W, camera module, and passive infrared (PIR) motion sensors powered by a solar system for continuous monitoring. The system is designed for remote, off-grid deployment, utilizing a headless Raspberry Pi powered by a 5V solar panel and power bank to ensure energy autonomy. Upon motion detection, captured images are processed on the edge device using OpenCV’s Haar Cascade classifier, optimized for upper-body detection to minimize false positives and verify human presence. Captured images are processed locally on the edge device using OpenCV’s Haar Cascade classifier to confirm human presence before an alert is sent to the mobile application, emphasizing real-time operation and low latency. Once an intrusion is confirmed, the images are saved locally and uploaded via the Secure File Transfer Protocol to a custom-developed Android application. The app provides a dedicated remote monitoring interface, enabling secure file transfer and system access, while providing users with immediate notifications and image management capabilities. The system emphasizes low power consumption, real-time operation, and low deployment cost. Tests over 200 triggered events under varied environmental conditions achieved 90% detection accuracy with an average latency of 4.5 s. Solar autonomy was maintained for approximately 24 h under normal operation. It is concluded that the integration of solar power, edge computing of images, and mobile monitoring provides a feasible, scalable, and financially viable framework for securing transformers, especially in resource-constrained environments.

Author Biographies

Promise Ojokoh, Federal University of Technology

Department of Electrical and Electronics Engineering, Federal University of Technology, Akure 340252, Ondo State, Nigeria

Olaide Agbolade, Federal University of Technology

Department of Electrical and Electronics Engineering, Federal University of Technology, Akure 340252, Ondo State, Nigeria

References

J. C. Olivares-Galván, F. de León, P. S. Georgilakis, and R. Escarela-Pérez, “Selection of copper against aluminium windings for distribution transformers,” IET Electr. Power Appl., vol. 4, no. 6, pp. 474–485, Jul. 2010, doi: 10.1049/iet-epa.2009.0297.

M. O. Obafemi, E. A. Oluwole, T. E. Omoniyi, P. . Meduna, and A. S. Alaye, “Prevalence of electricity theft among households in Lagos State, Nigeria,” Niger. J. Technol., vol. 40, no. 5, pp. 872–881, May 2022, doi: 10.4314/njt.v40i5.13.

I. Mugari and E. E. Obioha, “Socio-economic development impacts, attendant challenges and mitigation measures of infrastructure vandalism in Southern Africa,” Dev. South. Afr., vol. 41, no. 3, pp. 570–587, May 2024, doi: 10.1080/0376835X.2024.2352057.

Y. K. J. Hermann, G. Yirga, N. R. Gaetan, and K. B. Tanguy, “Design of A Security System with Mobile Notifications in Case of Intrusion,” J. Inf. Syst. Informatics, vol. 5, no. 2, pp. 800–818, Jun. 2023, doi: 10.51519/journalisi.v5i2.493.

R. Barnard, Intrusion and Detection Systems, 2nd ed. Gulf Professional Publishing, 1988. [Online]. Available: https://www.ojp.gov/ncjrs/virtual-library/abstracts/intrusion-and-detection-systems-second-edition

J. Yun and S.-S. Lee, “Human Movement Detection and Identification Using Pyroelectric Infrared Sensors,” Sensors, vol. 14, no. 5, pp. 8057–8081, May 2014, doi: 10.3390/s140508057.

P. Matczak, A. Wójtowicz, A. Dąbrowski, and K. Mączka, “Cost-Effectiveness of CCTV Surveillance Systems: Evidence from a Polish City,” Eur. J. Crim. Policy Res., vol. 29, no. 4, pp. 555–577, Dec. 2023, doi: 10.1007/s10610-022-09527-5.

A. Tseloni, R. Thompson, L. Grove, N. Tilley, and G. Farrell, “The effectiveness of burglary security devices,” Secur. J., vol. 30, no. 2, pp. 646–664, May 2017, doi: 10.1057/sj.2014.30.

L. J. Fennelly, “Protective barriers and deterrents,” in Handbook of Loss Prevention and Crime Prevention, Elsevier, 2020, pp. 469–474. doi: 10.1016/B978-0-12-817273-5.00041-7.

M. A. Al Rakib, M. M. Rahman, M. S. Rana, M. S. Islam, and F. I. Abbas, “GSM Based Home Safety and Security System,” Eur. J. Eng. Technol. Res., vol. 6, no. 6, pp. 69–73, Sep. 2021, doi: 10.24018/ejeng.2021.6.6.2580.

S. G. Hong, N. S. Kim, and W. W. Kim, “Reduction of False Alarm Signals for PIR Sensor in Realistic Outdoor Surveillance,” ETRI J., vol. 35, no. 1, pp. 80–88, Feb. 2013, doi: 10.4218/etrij.13.0112.0219.

