Skip to main content

Protecting Water and Wastewater Systems: Water Distribution Systems Security Modeling

  • Chapter
  • First Online:
  • 1384 Accesses

Part of the book series: Protecting Critical Infrastructure ((PCIN,volume 2))

Abstract

During the last decade the world faced a serious threat related to terror attacks and it is now clear that water supplies are terror targets. An FBI bulletin states that the warning is based on terrorist manuals and documents found at al-Qaeda sites in Afghanistan. As a result, online warning monitoring has received the highest priority by the US General Accounting Office (GAO) and was recently recommended to the US Senate for extensive federal support. Near real-time monitoring technologies were cited as critical to helping drinking water systems detect and respond quickly to threats related to terrorist water contamination, to minimize the impact of any such contamination by facilitating a quick response, and to help in restoring systems post an event. Drinking water utilities in Israel and around the world are vulnerable to various types of terrorist attacks including warfare contamination and bioterrorism. A distribution system is comprised of water tanks, pipes, pumps, and other components that deliver treated water from treatment plants to consumers. Particularly among large utilities, distribution systems may contain thousands of kilometers of pipes and numerous delivery points, which make such systems highly vulnerable to deliberate contamination injection by a terrorist. An online contaminant monitoring system (OCMS) is considered by the American Society of Civil Engineers (ASCE) and by the American Water Works Association (AWWA) as a major tool to reduce the likelihood of a deliberate contaminant chemical or biological intrusion. An OCMS should be designed to detect random contamination events and to provide information on the location of the contaminants within the system, including an estimation of the injection characteristics (i.e., contaminant type, injection time and duration, concentration, and injected mass flow rate). Once the type of the contaminant and its characteristics are discovered, a containment strategy can be implemented to minimize the pollutant spread throughout the system and to suggest for the system’s portions that need to be flushed. The objective of this chapter is to describe issues related to water security within the context of water distribution systems modeling and to highlight future needs and challenges in this area.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Al-Zahrani M. and Moied K. (2001). “Locating optimum water quality monitoring stations in water distribution system.” In Bridging the Gap: Meeting the World’s Water and Environmental Resources Challenges, Proceedings of the ASCE EWRI Annual Conference, Orlando, FL, published on CD.

    Google Scholar 

  • American Society of Civil Engineers (ASCE) (2004). “Guidelines for designing an online contaminant monitoring system.”

    Google Scholar 

  • American Water Works Association (AWWA) (2004). “Security guidance for water utilities.”

    Google Scholar 

  • Berry J. W., Hart W. E., Phillips C. A., Uber J. G., and Watson J. P. (2006). “Sensor placement in municipal water networks with temporal integer programming models.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 132, No. 4, pp. 218–224.

    Article  Google Scholar 

  • Deb K., Agrawal S., Pratap A., and Meyarivan T. (2000). “A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II.” Proceedings of the Parallel Problem Solving from Nature VI Conference, Paris, France, pp. 849–858.

    Google Scholar 

  • Dorini G., Jonkergouw P., Kapelan Z., Pierro F. di, Khu S. T., and Savic D. (2006). “An efficient algorithm for sensor placement in water distribution systems.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.

    Google Scholar 

  • Eliades D. and Polycarpou M. (2006). “Iterative deepening of Pareto solutions in water sensor Networks.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.

    Google Scholar 

  • Goldberg D. E. (1989). “Genetic algorithms in search, optimization, and machine learning.” Addison-Wesley, New York, NY.

    Google Scholar 

  • Gueli R. (2006). “Predator – prey model for discrete sensor placement.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.

    Google Scholar 

  • Holland J. H. (1975). “Adaptation in natural and artificial systems.” The University of Michigan Press, Ann Arbor, MI.

    Google Scholar 

  • Huang J. J., McBean E. A., and James W. (2006). “Multi-objective optimization for monitoring sensor placement in water distribution systems.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.

    Google Scholar 

  • Kessler A., Ostfeld A., and Sinai G. (1998). “Detecting accidental contaminations in municipal water networks.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 124, No. 4, pp. 192–198.

    Article  Google Scholar 

  • Kumar A., Kansal M. L., and Arora G. (1997). “Identification of monitoring stations in water distribution system.” Journal of Environmental Engineering, ASCE, Vol. 123, No. 8, pp. 746–752.

    Article  Google Scholar 

  • Lee B. and Deininger R. (1992). “Optimal locations of monitoring stations in water distribution system.” Journal of Environmental Engineering, ASCE, Vol. 118, No. 1, pp. 4–16.

    Article  Google Scholar 

  • Ostfeld A. and Salomons E. (2004). “Optimal layout of early warning detection stations for water distribution systems security.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 130, No. 5, pp. 377–385.

    Article  Google Scholar 

  • Ostfeld A. and Salomons E. (2005). “Securing water distribution systems using online contamination monitoring.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 131, No. 5, pp. 402–405.

    Article  Google Scholar 

  • Ostfeld A. and Salomons E. (2006). “Sensor network design proposal for the battle of the water sensor networks (BWSN).” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.

    Google Scholar 

  • Ostfeld A., Kessler A., and Goldberg I. (2004). “A contaminant detection system for early warning in water distribution networks.” Engineering Optimization, Vol. 36, No. 5, pp. 525–538.

    Article  Google Scholar 

  • Ostfeld A., Uber J., and Salomons E. (2006). “Battle of the Water Sensor Networks (BWSN): a design challenge for engineers and algorithms.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.

    Google Scholar 

  • Preis A. and Ostfeld A. (2006). “Multiobjective sensor design for water distribution systems security.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.

    Google Scholar 

  • Propato M. (2006). “Contamination warning in water networks: general mixed-integer linear models for sensor location design.” Journal of Water Resources Planning and Management Division, ASCE, Vol. 132, No. 4, pp. 225–233.

    Article  Google Scholar 

  • Rubinstein R. Y. (1999). “The simulated entropy method for combinatorial and continuous optimization.” Methodology and Computing in Applied Probability, Vol. 2, pp. 127–190.

    Article  Google Scholar 

  • USEPA (2002). “EPANET 2.00.10” Available online at http://www.epa.gov/ORD/NRMRL/wswrd/epanet.html (accessed 15 July 2008).

  • Watson J. P., Greenberg H. J., and Hart W. E. (2004). “A multiple-objective analysis of sensor placement optimization in water networks.” In Critical Transitions in Water and Environmental Resources Management, Proceedings of the ASCE EWRI Annual Conference, Salt Lake City, UT, published on CD.

    Google Scholar 

  • Woo H. M., Yoon J. H., and Choi D. Y. (2001). “Optimal monitoring sites based on water quality and quantity in water distribution systems.” In Bridging the Gap: Meeting the World’s Water and Environmental Resources Challenges, Proceedings of the ASCE EWRI Annual Conference, Orlando, FL, published on CD.

    Google Scholar 

  • Wu Z. Y. and Walski T. (2006). “Multi objective optimization of sensor placement in water distribution systems.” 8th Annual Water Distribution System Analysis Symposium, Cincinnati, OH, published on CD.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avi Ostfeld .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Ostfeld, A. (2011). Protecting Water and Wastewater Systems: Water Distribution Systems Security Modeling. In: Clark, R., Hakim, S., Ostfeld, A. (eds) Handbook of Water and Wastewater Systems Protection. Protecting Critical Infrastructure, vol 2. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0189-6_14

Download citation

Publish with us

Policies and ethics