Next Article in Journal
Solving Confirmation Time in Sharded Blockchain with PFQN
Next Article in Special Issue
A Comparative Study of Deep-Learning Autoencoders (DLAEs) for Vibration Anomaly Detection in Manufacturing Equipment
Previous Article in Journal
Offloading Decision and Resource Allocation in Mobile Edge Computing for Cost and Latency Efficiencies in Real-Time IoT
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Formal Model for Reliable Data Acquisition and Control in Legacy Critical Infrastructures

ETSI Telecomunicación, Universidad Politécnica de Madrid, 28040 Madrid, Spain
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(7), 1219; https://doi.org/10.3390/electronics13071219
Submission received: 6 March 2024 / Revised: 21 March 2024 / Accepted: 24 March 2024 / Published: 26 March 2024
(This article belongs to the Special Issue Current Trends on Data Management)

Abstract

:
The digital transformation of critical infrastructures, such as energy or water distribution systems, is essential for their smart management. Faster issue identification and smoother services enable better adaptation to consumers’ evolving demands. However, these large-scale infrastructures are often outdated. Their digital transformation is crucial to enable them to support societies. This process must be carefully planned, providing guidance that ensures that the data they rely on are dependable and that the system remains fully operational during the transition. This paper presents a formal model that supports reliable data acquisition in legacy critical infrastructures, facilitating their evolution towards a data-driven smart system. Our model provides the foundation for a flexible transformation process while generating dependable data for system management. We demonstrate the model’s applicability in a use case within the water distribution domain and discuss its benefits.

1. Introduction

The development of fully functional smart grids in recent years [1] has led to the digital transformation of formerly analog critical infrastructures. This transformation has become an important topic of research [2]. To achieve this transformation, acquiring reliable data is essential as they provide the raw material necessary for data-driven decision-making processes. By collecting and analyzing data from various sources, organizations can gain insights into customer behavior and infrastructure operation. This, in turn, enables them to make informed decisions that drive proper management and operation of these critical systems.
One domain that seems to be gaining research attention lately is Water Distribution Networks (WDNs) [3]. WDNs have some similarities with the electrical network, e.g., their distribution over a large territory. Yet, there are also significant differences aside from the physical nature and properties of the elements provided by the services. For example, WDNs are primarily underground, leading to an increased difficulty in acquiring and validating detailed data from specific elements. As a result, while there are lessons to be learned from the evolution of smart grids, a distinct approach is required to tackle the unique challenges of WDNs.
In particular, the digital transformation of WDNs from legacy analog systems into data-driven ones requires some guidance that offers flexibility and ensures reliability. Flexibility is required to support an incremental approach during the transformation process so as to introduce more data acquisition nodes as needed. Reliability is a must to ensure the proper verification of dependable data, thus providing a solid framework for detecting the relatively higher number of failures compared to other critical infrastructures [4], even with daily maintenance issues [5]. Furthermore, having dependable data paves the way for implementing a new supervisory control and data acquisition (SCADA) system [6] and a set of decision support tools to transform the current legacy system into a data-driven digital one.
Thus, the main goal of this paper is to create a formal model that would ensure the flexible and correct deployment of a SCADA system over a legacy WDN. Furthermore, the formal model will also ensure the validity of the data generated and inferred by the SCADA system and its nodes. In this sense, the formal model supports and guides the deployment of the SCADA system and its decision support tools when gearing towards a transition to a data-driven digital system in WDNs. Going into detail, the model validates the data through node- and system-level statements, thus providing the reliability required for issue detection and decision making in critical infrastructures. In addition, the model establishes the required topology for deploying the nodes of the SCADA system to ensure its correct functioning. To this end, the model is based on ternary relational semantics, also known as Routley–Meyer semantics [7]. Initially introduced to address the specific technical challenges of relevance logics, these logics have lately been applied to distributed systems such as smart grids [8]. Far from a purely theoretical exercise, the model has been validated by creating a software artifact to demonstrate its applicability in an industrially relevant environment.
The paper outline is as follows. Section 2 provides some background on WDNs and their data acquisition system. Section 3 analyzes the related works. Section 4 describes the formal model, and Section 5 details its implementation in a software artifact. Section 6 demonstrates the model’s applicability and discusses its benefits. Finally, Section 7 concludes this paper.

2. Data Acquisition in Water Distribution Networks

Although WDNs can present different topologies [9], Figure 1 introduces the main elements found in any WDN. Water can be extracted from various sources, such as rivers, lakes, reservoirs, and underground wells, or even from the ocean through desalination processes. The water source used depends on several factors, such as the geographical location, availability of water resources, and existing supply infrastructure. Several nodes are linked to the water intake, such as pumps and drivers, where the water is transferred to specific points, such as treatment plants, where it undergoes further processing. The treatment plants carry out processes to remove solid particles: filtration to eliminate fine particles, organic matter, microorganisms, and dissolved chemical compounds; disinfection to eliminate bacteria, viruses, and other microorganisms; and pH adjustment and demineralization. Once treated, the drinking water is stored in tanks and then distributed through the pipeline network for domestic, industrial, and commercial use.
SCADA systems for WDN monitoring and control typically consist of, among other components, data acquisition units and automation and control units in the field, often times with capabilities to execute complex logic operations such as supervisory control of programmable logic controllers (PLCs), a supervisory system responsible for gathering data and sending control commands to the field devices, the communication elements between them, and the user interface that allows for visualization of collected data and performing control operations. The SCADA components are distributed at different points of the WDN, forming a sensing (data acquisition) and control (actuators) overlay. The SCADA system includes multiple nodes distributed throughout the water intake, treatment, transport, storage, and distribution elements, such as water quality and temperature sensors, pressure and flow meters, etc. At the end of the WDN, we find smart water meters comparable to those in the electricity network [10].

