skip to main content
10.1145/2738935.2738945acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Towards WaterLab: A Test Facility for New Cyber-Physical Technologies in Water Distribution Networks

Published:13 April 2015Publication History

ABSTRACT

This paper reports the initial steps in the development of WaterLab, an ambitious experimental facility for the testing of new cyber-physical technologies in drinking water distribution networks (DWDN). WaterLab's initial focus is on wireless control networks and on data-based, distributed anomaly detection over wireless sensor networks. The former can be used to control the hydraulic properties of a DWDN, while the latter can be used for in-situ detection and isolation of contamination and hydraulic faults.

References

  1. R. Biuk-Aghai, Y.-W. Si, S. Fong, and P.-F. Yan. Individual movement behaviour in secure physical environments: Modeling and detection of suspicious activity. In L. Cao and P. S. Yu, editors, Behavior Computing, pages 241--253. Springer London, 2012.Google ScholarGoogle Scholar
  2. E. J. M. Blokker. Stochastic water demand modelling for a better understanding of hydraulics in water distribution networks. PhD thesis, Delft University of Technology, 2010.Google ScholarGoogle Scholar
  3. H. H. W. J. Bosman, G. Iacca, H. J. Wörtche, and A. Liotta. Online fusion of incremental learning for wireless sensor networks. In Proc. of the 4th of IEEE ICDM Workshop on Data Mining in Networks, Shenzhen, China, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  4. H. H. W. J. Bosman, A. Liotta, G. Iacca, and H. J. Wortche. Anomaly detection in sensor systems using lightweight machine learning. In 2013 IEEE Int. Conf. on Syst., Man, Cybern., pages 7--13, Manchester, United Kingdom, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3):1--58, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. De Persis and C. Kallesoe. Pressure regulation in nonlinear hydraulic networks by positive and quantized controls. IEEE Trans. Control Syst. Technol., 19(6):1371--1383, Nov 2011.Google ScholarGoogle ScholarCross RefCross Ref
  7. D. G. Eliades and M. M. Polycarpou. A fault diagnosis and security framework for water systems. IEEE Trans. Control Syst. Technol., 18(6):1254--1265, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  8. R. A. Freeman and P. V. Kokotović. Robust Nonlinear Control Design: State-Space and Lyapunov Techniques. Birkhäuser, Boston, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Isidori. Nonlinear Control Systems II. Communications and Control Engineering. Springer, London, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Jaumouillé, O. Piller, and J. Van Zyl. A hydraulic model for water distribution systems incorporating both inertia and leakage. In Proc. of Water Management Challenges in Global Change Conf., pages 3--5, Leicester, United Kingdom, 2007.Google ScholarGoogle Scholar
  11. Z.-P. Jiang, Y. Lin, and Y. Wang. Stabilization of nonlinear time-varying systems: A control Lyapunov function approach. Journal of Systems Science and Complexity, 22(4):683--696, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  12. S. Kao, A. Ganguly, and K. Steinhaeuser. Motivating complex dependence structures in data mining: A case study with anomaly detection in climate. In 2009 IEEE International Conference on Data Mining Workshops, pages 223--230, Miami, FL, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. E. Larock, R. W. Jeppson, and G. Z. Watters. Hydraulics of Pipeline Systems. CRC Press, Boca Raton, FL, 2000.Google ScholarGoogle Scholar
  14. Y. S. Ledyaev and E. D. Sontag. A Lyapunov characterization of robust stabilization. Nonlinear Analysis, 37:813--840, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  15. Y. Lin and E. D. Sontag. A universal formula for stabilization with bounded control. Systems & Control Letters, 16:393--397, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. McNabola, P. Coughlan, L. Corcoran, C. Power, A. P. Williams, I. Harris, J. Gallagher, and D. Styles. Energy recovery in the water industry using micro-hydropower: An opportunity to improve sustainability. Water Policy, 16:168--183, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  17. C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan. A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications, 36(1):42--57, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Pajic, S. Sundaram, G. J. Pappas, and R. Mangharam. The wireless control network: A new approach for control over networks. IEEE Trans. Automat. Contr., 56(10), 2011.Google ScholarGoogle ScholarCross RefCross Ref
  19. C. Phua, V. Lee, K. Smith, and R. Gayler. A comprehensive survey of data mining-based fraud detection research. Arxiv preprint arXiv:1009.6119, 2010.Google ScholarGoogle Scholar
  20. O. Piller and M. Propato. Slow transient pressure driven modeling in water distribution networks. In Proc. Water Distribution Systems Analysis Symposium 2006, pages 1--13, Cincinnati, OH, 2006.Google ScholarGoogle Scholar
  21. L. A. Rossman. EPANET 2 Users Manual. Water Supply and Water Resources Division National Risk Management Research Laboratory, 2000.Google ScholarGoogle Scholar
  22. E. D. Sontag and Y. Wang. New characterizations of input-to-state stability. IEEE Trans. Autom. Control, 41(9):1283--1294, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  23. B. Tangena, P. Janssen, G. Tiesjema, E. van den Brandhof, M. Klein Koerkamp, J. Verhoef, A. Filippi, and W. van Delft. A novel approach for early warning of drinking water contamination events. In Water Contamination Emergencies: Monitoring, Understanding and Acting, pages 13--31. The Royal Society of Chemistry, 2011.Google ScholarGoogle Scholar
  24. P. van Thienen. Alternative strategies for optimal water quality sensor placement in drinking water distribution networks. In 11th International Conference on Hydroinformatics, New York, NY, 2014.Google ScholarGoogle Scholar
  25. C. Wang, K. Viswanathan, L. Choudur, V. Talwar, W. Satterfield, and K. Schwan. Statistical techniques for online anomaly detection in data centers. In 2011 IFIP/IEEE International Symposium on Integrated Network Management (IM), pages 385--392, Dublin, Ireland, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  26. Willow Technologies. Teleosb mote platform. http://goo.gl/z28SqW. Retrieved on Jan. 30, 2015.Google ScholarGoogle Scholar

Index Terms

  1. Towards WaterLab: A Test Facility for New Cyber-Physical Technologies in Water Distribution Networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CySWater'15: Proceedings of the 1st ACM International Workshop on Cyber-Physical Systems for Smart Water Networks
          April 2015
          59 pages
          ISBN:9781450334853
          DOI:10.1145/2738935

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 April 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader