P2O: AI-Driven Framework for Managing and Securing Wastewater Treatment Plants
Publication: Journal of Environmental Engineering
Volume 149, Issue 9
Abstract
Wastewater treatment plants (WWTPs) are critical infrastructures responsible for processing wastewater before discharging effluent to rivers and other potential uses. WWTPs use large, connected deep tunnels for storing sanitary and wet-weather flows for treatment. However, wastewater in those systems cannot exceed safe tunnel levels in order to prevent overflows of untreated wastewater into the environment. Further, WWTPs are among the 16 national lifeline infrastructure sectors in which the utilization of sensor technology has increased, making the sectors vulnerable to all forms of cyber threats. Considering these challenges, the work presented in this manuscript uncovers the role of AI at WWTPs by focusing on two problems: tunnel water-level prediction and detection of security threats. This is done by proposing an AI framework: (prediction, protection, and optimization). The prediction module forecasts the tunnel water level using deep-learning models based on the current wastewater flow in the tunnel and other inputs from the sensors and gauges. The protection module focuses on classifying the intentionality of an anomaly, i.e., whether an attack is adversarial in nature or merely an outlier, using recurrent neural network models. Last, the optimization module aims to provide actionable recommendations to pump operators using a genetic algorithm. The experimental results of indicate that the prediction module can predict the tunnel water level with 85% accuracy, and the protection module can detect about 97% of intentional attacks on WWTPs. AI models within are evaluated; the experimental results are presented and discussed.
Practical Applications
This manuscript presents , which is a novel AI framework that can predict about 85% of wastewater overflow incidences and about 95% of intentional cyberattacks on a WWTP, as indicated in the experiments. The deployment of at a WWTP is essential, especially considering the adverse effects of overflowing wastewater on the environment (i.e., rivers and other water bodies). Moreover, cyberattacks on WWTPs can be subtle, making them challenging to detect; on average, most of them are noticed within one week to one month after the attack. This makes national infrastructure vulnerable to external and internal threats, influencing the well-being of water bodies and overall national security. provides a real-time monitoring interface and can recommend optimal actions in different scenarios (i.e., outliers) for pump operators and process engineers at WWTPs.
Get full access to this article
View all available purchase options and get full access to this article.
Data Availability Statement
The code for will be made available based on requests to the corresponding author. The SWaT (Goh et al. 2016) (https://itrust.sutd.edu.sg/itrust-labs_datasets/) and SMOD (Laso et al. 2017) are open-source data sets that can be obtained by contacting the original owners of the data. The third data set cannot be shared due to a nondisclosure agreement with the WWTP.
References
Abdi, H., and L. J. Williams. 2010. “Principal component analysis.” Wiley Interdiscip. Rev. Comput. Stat. 2 (4): 433–459. https://doi.org/10.1002/wics.101.
Adadi, A., and M. Berrada. 2018. “Peeking inside the black-box: A survey on explainable artificial intelligence (XAI).” IEEE Access 6 (Sep): 52138–52160. https://doi.org/10.1109/ACCESS.2018.2870052.
Adepu, S., and A. Mathur. 2016a. “Introducing cyber security at the design stage of public infrastructures: A procedure and case study.” In Complex systems design & management Asia, 75–94. Cham, Switzerland: Springer.
Adepu, S., and A. Mathur. 2016b. “An investigation into the response of a water treatment system to cyber attacks.” In Proc., 2016 IEEE 17th Int. Symp. on High Assurance Systems Engineering (HASE), 141–148. New York: IEEE.
Adepu, S., and A. Mathur. 2018. “Distributed attack detection in a water treatment plant: Method and case study.” IEEE Trans. Dependable Secure Comput. 18 (1): 86–99. https://doi.org/10.1109/TDSC.2018.2875008.
Alanazi, M., A. Mahmood, and M. J. M. Chowdhury. 2022. “SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues.” Comput. Secur. 125 (Feb): 103028.
Albahar, M. A., R. A. Al-Falluji, and M. Binsawad. 2020. “An empirical comparison on malicious activity detection using different neural network-based models.” IEEE Access 8 (Mar): 61549–61564. https://doi.org/10.1109/ACCESS.2020.2984157.
Alin, A. 2010. “Multicollinearity.” Wiley Interdiscip. Rev. Comput. Stat. 2 (3): 370–374. https://doi.org/10.1002/wics.84.
Ardabili, S., A. Mosavi, M. Dehghani, and A. R. Várkonyi-Kóczy. 2020. “Deep learning and machine learning in hydrological processes climate change and earth systems a systematic review.” In Vol. 101 of Engineering for sustainable future. INTER-ACADEMIA 2019. Lecture notes in networks and systems, edited by A. Várkonyi-Kóczy. Berlin: Springer.
Asadollahfardi, G., M. Afsharnasab, M. H. Rasoulifard, and M. Tayebi Jebeli. 2022. “Predicting of acid red 14 removals from synthetic wastewater in the advanced oxidation process using artificial neural networks and fuzzy regression.” Rend. Lincei Sci. Fis. Nat. 33 (1): 115–126. https://doi.org/10.1007/s12210-021-01043-8.
Asadollahfardi, G., H. Zangooi, M. Asadi, M. Tayebi Jebeli, M. Meshkat-Dini, and N. Roohani. 2018. “Comparison of box-Jenkins time series and ANN in predicting total dissolved solid at the Zāyandé-Rūd River, Iran.” J. Water Supply Res. Technol. AQUA 67 (7): 673–684. https://doi.org/10.2166/aqua.2018.108.
Batarseh, F. A., L. Freeman, and C.-H. Huang. 2021. “A survey on artificial intelligence assurance.” J. Big Data 8 (1): 1–30. https://doi.org/10.1186/s40537-021-00445-7.
Batarseh, F. A., M. O. Yardimci, R. Suzuki, M. N. K. Sikder, Z. Wang, and W. Mao. 2022. “Realtime management of wastewater treatment plants using AI.” Accessed March 15, 2023. https://www.waterrf.org/news/2022-intelligent-water-systems-challenge.
Bennett, N. D., et al. 2013. “Characterising performance of environmental models.” Environ. Modell. Software 40 (Feb): 1–20. https://doi.org/10.1016/j.envsoft.2012.09.011.
Bergstra, J., and Y. Bengio. 2012. “Random search for hyper-parameter optimization.” J. Mach. Learn. Res. 13 (2): 281–305. https://doi.org/10.5555/2503308.2188395.
Biewald, L. 2020. “Experiment tracking with weights and biases.” Accessed March 2, 2023. https://www.wandb.com/.
Bruce, P., A. Bruce, and P. Gedeck. 2020. Practical statistics for data scientists: 50+ essential concepts using R and Python. Sebastopol, CA: O’Reilly Media.
Chai, T., and R. R. Draxler. 2014. “Root mean square error (RMSE) or mean absolute error (MAE)?—Arguments against avoiding RMSE in the literature.” Geosci. Model Dev. 7 (3): 1247–1250. https://doi.org/10.5194/gmd-7-1247-2014.
Charu, C. A. 2018. Neural networks and deep learning: A textbook. New York: Springer.
Chawla, N. V., K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. 2002. “Smote: Synthetic minority over-sampling technique.” J. Artif. Intell. Res. 16 (Jun): 321–357. https://doi.org/10.1613/jair.953.
Chicano, F., A. M. Sutton, L. D. Whitley, and E. Alba. 2015. “Fitness probability distribution of bit-flip mutation.” Evol. Comput. 23 (2): 217–248. https://doi.org/10.1162/EVCO_a_00130.
Collier, K. 2021. “50,000 security disasters waiting to happen: The problem of America’s water supplies.” Accessed March 2, 2023. https://www.nbcnews.com/tech/security/hacker-tried-poison-calif-water-supply-was-easyentering-password-rcna1206.