I. G. M. N. Desnanjaya and I. N. A. Arsana, “Home security monitoring system with IoT-based Raspberry Pi,” Indones. J. Electr. Eng. Comput. Sci., vol. 22, no. 3, p. 1295, Jun. 2021, doi: 10.11591/ijeecs.v22.i3.pp1295-1302.

S. Snigdha and K. Haribabu, “IoT based Security System using Raspberry PI and Mail Server,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 11, pp. 1702–1704, Sep. 2019, doi: 10.35940/ijitee.K1517.0981119.

D. Rupanetti and N. Kaabouch, “Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities,” Appl. Sci., vol. 14, no. 16, p. 7104, Aug. 2024, doi: 10.3390/app14167104.

N. M. Lobanchykova, I. A. Pilkevych, and O. Korchenko, “Analysis and protection of IoT systems: Edge computing and decentralized decision-making,” J. Edge Comput., vol. 1, no. 1, pp. 55–67, Nov. 2022, doi: 10.55056/jec.573.

W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge Computing: Vision and Challenges,” IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, Oct. 2016, doi: 10.1109/JIOT.2016.2579198.

P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” in Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, vol. 1, pp. I-511-I–518. doi: 10.1109/CVPR.2001.990517.

N. Dalal and B. Triggs, “Histograms of Oriented Gradients for Human Detection,” in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), 2005, vol. 1, pp. 886–893. doi: 10.1109/CVPR.2005.177.

H.-T. Duong, V.-T. Le, and V. T. Hoang, “Deep Learning-Based Anomaly Detection in Video Surveillance: A Survey,” Sensors, vol. 23, no. 11, p. 5024, May 2023, doi: 10.3390/s23115024.

A. Çetin and S. Öztürk, “Comprehensive Exploration of Ensemble Machine Learning Techniques for IoT Cybersecurity Across Multi-Class and Binary Classification Tasks,” J. Futur. Artif. Intell. Technol., vol. 1, no. 4, pp. 371–384, Feb. 2025, doi: 10.62411/faith.3048-3719-51.

J. P. Ntayagabiri, Y. Bentaleb, J. Ndikumagenge, and H. El Makhtoum, “A Comparative Analysis of Supervised Machine Learning Algorithms for IoT Attack Detection and Classification,” J. Comput. Theor. Appl., vol. 2, no. 3, pp. 395–409, Feb. 2025, doi: 10.62411/jcta.11901.

M. Hosseinzadeh, A. M. Rahmani, B. Vo, M. Bidaki, M. Masdari, and M. Zangakani, “Improving security using SVM-based anomaly detection: issues and challenges,” Soft Comput., vol. 25, no. 4, pp. 3195–3223, Feb. 2021, doi: 10.1007/s00500-020-05373-x.

D. M. Bagnall and M. Boreland, “Photovoltaic technologies,” Energy Policy, vol. 36, no. 12, pp. 4390–4396, Dec. 2008, doi: 10.1016/j.enpol.2008.09.070.

V. K. Pandey, D. Sahu, S. Prakash, R. S. Rathore, P. Dixit, and I. Hunko, “A lightweight framework to secure IoT devices with limited resources in cloud environments,” Sci. Rep., vol. 15, no. 1, p. 26009, Jul. 2025, doi: 10.1038/s41598-025-09885-0.

M. Javeed, N. Al Mudawi, B. I. Alabduallah, A. Jalal, and W. Kim, “A Multimodal IoT-Based Locomotion Classification System Using Features Engineering and Recursive Neural Network,” Sensors, vol. 23, no. 10, p. 4716, May 2023, doi: 10.3390/s23104716.

A. C. Muhoza, E. Bergeret, C. Brdys, and F. Gary, “Power consumption reduction for IoT devices thanks to Edge-AI: Application to human activity recognition,” Internet of Things, vol. 24, p. 100930, Dec. 2023, doi: 10.1016/j.iot.2023.100930.

E. U. Omede, A. E. Edje, M. I. Akazue, H. Utomwen, and A. A. Ojugo, “IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System,” J. Comput. Theor. Appl., vol. 1, no. 3, pp. 273–283, Feb. 2024, doi: 10.62411/jcta.9541.

Downloads

Published

2025-11-27

How to Cite

Ojokoh, P., & Agbolade, O. (2025). A Solar-Powered Multimodal IoT Framework for Real-Time Transformer Theft Detection. Journal of Computing Theories and Applications, 3(2), 246–259. https://doi.org/10.62411/jcta.14901