Graph decomposition in risk analysis and sensor placement for water distribution network security

dc.contributor.authorDeuerlein, J.
dc.contributor.authorWolters, A.
dc.contributor.authorMeyer-Harries, L.
dc.contributor.authorSimpson, A.
dc.contributor.conferenceWater Distribution Systems Analysis (12th : 2010 : Tucson, Arizona, USA)
dc.date.issued2010
dc.description.abstractOver the last decade considerable research in water distribution network modeling has focused on the security of water supply against terrorist attacks. In this paper, specific issues of urban and regional distribution systems as to their vulnerability against terrorist attacks with CBRN (chemical, biological, radiological, nuclear) substances, detection methods and emergency plans are investigated. As a first step, a risk analysis is carried out based on topological properties of different parts of the network, classification of building developments and customers. The decomposition of the network graph enables the differentiation of network components (into treed components, blocks and bridges). Following this subdivision, the different impacts and detection characteristics can be assessed. The results of the risk analysis can be used for the creation of risk maps. The specific differences of urban (mainly looped) and regional (mainly branched) supply networks are discussed. The decomposition of the network graph can be further used for reducing the problem size of the sensor allocation problem by pre-selection of events with little impact and aggregation of the network model. The main ideas are demonstrated by use of the example network 2 of the Battle of the Water Sensor Networks (BWSN). The crucial point of all sensor networks is that a full coverage of the system won't be reachable and there will be a considerably long time to detection. An alarm is not actually generated until the toxic substance has passed a sensor. In this study another approach is proposed. The case of intrusion of the toxic substance by pumping against the pressure of the network will be considered. This event is considered as a "positive" leak. Leak detection methods that are normally used for the observation of pipelines are applied to the investigation of the water hammer event caused by the intrusion. Finally, conditions for the practical applicability of the method will be put up for discussion.
dc.description.statementofresponsibilityJochen Deuerlein, Andreas Wolters, Lea Meyer-Harries and Angus R. Simpson
dc.identifier.citation12th Annual Conference on Water Distribution Systems Analysis 2010, Tucson, Arizona, United States, 12 Sep-15 Sep 2010 / Kevin E. Lansey, Christopher Y. Choi, Avi Ostfeld and Ian L. Pepper (eds.): pp. 394-411
dc.identifier.doi10.1061/41203(425)38
dc.identifier.isbn9780784412039
dc.identifier.orcidSimpson, A. [0000-0003-1633-0111]
dc.identifier.urihttp://hdl.handle.net/2440/80959
dc.language.isoen
dc.publisherAmerican Society of Civil Engineers
dc.rights© 2010 American Society of Civil Engineers
dc.source.urihttps://doi.org/10.1061/41203(425)38
dc.titleGraph decomposition in risk analysis and sensor placement for water distribution network security
dc.typeConference paper
pubs.publication-statusPublished

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
hdl_80959.pdf
Size:
952.59 KB
Format:
Adobe Portable Document Format
Description:
Accepted version