Technology to thwart solar panel thieves

Issue 2/3 2023 Asset Management, Security Services & Risk Management, Products & Solutions, IoT & Automation


Kian Campling.

A highly efficient industrial network is coming to the rescue of the solar industry, as solar panels, inverters and batteries are being targeted by thieves and threaten to destabilise the industry.

The use of a decentralised network, based on a long-range low-power technologies, which has proliferated across the country, enables Internet of Things (IoT) devices to be used for remote monitoring of everything from temperature to air quality, and most recently, tracking devices.

Now, Lighter Than Air Network, the largest operator of the platform, with over 100 based-stations throughout the country, is providing tailor-made solutions especially to prevent solar panel theft. According to the company’s General Manager, Kian Campling, the solutions are based on industrial applications, where they are used to monitor and track anything from fresh produce to earthmoving machines, gas bottles, pallets and more.

Battery life

“Probably the biggest advantage our devices have over other GSM-based IoT devices is the low battery consumption, which can last months and years, rather than days as required by traditional GSM devices. This also overcomes the size challenge as manufacturers can install comparatively tiny batteries allowing for discreet trackers that can be hidden among wiring or behind a cover.”

“Some of our devices are not much bigger than a credit card and have the added advantage of relaying information, such as orientation of the equipment, movement and temperature to the user via computer or mobile device. The temperature application may even be valuable to solar operators to gather information about solar panel performance and safety in the event of a fire.”

“It also puts the power of tracking in the hands of the owner, as they can choose to use a security service provider, take their own steps, or use both in the event of an alarm. For example, if a panel changes its orientation or an inverter is moved then clearly there is a problem that needs to be rectified. Depending on the type of alarm it may indicate a possible theft event, fire or even storm damage etc.”

Pinpoint tracking

In the event that the panels are stolen they can be accurately tracked and live locations transmitted for several months in the unlikely event that they are hidden out of network coverage. Some of the devices even combine GSM, triangulation and other technologies to ensure tracked items can be found.

“Considering that most users will not monitor each and every panel or device, the cost of monitoring a solar system will be a tiny fraction of the cost of the system,” explains Campling.

Low cost

Lighter Than Air Network has its own proprietary monitoring software that enables larger users to monitor multiple sensors, including stand-alone security sensors, energy meters, smoke detectors, temperature, air quality and even weather sensors.

Its proprietary NviroSense software provides users with a powerful monitoring and control suite to manage IoT networks. It is also well suited to incorporate into modern day control rooms and operations offices.

For more information, contact Lighter Than Air Network, +27 10 157 5051, [email protected], www.ltan.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
Avoiding the trap of deepfake scams
AI & Data Analytics IoT & Automation
As cybersecurity technology evolves to block traditional attacks, cybercriminals are increasingly turning to social engineering—manipulative psychological tactics that exploit human trust and emotion—to achieve their goals.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...