Abstract
In the last years many interesting studies were devoted to the development of technologies and methodologies for the protection of water supply systems against intentional attacks. However the application to real systems is still limited for different economical and technical reasons. The Water Engineering Laboratory (L.I.A.) of University of Cassino (Italy) was involved in two research projects financed by the European Commission in the framework of the European Programme for Critical Infrastructure Protection (E.P.C.I.P.). Both projects, developed in partnership with a large Italian Water Company, have the common objective of providing guidelines for enhancing security in water supply systems respect to the intentional contamination risk. The final product is represented by the arrangement of a general procedure for protection systems design of water networks. In the paper the procedure is described through the application to two real water systems, characterized by different size and behavior.
Similar content being viewed by others
References
Agency for Toxic Substances & Disease Registry (ATSDR) (2005). Public Health Assessment Guidance Manual (Update)
ASCE, AWWA, WEF (2004). Interim voluntary guidelines for designing an online contaminant monitoring system, ASCE, Reston, USA
ASCE, AWWA (2006). Guidelines for Physical Security of Water Utilities
Clark RM, Geldreich E E, Fox K R, Rice EW, Johnson CW, Goodrich J A, Barnick J A, Abdesaken F (1996). Tracking a Salmonella servor Typhimurium outbreak in Gideon, Missouri: Role of contaminant propagation modelling. Journal of Water Supply: Research & Technology, 45(4): 171–183
Di Cristo C, Leopardi A (2008). Pollution source identification of accidental contamination in water distribution networks. J Water Resour Plan Manage, 134(2): 197–202
Di Cristo C, Leopardi A, de Marinis G (2011). Water infrastructure protection against intentional attacks: The experience of two European Research Projects. In: Clark R M, Hakim S, Ostfeld A, eds. Handbook of Water and Wastewater Systems Protection, 397–418 Springer. 9781461401889
Lee B H, Deininger R A (1992). Optimal location of monitoring stations in water distribution system. J Environ Eng, 118(1): 4–16
Nilsson K A, Buchberger S G, Clark R M (2005). Simulating exposures to deliberate intrusions into water distribution systems. J Water Resour Plan Manage, 131(3): 228–236
Ostfeld A, Uber J G, Salomons E, Berry J W, Hart W E, Phillips C A, Watson J P, Dorini G, Jonkergouw P, Kapelan Z, Di Pierro F, Khu S T, Savic D, Eliades D, Polycarpou M, Ghimire S R, Barkdoll B D, Gueli R, Huang J J, McBean E A, James W, Krause A, Leskovec J, Isovitsch S, Xu J, Guestrin C, VanBriesen J, Small M, Fischbeck P, Preis A, Propato M, Piller O, Trachtman G B, Wu Z Y, Walski T (2008). The battle of the water sensor networks (BWSN): A design challenge for engineers and algorithms. JWater Resour Plan Manage, 134(6): 556–568
Rescher N (1983). A Philosophical Introduction to the Theory of Risk Evaluation and Measurement. Lanham, MD: University Press of America
Rossman L A (2000). Epanet2 Users Manual. Risk Reduction Engrg. Lab., US Environmental Protection Agency, Cincinnati, USA
Walski T M, Brill E D, Gessler J, Goulter I C, Jeppson R M, Lansey K, Lee H L, Liebman J C, Mays L, Morgan D R, Ormsbee L (1987). Battle of the network models: Epilogue. J Water Resour Plan Manage, 113(2): 191–203
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Di Cristo, C., Leopardi, A. & de Marinis, G. Water infrastructure protection against intentional attacks: An experience in Italy. Front. Earth Sci. 5, 390–399 (2011). https://doi.org/10.1007/s11707-011-0208-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11707-011-0208-8