3. State of the Art

This paper addresses the digital transformation of legacy critical infrastructures, particularly WDNs, by proposing a formal model to guide the deployment of SCADA nodes and ensure the validity of the data they acquire. In this section, we analyze the previous works that have dealt with this topic.
The state of the art includes some previous works dealing with the WDNs’ digital transformations [3,11,12,13,14,15,16,17,18]. Some initial works [3] focused on leveraging historical data to identify critical areas in the distribution network to locate pipe bursts and prioritizing pipes for rehabilitation. With the advent of digital twins, different authors [11,12,13,14] have proposed frameworks for leveraging real-time data to assist technicians and water utilities in addressing other issues. For example, in Zekri et al.’s work [13], a digital twin supports detecting pipe bursts or unauthorized water usage. Recent works [15] have coined the term Water 4.0, in explicit parallelism with the Industry 4.0 concept [19], to highlight the smartification, data-driven orientation of modern WDNs. Under the Water 4.0 paradigm, various technologies such as cyber-physical systems, the Internet of Things, big data analytics, and artificial intelligence, as well as cloud computing, are combined to solve different management and operation problems in WDNs such as water routing [16], optimal pump control [17], and leakage detection [18]. While all these works exemplify the value of WDNs’ digital transformation to support the smart operation and maintenance of WDNs, they focus on delivering support services once the data gathered from the infrastructure are available. In contrast, our work focuses on guiding the deployment of sensors that acquire the data and validating the statements they produce.
SCADA systems [6] are widely used in industrial processes to acquire monitoring data, and previous research has already reported their application in critical infrastructures [20] such as oil refineries [21] and WDNs [22]. The main approaches to ensure the monitoring data’s validity include applying statistical methods, machine learning, and data fusion techniques. Statistical methods such as outlier detection, regression analysis, and statistical process control help identify data points that deviate significantly from expected patterns, indicating potential sensor faults or environmental influences affecting sensor readings. For example, Rigatos et al. [23] proposed using Kalman filters to emulate the functioning of fault-free sensors, comparing them against the output of actual sensors and using the resulting differences for statistical decision making. Machine learning models can learn from historical data to predict sensor values and identify anomalies by applying supervised learning techniques for known error patterns [24] and unsupervised learning techniques for detecting new anomalies [25]. And while certain techniques dealing with images have been applied in different domains [26], machine learning approaches in WDNs are still costly due to the limited amount of available images of underground legacy systems. Data fusion techniques integrate data from multiple sensors measuring the same parameter to improve accuracy and reliability [27]. Redundancy, where multiple sensors perform the same measurement, allows for cross-validation of data, helping to identify and isolate faulty sensors.
Our contributions share the goal of ensuring data validity. Yet, in contrast to other approaches, the application of formal models brings specific advantages, including rigorous guarantees (i.e., formal verification ensures that the system adheres to its specifications under all conditions, something that statistical methods and ML models, which rely on probabilistic outcomes, cannot guarantee), predictability (i.e., formal methods provide a clear and predictable framework for analyzing system behaviors, making it easier to predict and understand outcomes), exhaustiveness (i.e., formal methods can systematically explore all possible states of a system, including edge cases that might not be covered by historical data, thus helping in identifying potential issues that could be missed by other approaches, which are inherently limited by the scope and quality of the data they are based on), and early error detection. Indeed, formal methods can be applied early in the design phase, enabling the detection and correction of errors before a system is built or deployed, which is the case for legacy analog critical infrastructures undergoing a digital transformation process. This proactive approach can save considerable amounts of resources and time compared to other methods, which typically require implementation or data collection before validation can occur.
In this work, we are focusing on providing a design model that would ensure the expected results if the implementation follows the design [28]. This contrasts with the most recent approaches to formal verification that rely on model checking, but these approaches are usually costly and cannot be extended easily. Thus, they usually focus on analyzing the faulty behavior of the infrastructure (ex post) instead of its design (ex ante), since the infrastructure is not prone to change [29,30]. Similarly, formal models have been used to detect attacks in SCADA systems [31] or to model the attacks themselves [32]. Nonetheless, formal methods have also been used to model the infrastructure in the case of smart grids. Still, these efforts have focused on understanding the system behavior during runtime [33]. To the best of our knowledge, the only real example of enabling the deployment of a SCADA system while making use of formal models to ensure resiliency can be found in [34]. Still, the extension of the completed work is limited to smart grids and does not consider the flexibility required to deploy new nodes.
Our contributions build on a previous work [35], where we described an early formal model for the water domain and carried out a theoretical validation. This paper advances this related work by describing a detailed implementation and further demonstrating its maturity through its application in a real-world scenario from C-Town [36], one of the industry standards often used as a benchmark in the domain, thus reaching a technology readiness level of 5 (Technology Readiness Levels (https://ec.europa.eu/research/participants/data/ref/h2020/wp/2014_2015/annexes/h2020-wp1415-annex-g-trl_en.pdf accessed on 22 March 2024)): technology validated in a industrially relevant environment.

