Water infrastructure protection against intentional attacks: An experience in Italy
Cristiana Di Cristo, Angelo Leopardi, Giovanni de Marinis
Water infrastructure protection against intentional attacks: An experience in Italy
In the last years many interesting studies were devoted to the development of technologies and methodologies for the protection of water supply systems against intentional attacks. However the application to real systems is still limited for different economical and technical reasons. The Water Engineering Laboratory (L.I.A.) of University of Cassino (Italy) was involved in two research projects financed by the European Commission in the framework of the European Programme for Critical Infrastructure Protection (E.P.C.I.P.). Both projects, developed in partnership with a large Italian Water Company, have the common objective of providing guidelines for enhancing security in water supply systems respect to the intentional contamination risk. The final product is represented by the arrangement of a general procedure for protection systems design of water networks. In the paper the procedure is described through the application to two real water systems, characterized by different size and behavior.
security / water distribution systems / water quality / contamination
[1] |
Agency for Toxic Substances & Disease Registry (ATSDR) (2005). Public Health Assessment Guidance Manual (Update)
|
[2] |
ASCE, AWWA, WEF (2004). Interim voluntary guidelines for designing an online contaminant monitoring system, ASCE, Reston, USA
|
[3] |
ASCE, AWWA (2006). Guidelines for Physical Security of Water Utilities
|
[4] |
ClarkR M, GeldreichE E, FoxK R, RiceE W, JohnsonC W, GoodrichJ A, BarnickJ A, AbdesakenF (1996). Tracking a Salmonella servor Typhimurium outbreak in Gideon, Missouri: Role of contaminant propagation modelling.Journal of Water Supply: Research & Technology, 45(4): 171–183
|
[5] |
Di CristoC, LeopardiA (2008). Pollution source identification of accidental contamination in water distribution networks.J Water Resour Plan Manage, 134(2): 197–202
CrossRef
Google scholar
|
[6] |
Di CristoC, LeopardiA, de MarinisG (2011). Water infrastructure protection against intentional attacks: The experience of two European Research Projects. In: Clark R M, Hakim S, Ostfeld A, eds. Handbook of Water and Wastewater Systems Protection, 397–418 Springer. 9781461401889
|
[7] |
LeeB H, DeiningerR A (1992). Optimal location of monitoring stations in water distribution system.J Environ Eng, 118(1): 4–16
CrossRef
Google scholar
|
[8] |
NilssonK A, BuchbergerS G, ClarkR M (2005). Simulating exposures to deliberate intrusions into water distribution systems.J Water Resour Plan Manage, 131(3): 228–236
CrossRef
Google scholar
|
[9] |
OstfeldA, UberJ G, SalomonsE, BerryJ W, HartW E, PhillipsC A, WatsonJ P, DoriniG, JonkergouwP, KapelanZ, Di PierroF, KhuS T, SavicD, EliadesD, PolycarpouM, GhimireS R, BarkdollB D, GueliR, HuangJ J, McBeanE A, JamesW, KrauseA, LeskovecJ, IsovitschS, XuJ, GuestrinC, VanBriesenJ, SmallM, FischbeckP, PreisA, PropatoM, PillerO, TrachtmanG B, WuZ Y, WalskiT (2008). The battle of the water sensor networks (BWSN): A design challenge for engineers and algorithms.J Water Resour Plan Manage, 134(6): 556–568
CrossRef
Google scholar
|
[10] |
RescherN (1983). A Philosophical Introduction to the Theory of Risk Evaluation and Measurement. Lanham, MD: University Press of America
|
[11] |
RossmanL A (2000). Epanet2 Users Manual. Risk Reduction Engrg. Lab., US Environmental Protection Agency, Cincinnati, USA
|
[12] |
WalskiT M, BrillE D, GesslerJ, GoulterI C, JeppsonR M, LanseyK, LeeH L, LiebmanJ C, MaysL, MorganD R, OrmsbeeL (1987). Battle of the network models: Epilogue.J Water Resour Plan Manage, 113(2): 191–203
CrossRef
Google scholar
|
/
〈 | 〉 |