Abstract
During the last decade the world faced a serious threat related to terror attacks and it is now clear that water supplies are terror targets. An FBI bulletin states that the warning is based on terrorist manuals and documents found at al-Qaeda sites in Afghanistan. As a result, online warning monitoring has received the highest priority by the US General Accounting Office (GAO) and was recently recommended to the US Senate for extensive federal support. Near real-time monitoring technologies were cited as critical to helping drinking water systems detect and respond quickly to threats related to terrorist water contamination, to minimize the impact of any such contamination by facilitating a quick response, and to help in restoring systems post an event. Drinking water utilities in Israel and around the world are vulnerable to various types of terrorist attacks including warfare contamination and bioterrorism. A distribution system is comprised of water tanks, pipes, pumps, and other components that deliver treated water from treatment plants to consumers. Particularly among large utilities, distribution systems may contain thousands of kilometers of pipes and numerous delivery points, which make such systems highly vulnerable to deliberate contamination injection by a terrorist. An online contaminant monitoring system (OCMS) is considered by the American Society of Civil Engineers (ASCE) and by the American Water Works Association (AWWA) as a major tool to reduce the likelihood of a deliberate contaminant chemical or biological intrusion. An OCMS should be designed to detect random contamination events and to provide information on the location of the contaminants within the system, including an estimation of the injection characteristics (i.e., contaminant type, injection time and duration, concentration, and injected mass flow rate). Once the type of the contaminant and its characteristics are discovered, a containment strategy can be implemented to minimize the pollutant spread throughout the system and to suggest for the system’s portions that need to be flushed. The objective of this chapter is to describe issues related to water security within the context of water distribution systems modeling and to highlight future needs and challenges in this area.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Al-Zahrani M. and Moied K. (2001). “Locating optimum water quality monitoring stations in water distribution system.” In Bridging the Gap: Meeting the World’s Water and Environmental Resources Challenges, Proceedings of the ASCE EWRI Annual Conference, Orlando, FL, published on CD.
American Society of Civil Engineers (ASCE) (2004). “Guidelines for designing an online contaminant monitoring system.”
American Water Works Association (AWWA) (2004). “Security guidance for water utilities.”
Berry J. W., Hart W. E., Phillips C. A., Uber J. G., and Watson J. P. (2006). “Sensor placement in municipal water networks with temporal integer programming models.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 132, No. 4, pp. 218–224.
Deb K., Agrawal S., Pratap A., and Meyarivan T. (2000). “A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II.” Proceedings of the Parallel Problem Solving from Nature VI Conference, Paris, France, pp. 849–858.
Dorini G., Jonkergouw P., Kapelan Z., Pierro F. di, Khu S. T., and Savic D. (2006). “An efficient algorithm for sensor placement in water distribution systems.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.
Eliades D. and Polycarpou M. (2006). “Iterative deepening of Pareto solutions in water sensor Networks.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.
Goldberg D. E. (1989). “Genetic algorithms in search, optimization, and machine learning.” Addison-Wesley, New York, NY.
Gueli R. (2006). “Predator – prey model for discrete sensor placement.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.
Holland J. H. (1975). “Adaptation in natural and artificial systems.” The University of Michigan Press, Ann Arbor, MI.
Huang J. J., McBean E. A., and James W. (2006). “Multi-objective optimization for monitoring sensor placement in water distribution systems.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.
Kessler A., Ostfeld A., and Sinai G. (1998). “Detecting accidental contaminations in municipal water networks.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 124, No. 4, pp. 192–198.
Kumar A., Kansal M. L., and Arora G. (1997). “Identification of monitoring stations in water distribution system.” Journal of Environmental Engineering, ASCE, Vol. 123, No. 8, pp. 746–752.
Lee B. and Deininger R. (1992). “Optimal locations of monitoring stations in water distribution system.” Journal of Environmental Engineering, ASCE, Vol. 118, No. 1, pp. 4–16.
Ostfeld A. and Salomons E. (2004). “Optimal layout of early warning detection stations for water distribution systems security.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 130, No. 5, pp. 377–385.
Ostfeld A. and Salomons E. (2005). “Securing water distribution systems using online contamination monitoring.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 131, No. 5, pp. 402–405.
Ostfeld A. and Salomons E. (2006). “Sensor network design proposal for the battle of the water sensor networks (BWSN).” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.
Ostfeld A., Kessler A., and Goldberg I. (2004). “A contaminant detection system for early warning in water distribution networks.” Engineering Optimization, Vol. 36, No. 5, pp. 525–538.
Ostfeld A., Uber J., and Salomons E. (2006). “Battle of the Water Sensor Networks (BWSN): a design challenge for engineers and algorithms.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.
Preis A. and Ostfeld A. (2006). “Multiobjective sensor design for water distribution systems security.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.
Propato M. (2006). “Contamination warning in water networks: general mixed-integer linear models for sensor location design.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 132, No. 4, pp. 225–233.
Rubinstein R. Y. (1999). “The simulated entropy method for combinatorial and continuous optimization.” Methodology and Computing in Applied Probability, Vol. 2, pp. 127–190.
USEPA (2002). “EPANET 2.00.10” Available online at http://www.epa.gov/ORD/NRMRL/wswrd/epanet.html (accessed 15 July 2008).
Watson J. P., Greenberg H. J., and Hart W. E. (2004). “A multiple-objective analysis of sensor placement optimization in water networks.” In Critical Transitions in Water and Environmental Resources Management, Proceedings of the ASCE EWRI Annual Conference, Salt Lake City, UT, published on CD.
Woo H. M., Yoon J. H., and Choi D. Y. (2001). “Optimal monitoring sites based on water quality and quantity in water distribution systems.” In Bridging the Gap: Meeting the World’s Water and Environmental Resources Challenges, Proceedings of the ASCE EWRI Annual Conference, Orlando, FL, published on CD.
Wu Z. Y. and Walski T. (2006). “Multi objective optimization of sensor placement in water distribution systems.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Ostfeld, A. (2011). Protecting Water and Wastewater Systems: Water Distribution Systems Security Modeling. In: Clark, R., Hakim, S., Ostfeld, A. (eds) Handbook of Water and Wastewater Systems Protection. Protecting Critical Infrastructure, vol 2. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0189-6_14
Download citation
DOI: https://doi.org/10.1007/978-1-4614-0189-6_14
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-0188-9
Online ISBN: 978-1-4614-0189-6
eBook Packages: Humanities, Social Sciences and LawPolitical Science and International Studies (R0)