Abstract
Performing a comprehensive risk analysis is primordial to ensure a reliable and sustainable water supply. Though the general framework of risk analysis is well established, specific adaptation seems needed for systems such as water distribution networks (WDN). Understanding of vulnerabilities of WDN against deliberate contamination and consumers’ sensitivity against contaminated water use is very vital to inform decision-maker. This paper presents an innovative step-by-step methodology for developing comprehensive indicators to perform sensitivity, vulnerability and criticality analyses in case of absence of early warning system (EWS). The assessment and the aggregation of these indicators with specific fuzzy operators allow identifying the most critical points in a WDN. Intentional intrusion of contaminants at these points can potentially harm both the consumers as well as water infrastructure. The implementation of the developed methodology has been demonstrated through a case study of a French WDN unequipped with sensors.
Similar content being viewed by others
Notes
Risk = Consequences × Threat × Vulnerability.
We will talk further about OWA weights in order to avoid confusion with the weights assigned to the sensitivity criteria by the decision makers.
«Système Informatisé du Répertoire National des Entreprises et des Établissements» Governmental database of all French public and private organisations.
References
Ailamaki A, Faloutos C, Fischbeck PS, Small MJ, VanBriesen J (2003) An environmental sensor network to determine drinking water quality and security. ACM SIGMOD Rec 32(4):47–52
American Society for Mechanical Engineering (ASME) (2006) RAMCAP: the framework (version 2.0). ASME Innovative Technologies Institute, LLC
Augeraud P, Touaty M (2002) Consommation d’eau par les secteurs industriels. Planistat France. Rapport final
Bernard R, Bouyssou D (1993) Aide multicritère à la décision: Méthodes et cas, Paris, Economica, ISBN 2-7178-2473-1
Cingolani P, Alcala-Fdez J (2012) jFuzzyLogic: a robust and flexible fuzzy-logic inference system language implementation. In: FUZZ-IEEE, pp 1–8. Citeseer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.415.3325&rep=rep1&type=pdf. Accessed 31 Aug 2015
Clark R, Chandrasekaran L, Buchberger S (2008) Modeling the propagation of waterborne disease in water distribution systems: results from a case study. 8th water distribution systems analysis symposium 2006, Cincinnati, USA, pp 1–20. doi:10.1061/40941(247)71
Copeland C (2010) Terrorism and security issues facing the water infrastructure sector. In: Report for congress, congressional research service, order code RS21026, Washington, DC, USA. https://www.fas.org/sgp/crs/terror/RL32189.pdf. Accessed May 10 2016
Di Nardo A, Di Natale M, Guida M, Musmarra D (2013) Water network protection from intentional contamination by sectorization. Water Resour Manag 27(6):1837–1850
Di Nardo A, Di Natale M, Musmarra D, Santonastaso GF, Tzatchkov V, Alcocer-Yamanaka V-H (2014) A district sectorization for water network protection from intentional contamination. 12th international conference on computing and control for the water industry, CCWI2013. Procedia Engineering, vol 70, pp 515–524. doi:10.1016/j.proeng.2014.02.057
Ezell BC, Farr J, Wiese I (2000) Infrastructure risk analysis of municipal water distribution system. J Infrastruct Syst 6(3):118–122
Figueira J, Roy B (2002) Determining the weights of criteria in the ELECTRE type methods with a revised Simos procedure. Eur J Oper Res 139(2):317–326
Francisque A, Rodriguez MJ, Sadiq R, Miranda LF, Proulx F (2009) Prioritizing monitoring locations in a water distribution network: a fuzzy risk approach. J Water Suppl Res Technol AQUA 58(7):488–509
Hall J, Zaffiro AD, Marx RB, Kefauver PC, Krishnan ER, Herrmann JG (2007) Online water quality parameters as indicators of distribution system contamination. J Am Water Works Assoc 99(1):66–77
Hart WE, Murray R (2010) Review of sensor placement strategies for contamination warning systems in drinking water distribution systems. J Water Resour Plan Manag 136(6):611–619
Islam N, Farahat A, Al-Zahrani MAM, Rodriguez MJ, Sadiq R (2015) Contaminant intrusion in water distribution networks: review and proposal of an integrated model for decision making. Environ Rev 23(3):337–352
