Reduction of Physical Threats to Water Distribution Systems1
Publication: Journal of Water Resources Planning and Management
Volume 132, Issue 4
Abstract
The potential threats to U.S. water supply systems have changed fundamentally in the past 4 years. Prior to 2001, the major threats were natural causes, accidents, and some malicious behavior by a small group of individuals. Against these threats, water supply agencies have done a truly remarkable job of ensuring a safe, dependable supply. However, threats posed by an organized group of actors may represent a new and different challenge to the security of water supplies. A tool to assist in identifying possible attacks has been developed. Knowledge of these attack scenarios may help in designing countermeasures. The tool uses evolutionary computation as the optimization method, and EPANET as the system simulator. Examples of its use to identify effective physical attacks against a realistic but hypothetical pipe network and initial corresponding countermeasures are presented.
Get full access to this article
View all available purchase options and get full access to this article.
References
Arciszewski, T., and De Jong, K. A. (2001). “Evolutionary computation in civil engineering: Research frontiers.” Civil and structural engineering computing, Civil Compress, 161–179.
Bäck, T., Fogel, D. B., and Michalewicz, Z., eds. (1997). Handbook of evolutionary computation, IOP/Oxford University Press, Amsterdam, The Netherlands.
Bäck, T., Fogel, D. B., and Michalewicz, Z., eds. (2000). Evolutionary computation, Institute of Physics Publishing, Bristol, Philadelphia.
Bentley, P. (1999) Evolutionary design by computers, Morgan Kaufmann, San Francisco.
Blumh, G., Nichols, G., Hawkins, E., and Wadda, M. (2002). “Water security planning in metropolitan Washington area.” COG Institute of Regional Excellence–Project Rep., Washington, D.C.
Goldberg, D. E. (1989). Genetic algorithms in search, optimization and machine learning, Addison-Wesley, Reading, Mass.
Haestad Methods, Inc. (2002). Water Security Summit Proc., Haestad Methods, Inc., Conn.
Mays, L. W. (2000). Water distribution system handbook, McGraw-Hill, New York.
Mays, L. W. (2004). Water supply system security, McGraw-Hill, New York.
Mitchell, M. (1998). An introduction to genetic algorithms (complex adaptive systems), MIT Press, Cambridge, Mass.
Skolicki, Z., Arciszewski, T., Houck, M. H., and De Jong, K. (2005). “Emerging security patterns: Coevolution of terrorist and security scenarios” Proc., 8th Int. Conf. on the Application of Artificial Intelligence to Civil, Structural and Environmental Engineering, Rome.
Spears, W. M., De Jong, K. A., Bäck, T., Fogel, D. B., and De Garris, H. (1993). “An overview of evolutionary computation,” Proc., European Conf. on Machine Learning, Vienna, Austria, 442–459.
U.S. Environmental Protection Agency (EPA). (2005). EPANET 2000 Webpage ⟨http://www.epa.gov/ORD/NRMRL/wswrd/EPANET.html⟩ (February 13, 2005).
Information & Authors
Information
Published In
Copyright
© 2006 ASCE.
History
Received: Aug 24, 2005
Accepted: Dec 30, 2005
Published online: Jul 1, 2006
Published in print: Jul 2006
Notes
An earlier version of this paper was presented under the title “Water Supply Threat Reduction Using Evolutionary Approaches” at the ASCE/EWRI Conference in Anchorage, Alaska, May, 2005.
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.