Securing Smart Water Distribution Systems against Deceptive Data Injections: A Chance-Constrained Cyberattack Localization Approach
Publication: World Environmental and Water Resources Congress 2024
ABSTRACT
With the emergence of sensor-based devices, deceptive cyberattacks targeting smart water distribution systems (WDSs) have become substantially frequent. An inherent challenge for water authorities is to localize the susceptible regions of smart WDSs considering demand variability at nodes. To resolve this problem, this paper proposes a novel chance-constrained, cyberattack localization model to identify the susceptible zones of the WDSs that can face the adverse consequences of cyberattacks. The proposed model accounts for variable water demand at nodes, and it is validated with case studies depicting real-world situations. Furthermore, the financial damages from concurrent pipe leakage, hydraulic disturbances, and deception attacks are analyzed. The results reveal that the monetary losses due to cyberattacks have a positive correlation with the underlying leaks and disturbances in the systems. This paper contributes to the enhancement of cybersecurity aspects of the water systems while addressing the susceptibility of the system under uncertainties.
Get full access to this chapter
View all available purchase options and get full access to this chapter.
REFERENCES
Amin, S., Litrico, X., Sastry, S., and Bayen, A. M. (2013). “Cyber security of water scada systems—part i: Analysis and experimentation of stealthy deception attacks.” IEEE Transactions on Control Systems Technology, 21(5), 1963–1970.
Bentley. (2023). Pump theory. Accessed on July 26, 2023.
Elger, D. F., Williams, B. C., and Crowe, C. T. (2022). Engineering fluid mechanics. John Wiley & Sons.
Hwang, N. H., Houghtalen, R. J., Akan, A. O., and Hwang, N. H. (1996). Fundamentals of hydraulic engineering systems. Prentice Hall Upper Saddle River, NJ.
Lansey, K. E., Duan, N., Mays, L. W., and Tung, Y.-K. (1989). “Water Distribution System Design Under Uncertainties.” Journal of Water Resources Planning and Management, 115(5), 630–645 Publisher: American Society of Civil Engineers.
Mays, L. W. (2010). Water resources engineering. John Wiley & Sons.
Moazeni, F., and Khazaei, J. (2021a). “Sequential false data injection cyberattacks in water distribution systems targeting storage tanks; a bi-level optimization model.” Sustainable Cities and Society, 70, 102895.
Moazeni, F., and Khazaei, J. (2021b). “Sequential false data injection cyberattacks in water distribution systems targeting storage tanks; a bi-level optimization model.” Sustainable Cities and Society, 70, 102895.
Musleh, A. S., Chen, G., and Dong, Z. Y. (2020). “A survey on the detection algorithms for false data injection attacks in smart grids.” IEEE Transactions on Smart Grid, 11(3), 2218–2234.
Patriarca, R., Simone, F., and Di Gravio, G. (2022). “Modelling cyber resilience in a water treatment and distribution system.” Reliability Engineering & System Safety, 226, 108653.
Puig, V., Ocampo-Martínez, C., Pérez, R., Cembrano, G., Quevedo, J., and Escobet, T. (2017). Real-time monitoring and operational control of drinking-water systems. Springer.
Taormina, R., Galelli, S., Tippenhauer, N. O., Salomons, E., and Ostfeld, A. (2017). “Characterizing cyber-physical attacks on water distribution systems.” Journal of Water Resources Planning and Management, 143(5), 04017009.
Taormina, R., et al. (2018). “Battle of the attack detection algorithms: Disclosing cyber attacks on water distri- bution networks.” Journal of Water Resources Planning and Management, 144(8), 04018048.
Walski, T. M., Chase, D. V., Savic, D. A., Grayman, W., Beckwith, S., and Koelle, E. (2003). Advanced water distribution modeling and management.
Information & Authors
Information
Published In
History
Published online: May 16, 2024
ASCE Technical Topics:
- Case studies
- Computer networks
- Computing in civil engineering
- Cyber security
- Engineering fundamentals
- Equipment and machinery
- Infrastructure
- Methodology (by type)
- Pipe leakage
- Pipeline management
- Pipeline systems
- Probe instruments
- Research methods (by type)
- Validation
- Water and water resources
- Water demand
- Water management
- Water supply
- Water supply systems
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.