Corominas, L., M. Garrido-Baserba, K. Villez, G. Olsson, U. Cortés, and M. Poch. 2018. “Transforming data into knowledge for improved wastewater treatment operation: A critical review of techniques.” Environ. Modell. Software 106 (Aug): 89–103. https://doi.org/10.1016/j.envsoft.2017.11.023.
Das, B., and D. Chakrabarty. 2016. “Newton’s divided difference interpolation formula: Representation of numerical data by a polynomial curve.” Int. J. Math. Trend Technol. 35 (3): 197–203.
Dokeroglu, T., E. Sevinc, T. Kucukyilmaz, and A. Cosar. 2019. “A survey on new generation metaheuristic algorithms.” Comput. Ind. Eng. 137 (Nov): 10–40. https://doi.org/10.1016/j.cie.2019.106040.
Doshi-Velez, F., and B. Kim. 2017. “Towards a rigorous science of interpretable machine learning.” Preprint, submitted February 28, 2017. https://arxiv.org/abs/1702.08608.
Faramondi, L., F. Flammini, S. Guarino, and R. Setola. 2021. “A hardware-in-the-loop water distribution testbed dataset for cyber-physical security testing.” IEEE Access 9 (Aug): 122385–122396. https://doi.org/10.1109/ACCESS.2021.3109465.
Fernández, A., S. Garcia, F. Herrera, and N. V. Chawla. 2018. “Smote for learning from imbalanced data: Progress and challenges, marking the 15-year anniversary.” J. Artif. Intell. Res. 61 (Apr): 863–905. https://doi.org/10.1613/jair.1.11192.
Feurer, M., and F. Hutter. 2019. “Hyperparameter optimization.” In Automated machine learning. The springer series on challenges in machine learning, edited by F. Hutter, L. Kotthoff, and J. Vanschoren. Berlin: Springer.
Flynn, M. J. 2020. “Civilians ‘defending forward’ in cyberspace.” Cyber Defense Rev. 5 (1): 29–40.
Forest, J. J. F. 2006. Vol. 3 of Homeland security: Critical infrastructure. Westport, CT: Greenwood Publishing Group.
Gilpin, L. H., D. Bau, B. Z. Yuan, A. Bajwa, M. Specter, and L. Kagal. 2018. “Explaining explanations: An overview of interpretability of machine learning.” In Proc., 2018 IEEE 5th Int. Conf. on data science and advanced analytics (DSAA), 80–89. New York: IEEE.
Goh, J., S. Adepu, K. N. Junejo, and A. Mathur. 2016. “A dataset to support research in the design of secure water treatment systems.” In Proc., Int. Conf. on Critical Information Infrastructures Security, 88–99. Berlin: Springer.
Hassanzadeh, A., A. Rasekh, S. Galelli, M. Aghashahi, R. Taormina, A. Ostfeld, and M. K. Banks. 2020. “A review of cybersecurity incidents in the water sector.” J. Environ. Eng. 146 (5): 03120003. https://doi.org/10.1061/(ASCE)EE.1943-7870.0001686.
Hettiarachchi, H., and T. Ranasinghe. 2019. “Emoji powered capsule network to detect type and target of offensive posts in social media.” In Proc., Int. Conf. on Recent Advances in Natural Language Processing (RANLP 2019), 474–480. Varna, Bulgaria: INCOMA Ltd.
Hindy, H., D. Brosset, E. Bayne, A. Seeam, and X. Bellekens. 2019. “Improving SIEM for critical SCADA water infrastructures using machine learning.” In Proc., Computer Security: ESORICS 2018 Int. Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers 2, 3–19. Berlin: Springer. https://doi.org/10.1007/978-3-030-12786-2.
Hingston, P. F., L. C. Barone, and Z. Michalewicz. 2008. Design by evolution: Advances in evolutionary design. Berlin: Springer.
