Dual-use value of network partitioning for water system management and protection from malicious contamination
This paper considers the introduction of a contaminant into a water supply system using a backflow attack. The recent development of techniques for water network sectorization, aimed at improving the management of water systems, is also an efficient way to protect networks from intentional contamina...
Gespeichert in:
Veröffentlicht in: | Journal of hydroinformatics 2015-01, Vol.17 (3), p.361-376 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 376 |
---|---|
container_issue | 3 |
container_start_page | 361 |
container_title | Journal of hydroinformatics |
container_volume | 17 |
creator | Di Nardo, Armando Di Natale, Michele Musmarra, Dino Santonastaso, Giovanni Francesco Tzatchkov, Velitchko Alcocer-Yamanaka, Victor Hugo |
description | This paper considers the introduction of a contaminant into a water supply system using a backflow attack. The recent development of techniques for water network sectorization, aimed at improving the management of water systems, is also an efficient way to protect networks from intentional contamination and to reduce the risk of the dangerous effects of network contamination. Users can be significantly protected by isolated district meter areas (i-DMAs) in the water network and the closing of the gate valves by a remote control system to implement such i-DMAs in cases of malicious attacks. This study investigates the effects of different approaches for water network partitioning and sectorization to protect networks using a technique for designing i-DMAs that is compatible with hydraulic performance and that is based on graph theory and heuristic optimization. For this analysis, the introduction of cyanide through a backflow attack was assumed. The methodology was tested on a large water network in Mexico and displayed good protection from a malicious attack. |
doi_str_mv | 10.2166/hydro.2014.014 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1691294180</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1930865764</sourcerecordid><originalsourceid>FETCH-LOGICAL-c340t-db27fb137fecd21187b9d432bfca6e2772eb69723ada788ead9c377358c068153</originalsourceid><addsrcrecordid>eNpdkL1PwzAUxCMEElBYmS2xsKT42a6djKh8SpVYYLYc56WkJHaxHar-9ySFieF0T7qfnk6XZVdA5wykvP3Y18HPGQUxH3WUnYGQixwUF8eHW-QKBJxm5zFuKGXACzjL3P1gunyISL5NNyDxDXGYdj58kq0JqU2td61bk8YHsjMJA4n7mLAnvXFmjT26RIyryTb4hHaiSRP8FHetbf0QifUumb51ZgovspPGdBEv_3yWvT8-vC2f89Xr08vybpVbLmjK64qppgKuGrQ1AyhUVdaCs6qxRiJTimElS8W4qY0qCjR1ablSfFFYKgtY8Fl28_t37PU1YEy6b6PFrjMOx1IaZAmsFFDQEb3-h278ENzYTkPJaSEXSoqRmv9SNvgYAzZ6G9rehL0Gqqf59WF-Pc2vR_EfXXh7Zw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1930865764</pqid></control><display><type>article</type><title>Dual-use value of network partitioning for water system management and protection from malicious contamination</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Di Nardo, Armando ; Di Natale, Michele ; Musmarra, Dino ; Santonastaso, Giovanni Francesco ; Tzatchkov, Velitchko ; Alcocer-Yamanaka, Victor Hugo</creator><creatorcontrib>Di Nardo, Armando ; Di Natale, Michele ; Musmarra, Dino ; Santonastaso, Giovanni Francesco ; Tzatchkov, Velitchko ; Alcocer-Yamanaka, Victor Hugo</creatorcontrib><description>This paper considers the introduction of a contaminant into a water supply system using a backflow attack. The recent development of techniques for water network sectorization, aimed at improving the management of water systems, is also an efficient way to protect networks from intentional contamination and to reduce the risk of the dangerous effects of network contamination. Users can be significantly protected by isolated district meter areas (i-DMAs) in the water network and the closing of the gate valves by a remote control system to implement such i-DMAs in cases of malicious attacks. This study investigates the effects of different approaches for water network partitioning and sectorization to protect networks using a technique for designing i-DMAs that is compatible with hydraulic performance and that is based on graph theory and heuristic optimization. For this analysis, the introduction of cyanide through a backflow attack was assumed. The methodology was tested on a large water network in Mexico and displayed good protection from a malicious attack.