TECHNICAL NOTES
Jul 1, 2006

Locating Monitors in Water Distribution Systems: Red Team–Blue Team Exercise

Publication: Journal of Water Resources Planning and Management
Volume 132, Issue 4

Abstract

Red team–blue team exercises are methods of evaluating security by creating a “game” where one team (the red team) attempts to “attack” a target and the other team (the blue team) tries to defend it. This paper describes a computer exercise where the red team simulates the contamination of a water distribution system and the blue team defends the system by installing monitors to detect the presence of the contaminant. This exercise was developed and has been used as part of several demonstrations on the effectiveness of contamination monitoring systems for distribution systems. For comparison, a mathematical model is applied to the same network to select monitor locations that provide the optimal solution in terms of a set of objectives.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

The writers would like to acknowledge the assistance of Dr. Lewis Rossman in modifying EPANET to calculate exposures. The financial support to Dr. Avi Ostfeld and Elad Salomons by the Technion Grand Water Research Institute and the North Atlantic Treaty Organization [Science for Peace (SfP) Project No. CBD.MD.SFP 981456] is acknowledged. Alan Roberson [American Water Works Association (AWWA)] and Stanley States (Pittsburgh Water and Sewer Authority) made useful suggestions in the development of the original red team–blue team exercise as part of AWWA’s Contamination Monitoring Technologies course.

References

Berry, J., Fleisher, L., Hart, W. E., Phillips, C. A., and Watson, J. (2005). “Sensor placement in municipal water networks.” J. Water Resour. Plan. Manage., 131(3), 237–243.
Craft, R. L. (2002). “A concept for the use of red teams in homeland defense.” Advanced Concepts Group, Sandia National Labs, Albuquerque, N.M. ⟨http://www.sandia.gov/ACG/documents/sandreports/SAND2003-0063P.pdf⟩ (April 3, 2006).
Murray, R., Robert, J., and Uber, J. (2004). “The Threat Ensemble Vulnerability Assessment (TEVA) program for drinking water distribution system security.” Proc., EWRI World Water and Environmental Resources Congress, ASCE, Reston, Va., 1–8.
Ostfeld, A., and Salomons, E. (2004). “A stochastic early warning detection system model for drinking water distribution systems security.” Proc., EWRI World Water and Environmental Resources Congress, ASCE, Reston, Va., 1–6.
Rossman, L. A. (2000). EPANET 2 user’s manual, National Risk Management Research Laboratory, Cincinnati.
Sinnreich, R. H. (2002). “Red team insights from wargaming.” DART working paper #02-3, Hicks and Associates, Inc.http://www.hicksandassociates.com/reports/⟩ (April 3, 2006).

Information & Authors

Information

Published In

Go to Journal of Water Resources Planning and Management
Journal of Water Resources Planning and Management
Volume 132Issue 4July 2006
Pages: 300 - 304

History

Received: Aug 23, 2005
Accepted: Dec 29, 2005
Published online: Jul 1, 2006
Published in print: Jul 2006

Permissions

Request permissions for this article.

Authors

Affiliations

Walter M. Grayman [email protected]
Owner, W. M. Grayman, Consulting Engineer, 321 Ritchie Ave., Cincinnati, OH 45215. E-mail: [email protected]
Avi Ostfeld [email protected]
Senior Lecturer, Dept. of Civil and Environmental Engineering, Technion–Israel Institute of Technology, Haifa 32000, Israel. E-mail: [email protected]
Elad Salomons [email protected]
Owner, OptiWater, 6 Amikam Israel St., Haifa 34385, Israel. E-mail: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share