Hyndman, R. J., and G. Athanasopoulos. 2018. Forecasting: Principles and practice. Melbourne, Australia: OTexts.
Ilyas, A., L. Engstrom, A. Athalye, and J. Lin. 2018. “Black-box adversarial attacks with limited queries and information.” In Vol. 80 of Proc., Int. Conf. on Machine Learning, in Proceedings of Machine Learning Research, 2137–2146. Washington, DC: Machine Learning Research.
James, G., D. Witten, T. Hastie, and R. Tibshirani. 2013. Vol. 112 of An introduction to statistical learning. Boston: Springer.
Kabir Sikder, M. N., F. A. Batarseh, P. Wang, and N. Gorentala. 2022. “Model-agnostic scoring methods for artificial intelligence assurance.” In Proc., 2022 IEEE 29th Annual Software Technology Conf. (STC), 9–18. New York: IEEE. https://doi.org/10.1109/STC55697.2022.00011.
Katoch, S., S. S. Chauhan, and V. Kumar. 2021. “A review on genetic algorithm: Past, present, and future.” Multimedia Tools Appl. 80 (5): 8091–8126. https://doi.org/10.1007/s11042-020-10139-6.
Khan, N. A., S. U. Khan, S. Ahmed, I. H. Farooqi, M. Yousefi, A. A. Mohammadi, and F. Changani. 2020. “Recent trends in disposal and treatment technologies of emerging-pollutants-a critical review.” TRAC Trends Anal. Chem. 122 (Jan): 115744. https://doi.org/10.1016/j.trac.2019.115744.
Khan, N. A., V. Vambol, S. Vambol, B. Bolibrukh, M. Sillanpaa, F. Changani, A. Esrafili, and M. Yousefi. 2021. “Hospital effluent guidelines and legislation scenario around the globe: A critical review.” J. Environ. Chem. Eng. 9 (5): 105874. https://doi.org/10.1016/j.jece.2021.105874.
Kochenderfer, M. J., and T. A. Wheeler. 2019. Algorithms for optimization. Cambridge, MA: MIT Press.
Komorowski, M., D. C. Marshall, J. D. Salciccioli, and Y. Crutain. 2016. “Exploratory data analysis.” In Secondary analysis of electronic health records, 185–203. Cham, Switzerland: Springer.
Kuhn, M., and K. Johnson. 2013. Vol. 26 of Applied predictive modeling. New York: Springer.
Kulkarni, A., D. Chong, and F. A. Batarseh. 2020. “Foundations of data imbalance and solutions for a data democracy.” In Data democracy, 83–106. Amsterdam, Netherlands: Elsevier.
Laso, P. M., D. Brosset, and J. Puentes. 2017. “Dataset of anomalies and malicious acts in a cyber-physical subsystem.” Data Brief 14 (Oct): 186–191. https://doi.org/10.1016/j.dib.2017.07.038.
LeCun, Y., Y. Bengio, and G. Hinton. 2015. “Deep learning.” Nature 521 (7553): 436–444. https://doi.org/10.1038/nature14539.
Li, J.-H. 2018. “Cyber security meets artificial intelligence: A survey.” Front. Inf. Technol. Electron. Eng. 19 (12): 1462–1474. https://doi.org/10.1631/FITEE.1800573.
Lim, B., and S. Zohren. 2021. “Time-series forecasting with deep learning: A survey.” Philos. Trans. R. Soc. A 379 (2194): 202–209.
Lunardi, A. 2018. “Real interpolation.” In Vol. 16 of Interpolation theory. CRM series. Berlin: Springer.
Lundberg, S. M., and S.-I. Lee. 2017. “A unified approach to interpreting model predictions.” In Advances in neural information processing systems, 30. San Mateo, CA: Morgan Kaufmann Publishers.
