Skip to main content
Log in

Water Network Protection from Intentional Contamination by Sectorization

  • Published:
Water Resources Management Aims and scope Submit manuscript

Abstract

Each single phase of a water supply network, from water adduction to distribution to end-users, is exposed to many diverse potential sources of intentional contamination (or malicious attacks). One of the most dangerous threats is a backflow attack that occurs when a pump system, easily available on the market, is utilized to overcome the pressure gradient of network pipes. In this work, a simple backflow attack with cyanide being introduced into a real-water system is modeled and the most dangerous introduction points for a contaminant incident are defined. Moreover, the network vulnerability has been analyzed by computing the lethal dose of cyanide ingested by users and the total length of the contaminated water system. Eventually the effects of network partitioning and district isolation to protect water supply systems have been investigated. The results show how district closing - by network sectorization techniques used to improve leakage search and reduction - can significantly decrease contaminant diffusion and protect part of the users from cyanide uptake. Network sectorization can also reduce the risk of simple malicious attacks because several introduction points are necessary to have a massive negative impact on the network. Simulation results also show that in some cases water network partitioning may worsen water network protection and further studies are necessary to design water districts for network security and safety.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • CER (Centre for European Reform) (2005) The EU and counter-terrorism, Centre for European Reform, London.

  • Chang NB, Pongsanone NP, Ernest A (2011) Comparisons between a rule-based expert system and optimization models for sensor deployment in a small drinking water network. Expert Syst Appl 38:10685–10695

    Article  Google Scholar 

  • Clark RM, Chandrasekaran L, Buchberger SB (2006) Modeling the propagation of waterborne disease in water distribution systems: results from a case study, 8th WSDA Symposium, Cincinnati.

  • Di Cristo C, Leopardi A (2008) Pollution source identification of accidental contamination in water distribution networks. Journal of Water Resources, Plng And Mgmt, ASCE 134(2):197–202

    Article  Google Scholar 

  • Di Nardo A, Di Natale M (2011) A heuristic design support methodology based on graph theory for district metering of water supply networks. Eng Optim 2(43):193–211

    Article  Google Scholar 

  • Di Nardo A, Di Natale M (2012) A design support methodology for district metering of water supply networks, In: Proc. of the 12th Annual International Conference on Water Distribution Systems Analysis 2010, WDSA 2010, Tucson, AZ, USA, 870–877.

  • Grayman WM, Murray R, Savic DA (2009) Effects of redesign of water systems for security and water quality actors. In: Starrett, S. (Ed.), Proc. of the World Environmental and Water Resources Congress. 49 Kansas City, MO.

  • Guan J, Aral MM, Maslia ML, Grayman WM (2006) Identification of Contaminant Sources in Water Distribution Systems using Symulation-Optimization Method: Case study. J Water Resour Plng and Mgmt, ASCE 132(4):252–262

    Article  Google Scholar 

  • Guidorzi M, Franchini M, Alvisi S (2008) A multi-objective approach for detecting and responding to accidental and intentional contamination events in water distribution systems. Urban Water Journal 6(2):115–135

    Article  Google Scholar 

  • Hall J, Zaffiro AD, Marx RB, Kefauver PC, Krishnan ER, Haught RC, Herrmann JG (2007) On-Line Water Quality Parameters as Indicators of Distribution System Contamination. Jour AWWA 99(1):66

    Google Scholar 

  • HSPDs (2002) Public Health Security and Bioterrorism Preparedness and Response, Act of 2002 (Bioterrorism Act).

  • Kroll D (2006) Safeguarding the Distribution System: On-Line Monitoring for Security and Enhancing Operational Performance. Jour. New England Water Works Assn., June.

  • Kroll D (2010) Protecting world water supplies against backflow attacks, a. Water and Wastewater International 25(2):4 p

    Google Scholar 

  • Kroll D, King K (2010) Methods for evaluating water distribution network early warning systems. J Am Water Works Assoc 102(1):79–89

    Google Scholar 

  • Laird CD, Biegler LT, van Bloemen Waanderse BG, Barlett RA (2005) Contamination source determination for water networks. J Water Resour Plng and Mgmt, ASCE 131(2):125–134

    Article  Google Scholar 

  • Laird CD, Biegler LT, van BloemenWaanderse BG (2006) Mixed-Integer approach for obtaining unique solutions in source inversion of water networks. J Water Resour Plng and Mgmt, ASCE 132(4):242–251

    Article  Google Scholar 

  • Liou CP, Kroon JR (1987) Modeling the propagation of waterborne substances in distribution networks. J AWWA 79(11):54–58

    Google Scholar 

  • Mays LW (2002) Urban Water Supply Hand. McGraw Hill, New York Mays

    Google Scholar 

  • McKenna SA, Hart DB, Klise, KA, Cruz VA, Wilson MP (2007) Event detection from water quality time series. Proc. ASCE World Envir. & Water Resources Congress, Tampa, Fla.

