38
AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop, ICCS 2006, Reading, UK May 28 - 31, 2006

AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

Embed Size (px)

Citation preview

Page 1: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS

Kumar Mahinthakumar

North Carolina State University

DDDAS Workshop, ICCS 2006, Reading, UKMay 28 - 31, 2006

Page 2: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

2

Our Team

North Carolina State University Mahinthakumar, Brill, Ranji (PI’s) Sreepathi, Liu, Vankalaya (Grad Students) Zechman (Post-Doc)

University of Chicago Von Laszewski (PI) Haetgen (Post-Doc)

University of Cincinnati Uber (PI) Feng (Post-Doc)

University of South Carolina Harrison (PI)

Greater Cincinnati Water Works

Page 3: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

3

Outline

Overall Scope of Project Test problem Preliminary Results

Page 4: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

4

Many security threat problems in civil infrastructure systems

Page 5: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

5

Water Distribution Security ProblemDiameter

6.00

12.00

24.00

36.00

in

Page 6: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

6

Water Distribution Problem

Page 7: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

7

Why is this an important problem? Potentially lethal and public health hazard Cause short term chaos and long term issues Diversionary action to cause service outage

Reduction in fire fighting capacity Distract public & system managers

Page 8: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

8

What needs to be done?

Determine Location of the contaminant source(s)Contamination release history

Identify threat management optionsSections of the network to be shut downFlow controls to

Limit spread of contamination Flush contamination

Page 9: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

9

DDDAS Aspects

Dynamic Data Optimization Simulation Workflow Computer Resources

Data Driven and Vice Versa Water Demand Data Water Quality Data

Page 10: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

10

Grid Resource Broker and SchedulerGrid Resource Broker and Scheduler

Adaptive Simulation ControllerAdaptive Simulation Controller

Adaptive Optimization Controller

Sensors& Data

Our Cyberinfrastructure

Mobile RF AMR SensorsStatic RF AMR

Sensor NetworkStatic Water Quality

Sensor Network

Resource Needs

Resource Availability

Bayesian Monte-Carlo Engine

Optimization Engine

Simulation Model

Grid Computing Resources

Adaptive Wireless Data Receptor and Controller

Deci

sio

ns

Data

Adaptive Workflow

Portal

Algorithms & Models

Middleware & Resources

Mod

el

Para

me

ters

Mod

el

Ou

tpu

ts

Page 11: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

11

Key DDDAS Developments Algorithm and Model Development

Dynamic Optimization Bayesian Data Sampling and Probabilistic Assessment Model Auto Calibration Model Skeletonization Network Assessment using Back Tracking

Middleware Development Adaptive Workflow Engine Adaptive Resource Management Controller Designs

Cincinnati Application Scenario Development Source Identification Sensor Network Design Flow control design

Page 12: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

12

Water Distribution Network Modeling Solve for network hydraulics (i.e., pressure, flow)

Depends on Water demand/usage Properties of network components

Uncertainty/variability Dynamic system

Solve for contamination transport Depends on existing hydraulic conditions Spatial/temporal variation

time series of contamination concentration

Page 13: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

13

Source Identification Problem

Find: L(x,y), {Mt}, T0

Minimize Prediction Error ∑i,t || Ci

t(obs) – Cit(L(x,y), {Mt}, T0) ||

where L(x,y) – contamination source location (x,y) Mt – contaminant mass loading at time t T0 – contamination start time Ci

t(obs) – observed concentration at sensors Ci

t(L(x,y), {Mt}, T0) – concentration from system simulation model i – observation (sensor) location t – time of observation

• unsteady• nonlinear• uncertainty/error

Page 14: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

14

Interesting challenges

Non-unique solutions Due to limited observations (in space & time)

Resolve non-uniqueness Incrementally adaptive search

Due to dynamically updated information stream

Optimization under dynamic environments Search under noisy conditions

Due to data errors & model uncertainty

Optimization under uncertain environments

Page 15: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

15

Resolving non-uniqueness Underlying premise

In addition to the “optimal” solution, identify other “good” solutions that fit the observations

Are there different solutions with similar performance in objective space?

Search for alternative solutions

Page 16: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

16

Resolving non-uniqueness

Search for different solutions that are far apart in decision space

x

f(x)

Page 17: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

17

Resolving non-uniqueness…

x

f(x)

Effects of uncertainty

Page 18: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

18

Resolving non-uniqueness…

x

f(x)

Search for solutions that are far apart in decision space and are within an objective threshold of best solution

Page 19: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

19

Resolving non-uniqueness…EAs for Generating Alternatives (EAGA)

Create n subpopulations

Sub Pop 1

Evaluate objfunction values

Best solution (X*, Z*)

Evaluate pop centroid(C1) in decision space

Selection(obj fn values)& EA operators

STOP?