4. Formal Model

Whenever a SCADA system is considered, we have to specify if we are considering it from a topological point of view or if we are approaching it from the point of view of its processing of data. In this case, we are tackling the latter, so we will begin by understanding what type of data it produces and processes. At first, it is easy to see that the data primarily generated by the SCADA will come from sensors, and because of that, the data will have the shape of simple statements. For example, it could be the case that a pressure sensor would be reporting “pressure: 2.8”, and an adjacent flow rate sensor would be reporting “flow: 4”. The work of a PLC could later combine these two simple statements and use syntactic conjunction to give back the complex statement “pressure: 2.8 ∧ flow: 4”. With this first notion, we can define a simple, complex, and well-formed data statement (wfds). Also, we will define the connectives that can be used for this.
Definition 1 
(simple and complex data statements). For any simple data statement p , q , , any complex statement A , B , , the unary connective ¬ (Negation), and the binary connectives ∧ (Conjunction), ∨ (Disjunction), → (Entailment), the following recursive forming rules apply:
(a) 
For any simple statement p, p is a wfds. Furthermore, if A = p , then A is a wfds.
(b) 
If A is a wfds and is a unary connective, then A is a wfds.
(c) 
If A and B are a wfds and a binary connective, then A B is a wfds.
(d) 
There are no more well-formed data statements than those defined by the clauses (a), (b) and (c).
Each wfds, be it simple or complex, is part of the different data statements generated by the SCADA system, either at the sensor or the PLC level. In this sense, these data statements are defined only with respect to the number of propositional connectives, while excluding quantifiers (e.g., x , for all x). This is due to multiple reasons. The first one is the ability to create a much more streamlined and simple-to-understand model, making its implementation much easier and excluding complex computational operations. It has also been intended to ensure the results of the formal model rather than going into a much more complex discussion of the different proofs required to ensure the data’s validity. Finally, it will make the model lighter and its deployment in resource-constrained devices, such as old PLCs, much easier.
Now that the well-formed data statements have been defined, we can define and introduce the model. This formal model processes and ensures the logical validity of the different well-formed data statements generated by the SCADA system. In particular, the validation will be represented by using the symbol, which in turn will be used to represent the validity of a wfds A, A , at the system level. Additionally, this same symbol will be used to represent the validity of the aforementioned wfds at a node a, a A . The model is also based on the idea of a set of designated nodes. Given how the SCADA systems are always dependent on the topology, these nodes will bear some topological requirements. Designated nodes represent nodes where the data are being held to a much higher level of verification, usually those of the water intake or treatment. In particular, we will refer to this set of nodes by T. In the same sense, all the nodes, not just the designated ones, will be captured in one big set designated K. The final element of the model is the one of the accessibility relations that will be represented by R. This accessibility relation is one of the most important elements of the model and will show how the different nodes connect and interact with each other. Not only that, but it will ensure that the logical validation of the data happens at the right nodes.
The whole model is also created based on a number of definitions and semantic postulates that are key to ensure the different formal results of the model that later will translate into the real-world reliability of the data generated. These definitions and semantic postulates will lead to the topological architecture of the SCADA system. In particular, they will force the creation of a certain number of connections and the elimination of others to ensure that the data are processed according to the model to preserve their validity. Given all this, we can define the model as follows:
Definition 2 
(WDN model). A W D N model M is a structure < T , K, R, > , where K is a non-empty set where every element represents a node of the SCADA system. T K , where T is the set of designated nodes, and R is a ternary relation on K that represents the connection and data transfer of different nodes. R is subject to the following definitions and postulates for all a, b, c K :
d1. 
a b   = d f   x T | R x a b .
d2. 
a = b   = d f   a b & b a .
d3. 
R 2 a b c d   = d f   x K | R a b x & R x c d ,
p1. 
a a .
p2. 
( a b & R b c d ) R a c d .
Finally, is a valuation relation from K to the set of all data statements such that the following conditions (clauses) are satisfied for every data statement p, A, B and nodes a and b such that a , b K :
(i). 
( a b & a p ) b p .
(ii). 
a A B if a A and a B .
(iii). 
a A B if a A or a B .
(iv). 
a A B if for all b, c K , ( R a b c and b A ) c B .
(v). 
a ¬ A if a | / = A .
A crucial aspect of the model that requires a thorough explanation involves the ternary accessibility relation, the entailment (→), and their alignment with the aforementioned clause (iv). To delve into this within the context of WDNs and its implications for distributed systems, we will designate a, b, and c as distinct nodes within the network. These nodes are interconnected so that they are represented by the relation R a b c . Additionally, we will consider the well-formed data statements A and B. Considering this, the ternary accessibility relation mirrors the generation and processing of data in a distributed system. Specifically, well-formed data statements A and B, generated and validated by nodes b and c ( b A , c B ), are interconnected through the relation R a b c . This connection allows them to collaboratively produce a new and complex data statement as a conditional wfds A B . Subsequently, this new statement undergoes validation in the third node, where a A B .
The above interpretation suggests a dual nature to the concept of the ternary accessibility relation. On the one hand, it can be understood as a form of transitivity, signifying that with R a b c , a has access to b, and b has access to c. While this interpretation is the usual and, of course, compelling interpretation, it is overly restrictive for certain topologies within the WDN domain. On the other hand, we can alternatively interpret R a b c as the idea that a has access not only to b but also to c. This approach leads us away from a strictly transitive relation and towards a distributed one, where a central node, a, directly accesses the other two interconnected elements, b and c, to infer further knowledge.
As a final point, regarding the metaproperties of the model, it is ensured that they are complete, sound, and decidable. These outcomes are derived through the methodology outlined in [37]. It is essential to highlight that the completeness and soundness of results are not strong but rather weak. However, this distinction has no consequence for our interest in the WDN use case. In this context, there is no practical distinction between validating all data statements at the SCADA system level and validating them at the node level. Obtaining the results in a weak sense does not interfere with validating specific data at the node level; they merely constrain it from occurring broadly and in general.

The Relation R and the Topological Requirements

The model is not only able to describe how the SCADA system can process and manage the data to ensure their validity but also can set the topological requirements of how the different nodes of the system should connect. In particular, this topological requirements are set by the definitions d1 to d3, and the semantic postulates p1 and p2. Not all of them carry valuable information about the topology. In particular, d1 only establishes how designated nodes connect with non-designated nodes and creates the hierarchy between the different sets of nodes mentioned earlier. This connection happens as shown in Figure 2a.
On the other hand, d2 creates a definition of equality for the nodes connected to the set of designated nodes. This definition states that two nodes that are connected to the set of designated nodes and also are connected between them are just the same node. All this can be seen in Figure 2b, where a and b are the same nodes. From a formal point of view, this eliminates the surjection between T, the set of designated nodes, and K, the set of regular nodes. From a system perspective, it creates a layer of PLC middleware between the water treatment nodes and the outer nodes of the system’s edge. Finally, d3 allows the accessibility relation to be extended from just three elements to four, i.e., virtually infinite, just because these longer relations can be broken down into smaller ones that fit the different clauses of the formal model. This can be seen in Figure 2c, where the case for a relation of four elements is represented.
Furthermore, going past the definitions and delving into the semantic postulates, we can obtain a greater understanding of how the model configures the topology of the SCADA system, just as we mentioned earlier. The first semantic postulate, p1, states that for any node a that is directly linked to T, the set of designated nodes, a, is going to have access to itself (it is self-aware) and an accessibility relation starting from T and ending with access to itself. Generally speaking, this means that a will have some computational capabilities, so, for the case of WDNs, we will consider a to be a PLC. Let us take a look at the second semantic postulate, p2. It requires creating a new connection; whenever a three-element relation begins with a node that connects to a node that in turn connects with T, the set of designated nodes, this first node will connect with the last two of the other relation. In this sense, p2 forces the topology like no other definition or postulate, as it requires the creation of newer connections whenever the accessibility relations are developed further away from the designated nodes. Nonetheless, this is not a fatal flaw, but rather an opportunity to enhance the computation capabilities of the whole system, since it will require the addition of new connections with those nodes that have mandatory computational capabilities, thus creating a fog of data processing that otherwise could have been ignored. The extent of both semantic postulates can be seen graphically in Figure 3.

5. Implementation

To show the model’s validity and application, first we need to transfer it to a real world implementation as a software artifact. We translate the model and its topological requirements into an algorithm and then produce the software artifact that supports the validation.

5.1. Algorithm

Given that all the elements of the model, the set of nodes K, the set of designated nodes T, and the relations between nodes R are part of the SCADA system that would regulate a smart WDN, we just need to focus on capturing the different topological requirements created by the definitions and semantic postulates. All these can be summed up in the following algorithm. For this, we will use color coding, in which designated nodes will appear in blue, regular nodes will appear in brown, and actions to be taken will appear in red.
Going into detail, the first if statement captures d2, which leads to not having two different nodes connected and, in turn, both nodes connected are to the set of designated nodes. The second if statement, representing d3, states that whenever a chain of nodes has a length equal to or superior to four, a new node will be inserted between the second to last and last nodes, breaking the connection between these two nodes. The third of the if statements focuses on p1 and shows that whenever a node is connected to the set of designated nodes, it will have access to itself. In particular, this will be represented further by the node having computation capabilities to process its own data. Finally, the fourth and last if statement deals with p2. This if statement describes that whenever a connection of four nodes spawns from a node connected directly to the set of designated nodes, a connection will be made from the first non-designated one to the third.
Algorithm 1 Topological requirements of the model
  if [node_a connects with (designated_node and node_b)] and [node_b connects with
  (designated_node and node_a] then
    node_b disconnects from designated_node▷ d2
  end if
  if len(nodes_connections)≥ 4 and is even then
    (new_node connects with node_(len-1) and node_len) and (node_(len-1) disconnects
  from node_len)▷ d3
  end if
  if node_a connects with designated_node then
    [(node_a connects with node_a)▷ p1
  end if
  if [(designated_node connects with node_a) and (node_a connects with node_b)] and
  [(node_b connects with node_c) and (node_c connects with node_d)] then
    node_a connects with node_c▷ p2
  end if

