Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

The Detection of Illicit Cryptocurrency Mining Farms in Electrical Distribution Systems with Innovative Approaches

Version 1 : Received: 11 April 2021 / Approved: 12 April 2021 / Online: 12 April 2021 (13:12:25 CEST)

How to cite: Gül, Ö. The Detection of Illicit Cryptocurrency Mining Farms in Electrical Distribution Systems with Innovative Approaches. Preprints 2021, 2021040308 (doi: 10.20944/preprints202104.0308.v1). Gül, Ö. The Detection of Illicit Cryptocurrency Mining Farms in Electrical Distribution Systems with Innovative Approaches. Preprints 2021, 2021040308 (doi: 10.20944/preprints202104.0308.v1).

Abstract

Since the most important constituent of the cost of cryptocurrency production is energy bills, use of illegal electricity in cryptocurrency mining farms is very common. For this reason, many countries prohibit cryptocurrency production or restrict it with some legal regulations. This situation raises the problem of how to detect illicit cryptocurrency mining. Therefore, innovative approaches are needed to detect illicit cryptocurrency mining farms. In this study, it has been shown that unique noise and/or harmonic characteristics of machines producing cryptocurrency can be used to detect illicit cryptocurrency mining farms. The unique harmonic characteristics formed by data centers on neutral line have been detected by field measurements performed. Electricity distribution companies can make risk assessments with this approach by monitoring energy quality data. As a result, the necessary legal permissions can be obtained to investigate suspicious high-risk consumers. Illicit cryptocurrency mining farms can be detected by investigating at high-risk consumer facilities.

Subject Areas

Cryptocurrency; Electricity theft; Energy consumption; CO2 emission; power signatures.

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.