skip to main content
10.1145/2566468.2566480acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

A network interdiction model for analyzing the vulnerability of water distribution systems

Published: 15 April 2014 Publication History

Abstract

This article presents a network interdiction model to assess the vulnerabilities of a class of physical flow networks. A flow network is modeled by a potential function defined over the nodes and a flow function defined over arcs (links). In particular, the difference in potential function between two nodes is characterized by a nonlinear flux function of the flow on link between the two nodes. To assess the vulnerability of the network to adversarial attack, the problem is formulated as an attacker-defender network interdiction model. The attacker's objective is to interdict the most valuable links of the network given his resource constraints. The defender's objective is to minimize power loss and the unmet demand in the network. A bi-level approach is explored to identify most critical links for network interdiction. The applicability of the proposed approach is demonstrated on a reference water distribution network, and its utility toward developing mitigation plans is discussed.

References

[1]
D. L. Alderson, G. G. Brown, W. M. Carlyle, and L. A. Cox. Sometimes there is no most-vital arc: assessing and improving the operational resilience of systems. Military Oper. Res., 18(1):21--37, 2013.
[2]
D. L. Alderson, G. G. Brown, W. M. Carlyle, and R. K. Wood. Solving defender-attacker-defender models for infrastructure defense. In 12th INFORMS Computing Society Conference. INFORMS, 2011.
[3]
M. Allen, A. Preis, M. Iqbal, S. Srirangarajan, H. B. Lim, L. Girod, and A. J. Whittle. Real-time in-network distribution system monitoring to improve operational efficiency. J. Amer. Water Work. Assoc., 103(7):63--75, July 2011.
[4]
E. Alperovits and U. Shamir. Design of optimal water distribution systems. Water Resources Research, 13(6):885--900, May-June 1977.
[5]
S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen. Stealthy deception attacks on water scada systems. In HSCC'10, Stockholm, Sweden, pages 161--170. ACM, April 2010.
[6]
A. Babayan, D. Savic, G. Walters, and Z. Kapelan. Robust least cost design of water distribution networks using redundancy and intergration based methodologies. J. Water Resour. Plann. Manage., 133(1):67--77, 2007.
[7]
A. Babayan, G. Walters, Z. Kapelan, and D. Savic. Least cost design of water distribution networks under demand uncertainty. J. Water Resour. Plann. Manage., 131(5):375--382, 2005.
[8]
H. Bell, U. Kanturska, D. Schmocker, and A. Fonze. Attacker - defender models and road network vulnerability. Phil. Trans. R. Soc. A, 366:1893--1906, 2008.
[9]
P. F. Boulos, K. E. Lansey, and B. W. Karney. Comprehensive water distribution systems analysis handbook for engineers and planners. MWH Soft, Inc. Publ., Pasadena, CA, 2006.
[10]
S. Boyd and L. Vandenberghe. Convex optimization. Cambridge university press, The Edinburgh Building, Cambridge, UK, 2004.
[11]
G. G. Brown, W. M. Carlyle, J. Salmeron, and K. Wood. Analyzing the vulnerability of critical infrastructure to attack and planning defenses. In Tutorials in Operations Research, pages 102--123. INFORMS, 2005.
[12]
B. Calvert and G. Deady. Braess's paradox and power-law nonlinearities in networks. J. Austral. Math. Soc. Ser.B, 35:1--22, 1993.
[13]
A. Delgadillo, J. M. Arroyo, and N. Alguacil. Analysis of electric grid interdiction with line switching. IEEE Trans. Power Syst., 25(2):633--641, May 2010.
[14]
EPA. Water sector-specific plan, an annex to the national infrastructure protection plan. In EPA 817-R-10-001. Water Security Division, 2010.
[15]
G. Fu and Z. Kapelan. Fuzzy probabilistic design of water distribution networks. Water Resour. Res., 47:W05538, 2011.
[16]
O. Fujiwara and J. Li. Reliability analysis of water distribution networks in consideration of equity, redistribution, and pressure-dependent demand. Water Resources Research, 34(7):1843--1850, July 1998.
[17]
A. M. Geoffrion. Generalized benders decomposition. J. Opt. Theor. Appli., 10(4):237--260, October 1972.
[18]
O. Giustolisi, D. Savic, and Z. Kapelan. Pressure driven demand and leakage simulation for water distribution networks. J. Hydr. Engi., 134(5):626--635, May 2008.
[19]
R. Johnson. Being vulnerable to the threat of confusing threats with vulnerabilites. J. Phys. Secur., 4(2):30--34, May 2010.
[20]
M. Karamouz, S. Saadati, and A. Ahmadi. Vulnerability assessment and rist reduction of water supply systems. In World Environmental and Water Resources Congress, pages 4414--4426. ASCE, October 2010.
[21]
MATLAB. version 8.0.0.783 (R2012b). The MathWorks Inc., Natick, Massachusetts, 2010.
[22]
C. Ocampo-Martinez, V. Puig, G. Cembrano, and J. Quevedo. Application of predictive control strategies to the management of complex networks in the urban water cycle. Control Systems, IEEE, 33(1):15--41, February 2013.
[23]
A. Ostfeld. Water distribution systems connectivity analysis. J. Water Resour. Plann. Manag., 131(1):58--66, January 2013.
[24]
L. Perelman, J. Arad, M. Housh, and A. Ostfeld. Event detection in water distribution systems from multivariate water quality time series. Environ. Sci. Technol., 46:8212--8219, 2012.
[25]
L. Perelman, M. Housh, and A. Ostfeld. Robust optimization for water distribution systems least cost design. Water Resour. Resear., 49(10):6795--6809, 2013.
[26]
R. T. Rockafellar. Network flows and monotropic optimization. Athena Scientific, Belmont, MA, 1998.
[27]
J. Salmeron, K. Wood, and R. Baldick. Analysis of electric grid security under terrorist threat. IEEE Trans. Power Syst., 19(2):905--912, May 2004.
[28]
D. A. Savic. Coping with risk and uncertainty in urban water infrastructure rehabilitation planning. In 1st Italian Urban Hydraulics Conference, pages 28--30, September 2005.
[29]
D. A. Savic and G. A. Walters. Genetic algorithms for least cost design of water distribution networks. Water Resources Planning and Management, 123(2):67--77, March-April 1999.
[30]
S. Srirangarajan, M. Allen, A. Preis, M. Iqbal, H. B. Lim, and A. J. Whittle. Wavelet-based burst event detection and localization in water distribution systems. J. Sign. Process. Syst., 72(1):1--16, July 2013.
[31]
C. Sun, V. Puig, and G. Cembrano. Multi-layer model predictive control of regional water networks: Application to the catalunya case study. In 52nd Conference on Decision and Control. IEEE, December 2013.
[32]
USEPA. EPANET 2.00.12. U.S. Environmental Protection Agency, Cincinnati, Ohio, 2002.
[33]
WSCC-CSWG. Roadmap to secure control systems in the water sector. In Water Sector Cyber Security Working Group. Water Sector Coordinating Counsil Cyber Security Working Group, March 2008.
[34]
C. Xu and C. Goutler. Reliability based optimal design of water distribution systems. J. Water Resour. Plann. Manage., 125(6):352--362, 1999.
[35]
C. Xu and I. C. Goutlter. Probabilistic model for water distribution reliability. J. Water Resour. Plann. Manag., 124(4):218--228, July 1998.
[36]
A. Yazdani and P. Jeffrey. Applying network theory to quantify the redundancy and structural robustness of water distribution systems. J. Water Resour. Plann. Manag., 38(2):153--161, March 2012.
[37]
A. Yazdani and P. Jeffrey. Water distribution system vulnerability analysis using weighted and directed network models. Water Resour. Res., 48:W06517, 2012.
[38]
B. Zhuang, K. Lansey, and D. Kang. Resilience/availability analysis of municipal water distribution system incorporating adaptive pump operation. J. Hydraul. Eng., 139(5):527--537, 2013.