5.2. Architecture

With the algorithm described above, we can proceed to create a software artifact so that the model can be validated. For that matter, the artifact will be codified using the programming language Python 3.12.2, making use of the libraries wntr, chama, numpy, pandas, matplotlib, and networkX. In particular, wntr was used as a mean to load the corresponding files for the different scenarios, modifying them (if required) and performing the corresponding simulations; chama was used to identify the place in the topology where sensors must be set in order to ensure a certain property of the SCADA system (such as, when given a physical poisoning attack on the waters, the polluted water will be detected as far as possible); numpy provided support to work with multidimensional numeric matrices as well as a set of mathematical functions to operate on these; pandas was used to process the data generated by the simulation of the different scenarios; matplotlib was utilized to create the different graphics used to understand the results derived from the simulations; and networkX supported the manipulation of the different graphs that represent the control network deployed on top of the simulation of the physical network, providing an implementation of the Prim’s Minimal Spanning Tree algorithm [38] that identifies the set of links between elements in a network that scores for the shortest length of links.
In addition to all these libraries, we also used epanetCPA [36]. This additional software was developed as "an open-source object-oriented MATLAB toolbox for modelling the hydraulic response of water distribution systems to cyber-physical attacks". With this in mind, epanetCPA has the advantage of having several realistic scenarios as well as a number of attacks associated with them. For our purpose, epanetCPA provided a realistic scenario upon which to build the whole simulation of the WDN on which the model, condensed into the algorithm, would be deployed. It is important to mention that it was possible to use epanetCPA thanks to the interoperability that wntr provides. Nonetheless, epanetCPA can provide us with the different variables of the WDN at each moment of the simulation, allowing us to make queries and filters to determine the most valuable variables for the deployment of the model. All this will help to put together an implementation that ensures that the model is actually being used for the deployment of nodes of the SCADA system, and thus help us in the validation of the formal model itself.
With the above in mind, we decide which variable should be used to monitor the different nodes implemented in the simulation. The variables that were considered were critical nodes, higher-demand nodes, water quality nodes, and vulnerable area nodes. Going into detail, critical nodes represented the most important elements of the network, such as intersections, intakes, out-takes, or nodes closer to other critical infrastructures. Higher-demand nodes correspond to those within the WDN with the highest registered water usage of all the network. Water quality nodes are those nodes that are key when determining if the quality of water has gone under a certain threshold or if it has been contaminated in one way or another. Finally, vulnerable area nodes are the ones that correspond to nodes with an importance relative to their geographical location; some examples of this could be the nodes in a busy traffic intersection or those in a difficult-to-reach area. With all this, it was decided that the simulation would run on the variable of critical nodes, as it is the most comprehensive one and the one that is most used in real-world scenarios.
Afterwards, it is up to us to decide which parameter will be captured by the different network nodes. Given that we are using wntr as the library for processing the simulation data, we already have a comprehensive list of the parameters that can be used. These are Demand, how much water is used in the different nodes; Head, the height of the water column at a given point in the network; Pressure, the water pressure at the different nodes; Quality, which represents water quality, including the different chemicals that are present in the water; Flow rate, the flow of the water in different parts of the network; Velocity, the speed of the water in different pipes; Head loss, the loss of pressure as water flows through the pipes; Link quality, similar to Quality, but focusing on very specifics links of the network; Status, the state (operative, open, closed...) of the different nodes of the network; Setting, the different configurations of the nodes; Rxn rate, the speed T which different chemicals react within the network; and Frictionfact, the friction factor of the pipes. Out of all of these, both Quality and Flow rate are probably the most interesting, descriptive, and comprehensive. Nonetheless, given chama’s optimization for detecting the quality of the water and its algorithm for deploying the optimal sensors for this, the variable chosen was Quality.
Furthermore, how the impact will be measured in the network needs to be decided. The different options respond to the variety of metrics available in chama, leading to the optimal placement of sensors in the network. These are as follows: the minimal detection time, aiming to detect network events in the shortest time possible; the minimal undetected impact, dedicated to minimizing the impact of not detecting an important event in the network; the maximal coverage, focusing on ensuring that the network has the maximum coverage possible; the minimal cost, supporting a deployment on which the network implementation cost is at a minimum; and specific scenarios, which provides support for custom situations. Given that we are targeting a general-purpose network, the minimal detection time was selected.
Another key element in this architecture is the strategy used to connect the different nodes. It is well known that for connecting the nodes of a network, there are two different options; it can be achieved by using a wired connection or by using a wireless one. A wired connection provides a greater stability and increased security, is less prone to interference, and has less latency. Nonetheless, it is also possible to list some of its disadvantages, like the increased cost of the deployment of nodes, adding to the complexity of expanding the network or limiting the mobility. On the other hand, wireless connections have greater flexibility and mobility and lower installation costs. They also add to the ease of expansion. Yet they have downsides, like being more prone to interference and having a higher latency. Given that choosing one or the other is a matter of preference linked to a specific situation, both can be considered during implementation, so it can be decided if the deployment will be wired or wireless on a link-by-link basis.
With the above, and as we have discussed, it is clear that the connection of the nodes of the WDN is considered in the implementation, but this connection happens differently in each case. In the case of a wireless connection, it is established as the shortest Euclidean distance. On the other hand, when we look at the case of the wired connection, it works upon the topology of the simulation using Prim’s algorithm. In particular, Prim’s algorithm is greedy, and its purpose is to find the minimum spanning tree for a graph in a weighted and undirected manner. To implement Prim’s algorithm and the corresponding method for establishing the initial network of the nodes, we used networkX as it facilitates work on graphs.
All the previous work is needed to support Algorithm 1, in which we have condensed the topological requirements of the model. With that in mind, we can describe the process followed whenever the implementation is started. First, the artifact will load the topology file of the different elements of the network, the number of initial nodes, and their deployment. Then, it will perform a check on the initial network using the following steps:
1
If a node is connected to the set of designated nodes T and it is not a PLC, i.e., it has computation capabilities, the node will disconnect from the original node and will connect to a PLC.
2
If two PLCs are connected to T and to each other, the connection of one of them with T will be eliminated.
3
If there is a chain of nodes with a length equal to or over four, and the length is an even number, a new node will be inserted in the second to last position, breaking the previous connections.
4
If a chain of over three regular nodes connects to a PLC, the second regular node will also be connected to the PLC.
Afterward, it will register the number of nodes aggregated to the pre-existing network. Then, it will check node by node all the new ones following the subsequent steps:
1
It will check if the new node is connected to a node of the set T, the set of designated nodes, and a previously existing one. It will also check if the previous node is connected to T. If that is the case, then the new node will be eliminated.
2
It will ensure the computation capabilities of the new node in case it is connected to T. If it does not have those, it will be eliminated.
3
It will evaluate if the connections described in p2, the fourth if statement of the algorithm, exist. Otherwise, it will create them.
4
It will go over the length of the chains of nodes; if those are over four elements, the number of elements is even. If these conditions are satisfied, a new node will be added in the second to last position of the chain, breaking the previous connections.
All the previous notions are summed up in the diagram in Figure 4. Finally, let us state that this implementation’s overall critical requirements are the SCADA connections, the node list both acquired by using chama, and the different types of connections that allow for the calculation of the distances with the use of Prim’s algorithm or Euclidean distances depending on the type of connection.

