This paper considers the introduction of a contaminant into a water supply system using a backflow attack. The recent development of techniques for water network sectorization, aimed at improving the management of water systems, is also an efficient way to protect networks from intentional contamination and to reduce the risk of the dangerous effects of network contamination. Users can be significantly protected by isolated district meter areas (i-DMAs) in the water network and the closing of the gate valves by a remote control system to implement such i-DMAs in cases of malicious attacks. This study investigates the effects of different approaches for water network partitioning and sectorization to protect networks using a technique for designing i-DMAs that is compatible with hydraulic performance and that is based on graph theory and heuristic optimization. For this analysis, the introduction of cyanide through a backflow attack was assumed. The methodology was tested on a large water network in Mexico and displayed good protection from a malicious attack.

"Dual-use value of network partitioning for water system management and protection from malicious contamination"

DI NARDO, Armando;DI NATALE, Michele;MUSMARRA, Dino;Santonastaso G. F.;
2015

Abstract

This paper considers the introduction of a contaminant into a water supply system using a backflow attack. The recent development of techniques for water network sectorization, aimed at improving the management of water systems, is also an efficient way to protect networks from intentional contamination and to reduce the risk of the dangerous effects of network contamination. Users can be significantly protected by isolated district meter areas (i-DMAs) in the water network and the closing of the gate valves by a remote control system to implement such i-DMAs in cases of malicious attacks. This study investigates the effects of different approaches for water network partitioning and sectorization to protect networks using a technique for designing i-DMAs that is compatible with hydraulic performance and that is based on graph theory and heuristic optimization. For this analysis, the introduction of cyanide through a backflow attack was assumed. The methodology was tested on a large water network in Mexico and displayed good protection from a malicious attack.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11591/200956
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 46
  • ???jsp.display-item.citation.isi??? 39
social impact