Murray RE, Grayman WM, Savic DA, Farmani R (2010) Effects of DMA redesign on water distribution system performance. Integrating water systems—Boxall & Maksimovíc (eds)© 2010Taylor & Francis Group, London, ISBN 978-0-415-54851-9
Nilsson KA, Buchberger SG, Clark RM (2005) Simulating exposures to deliberate intrusions into water distribution systems. J Water Resour Plan Manag 131(3):228–236
Panigrahi DP, Mujumdar PP (2000) Reservoir operation modeling with fuzzy logic. Water Res Manag 14:89–109
Porteau (2016) Porteau 4.0, Logiciel de modélisation hydraulique. http://porteau.irstea.fr/. Accessed May 10, 2016
Rasekh A, Brumbelow K (2013) Probabilistic analysis and optimization to characterize critical water distribution system contamination scenarios. J Water Res Plan Manag 139(2):191–199
Sadiq R, Kleiner Y, Rajani B (2007) Water quality failures in distribution networks—risk analysis using fuzzy logic and evidential reasoning. Risk Anal 27(5):1381–1394
Simos J (1990) L’évaluation Environnementale: Un Processus Cognitif Négocié. Thèse de doctorat. DGF-Lausanne, Suisse
SMaRT-onlineWDN (2015) http://www.smart-onlinewdn.eu/. Last visit on 5 Oct 2015
Tchórzewska-Cieślak B (2011) Fuzzy failure risk analysis in drinking water technical system. Reliab Theory Appl 1(20):138–148
Tesfamariam S, Sadiq R (2006) Risk-based environmental decision-making using fuzzy analytic hierarchy process (F-AHP). Stoch Environ Res Risk Assess 21(1):35–50
Torres JM, Brumbelow K, Guikema SD (2009) Risk classification and uncertainty propagation for virtual water distribution systems. Reliab Eng Syst Saf 94(8):1259–1273
Ung H (2016) Quasi real-time model for security of water distribution network. Modeling and simulation. Université de Bordeaux, PhD Thesis. https://tel.archives-ouvertes.fr/tel-01310849/. Accessed Mar 2017
Ung H, Piller O, Gilbert D, Mortazavi I (2013) Inverse transport method for determination of potential contamination sources with a stochastic framework. In: World environmental and water resources congress, ASCE, pp 798–812. http://ascelibrary.org/doi/abs/10.1061/9780784412947.077. Accessed 28 Aug 2015
US EPA (2003) Response protocol toolbox: planning for and responding to drinking water contamination threats and incidents. http://www.epa.gov/safewater/watersecurity/pubs/guide_response_overview.pdf. Accessed 28 Aug 2015
Xu Z (2005) An overview of methods for determining OWA weights. Int J Intell Syst 20(8):843–865
Yager RR (1998) New modes of OWA information fusion. Int J Intell Syst 13(7):661–681
Acknowledgements
The work presented in the paper is part of the French-German collaborative research project SMart-OnlineWDN that is funded by the French National Research Agency (ANR Project: ANR-11-SECU-006) and the German Federal Ministry of Education and Research (BMBF; Project: 13N12180).
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
The first inference engine concerns the assessment of structural vulnerability index as illustrated in the Fig. 12.
Table 10 illustrates the rule base for inference 1 in order to estimate the structural vulnerability. IF Level of protection is “P” AND Ease of installation of the injection device is “I” THEN Structural vulnerability is “SV”.
The second inference engine aims at assessing the vulnerability of intrusion point linked to its environment as illustrated by Fig. 13.
Table 11 illustrates the rule base for inference 2 to estimate the intrinsic vulnerability linked to the environment. IF Level of surveillance is “S” AND Ease of physical access is “A” THEN Vulnerability linked with the environment is “VE”.
The last inference engine concerns the assessment of intrinsic vulnerability index based on the aggregation of previous indexes. The knowledge-base of inference 3 is illustrated by the Fig. 14.
The Table 6 illustrates the rule base for inference 3 to estimate the intrinsic vulnerability linked to the environment. IF Vulnerability linked with the environment of the intrusion site (VE) is “SE” AND Structural Vulnerability is SV” THEN Intrinsic Vulnerability is “IV” (Fig. 14).
Rights and permissions
About this article
Cite this article
Nafi, A., Crastes, E., Sadiq, R. et al. Intentional contamination of water distribution networks: developing indicators for sensitivity and vulnerability assessments. Stoch Environ Res Risk Assess 32, 527–544 (2018). https://doi.org/10.1007/s00477-017-1415-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00477-017-1415-y