Skip to main content
Log in

Intentional contamination of water distribution networks: developing indicators for sensitivity and vulnerability assessments

  • Original Paper
  • Published:
Stochastic Environmental Research and Risk Assessment Aims and scope Submit manuscript

Abstract

Performing a comprehensive risk analysis is primordial to ensure a reliable and sustainable water supply. Though the general framework of risk analysis is well established, specific adaptation seems needed for systems such as water distribution networks (WDN). Understanding of vulnerabilities of WDN against deliberate contamination and consumers’ sensitivity against contaminated water use is very vital to inform decision-maker. This paper presents an innovative step-by-step methodology for developing comprehensive indicators to perform sensitivity, vulnerability and criticality analyses in case of absence of early warning system (EWS). The assessment and the aggregation of these indicators with specific fuzzy operators allow identifying the most critical points in a WDN. Intentional intrusion of contaminants at these points can potentially harm both the consumers as well as water infrastructure. The implementation of the developed methodology has been demonstrated through a case study of a French WDN unequipped with sensors.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Notes

  1. Risk = Consequences × Threat × Vulnerability.

  2. We will talk further about OWA weights in order to avoid confusion with the weights assigned to the sensitivity criteria by the decision makers.

  3. «Système Informatisé du Répertoire National des Entreprises et des Établissements» Governmental database of all French public and private organisations.

References

  • Ailamaki A, Faloutos C, Fischbeck PS, Small MJ, VanBriesen J (2003) An environmental sensor network to determine drinking water quality and security. ACM SIGMOD Rec 32(4):47–52

    Article  Google Scholar 

  • American Society for Mechanical Engineering (ASME) (2006) RAMCAP: the framework (version 2.0). ASME Innovative Technologies Institute, LLC

  • Augeraud P, Touaty M (2002) Consommation d’eau par les secteurs industriels. Planistat France. Rapport final

  • Bernard R, Bouyssou D (1993) Aide multicritère à la décision: Méthodes et cas, Paris, Economica, ISBN 2-7178-2473-1

  • Cingolani P, Alcala-Fdez J (2012) jFuzzyLogic: a robust and flexible fuzzy-logic inference system language implementation. In: FUZZ-IEEE, pp 1–8. Citeseer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.415.3325&rep=rep1&type=pdf. Accessed 31 Aug 2015

  • Clark R, Chandrasekaran L, Buchberger S (2008) Modeling the propagation of waterborne disease in water distribution systems: results from a case study. 8th water distribution systems analysis symposium 2006, Cincinnati, USA, pp 1–20. doi:10.1061/40941(247)71

  • Copeland C (2010) Terrorism and security issues facing the water infrastructure sector. In: Report for congress, congressional research service, order code RS21026, Washington, DC, USA. https://www.fas.org/sgp/crs/terror/RL32189.pdf. Accessed May 10 2016

  • Di Nardo A, Di Natale M, Guida M, Musmarra D (2013) Water network protection from intentional contamination by sectorization. Water Resour Manag 27(6):1837–1850

    Article  Google Scholar 

  • Di Nardo A, Di Natale M, Musmarra D, Santonastaso GF, Tzatchkov V, Alcocer-Yamanaka V-H (2014) A district sectorization for water network protection from intentional contamination. 12th international conference on computing and control for the water industry, CCWI2013. Procedia Engineering, vol 70, pp 515–524. doi:10.1016/j.proeng.2014.02.057

  • Ezell BC, Farr J, Wiese I (2000) Infrastructure risk analysis of municipal water distribution system. J Infrastruct Syst 6(3):118–122

    Article  Google Scholar 

  • Figueira J, Roy B (2002) Determining the weights of criteria in the ELECTRE type methods with a revised Simos procedure. Eur J Oper Res 139(2):317–326

    Article  Google Scholar 

  • Francisque A, Rodriguez MJ, Sadiq R, Miranda LF, Proulx F (2009) Prioritizing monitoring locations in a water distribution network: a fuzzy risk approach. J Water Suppl Res Technol AQUA 58(7):488–509

    Article  Google Scholar 

  • Hall J, Zaffiro AD, Marx RB, Kefauver PC, Krishnan ER, Herrmann JG (2007) Online water quality parameters as indicators of distribution system contamination. J Am Water Works Assoc 99(1):66–77

    CAS  Google Scholar 

  • Hart WE, Murray R (2010) Review of sensor placement strategies for contamination warning systems in drinking water distribution systems. J Water Resour Plan Manag 136(6):611–619

    Article  Google Scholar 

  • Islam N, Farahat A, Al-Zahrani MAM, Rodriguez MJ, Sadiq R (2015) Contaminant intrusion in water distribution networks: review and proposal of an integrated model for decision making. Environ Rev 23(3):337–352

    Article  Google Scholar 

  • Murray RE, Grayman WM, Savic DA, Farmani R (2010) Effects of DMA redesign on water distribution system performance. Integrating water systems—Boxall & Maksimovíc (eds)© 2010Taylor & Francis Group, London, ISBN 978-0-415-54851-9