  • Murray R, Grayman WM, Savic DA, Farmani R (2010) Effects of DMA redesign on water distribution system performance. In: Boxall J, Maksimovic C (eds) Proceedings of the Tenth International Conference on Computing and Control in the Water Industry 2009. CRC Press, London

    Google Scholar 

  • National Research Council (NRC) (2007) Improving the nation’s water security: opportunities for research. The National Academies Press, Washington

    Google Scholar 

  • Ostfeld A, ber JG, Salomons E, Berry JW, Hart WE, Phillips CA, Watson JP, Dorini G, Jonkergouw P, Kapelan Z, di Pierro F, Khu ST, Savic D, Eliades D, Polycarpou M, Ghimire SR, Barkdoll BD, Gueli R, Huang JJ, McBean EA, James W, Krause A, Leskovec J, Isovitsch S, Xu J, Guestrin C, VanBriesen J, Small M, Fischbeck P, Preis A, Propato M, Piller O, Trachtman GB, Yi Wu Z, Walski T (2008) The Battle of water Sensor Networks (BWSN): A Design Challenge for Engineers and Algorithms. J Water Resour Plng and Mgmt, 134(6):556–568

    Article  Google Scholar 

  • Patnaik P (2007) A comprehensive guide to the hazardous properties of chemical substances, Thirdth edn. J. Wiley & Sons, New Jersey. doi:DOI:10.1002/9780470134955.ch16

    Book  Google Scholar 

  • Preis A, Ostfeld A (2006) Contamination Source Identification in water Systems: A Hybrid model Trees-linear Programming scheme. J Water Resour Plng and Mgmt, ASCE 132(4):263–273

    Article  Google Scholar 

  • Rico-Ramirez V, Frausto-Hernandez S, Diwekar UM, Hernandez-Castro S (2007) Water networks security: A two-stage mixed-integer stochastic program for sensor placement under uncertainty. Computers and Chemical Engineering, Elsevier 31:565–573

    Article  Google Scholar 

  • Rossman LA (2000) EPANET 2 User’s Manual, EPA Publication.

  • SRSI (2002) Situating the concepts of security and risk, SRSI paper.

  • Tzatchkov VG, Alcocer-Yamanaka VH, Bourguett-Ortız VH (2006) Graph theory based algorithms for water distribution network sectorization projects. In Proc. of the 8th Annual Water Distribution Systems Analysis Symposium WDSA, Cincinnati, Ohio, USA.

  • Umberg K (2008) Evaluation of Water Quality Event Detection Systems Deployed at the First Water Security Initiative Pilot Utility. Proc. 2008 AWWA Water Security Congress, Cincinnati.

  • US EPA (2001) Distribution system research and information collection partnership factsheet, office of water (4607 M) EPA-815-F-10-001. http://www.epa.gov/safewater and http://www.epa.gov/ogwdw000/disinfection/tcr/regulation_revisions_tcrdsac.html.

  • US EPA (2003) Response Protocol Toolbox: Planinng for and Responding to Drinking Water Contamination Threats and Incidents, online version: http://www.epa.gov/safewater/watersecurity/pubs/guide_response_overview.pdf

  • US EPA (2005) Technologies and Techniques for Early Warning Systems to Monitor and Evaluate Drinking Water Quality: A State-of-the-Art Review. Research Rept., Ofce. of Research and Development, National Homeland Security Research Center, Cincinnati.

  • US EPA (2009) National primary drinking water regulations. US. Environmental protection agency. Washington DC, USA, EPA 816-F-09-004.

  • Wrc/WSA/WCA Engineering and Operations Commitee. (1994) Managing leakage: UK water industry managing leakage. Rep. A-J. London: WRc/WSA/WCA.

  • Yang J, Haught RC, Hall J, Goodrich JA, Hasan J (2006) Adaptive Monitoring to Enhance Water Sensor Capabilities for Chemical and Biological Contaminant Detection in Drinking Water Systems. Proc. Optics and Photonics in Global Homeland Security II (T. Saito and D. Lehrfeld, editors). SPIE Publications, Bellingham, Wash.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Armando Di Nardo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Di Nardo, A., Di Natale, M., Guida, M. et al. Water Network Protection from Intentional Contamination by Sectorization. Water Resour Manage 27, 1837–1850 (2013). https://doi.org/10.1007/s11269-012-0133-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11269-012-0133-y

Keywords

Navigation