Process-Aware Cyberattacks for Thermal Desalination Plants

In 2017, desalination industry was contracted to produce 99.8 million m3/d of fresh water globally. In regions with a natural shortage of fresh water, desalination contributes up to 70% of drinking water. While state-of-the-art research has focused on securing the power grid, water treatment plants, and other critical infrastructure, not much attention has been given towards desalination plants. In this work, we perform interdisciplinary cyber threat analysis on a desalination plant model, presenting cyberattacks and analyzing their effect on the plant performance and equipment both from economics and mechanical engineering perspective. Our analysis shows that cyber actors can perform extensive financial damage by affecting the performance of the plant. We also perform control volume analysis and finite element analysis studies to investigate the possibility of Stuxnet-like attacks with the potential to cause mechanical damage and equipment failure.

[1]  S. Haaland Simple and Explicit Formulas for the Friction Factor in Turbulent Pipe Flow , 1983 .

[2]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[3]  Emad Ali Understanding the operation of industrial MSF plants Part II: Optimization and dynamic analysis , 2002 .

[4]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[5]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.

[6]  Ramesh Karri,et al.  Cybersecurity for Control Systems: A Process-Aware Perspective , 2016, IEEE Design & Test.

[7]  Akili D. Khawaji,et al.  Advances in seawater desalination technologies , 2008 .

[8]  S. Whitaker Forced convection heat transfer correlations for flow in pipes, past flat plates, single cylinders, single spheres, and for flow in packed beds and tube bundles , 1972 .

[9]  Michail Maniatakos,et al.  The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.

[10]  Michail Maniatakos,et al.  Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.

[11]  P. Pedley,et al.  An Introduction to Fluid Dynamics , 1968 .

[12]  Hisham Ettouney,et al.  Process control in water desalination industry: an overview☆ , 1999 .

[13]  Nils Ole Tippenhauer,et al.  SWaT: a water treatment testbed for research and training on ICS security , 2016, 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater).

[14]  Levente Buttyán,et al.  The Cousins of Stuxnet: Duqu, Flame, and Gauss , 2012, Future Internet.

[15]  Mohammad Sadegh Hatamipour,et al.  A review on energy consumption of desalination processes , 2014 .

[16]  Béla Genge,et al.  A clustering-based approach to detect cyber attacks in process control systems , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).

[17]  Thomas M. Chen,et al.  Lessons from Stuxnet , 2011, Computer.

[18]  Emad Ali,et al.  Model Reduction and Robust Control of Multi-Stage Flash (MSF) Desalination Plants , 1999 .

[19]  Alex Talevski,et al.  Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[20]  Sami Zhioua,et al.  The Middle East under Malware Attack Dissecting Cyber Weapons , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.

[21]  G. Batchelor,et al.  An Introduction to Fluid Dynamics , 1968 .

[22]  Emad Ali Understanding the operation of industrial MSF plants Part I: Stability and steady-state analysis , 2002 .

[23]  H. Rouse,et al.  Modern conceptions of the mechanics of turbulence , 1937 .

[24]  Rong Zheng,et al.  Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.

[25]  Nils Ole Tippenhauer,et al.  HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems , 2016, CPS-SPC '16.

[26]  V. Gnielinski Neue Gleichungen für den Wärme- und den Stoffübergang in turbulent durchströmten Rohren und Kanälen , 1975 .

[27]  Zhao Yang Dong,et al.  The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.

[28]  H. F. Al-Fulaij,et al.  Dynamic modeling of multi stage flash (MSF) desalination plant , 2011 .

[29]  Hunter Rouse,et al.  Modern Conceptions of the Mechanics or Fluid Turbulence , 1937 .

[30]  D. Carpenter,et al.  Climate Change and Water Scarcity: The Case of Saudi Arabia. , 2015, Annals of global health.

[31]  Michail Maniatakos,et al.  Attacking the smart grid using public information , 2016, 2016 17th Latin-American Test Symposium (LATS).

[32]  Veva Elwell,et al.  Toxicity and Anti-Inflammatory Activity of Phenolic-Rich Extract from Nopalea cochenillifera (Cactaceae): A Preclinical Study on the Prevention of Inflammatory Bowel Diseases , 2023, Plants.

[33]  R. Weisberg A-N-D , 2011 .

[34]  Mohamed Salah Ghidaoui,et al.  A Review of Water Hammer Theory and Practice , 2005 .