6. Validation

We use the C-Town network scenario [39] (Figure 5) for our model and architecture validation. C-Town is a real-world, medium-sized network used extensively in WDN simulations for benchmarking different models and for analyses [40]. It comprises 429 pipes and 388 demand nodes, and seven tanks guarantee distribution. It also contains a key element in the shape of a pumping station that acts as the scenario’s water intake. In particular, this pumping station will act as T, the set of designated nodes and the central node of the SCADA system whose deployment we are simulating. Let us further state that C-Town is a scenario from which we only take the physical elements, not any of the SCADA elements added later.
Given the C-Town scenario, our first intention is to determine which and how many nodes we will be using for the validation. As stated earlier, we will focus on the critical nodes and how long they take to detect network events. For that matter, the chama module of the implementation can be used to assess the relation between detection time and the number of sensors (Figure 6). The performance gains are not relevant once we have introduced seven sensors.
Since the intention is not just to use a real-world scenario, but also perform a validation that is based on what could be real-world decisions, we set the number of sensors that will be deployed as part of the SCADA system to seven. When deciding where the different sensors will be placed, we use chama again. This allows us to determine not only the number of sensors that we will be using but also which of the nodes of the topological scenario of C-Town are the ones that we will be using. Figure 7 shows the nodes that have been selected. It is crucial to mention that, despite being also highlighted, the pumping station (S1), that acts as the SCADA central node and as the set of designated nodes (T), is not included among the number of nodes outputted by chama. This is because the decision is made by keeping in mind that there is always a minimum of one node in the SCADA system. Additionally, it should be noted that the module computes the number of sensors. In this scenario, the pumping station is not recognized as a sensor but as the central processing unit without any sensing capabilities.
With all of the above, we can proceed to describe the deployment of the different nodes that we have selected. For this, and by using the support provided by networkX, we obtain the result shown in Figure 8(left) when deploying all the nodes with a wired connection to enable communication. In this, and all of the following diagrams, the node in red corresponds to the central node of the SCADA; the node in green is the one that is a PLC, that is, a sensor with computing capabilities as well as sensing ones, establishing it as self-aware. Finally, the nodes in blue represent regular sensors that are not required to have computing capabilities. As seen in Figure 8(left), the PLC connects directly to the SCADA central node, and another acts as the bridge between two different nodes and the PLC. It is easy to understand that there is no rationale behind deploying the different nodes besides the ones selected by Prim’s algorithm.
Nonetheless, if we look at Figure 8(right), we see that the outcome of making the deployment compliant with the model is quite different. In this case, T6, a regular node in the original scenario, has become a PLC and now has computing capabilities. Additionally, the nodes T5 and T7 now reach out to J269, the SCADA central node, through it. On the other side of the diagram, we see that node J88 now acts as an accessory connection between J130 and the PLC T3. Finally, in this scenario, J169 sits at the end of a chain. This series of changes, which can look drastic, ensures the validity of all the data produced by the system as a byproduct of compliance with the topology provided by the formal model. Further, this not only proves the validity of the data statements generated by the different sensors, but it also ensures the validity of the inferences that could be made out of those data, making the system much more resilient, intelligent, and skilled whenever managing data.
In a similar fashion to the previous scenario, if the connection is decided to be implemented in a wireless manner rather than through the usual method of using a wired connection, the implementation can obtain a solution that is compliant with the formal model and its topology, just as described above. The result, which can be seen in Figure 9, shows some crucial differences with the wired scenario as, for example, there is no extra PLC. The wireless verified scenario does not require any extra PLC but, on the other hand, it requires extra nodes to ensure the right length of the chains of nodes. In this case, extra nodes are situated between T6 and J88, T5 and J130, and T5 and J169. Again, all these simple changes, i.e., adding extra regular nodes near the end of certain chains, are more than enough to ensure that the properties of the model defined above are used in the best manner.
The final scenario for us to tackle is when a node has been added to the pre-existing deployment, something that could easily happen whenever we face the usual case of the digital transformation of a WDN. In this case, a PLC will be added right after node J88 in the solution corresponding to the wired scenario, as seen in Figure 10(left). It is easy for us to imagine a situation in which the new PLC has been deployed in an area with a low reception and that geographically is more difficult to connect, thus needing extra computational capabilities to understand what is occurring in that local area of the WDN. Of course, adding a new node does not imply that it will not automatically follow the directives propagated by the model, but in this case, it does.
The solution is quite simple and could be arranged before deploying the new PLC to ensure the SCADA system’s validity with the model. Thus, the only real requirement would be to add a node between the new PLC, added_1, and the node J88. Nonetheless, given that the implementation considers the whole network rather than just the new additional node, it also detects that it is possible to strengthen the network by adding nodes between the nodes T5 and T6 and T7 and T6. These changes can be seen in Figure 10(right). This would allow us to ensure a higher response for event detection while keeping all the properties of the model online.
With all of the above, we have been able to demonstrate how the formal model can be codified with a simple algorithm, ensuring that the collected and processed data, as well as the new inferred data, are valid. It also supports adding new nodes to the network and allows the possibility to expand the SCADA system on the fly while keeping all the aforementioned properties.
As a final point to be discussed, it is also possible to show that the model implementation is not only satisfactory, as has been mentioned, but it also provides a further advantage against traditional formal methods such as model checking [29]. Whenever performing model checking, the outcome ensures that a system’s current implementation is formally solid and meets the model properties. On the other hand, using a formal model to guide a system’s deployment ensures that any system’s implementation meets the model properties. This, in particular, allows for a flexible deployment approach, which can be carried out incrementally without needing to model and check each incremental implementation. This helps to reduce the costly effort of creating a formal representation of the system at different times while enabling a solid foundation that provides the same results.
Going into further detail, we can showcase some of the scenarios the model helps validate. In particular, we have stated that one of the main positive characteristics of the model is that it ensures the validity of the different inferences that can be made within the model-generated data. In this sense, we can assume a simple inference of the type A B for any data statements A and B. In the case of Figure 8(left), if A was produced in T7, and B in T5, given that we have the relation RT6T7T5, that would lead, theoretically, to the conclusion that A B in T6. Nonetheless, this is impossible, as T6 has no computing capabilities as shown in the case in Figure 8(left). On the other hand, if we look at Figure 8(right), where the deployment has changed according to the model, we can easily see that this issue has been solved thanks to the implementation of the model, as now T6 has computational capabilities. This shows that the implementation not only coincides with what is being described in the model, but can also provide obvious and strong support for the validity of inferences.

Limitations

Despite the validation we carried out, there are still some limitations to our method and its implementation to be mentioned. In particular, using a formal model to drive an implementation might pose some difficulties, as most of the formal results require an extensive knowledge of different techniques required to obtain them. On the bright side, it is always possible to refer to the previous specialized literature in which results have already been published. However, this might not work straight away for ad hoc formal models, and some tailoring might be required. Another related limitation comes from the applicability of the methodology at scale. An expert on formal methods is required to extrapolate the knowledge contained in the model into an algorithm. This leads to a possible bottleneck in the case that multiple models are used, requiring extensive effort from a limited number of highly skilled experts. When looking at the validation, some concerns are raised about the model’s impact on the network itself, as the model has not been fully tested in a real-world environment. It is also possible that some of the topological requirements would lead to deployment in an area that is difficult to access. Nonetheless, this can be mitigated by a wireless connection that is already considered in the implementation performed for the validation of the model. Overall, these are simple drawbacks that can be accepted in order to attain the different extensive benefits of the model.

7. Conclusions

This paper has defined a formal model that ensures that the digital transformation of a WDN is easy, reliable, and flexible, further providing extra assurance regarding the data that are generated, processed, and managed within the SCADA system of a WDN. This model supports the deployment, not only of the first iteration of the WDN, but of its possible expansions as time passes. This is crucial as the digital transformation of legacy critical infrastructures is not expected to happen immediately. Furthermore, since the model transfers its properties to the SCADA system, it significantly increases the reliability of the generated data statements. We have demonstrated the model applicability in a real-world scenario, showing how it will adapt a rationally sound deployment into one that keeps the same decisions but ensures certain properties that otherwise would be unreachable.
Future research lines include developing a version of the model that allows node validation of the data statements generated. It is also interesting to further study the implementation and apply it in an industry setting. Another future line of research could be adapting the model so that it takes into account data tampering attacks leading to invalid inferences; thanks to this, the model could also be used for the detection of attacks on a SCADA system. Finally, given the extension of WDNs and how prone they are to failure, it would be interesting to modify the model to deal with inconsistent data as proposed in [41].