</description><identifier>ISSN: 1464-7141</identifier><identifier>EISSN: 1465-1734</identifier><identifier>DOI: 10.2166/hydro.2014.014</identifier><language>eng</language><publisher>London: IWA Publishing</publisher><subject>Algorithms ; Contaminants ; Contamination ; Control systems ; Control valves ; Cyanides ; Drinking water ; Emergency communications systems ; Flow velocity ; Gate valves ; Graph theory ; Industrial research ; Partitioning ; Planning ; Protection ; Remote control ; Risk reduction ; Sensors ; Water conveyance ; Water distribution ; Water management ; Water quality ; Water shortages ; Water supply</subject><ispartof>Journal of hydroinformatics, 2015-01, Vol.17 (3), p.361-376</ispartof><rights>Copyright IWA Publishing May 2015</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c340t-db27fb137fecd21187b9d432bfca6e2772eb69723ada788ead9c377358c068153</citedby><cites>FETCH-LOGICAL-c340t-db27fb137fecd21187b9d432bfca6e2772eb69723ada788ead9c377358c068153</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27905,27906</link.rule.ids></links><search><creatorcontrib>Di Nardo, Armando</creatorcontrib><creatorcontrib>Di Natale, Michele</creatorcontrib><creatorcontrib>Musmarra, Dino</creatorcontrib><creatorcontrib>Santonastaso, Giovanni Francesco</creatorcontrib><creatorcontrib>Tzatchkov, Velitchko</creatorcontrib><creatorcontrib>Alcocer-Yamanaka, Victor Hugo</creatorcontrib><title>Dual-use value of network partitioning for water system management and protection from malicious contamination</title><title>Journal of hydroinformatics</title><description>This paper considers the introduction of a contaminant into a water supply system using a backflow attack. The recent development of techniques for water network sectorization, aimed at improving the management of water systems, is also an efficient way to protect networks from intentional contamination and to reduce the risk of the dangerous effects of network contamination. Users can be significantly protected by isolated district meter areas (i-DMAs) in the water network and the closing of the gate valves by a remote control system to implement such i-DMAs in cases of malicious attacks. This study investigates the effects of different approaches for water network partitioning and sectorization to protect networks using a technique for designing i-DMAs that is compatible with hydraulic performance and that is based on graph theory and heuristic optimization. For this analysis, the introduction of cyanide through a backflow attack was assumed. The methodology was tested on a large water network in Mexico and displayed good protection from a malicious attack.</description><subject>Algorithms</subject><subject>Contaminants</subject><subject>Contamination</subject><subject>Control systems</subject><subject>Control valves</subject><subject>Cyanides</subject><subject>Drinking water</subject><subject>Emergency communications systems</subject><subject>Flow velocity</subject><subject>Gate valves</subject><subject>Graph theory</subject><subject>Industrial research</subject><subject>Partitioning</subject><subject>Planning</subject><subject>Protection</subject><subject>Remote control</subject><subject>Risk reduction</subject><subject>Sensors</subject><subject>Water conveyance</subject><subject>Water distribution</subject><subject>Water management</subject><subject>Water quality</subject><subject>Water shortages</subject><subject>Water supply</subject><issn>1464-7141</issn><issn>1465-1734</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpdkL1PwzAUxCMEElBYmS2xsKT42a6djKh8SpVYYLYc56WkJHaxHar-9ySFieF0T7qfnk6XZVdA5wykvP3Y18HPGQUxH3WUnYGQixwUF8eHW-QKBJxm5zFuKGXACzjL3P1gunyISL5NNyDxDXGYdj58kq0JqU2td61bk8YHsjMJA4n7mLAnvXFmjT26RIyryTb4hHaiSRP8FHetbf0QifUumb51ZgovspPGdBEv_3yWvT8-vC2f89Xr08vybpVbLmjK64qppgKuGrQ1AyhUVdaCs6qxRiJTimElS8W4qY0qCjR1ablSfFFYKgtY8Fl28_t37PU1YEy6b6PFrjMOx1IaZAmsFFDQEb3-h278ENzYTkPJaSEXSoqRmv9SNvgYAzZ6G9rehL0Gqqf59WF-Pc2vR_EfXXh7Zw</recordid><startdate>20150101</startdate><enddate>20150101</enddate><creator>Di Nardo, Armando</creator><creator>Di Natale, Michele</creator><creator>Musmarra, Dino</creator><creator>Santonastaso, Giovanni Francesco</creator><creator>Tzatchkov, Velitchko</creator><creator>Alcocer-Yamanaka, Victor Hugo</creator><general>IWA Publishing</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7QH</scope><scope>7UA</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BHPHI</scope><scope>BKSAR</scope><scope>C1K</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>F1W</scope><scope>GNUQQ</scope><scope>H96</scope><scope>HCIFZ</scope><scope>L.G</scope><scope>PATMY</scope><scope>PCBAR</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PYCSY</scope><scope>7TV</scope><scope>7U1</scope><scope>7U2</scope><scope>H97</scope></search><sort><creationdate>20150101</creationdate><title>Dual-use value of network partitioning for water system management and protection from malicious contamination</title><author>Di Nardo, Armando ; Di Natale, Michele ; Musmarra, Dino ; Santonastaso, Giovanni Francesco ; Tzatchkov, Velitchko ; Alcocer-Yamanaka, Victor Hugo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c340t-db27fb137fecd21187b9d432bfca6e2772eb69723ada788ead9c377358c068153</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Contaminants</topic><topic>Contamination</topic><topic>Control systems</topic><topic>Control valves</topic><topic>Cyanides</topic><topic>Drinking water</topic><topic>Emergency communications systems</topic><topic>Flow velocity</topic><topic>Gate valves</topic><topic>Graph theory</topic><topic>Industrial research</topic><topic>Partitioning</topic><topic>Planning</topic><topic>Protection</topic><topic>Remote