Best Solutions

Sub Pop 2

Evaluate objfunction values

Feasible/Infeasible?

Evaluate distance in decisionspace to other populations

Selection(feasibility, dist)& EA operators

STOP?N Y NY

.

.

.

.

.

.

Page 20: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

20

Non-uniqueness

Concentration for node 115

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0 24 48 72 96 120 144 168 192 216 240 264 288Time step

Co

nce

ntr

atio

n(m

g/L

)

Concentration for node 265

0

0.0002

0.0004

0.0006

0.0008

0.001

0.0012

0.0014

0 24 48 72 96 120 144 168 192 216 240 264 288Time step

Co

ncen

trati

on

(mg

/L)

Contaminant source profile

0

500

1000

1500

2000

2500

3000

3500

1 26 51 76 101 126 151 176 201 226 251 276Time step

So

urc

e m

ass

(mg

/min

)

Page 21: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

21

Simulation Code

EPANET from USEPA Originally for Windows environments Ported to Unix platforms including

TeraGrid architectures

Page 22: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

22

Current Search Algorithms

Classical Random Search (CRS) Easy to implement Massively parallel Tight efficient coupling with EPANET (C)

Evolutionary Algorithms (EA) Stand alone optimization toolkit (Java)

Loose coupling with EPANET through files Specific Algorithms

Standard GA Dynamic Optimization (ADOPT)

Page 23: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

23

Dynamic optimization Minimize Prediction Error

∑i,t || Cit(obs) – Ci

t(L(x,y), {Mt}, T0) ||

Cit(obs) – streaming data

Objective function is dynamically updated Dynamically update estimate of source

characteristics

Page 24: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

24

Dynamic optimization…

Underlying premisePredict solutions using available information

at any time stepSearch for a diverse set of solutions (EAGA)Current solutions are good starting points for

search in the next time step

Page 25: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

25

Preliminary Architecture

MPI

EPANET

EPANET

EPANET

Optimization Toolkit

Sensor Data

Karigen Workflow Engine Grid Resources

Page 26: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

26

Example Test Problem

Single source contamination Unknowns

Source Location Start Time Release History

Algorithms Classical Random Search Evolutionary Computation

Page 27: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

27

Single Source Contamination ProblemContaminant source profile

0

500

1000

1500

2000

2500

3000

3500

1 26 51 76 101 126 151 176 201 226 251 276Time step

So

urc

e m

ass

(mg

/min

)

Page 28: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

28

Single source contamination problemContaminant source profile

0

500

1000

1500

2000

2500

3000

3500

1 26 51 76 101 126 151 176 201 226 251 276Time step

So

urc

e m

ass

(mg

/min

)

Page 29: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

29

Single source contamination problem

Explain the contamination issues

Show animation

Page 30: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

30

Solution Comparison

0

500

1000

1500

2000

2500

3000

3500

source start c1 c2 c3 c4 c5 c6

exact

CRS

ADOPT

GA

ERRORCRS = 6.5%, ADOPT = 5.7%, GA = 10.0 %

Page 31: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

31

Preliminary Architecture

Parallel EPANET(MPI)

EPANET-Driver

Optimization Toolkit

Sensor Data

Karigen Workflow Engine Grid Resources

EPANET EPANET EPANET

Page 32: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

32

Speedups on local clusterEPANET File based Vs. CRS

0500

10001500200025003000350040004500

1 2 4 8 16 22

Num of Processors

Tim

e(s

ec

)

Parallel EPANET-FileBased

Parallel EPANET-CRS Version

Page 33: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

33

Java Toolkit Overhead

EA + Parallel EPANET

0500

10001500200025003000350040004500

1 2 4 8 16

Number of Processors

Tim

e(se

c) Total time

Epanet Time

EAGA time

Page 34: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

34

Java Toolkit Overhead

EA + Parallel EPANET

0%10%20%30%40%50%60%70%80%90%

100%

1 2 4 8 16

Number of Processors

% o

f T

ota

l T

ime

EAGA time

Epanet Time

Page 35: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

35

Speedups on local clusterParallel EPANET

0500

10001500200025003000350040004500

1 2 4 8 16 22Num of Processors

Tim

e(se

c)

File based coupling (EA)

Tight coupling (CRS)

Page 36: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

36

Summary

A cyberinfrastructure is being developed for water distribution threat management

Adaptive dynamic optimization algorithm shows promise for detecting contamination sources

Page 37: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

37

What’s Next?

Dynamic optimization for determining optimal location of sensors and optimal sampling frequency

True integration of workflow engine into the cyberinfrastructure

Backtracking to improve source identification search efficiency

Page 38: AN ADAPTIVE CYBERINFRASTRUCTURE FOR THREAT MANAGEMENT IN URBAN WATER DISTRIBUTION SYSTEMS Kumar Mahinthakumar North Carolina State University DDDAS Workshop,

38

Questions?