Luo, Y., W. Guo, H. H. Ngo, L. D. Nghiem, F. I. Hai, J. Zhang, S. Liang, and X. C. Wang. 2014. “A review on the occurrence of micropollutants in the aquatic environment and their fate and removal during wastewater treatment.” Sci. Total Environ. 473 (Mar): 619–641. https://doi.org/10.1016/j.scitotenv.2013.12.065.
Miller, T., A. Staves, S. Maesschalck, M. Sturdee, and B. Green. 2021. “Looking back to look forward: Lessons learnt from cyber-attacks on industrial control systems.” Int. J. Crit. Infrastruct. Prot. 35 (Dec): 100464. https://doi.org/10.1016/j.ijcip.2021.100464.
Moradbeikie, A., K. Jamshidi, A. Bohlooli, J. Garcia, and X. Masip-Bruin. 2020. “An IIOT based ICS to improve safety through fast and accurate hazard detection and differentiation.” IEEE Access 8 (Nov): 206942–206957. https://doi.org/10.1109/ACCESS.2020.3037093.
Moriasi, D. N., J. G. Arnold, M. W. Van Liew, R. L. Bingner, R. D. Harmel, and T. L. Veith. 2007. “Model evaluation guidelines for systematic quantification of accuracy in watershed simulations.” Trans. ASABE 50 (3): 885–900. https://doi.org/10.13031/2013.23153.
Owolabi, T. A., S. R. Mohandes, and T. Zayed. 2022. “Investigating the impact of sewer overflow on the environment: A comprehensive literature review paper.” J. Environ. Manage. 301 (Jan): 113810. https://doi.org/10.1016/j.jenvman.2021.113810.
Park, J., W. H. Lee, K. T. Kim, C. Y. Park, S. Lee, and T.-Y. Heo. 2022. “Interpretation of ensemble learning to predict water quality using explainable artificial intelligence.” Sci. Total Environ. 832 (Aug): 155070. https://doi.org/10.1016/j.scitotenv.2022.155070.
Perrone, P., F. Flammini, and R. Setola. 2021. “Machine learning for threat recognition in critical cyber-physical systems.” In Proc., 2021 IEEE Int. Conf. on Cyber Security and Resilience (CSR), 298–303. New York: IEEE.
Peters, P. E., and D. H. Zitomer. 2021. “Current and future approaches to wet weather flow management: A review.” Water Environ. Res. 93 (8): 1179–1193. https://doi.org/10.1002/wer.1506.
Picek, S., M. Golub, and D. Jakobovic. 2012. “Evaluation of crossover operator performance in genetic algorithms with binary representation.” In Bio-iInspired computing and applications. ICIC 2011. Lecture notes in computer science, edited by D. S. Huang, Y. Gan, P. Premaratne, and K. Han, 223–230. Berlin: Springer.
Radanliev, P., D. De Roure, M. Van Kleek, O. Santos, and U. Ani. 2021. “Artificial intelligence in cyber physical systems.” AI Soc. 36 (3): 783–796. https://doi.org/10.1007/s00146-020-01049-0.
Rahnama, E., O. Bazrafshan, and G. Asadollahfardi. 2020. “Application of data-driven methods to predict the sodium adsorption rate (SAR) in different climates in Iran.” Arabian J. Geosci. 13 (21): 1–19. https://doi.org/10.1007/s12517-020-06146-4.
Ratner, B. 2009. “The correlation coefficient: Its values range between + 1/- 1, or do they?” J. Targeting Meas. Anal. Mark. 17 (2): 139–142. https://doi.org/10.1057/jt.2009.5.
Reardon, R. D. 2005. “Clarification concepts for treating peak wet weather wastewater flows.” In Proc., WEFTEC 2005, 4431–4444. Clermont, FL: Florida Water Resources Journal.
Robison, M. 1991. “National pollutant discharge elimination system (NPDES) permit application requirement for storm water discharges.” In Army environmental hygiene agency aberdeen proving ground MD. Washington, DC: USEPA.
Sahu, A., Z. Mao, P. Wlazlo, H. Huang, K. Davis, A. Goulart, and S. Zonouz. 2021. “Multi-source multi-domain data fusion for cyberattack detection in power systems.” IEEE Access 9 (Aug): 119118–119138. https://doi.org/10.1109/ACCESS.2021.3106873.
Sanders, K. T., and M. E. Webber. 2012. “Evaluating the energy consumed for water use in the united states.” Environ. Res. Lett. 7 (3): 034034. https://doi.org/10.1088/1748-9326/7/3/034034.
Schütze, M., A. Campisano, H. Colas, W. Schilling, and P. A. Vanrolleghem. 2002. “Real-time control of urban wastewater systems-where do we stand today?” In Global solutions for urban drainage, 1–17. Reston, VA: ASCE.
Sojobi, A. O., and T. Zayed. 2022. “Impact of sewer overflow on public health: A comprehensive scientometric analysis and systematic review.” Environ. Res. 203 (Jan): 111609. https://doi.org/10.1016/j.envres.2021.111609.
Thompson, N. C., K. Greenewald, K. Lee, and G. F. Manso. 2020. “The computational limits of deep learning.” Preprint, submitted July 10, 2020. https://arxiv.org/abs/2007.05558.
Throneburg, M., P. Amico, and M. Labitzke. 2014. “An optimization planning framework for cost-effective wet-weather planning.” In Proc., Collection Systems Conf. 2014. Richmond, VA: Water Environment Federation.
Tuptuk, N., P. Hazell, J. Watson, and S. Hailes. 2021. “A systematic review of the state of cyber-security in water systems.” Water 13 (1): 81. https://doi.org/10.3390/w13010081.
Wang, Z., H. Song, D. W. Watkins, K. G. Ong, P. Xue, Q. Yang, and X. Shi. 2015. “Cyber-physical systems for water sustainability: Challenges and opportunities.” IEEE Commun. Mag. 53 (5): 216–222. https://doi.org/10.1109/MCOM.2015.7105668.
Willemain, T. R. 2013. “Practical time series forecasting: A hands-on guide, by Galit Shmueli.” Foresight: Int. J. Appl. Forecasting 1 (29): 43–44.
Yu, T., and H. Zhu. 2020. “Hyper-parameter optimization: A review of algorithms and applications.” Preprint, submitted March 12, 2020. https://arxiv.org/abs/2003.05689.
Yu, Y., X. Si, C. Hu, and J. Zhang. 2019. “A review of recurrent neural networks: LSTM cells and network architectures.” Neural Comput. 31 (7): 1235–1270. https://doi.org/10.1162/neco_a_01199.
Zanzotto, F. M. 2019. “Human-in-the-loop artificial intelligence.” J. Artif. Intell. Res. 64 (Feb): 243–252. https://doi.org/10.1613/jair.1.11345.
Zhong, J., X. Hu, J. Zhang, and M. Gu. 2005. “Comparison of performance between different selection strategies on simple genetic algorithms.” In Vol. 2 of Proc., Int. Conf. on Computational Intelligence for Modelling, Control and Automation and Int. Conf. on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06), 1115–1121. New York: IEEE.
Information & Authors
Information
Published In
Copyright
© 2023 American Society of Civil Engineers.
History
Received: Nov 29, 2022
Accepted: Mar 21, 2023
Published online: Jun 17, 2023
Published in print: Sep 1, 2023
Discussion open until: Nov 17, 2023
ASCE Technical Topics:
- Engineering fundamentals
- Environmental engineering
- Geotechnical engineering
- Infrastructure
- Infrastructure vulnerability
- Lifeline systems
- Measurement (by type)
- Sensors and sensing
- Tunnels
- Wastewater management
- Wastewater treatment plants
- Water and water resources
- Water level
- Water management
- Water supply
- Water treatment
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.