Cited By

View all
  • (2024)A Quantal Response Analysis of Simultaneous Multi-Target Attacker-Defender Security GamesNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575252(1-6)Online publication date: 6-May-2024
  • (2024)A Quantal Response Analysis of Human Decision-Making in Interdependent Security Games Modeled by Attack GraphsIEEE Access10.1109/ACCESS.2024.339130512(56159-56178)Online publication date: 2024
  • (2024)PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphsInternational Journal of Information Security10.1007/s10207-024-00964-324:1Online publication date: 23-Dec-2024
  • Show More Cited By

Index Terms

  1. A network interdiction model for analyzing the vulnerability of water distribution systems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      HiCoNS '14: Proceedings of the 3rd international conference on High confidence networked systems
      April 2014
      162 pages
      ISBN:9781450326520
      DOI:10.1145/2566468
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 April 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cyber-physical systems
      2. network flow analysis
      3. network interdiction
      4. vulnerability assessment
      5. water distribution systems

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      HiCoNS '14
      Sponsor:

      Acceptance Rates

      HiCoNS '14 Paper Acceptance Rate 12 of 18 submissions, 67%;
      Overall Acceptance Rate 30 of 55 submissions, 55%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 14 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Quantal Response Analysis of Simultaneous Multi-Target Attacker-Defender Security GamesNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575252(1-6)Online publication date: 6-May-2024
      • (2024)A Quantal Response Analysis of Human Decision-Making in Interdependent Security Games Modeled by Attack GraphsIEEE Access10.1109/ACCESS.2024.339130512(56159-56178)Online publication date: 2024
      • (2024)PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphsInternational Journal of Information Security10.1007/s10207-024-00964-324:1Online publication date: 23-Dec-2024
      • (2022)Attack-Resilient Path Planning Using Dynamic Games With Stopping StatesIEEE Transactions on Robotics10.1109/TRO.2021.312389638:1(25-41)Online publication date: Feb-2022
      • (2022)TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833591(249-266)Online publication date: May-2022
      • (2021)Distributed Sensing for Monitoring Water Distribution SystemsEncyclopedia of Systems and Control10.1007/978-3-030-44184-5_100105(614-622)Online publication date: 4-Aug-2021
      • (2020)Improvement of Cyber-Attack Detection Accuracy from Urban Water Systems Using Extreme Learning MachineApplied Sciences10.3390/app1022817910:22(8179)Online publication date: 18-Nov-2020
      • (2020)Simulation-Based Analysis of a Real Water Distribution Network to Support Emergency ManagementIEEE Transactions on Engineering Management10.1109/TEM.2019.293909967:3(554-567)Online publication date: Aug-2020
      • (2020)Detecting Cyber-Physical Attacks in Water Distribution Systems: One-Class Classifier ApproachJournal of Water Resources Planning and Management10.1061/(ASCE)WR.1943-5452.0001259146:8Online publication date: Aug-2020
      • (2020)Improving a Branch-and-Bound Approach for the Degree-Constrained Minimum Spanning Tree Problem with LKHIntegration of Constraint Programming, Artificial Intelligence, and Operations Research10.1007/978-3-030-58942-4_29(447-456)Online publication date: 19-Sep-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media