Water infrastructure protection against intentional attacks: An experience in Italy

Cristiana Di Cristo, Angelo Leopardi, Giovanni de Marinis

PDF(404 KB)
PDF(404 KB)
Front. Earth Sci. ›› DOI: 10.1007/s11707-011-0208-8
RESEARCH ARTICLE
RESEARCH ARTICLE

Water infrastructure protection against intentional attacks: An experience in Italy

Author information +
History +

Abstract

In the last years many interesting studies were devoted to the development of technologies and methodologies for the protection of water supply systems against intentional attacks. However the application to real systems is still limited for different economical and technical reasons. The Water Engineering Laboratory (L.I.A.) of University of Cassino (Italy) was involved in two research projects financed by the European Commission in the framework of the European Programme for Critical Infrastructure Protection (E.P.C.I.P.). Both projects, developed in partnership with a large Italian Water Company, have the common objective of providing guidelines for enhancing security in water supply systems respect to the intentional contamination risk. The final product is represented by the arrangement of a general procedure for protection systems design of water networks. In the paper the procedure is described through the application to two real water systems, characterized by different size and behavior.

Keywords

security / water distribution systems / water quality / contamination

Cite this article

Download citation ▾
Cristiana Di Cristo, Angelo Leopardi, Giovanni de Marinis. Water infrastructure protection against intentional attacks: An experience in Italy. Front Earth Sci, https://doi.org/10.1007/s11707-011-0208-8

References

[1]
Agency for Toxic Substances & Disease Registry (ATSDR) (2005). Public Health Assessment Guidance Manual (Update)
[2]
ASCE, AWWA, WEF (2004). Interim voluntary guidelines for designing an online contaminant monitoring system, ASCE, Reston, USA
[3]
ASCE, AWWA (2006). Guidelines for Physical Security of Water Utilities
[4]
ClarkR M, GeldreichE E, FoxK R, RiceE W, JohnsonC W, GoodrichJ A, BarnickJ A, AbdesakenF (1996). Tracking a Salmonella servor Typhimurium outbreak in Gideon, Missouri: Role of contaminant propagation modelling.Journal of Water Supply: Research & Technology, 45(4): 171–183
[5]
Di CristoC, LeopardiA (2008). Pollution source identification of accidental contamination in water distribution networks.J Water Resour Plan Manage, 134(2): 197–202
CrossRef Google scholar
[6]
Di CristoC, LeopardiA, de MarinisG (2011). Water infrastructure protection against intentional attacks: The experience of two European Research Projects. In: Clark R M, Hakim S, Ostfeld A, eds. Handbook of Water and Wastewater Systems Protection, 397–418 Springer. 9781461401889
[7]
LeeB H, DeiningerR A (1992). Optimal location of monitoring stations in water distribution system.J Environ Eng, 118(1): 4–16
CrossRef Google scholar
[8]
NilssonK A, BuchbergerS G, ClarkR M (2005). Simulating exposures to deliberate intrusions into water distribution systems.J Water Resour Plan Manage, 131(3): 228–236
CrossRef Google scholar
[9]
OstfeldA, UberJ G, SalomonsE, BerryJ W, HartW E, PhillipsC A, WatsonJ P, DoriniG, JonkergouwP, KapelanZ, Di PierroF, KhuS T, SavicD, EliadesD, PolycarpouM, GhimireS R, BarkdollB D, GueliR, HuangJ J, McBeanE A, JamesW, KrauseA, LeskovecJ, IsovitschS, XuJ, GuestrinC, VanBriesenJ, SmallM, FischbeckP, PreisA, PropatoM, PillerO, TrachtmanG B, WuZ Y, WalskiT (2008). The battle of the water sensor networks (BWSN): A design challenge for engineers and algorithms.J Water Resour Plan Manage, 134(6): 556–568
CrossRef Google scholar
[10]
RescherN (1983). A Philosophical Introduction to the Theory of Risk Evaluation and Measurement. Lanham, MD: University Press of America
[11]
RossmanL A (2000). Epanet2 Users Manual. Risk Reduction Engrg. Lab., US Environmental Protection Agency, Cincinnati, USA
[12]
WalskiT M, BrillE D, GesslerJ, GoulterI C, JeppsonR M, LanseyK, LeeH L, LiebmanJ C, MaysL, MorganD R, OrmsbeeL (1987). Battle of the network models: Epilogue.J Water Resour Plan Manage, 113(2): 191–203
CrossRef Google scholar

RIGHTS & PERMISSIONS

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg
AI Summary AI Mindmap
PDF(404 KB)

Accesses

Citations

Detail

Sections
Recommended

/