  • Nilsson KA, Buchberger SG, Clark RM (2005) Simulating exposures to deliberate intrusions into water distribution systems. J Water Resour Plan Manag 131(3):228–236

    Article  Google Scholar 

  • Panigrahi DP, Mujumdar PP (2000) Reservoir operation modeling with fuzzy logic. Water Res Manag 14:89–109

    Article  Google Scholar 

  • Porteau (2016) Porteau 4.0, Logiciel de modélisation hydraulique. http://porteau.irstea.fr/. Accessed May 10, 2016

  • Rasekh A, Brumbelow K (2013) Probabilistic analysis and optimization to characterize critical water distribution system contamination scenarios. J Water Res Plan Manag 139(2):191–199

    Article  Google Scholar 

  • Sadiq R, Kleiner Y, Rajani B (2007) Water quality failures in distribution networks—risk analysis using fuzzy logic and evidential reasoning. Risk Anal 27(5):1381–1394

    Article  Google Scholar 

  • Simos J (1990) L’évaluation Environnementale: Un Processus Cognitif Négocié. Thèse de doctorat. DGF-Lausanne, Suisse

  • SMaRT-onlineWDN (2015) http://www.smart-onlinewdn.eu/. Last visit on 5 Oct 2015

  • Tchórzewska-Cieślak B (2011) Fuzzy failure risk analysis in drinking water technical system. Reliab Theory Appl 1(20):138–148

    Google Scholar 

  • Tesfamariam S, Sadiq R (2006) Risk-based environmental decision-making using fuzzy analytic hierarchy process (F-AHP). Stoch Environ Res Risk Assess 21(1):35–50

    Article  Google Scholar 

  • Torres JM, Brumbelow K, Guikema SD (2009) Risk classification and uncertainty propagation for virtual water distribution systems. Reliab Eng Syst Saf 94(8):1259–1273

    Article  Google Scholar 

  • Ung H (2016) Quasi real-time model for security of water distribution network. Modeling and simulation. Université de Bordeaux, PhD Thesis. https://tel.archives-ouvertes.fr/tel-01310849/. Accessed Mar 2017

  • Ung H, Piller O, Gilbert D, Mortazavi I (2013) Inverse transport method for determination of potential contamination sources with a stochastic framework. In: World environmental and water resources congress, ASCE, pp 798–812. http://ascelibrary.org/doi/abs/10.1061/9780784412947.077. Accessed 28 Aug 2015

  • US EPA (2003) Response protocol toolbox: planning for and responding to drinking water contamination threats and incidents. http://www.epa.gov/safewater/watersecurity/pubs/guide_response_overview.pdf. Accessed 28 Aug 2015

  • Xu Z (2005) An overview of methods for determining OWA weights. Int J Intell Syst 20(8):843–865

    Article  Google Scholar 

  • Yager RR (1998) New modes of OWA information fusion. Int J Intell Syst 13(7):661–681

    Article  Google Scholar 

Download references

Acknowledgements

The work presented in the paper is part of the French-German collaborative research project SMart-OnlineWDN that is funded by the French National Research Agency (ANR Project: ANR-11-SECU-006) and the German Federal Ministry of Education and Research (BMBF; Project: 13N12180).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir Nafi.

Appendix

Appendix

The first inference engine concerns the assessment of structural vulnerability index as illustrated in the Fig. 12.

Table 10 illustrates the rule base for inference 1 in order to estimate the structural vulnerability. IF Level of protection is “P” AND Ease of installation of the injection device is “I” THEN Structural vulnerability is “SV”.

Table 10 Rule base for structural vulnerability index assessment

The second inference engine aims at assessing the vulnerability of intrusion point linked to its environment as illustrated by Fig. 13.

Fig. 12
figure 12

Knowledge-base for the retained criteria: case of structural vulnerability index

Table 11 illustrates the rule base for inference 2 to estimate the intrinsic vulnerability linked to the environment. IF Level of surveillance is “S” AND Ease of physical access is “A” THEN Vulnerability linked with the environment is “VE”.

Table 11 Rule base for vulnerability linked to the environment of intrusion point
Table 12 Rule-base for the assessment of intrinsic vulnerability

The last inference engine concerns the assessment of intrinsic vulnerability index based on the aggregation of previous indexes. The knowledge-base of inference 3 is illustrated by the Fig. 14.

Fig. 13
figure 13

Knowledge-base for the retained criteria: case of vulnerability linked to the environment

The Table 6 illustrates the rule base for inference 3 to estimate the intrinsic vulnerability linked to the environment. IF Vulnerability linked with the environment of the intrusion site (VE) is “SE” AND Structural Vulnerability is SV” THEN Intrinsic Vulnerability is “IV” (Fig. 14).

Fig. 14
figure 14

Knowledge-base for the retained indexes: case of intrinsic vulnerability index

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nafi, A., Crastes, E., Sadiq, R. et al. Intentional contamination of water distribution networks: developing indicators for sensitivity and vulnerability assessments. Stoch Environ Res Risk Assess 32, 527–544 (2018). https://doi.org/10.1007/s00477-017-1415-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00477-017-1415-y

Keywords

Navigation