Author Contributions

Conceptualization, J.M.B., J.M.D.A., J.C.D. and F.C.; validation, J.M.B.; formal analysis, J.M.B.; investigation, J.M.B.; writing—original draft preparation, J.M.B. and J.M.D.A.; writing—review and editing, J.M.B., J.M.D.A., J.C.D. and F.C.; visualization, J.M.B. and J.M.D.A.; project administration, J.M.D.A. and J.C.D.; funding acquisition, J.M.D.A. and F.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by the SUNRISE project and the CEDAR project, funded from the Horizon Europe research programme (2021–2027) under grant agreements no. 101073821. and no. 101135577.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors would like to thank Alana Fernández Basquero for her contributions and efforts on the technical aspects of the implementation.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Chren, S.; Rossi, B.; Pitner, T. Smart grids deployments within EU projects: The role of smart meters. In Proceedings of the 2016 Smart Cities Symposium Prague (SCSP), Prague, Czech Republic, 26–27 May 2016; pp. 1–5. [Google Scholar] [CrossRef]
  2. Zhu, Z.Y.; Xie, H.M.; Chen, L. ICT industry innovation: Knowledge structure and research agenda. Technol. Forecast. Soc. Change 2023, 189, 122361. [Google Scholar] [CrossRef]
  3. Carriço, N.; Ferreira, B.; Antunes, A.; Caetano, J.; Covas, D. Computational Tools for Supporting the Operation and Management of Water Distribution Systems towards Digital Transformation. Water 2023, 15, 553. [Google Scholar] [CrossRef]
  4. Yao, C.; Fan, B. Spatiotemporal Vulnerability Analysis of Large-Scale Infrastructure Systems under Cascading Failures: Case of Water Distribution Networks. J. Infrastruct. Syst. 2023, 29, 04023008. [Google Scholar] [CrossRef]
  5. Pereira, L.; Morais, D.; Figueira, J. Using criticality categories to evaluate water distribution networks and improve maintenance management. Sustain. Cities Soc. 2020, 61, 102308. [Google Scholar] [CrossRef]
  6. Boyer, S.A. SCADA: Supervisory Control and Data Acquisition; International Society of Automation: Research Triangle Park, NC, USA, 2009. [Google Scholar]
  7. Routley, R.; Meyer, R.; Brady, R.; Plumwood, V. Relevant Logics and Their Rivals 1; Ridgeview: Atascadero, CA, USA, 1983. [Google Scholar]
  8. Blanco, J.M.; Rossi, B.; Pitner, T. A Time-Sensitive Model for Data Tampering Detection for the Advanced Metering Infrastructure. In Proceedings of the 2021 16th Conference on Computer Science and Intelligence Systems (FedCSIS), Online, 2–5 September 2021; pp. 511–519. [Google Scholar] [CrossRef]
  9. Mays, L.W. (Ed.) Water Distribution System Handbook, 1st ed.; McGraw-Hill Education: New York, NY, USA, 2000. [Google Scholar]
  10. Alves, D.; Blesa, J.; Duviella, E.; Rajaoarisoa, L. Topological analysis of water distribution networks for optimal leak localization. IOP Conf. Ser. Earth Environ. Sci. 2023, 1136, 012043. [Google Scholar] [CrossRef]
  11. Ciliberti, F.G.; Berardi, L.; Laucelli, D.B.; Giustolisi, O. Digital Transformation Paradigm for Asset Management in Water Distribution Networks. In Proceedings of the 2021 10th International Conference on ENERGY and ENVIRONMENT (CIEM), Bucharest, Romania, 14–15 October 2021; pp. 1–5. [Google Scholar] [CrossRef]
  12. Wu, Z.Y.; Chew, A.; Meng, X.; Cai, J.; Pok, J.; Kalfarisi, R.; Lai, K.C.; Hew, S.F.; Wong, J.J. High Fidelity Digital Twin-Based Anomaly Detection and Localization for Smart Water Grid Operation Management. Sustain. Cities Soc. 2023, 91, 104446. [Google Scholar] [CrossRef]
  13. Zekri, S.; Jabeur, N.; Gharrad, H. Smart Water Management Using Intelligent Digital Twins. Comput. Inf. 2022, 41, 135–153. [Google Scholar] [CrossRef]
  14. Korotkova, N.; Benders, J.; Mikalef, P.; Cameron, D. Maneuvering between skepticism and optimism about hyped technologies: Building trust in digital twins. Inf. Manag. 2023, 60, 103787. [Google Scholar] [CrossRef]
  15. Adedeji, K.B.; Ponnle, A.A.; Abu-Mahfouz, A.M.; Kurien, A.M. Towards Digitalization of Water Supply Systems for Sustainable Smart City Development—Water 4.0. Appl. Sci. 2022, 12, 9174. [Google Scholar] [CrossRef]
  16. Mohapatra, H.; Mohanta, B.K.; Nikoo, M.R.; Daneshmand, M.; Gandomi, A.H. MCDM-Based Routing for IoT-Enabled Smart Water Distribution Network. IEEE Internet Things J. 2023, 10, 4271–4280. [Google Scholar] [CrossRef]
  17. Guo, Y.; Wang, S.; Taha, A.F.; Summers, T.H. Optimal Pump Control for Water Distribution Networks via Data-Based Distributional Robustness. IEEE Trans. Control. Syst. Technol. 2023, 31, 114–129. [Google Scholar] [CrossRef]
  18. van Lagen, G.; Abraham, E.; Esfahani, P.M. A Bayesian Approach for Active Fault Isolation with an Application to Leakage Localization in Water Distribution Networks. IEEE Trans. Control. Syst. Technol. 2023, 31, 761–771. [Google Scholar] [CrossRef]
  19. Lasi, H.; Fettke, P.; Kemper, H.G.; Feld, T.; Hoffmann, M. Industry 4.0. Bus. Inf. Syst. Eng. 2014, 6, 239–242. [Google Scholar] [CrossRef]
  20. Alcaraz, C.; Zeadally, S. Critical infrastructure protection: Requirements and challenges for the 21st century. Int. J. Crit. Infrastruct. Prot. 2015, 8, 53–66. [Google Scholar] [CrossRef]
  21. Yadav, G.; Paul, K. Architecture and security of SCADA systems: A review. Int. J. Crit. Infrastruct. Prot. 2021, 34, 100433. [Google Scholar] [CrossRef]
  22. Dolatshahi-Zand, A.; Damghani, K.K.; Raissi, S. An evolutionary approach with reliability priority to design Scada systems for water reservoirs. Evol. Syst. 2022, 13, 499–517. [Google Scholar] [CrossRef]
  23. Rigatos, G.; Serpanos, D.; Zervos, N. Detection of attacks against power grid sensors using Kalman filter and statistical decision making. IEEE Sens. J. 2017, 17, 7641–7648. [Google Scholar] [CrossRef]
  24. Suaboot, J.; Fahad, A.; Tari, Z.; Grundy, J.; Mahmood, A.N.; Almalawi, A.; Zomaya, A.Y.; Drira, K. A Taxonomy of Supervised Learning for IDSs in SCADA Environments. ACM Comput. Surv. 2020, 53, 1–37. [Google Scholar] [CrossRef]
  25. Ducharlet, K.; Travé-Massuyès, L.; Le Lann, M.V.; Miloudi, Y. A multi-phase iterative approach for anomaly detection and its agnostic evaluation. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2020, 12144 LNAI; Springer: Cham, Switzerland, 2020; pp. 505–517. [Google Scholar] [CrossRef]
  26. Ren, Z.; Wang, S.; Zhang, Y. Weakly supervised machine learning. CAAI Trans. Intell. Technol. 2023, 8, 549–580. [Google Scholar] [CrossRef]
  27. Wang, P.; Xiang, M.; Lei, R. Research on Multi-Sensor Data Fusion Algorithm for Monitoring of Power Distribution Station. Smart Innov. Syst. Technol. 2022, 257, 207–213. [Google Scholar] [CrossRef]
  28. Bjesse, P. What is formal verification? SIGDA Newsl. 2005, 35, 1–es. [Google Scholar] [CrossRef]
  29. Mercaldo, F.; Martinelli, F.; Santone, A. Model Checking for Real-Time Attack Detection in Water Distribution Systems. Inform. Autom. 2022, 21, 219–242. [Google Scholar] [CrossRef]
  30. Vistbakka, I.; Troubitsyna, E. Modelling and Verification of Safety of Access Control in SCADA Systems. In Risks and Security of Internet and Systems; Garcia-Alfaro, J., Leneutre, J., Cuppens, N., Yaich, R., Eds.; Springer: Cham, Switzerland, 2021; pp. 354–364. [Google Scholar]
  31. Mercaldo, F.; Martinelli, F.; Santone, A. Real-Time SCADA Attack Detection by Means of Formal Methods. In Proceedings of the 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Capri, Italy, 12–14 June 2019; pp. 231–236. [Google Scholar] [CrossRef]
  32. AL-Dahasi, A.E.M.; Saqib, B.N.A. Attack tree Model for Potential Attacks Against the SCADA System. In Proceedings of the 2019 27th Telecommunications Forum (TELFOR), Belgrade, Serbia, 26–27 November 2019; pp. 1–4. [Google Scholar] [CrossRef]
  33. Kousar, S.; Nazir, A.Z.; Ali, T.; Alkhammash, E.H.; Hadjouni, M. Formal Modeling of IoT-Based Distribution Management System for Smart Grids. Sustainability 2022, 14, 4499. [Google Scholar] [CrossRef]