control</topic><topic>Risk reduction</topic><topic>Sensors</topic><topic>Water conveyance</topic><topic>Water distribution</topic><topic>Water management</topic><topic>Water quality</topic><topic>Water shortages</topic><topic>Water supply</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Di Nardo, Armando</creatorcontrib><creatorcontrib>Di Natale, Michele</creatorcontrib><creatorcontrib>Musmarra, Dino</creatorcontrib><creatorcontrib>Santonastaso, Giovanni Francesco</creatorcontrib><creatorcontrib>Tzatchkov, Velitchko</creatorcontrib><creatorcontrib>Alcocer-Yamanaka, Victor Hugo</creatorcontrib><collection>CrossRef</collection><collection>Aqualine</collection><collection>Water Resources Abstracts</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Agricultural & Environmental Science Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Natural Science Collection</collection><collection>Earth, Atmospheric & Aquatic Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ASFA: Aquatic Sciences and Fisheries Abstracts</collection><collection>ProQuest Central Student</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) 2: Ocean Technology, Policy & Non-Living Resources</collection><collection>SciTech Premium Collection</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) Professional</collection><collection>Environmental Science Database</collection><collection>Earth, Atmospheric & Aquatic Science Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Environmental Science Collection</collection><collection>Pollution Abstracts</collection><collection>Risk Abstracts</collection><collection>Safety Science and Risk</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) 3: Aquatic Pollution & Environmental Quality</collection><jtitle>Journal of hydroinformatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Di Nardo, Armando</au><au>Di Natale, Michele</au><au>Musmarra, Dino</au><au>Santonastaso, Giovanni Francesco</au><au>Tzatchkov, Velitchko</au><au>Alcocer-Yamanaka, Victor Hugo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dual-use value of network partitioning for water system management and protection from malicious contamination</atitle><jtitle>Journal of hydroinformatics</jtitle><date>2015-01-01</date><risdate>2015</risdate><volume>17</volume><issue>3</issue><spage>361</spage><epage>376</epage><pages>361-376</pages><issn>1464-7141</issn><eissn>1465-1734</eissn><abstract>This paper considers the introduction of a contaminant into a water supply system using a backflow attack. The recent development of techniques for water network sectorization, aimed at improving the management of water systems, is also an efficient way to protect networks from intentional contamination and to reduce the risk of the dangerous effects of network contamination. Users can be significantly protected by isolated district meter areas (i-DMAs) in the water network and the closing of the gate valves by a remote control system to implement such i-DMAs in cases of malicious attacks. This study investigates the effects of different approaches for water network partitioning and sectorization to protect networks using a technique for designing i-DMAs that is compatible with hydraulic performance and that is based on graph theory and heuristic optimization. For this analysis, the introduction of cyanide through a backflow attack was assumed. The methodology was tested on a large water network in Mexico and displayed good protection from a malicious attack.</abstract><cop>London</cop><pub>IWA Publishing</pub><doi>10.2166/hydro.2014.014</doi><tpages>16</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1464-7141 |
ispartof | Journal of hydroinformatics, 2015-01, Vol.17 (3), p.361-376 |
issn | 1464-7141 1465-1734 |
language | eng |
recordid | cdi_proquest_miscellaneous_1691294180 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Algorithms Contaminants Contamination Control systems Control valves Cyanides Drinking water Emergency communications systems Flow velocity Gate valves Graph theory Industrial research Partitioning Planning Protection Remote control Risk reduction Sensors Water conveyance Water distribution Water management Water quality Water shortages Water supply |
title | Dual-use value of network partitioning for water system management and protection from malicious contamination |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T08%3A11%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dual-use%20value%20of%20network%20partitioning%20for%20water%20system%20management%20and%20protection%20from%20malicious%20contamination&rft.jtitle=Journal%20of%20hydroinformatics&rft.au=Di%20Nardo,%20Armando&rft.date=2015-01-01&rft.volume=17&rft.issue=3&rft.spage=361&rft.epage=376&rft.pages=361-376&rft.issn=1464-7141&rft.eissn=1465-1734&rft_id=info:doi/10.2166/hydro.2014.014&rft_dat=%3Cproquest_cross%3E1930865764%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1930865764&rft_id=info:pmid/&rfr_iscdi=true |