  34. Jakaria, A.H.M.; Rahman, M.A.; Gokhale, A. A Formal Model for Resiliency-Aware Deployment of SDN: A SCADA-Based Case Study. In Proceedings of the 2019 15th International Conference on Network and Service Management (CNSM), Halifax, NS, Canada, 21–25 October 2019; pp. 1–5. [Google Scholar] [CrossRef]
  35. Blanco, J.M.; Ge, M.; del Alamo, J.M.; Dueñas, J.C.; Cuadrado, F. A formal model for reliable digital transformation of water distribution networks. Procedia Comput. Sci. 2023, 225, 2076–2085. [Google Scholar] [CrossRef]
  36. Taormina, R.; Galelli, S.; Douglas, H.; Tippenhauer, N.; Salomons, E.; Ostfeld, A. A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems. Environ. Model. Softw. 2019, 112, 46–51. [Google Scholar] [CrossRef]
  37. Robles, G.; Blanco, J.M.; López, S.M.; Paradela, J.R.; Recio, M.M. Relational semantics for the 4-valued relevant logics BN4 and E4. Log. Log. Philos. 2016, 25, 173–201. [Google Scholar] [CrossRef]
  38. Prim, R.C. Shortest connection networks and some generalizations. Bell Syst. Tech. J. 1957, 36, 1389–1401. [Google Scholar] [CrossRef]
  39. Pournaras, E.; Taormina, R.; Thapa, M.; Galelli, S.; Palleti, V.; Kooij, R. Cascading Failures in Interconnected Power-to-Water Networks. SIGMETRICS Perform. Eval. Rev. 2020, 47, 16–20. [Google Scholar] [CrossRef]
  40. Taormina, R.; Galelli, S.; Tippenhauer, N.O.; Salomons, E.; Ostfeld, A. Characterizing Cyber-Physical Attacks on Water Distribution Systems. J. Water Resour. Plan. Manag. 2017, 143, 04017009. [Google Scholar] [CrossRef]
  41. Blanco, J.M.; Ge, M.; Pitner, T. Modeling Inconsistent Data for Reasoners in Web of Things. Procedia Comput. Sci. 2021, 192, 1265–1273. [Google Scholar] [CrossRef]
Figure 1. Stages of the water processing lifecycle in a Water Distribution Network: intake, treatment, transport, storage, distribution, and consumption.
Figure 1. Stages of the water processing lifecycle in a Water Distribution Network: intake, treatment, transport, storage, distribution, and consumption.
Electronics 13 01219 g001
Figure 2. Definitions of the WDN model as adapted from [35]. (a) Ternary accessibility relation with the designated nodes; (b) equality as understood in the WDN model; (c) extension of the ternary accessibility relation to four elements. The order of deployment of the relations is based on the arrow colors: First black, then blue, later red.
Figure 2. Definitions of the WDN model as adapted from [35]. (a) Ternary accessibility relation with the designated nodes; (b) equality as understood in the WDN model; (c) extension of the ternary accessibility relation to four elements. The order of deployment of the relations is based on the arrow colors: First black, then blue, later red.
Electronics 13 01219 g002
Figure 3. Semantic postulates of the WDN model as adapted from [35]. (a) Reflexivity of fog nodes; (b) topological requirement of long chains of nodes. The order of deployment of the relations is based on the arrow colors: First black, then blue, later red.
Figure 3. Semantic postulates of the WDN model as adapted from [35]. (a) Reflexivity of fog nodes; (b) topological requirement of long chains of nodes. The order of deployment of the relations is based on the arrow colors: First black, then blue, later red.
Electronics 13 01219 g003
Figure 4. Architecture of the implementation. Red nodes represent external information that is provided to the main components of the implementation (blue nodes). Yellow nodes represent intermediate results that culminate in the final data compiled in the green node. The purple node constitutes a representation of the results. Dashed lines represent data modified in multiple iterarions.
Figure 4. Architecture of the implementation. Red nodes represent external information that is provided to the main components of the implementation (blue nodes). Yellow nodes represent intermediate results that culminate in the final data compiled in the green node. The purple node constitutes a representation of the results. Dashed lines represent data modified in multiple iterarions.
Electronics 13 01219 g004
Figure 5. C-Town as adapted from [39]. This scenario is a real-world, medium-sized network used extensively in WDN simulations for benchmarking different models and for analyses, constituting an industry standard.
Figure 5. C-Town as adapted from [39]. This scenario is a real-world, medium-sized network used extensively in WDN simulations for benchmarking different models and for analyses, constituting an industry standard.
Electronics 13 01219 g005
Figure 6. Number of critical nodes against detection time. It can be observed that after the placement of seven sensors, the detection time reaches a point of diminishing returns.
Figure 6. Number of critical nodes against detection time. It can be observed that after the placement of seven sensors, the detection time reaches a point of diminishing returns.
Electronics 13 01219 g006
Figure 7. Critical nodes of C-Town as selected for the implementation. The critical nodes were selected using chama and their numbershows the limit before the point of diminishing returns as it appears in Figure 6.
Figure 7. Critical nodes of C-Town as selected for the implementation. The critical nodes were selected using chama and their numbershows the limit before the point of diminishing returns as it appears in Figure 6.
Electronics 13 01219 g007
Figure 8. Original node deployment scenario (left). Verified node deployment scenario—wired connection (right). This figure shows the changes that a SCADA deployment should undergo to ensure the implementation of the model and the validity of the data.
Figure 8. Original node deployment scenario (left). Verified node deployment scenario—wired connection (right). This figure shows the changes that a SCADA deployment should undergo to ensure the implementation of the model and the validity of the data.
Electronics 13 01219 g008
Figure 9. Verified node deployment scenario—wireless connection. In addition to Figure 8(right), here we show the changes that the SCADA system of Figure 8(left) should undergo to ensure the implementation of the model in a wireless fashion.
Figure 9. Verified node deployment scenario—wireless connection. In addition to Figure 8(right), here we show the changes that the SCADA system of Figure 8(left) should undergo to ensure the implementation of the model in a wireless fashion.
Electronics 13 01219 g009
Figure 10. Added node scenario (left). Verified added node scenario (right).
Figure 10. Added node scenario (left). Verified added node scenario (right).
Electronics 13 01219 g010
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Blanco, J.M.; Del Alamo, J.M.; Dueñas, J.C.; Cuadrado, F. A Formal Model for Reliable Data Acquisition and Control in Legacy Critical Infrastructures. Electronics 2024, 13, 1219. https://doi.org/10.3390/electronics13071219

AMA Style

Blanco JM, Del Alamo JM, Dueñas JC, Cuadrado F. A Formal Model for Reliable Data Acquisition and Control in Legacy Critical Infrastructures. Electronics. 2024; 13(7):1219. https://doi.org/10.3390/electronics13071219

Chicago/Turabian Style

Blanco, José Miguel, Jose M. Del Alamo, Juan C. Dueñas, and Felix Cuadrado. 2024. "A Formal Model for Reliable Data Acquisition and Control in Legacy Critical Infrastructures" Electronics 13, no. 7: 1219. https://doi.org/10.3390/electronics13071219

APA Style

Blanco, J. M., Del Alamo, J. M., Dueñas, J. C., & Cuadrado, F. (2024). A Formal Model for Reliable Data Acquisition and Control in Legacy Critical Infrastructures. Electronics, 13(7), 1219. https://doi.org/10.3390/electronics13071219

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop