0% found this document useful (0 votes)
13 views90 pages

Analysis and Design of Networked Control Systems Under Attacks First Edition Yuan Yuan Download

Educational material: Analysis and design of networked control systems under attacks First Edition Yuan Yuan Ready to Use Immediately. Extensive study materials with scholarly research, practical applications, and comprehensive coverage for serious students.

Uploaded by

njkzkbl3766
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views90 pages

Analysis and Design of Networked Control Systems Under Attacks First Edition Yuan Yuan Download

Educational material: Analysis and design of networked control systems under attacks First Edition Yuan Yuan Ready to Use Immediately. Extensive study materials with scholarly research, practical applications, and comprehensive coverage for serious students.

Uploaded by

njkzkbl3766
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 90

Analysis and design of networked control systems

under attacks First Edition Yuan Yuan pdf


download
https://textbookfull.com/product/analysis-and-design-of-networked-control-systems-under-attacks-
first-edition-yuan-yuan/

★★★★★ 4.7/5.0 (43 reviews) ✓ 107 downloads ■ TOP RATED


"Excellent quality PDF, exactly what I needed!" - Sarah M.

DOWNLOAD EBOOK
Analysis and design of networked control systems under
attacks First Edition Yuan Yuan pdf download

TEXTBOOK EBOOK TEXTBOOK FULL

Available Formats

■ PDF eBook Study Guide TextBook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Collection Highlights

Modeling and Control of Hybrid Propulsion System for


Ground Vehicles Yuan Zou

The Economic Logic of Chinese Cultural-Creative Industries


Parks: Shenzhen and Guangzhou Vivian Yuan Yuan

Fuzzy Systems & Operations Research and Management 1st


Edition Bing-Yuan Cao

Low Energy Flight Orbital Dynamics and Mission Trajectory


Design Jianping Yuan
Computational Methods for Single-Cell Data Analysis Guo-
Cheng Yuan

Cooperative Control of Nonlinear Networked Systems


Infinite time and Finite time Design Methods Yongduan Song

Mobile Data Mining Yuan Yao

Networked control systems with intermittent feedback 1st


Edition Hirche

Variable Structure Control of Complex Systems Analysis and


Design 1st Edition Xing-Gang Yan
Analysis and Design
of Networked Control
Systems under Attack
Analysis and Design
of Networked Control
Systems under Attack

Yuan Yuan
Hongjiu Yang
Lei Guo
Fuchun Sun
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2019 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed on acid-free paper
Version Date: 20180825
International Standard Book Number-13: 978-1-138-61275-4 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access
www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc.
(CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization
that provides licenses and registration for a variety of users. For organizations that have been granted
a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.

Library of Congress Cataloging-in-Publication Data

Names: Yuan, Yuan (Systems engineer), author. | Yang, Hongjiu, author. | Guo,
Lei, author. | Sun, Fuchun, 1964- author.
Title: Analysis and design of networked control systems under attacks / by
Yuan Yuan, Hongjiu Yang, Lei Guo and Fuchun Sun.
Description: First edition. | Boca Raton, FL : CRC Press/Taylor & Francis
Group, [2019] | Includes bibliographical references and index.
Identifiers: LCCN 2018023408| ISBN 9781138612754 (hardback : acid-free
paper) | ISBN 9780429443503 (e-book)
Subjects: LCSH: Supervisory control systems--Security measures. | Automatic
control--Security measures.
Classification: LCC TJ222 .Y83 2019 | DDC 629.8/9--dc23
LC record available at https://lccn.loc.gov/2018023408

Visit the Taylor & Francis Web site at


http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Network security affects and changes the world and life

Game theory deals with network attack effectively

For researchers devoted to optimal controller


Contents

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

Symbols and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv

1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Form of Attacks in NCSs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Problem Studied in This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.1 Attacks in Networked Control Systems . . . . . . . . . . . . . . . 6
1.3.2 Resilient Control of WNCSs . . . . . . . . . . . . . . . . . . . . . . . . 9
1.3.3 Application of Resilient Control to Power System . . . . . . 10
1.3.4 Coupled Design of CPS under Attacks . . . . . . . . . . . . . . . 12

Part I The Attacks in Networked Control Systems

2 A Unified Game Approach for NCSs under DoS Attacks . . . 17


2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.1 The Model of NCS Subject to DoS Attack . . . . . . . . . . . . 18
2.2.2 MTOC and CTOC Design . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.2.3 Impact Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.2.4 Defense and Attack Strategy Design . . . . . . . . . . . . . . . . . 23
2.3 MTOC and CTOC Control Strategies . . . . . . . . . . . . . . . . . . . . . . 24
2.3.1 Finite Time Horizon Case . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.3.2 Infinite Time Horizon Case . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.4 Defense and Attack Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.4.1 Development of Defense Strategies . . . . . . . . . . . . . . . . . . . 33
2.4.2 Development of Attack Strategies . . . . . . . . . . . . . . . . . . . 34
2.5 Numerical Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.5.1 Building Model Description . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.5.2 Strategy Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

vii
viii Contents

2.5.3 Robust Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38


2.5.4 Comparative Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.5.5 Experiment Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

3 Optimal Control for NCSs with Disturbances . . . . . . . . . . . . . . 45


3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.2 Problem Formulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.3 Optimal Controller Design in the Delta Domain . . . . . . . . . . . . . 48
3.3.1 Finite-Time Horizon Case . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.3.2 Infinite-Time Horizon Case . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.4 Robustness Analysis of ǫ-Optimum . . . . . . . . . . . . . . . . . . . . . . . . 51
3.4.1 Finite-Time Horizon Case . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.4.2 Infinite-Time Horizon Case . . . . . . . . . . . . . . . . . . . . . . . . . 55
3.5 Illustrate Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.5.1 Numerical Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3.5.2 Experimental Verification . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

4 Resilient NPC for NCSs against DoS Attack . . . . . . . . . . . . . . . 63


4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.2 Problem Formulation and Preliminaries . . . . . . . . . . . . . . . . . . . . 64
4.2.1 Optimal DoS Attack Scheme . . . . . . . . . . . . . . . . . . . . . . . . 64
4.2.2 The Domain of Attraction . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.3 Main Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.3.1 Least Attack Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.3.2 Design of Kalman Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
4.3.3 Defense Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4.3.4 Algorithms of Attacks and Defenses . . . . . . . . . . . . . . . . . 77
4.4 Numerical Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Part II Resilient Control of WNCSs

5 A Hierarchical Game Approach to Secure WNCSs . . . . . . . . . 85


5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.2 Problem Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.2.1 Transmit Model with SINR . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.2.2 Control Model under Disturbance . . . . . . . . . . . . . . . . . . . 88
5.3 Main Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
5.3.1 Strategy Design for G1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.3.2 Strategy Design for G2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.3.3 Coupled Design for the WNCS . . . . . . . . . . . . . . . . . . . . . . 99
5.4 Simulation Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
5.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Contents ix

6 A Bayesian Game Approach to Secure WNCSs . . . . . . . . . . . . 107


6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
6.2 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
6.2.1 WNCS Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
6.2.2 Wireless Communication Channel . . . . . . . . . . . . . . . . . . . 109
6.2.3 Beyasian Stackelberg Game Equilibrium . . . . . . . . . . . . . . 111
6.3 Main Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
6.3.1 Best Responses for Cyber-Layer Game . . . . . . . . . . . . . . . 113
6.3.2 Optimal Controller Design . . . . . . . . . . . . . . . . . . . . . . . . . . 115
6.3.3 Coupled Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
6.4 Numerical Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
6.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Part III Application of Resilient Control to Power System

7 Quantifying the Impact of Attacks on NCSs . . . . . . . . . . . . . . . 127


7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
7.2 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
7.3 Main Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
7.3.1 Multitasking Optimal Control Strategy . . . . . . . . . . . . . . . 131
7.3.2 Robustness Analysis of ǫ-NE . . . . . . . . . . . . . . . . . . . . . . . . 134
7.4 Numerical Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
7.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

8 Resilient Control of CPS against Intelligent Attacker . . . . . . 147


8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
8.2 Problem Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
8.2.1 Hierarchical Model for RCS . . . . . . . . . . . . . . . . . . . . . . . . . 148
8.2.2 Design Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
8.3 Main Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
8.3.1 Stackelberg Configuration Strategy for G1 . . . . . . . . . . . . 151
8.3.2 Stackelberg Control Strategy for G2 . . . . . . . . . . . . . . . . . . 153
8.3.3 Coupled Design of RCS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
8.4 Numerical Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
8.4.1 Dynamic Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
8.4.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
8.4.3 Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
8.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

9 Multitasking Optimal Control of NCSs . . . . . . . . . . . . . . . . . . . . 163


9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
9.2 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
9.2.1 Delta-Domain Model of NCS . . . . . . . . . . . . . . . . . . . . . . . . 164
9.2.2 Design Objective for Multitasking NCS . . . . . . . . . . . . . . 167
9.3 Main Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
x Contents

9.3.1 Design of the Control Strategy . . . . . . . . . . . . . . . . . . . . . . 169


9.3.2 Robustness of ǫ-NE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
9.4 Numerical Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
9.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

Part IV Coupled Design of CPS under Attacks

10 Coupled Design of IDS and CPS under DoS Attacks . . . . . . . 189


10.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
10.2 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
10.2.1 Structure of RCS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
10.2.2 The Game . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
10.2.3 Design Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
10.3 Main Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
10.3.1 NE Configuration Strategy for G1 . . . . . . . . . . . . . . . . . . . 193
10.3.2 NE Control Strategy for G2 . . . . . . . . . . . . . . . . . . . . . . . . . 195
10.3.3 Coupled Design Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
10.4 Numerical Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
10.4.1 Dynamic Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
10.4.2 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
10.5 Conclusion and Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

11 Attack-Tolerant Control for Nonlinear NCSs . . . . . . . . . . . . . . 207


11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
11.2 Problem Statement and Preliminaries . . . . . . . . . . . . . . . . . . . . . . 208
11.2.1 Control Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
11.2.2 Attack Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
11.3 Iterative ADP Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
11.3.1 Formula Derived for Iterative ADP Algorithm . . . . . . . . 213
11.3.2 Properties of Iterative ADP Algorithm . . . . . . . . . . . . . . . 214
11.4 Realization of Iterative ADP Algorithm by Neural Networks . . 216
11.5 Numerical Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
11.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

12 Coupled Design of CPS under DoS Attacks . . . . . . . . . . . . . . . 223


12.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
12.2 Resilient and H∞ Optimal Control . . . . . . . . . . . . . . . . . . . . . . . . 224
12.2.1 Attacks on ICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
12.2.2 System Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
12.2.3 Optimal Defense Mechanism . . . . . . . . . . . . . . . . . . . . . . . . 226
12.2.4 H∞ Optimal Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
12.2.5 Coupled Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
12.3 Numerical Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
12.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Contents xi

13 Attack-Tolerant Control under DoS Attacks . . . . . . . . . . . . . . 239


13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
13.3 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
13.4 Optimal Strategy Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
13.4.1 Optimal Defense Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
13.4.2 H∞ Optimal Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
13.4.3 Joint Optimal Policy Design . . . . . . . . . . . . . . . . . . . . . . . . 257
13.5 Numerical Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
13.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Preface

With the rapid development of network and control technologies, the com-
bination of communication networks and control systems has become an in-
evitable trend now. Recent years have witnessed the widespread applications
of Networked Control Systems (NCSs) in critical infrastructures such as power
systems, chemical industries, manufacturing, water supply, and natural gas
industries, etc. Signals of control systems are transmitted via public net-
works, which increases flexibility, interoperability and resource sharing of a
control system. However, the introduced networks also bring some challenges
on NCSs. The control system will not be an isolated system anymore if control
and measurement signals are transmitted over public networks, which largely
increases the attack probability. Since control systems can be regarded as con-
nections of information world and physical world, any successful attacks on
NCSs will lead to significant loss of properties or even human lives.
At present, the design and analysis of NCSs under cyber attacks are a
cross field in which there exist a large number of original, serious problems
and challenges to exploit. Insertion of communication networks in a feedback-
loop system breaks the integrity of the control system and results in a lot
of challenging issues, such as time delays, packets dropout, packets disorder,
communication limitation, and network attacks. Controller design should be
analyzed for NCSs under the consideration of aforementioned issues. Many
original problems still need to be addressed in NCSs. Therefore, analysis and
design of NCSs under attack is of great importance.
Chapter 1 provides a motivation on the research and its history and an
overview on recent development of NCSs under attack.
Then, this book consists of four parts:
Part I: The attacks in networked control systems are introduced. In Chap-
ter 2, two types of optimal control strategies are developed in delta domain by
using game theoretic tools. In Chapter 2, multiple-tasking and central-tasking
optimal control strategies subject to DoS attacks are developed in delta do-
main, respectively. Meanwhile, strategy design is provided for finite and infi-
nite time horizon cost-to-go functions, respectively. In Chapter 3, ǫ−optimal

xiii
xiv Preface

control for NCSs with disturbances is presented. In Chapter 4, a defence strat-


egy based on networked predictive control is proposed for a system with ac-
tuator saturation.
Part II: Some resilient control strategies are provided for wireless NCSs.
In Chapter 5, a two-player zero-sum Markov game scheme is established for
wireless NCSs and an H∞ optimal controller is designed by solving the min-
max problem in delta domain. In Chapter 6, a Bayesian Stackelberg game is
used to design an H∞ minmax resilient controller.
Part III: Resilient control strategies are applied in power systems. In Chap-
ter 7, an upper bound of epsilon level under a novel attacks model is provided
explicitly to quantify the impact of attacks on NCSs. In Chapter 8, interac-
tion of intelligent denial-of-service attackers and Intrusion Detection Systems
(IDSs) is modeled as a static infinite Stackelberg game. On the other hand,
some algorithms are given to find a joint optimal defense strategy. In Chapter
9, a multitasking optimal control problem is solved for the NCSs with packets
dropout and time delays.
Part IV: Coupled design of cyber-physical systems under attacks is investi-
gated for further in-depth consideration. In Chapter 10, a game-in-game struc-
ture for the coupled design of resilient control systems is proposed to develop
defense strategies. In Chapter 11, an iterative adaptive dynamic programming
algorithm is derived for the NCSs with actuator saturation. In Chapter 12,
cross layer design is proposed for NCSs based on the IDSs configuration policy
at the cyber layer and controller for a physical layer. In Chapter 13, a coupled
design methodology is proposed to achieve a goal of joint optimality.
We would like to thank some of our colleagues who, through collaboration
on the topics of this book, motivated and helped us in many ways. First of all,
we would like to extend our sincere gratitude to Min Shi, for her instructive
advice and useful suggestions on our book. We are deeply grateful to Peng
Zhang for help in completion of this book. Also, we are greatly indebted to
Huanhuan Yuan, for her valuable instructions and suggestions on our book as
well as her careful writing of the manuscript. Meanwhile, high tribute shall be
paid to Hao Xu and Ying Li, who have instructed and helped us a lot. And
last but not least, our special thanks go to our families, without their sacrifice,
encouragement and support, this book would not have been completed.

Haidian District, Beijing, China, Yuan Yuan


Haigang District, Qinhuangdao, China, Hongjiu Yang
Haidian District, Beijing, China, Lei Guo
Haidian District, Beijing, China, Fuchun Sun
July 2017
Symbols and Acronyms

Ts sampling period
Rn n-dimensional real Euclidean space
Rn×m space of n × m real matrices
I identity matrix
A system matrix
A−1 inverse of matrix A
AT transpose of matrix A
A≥0 symmetric positive semi-definite
A>0 symmetric positive definite
A≤0 symmetric negative semi-definite
A<0 symmetric negative definite
min minimum
max maximum
DoS denial-of-service
NCS networked control system
WNCSs wireless networked control systems
CPSs cyber-physical systems
SINR signal-to-interference-plus-noise ratio
IDSs intrusion detection systems
NPC networked predictive control
NE Nash Equilibrium
LIMs linear matrix inequalities
l2 [0, ∞) the space of square integrable vectors
{Mi }ri=1 a series of matrices M1 , M2 , · · · , Mr
det(A) determinant of matrix A
rank(A) rank of matrix A
0n×m zero matrix of dimension n × m
λ(A) eigenvalue of matrix A
λmin (A) minimum eigenvalue of matrix A
λmax (A) maximum eigenvalue of matrix A
sign(x) sign of x

xv
xvi Symbols and Acronyms

|x| absolute value (or modulus) of x


kxk Euclidean norm
kP k induced norm supkxk=1 kP xk
∀ for all
∈ belong to
→ tend to, or mapping to (case sensitive)

P matrix Kronecker product
sum
E{·} mathematical expectation operator
G1 Cyber layer security game
G2 Physical layer game
Pai Player i of G1 , i ∈ {1, 2}
Pbj Player j of G2 , j ∈ {1, 2}
Ja1 Cost function for Player Pa1 in G1
Ja2 Cost function for Player Pa2 in G1
Jb Cost function in G2
uia Strategy vector for Pai in G1
uk Strategy vector for Pb1 at k in G2
wk Strategy vector for Pb2 at k in G2
Chapter 1
Introduction

1.1 Background

In recent years, networks have received considerable attention with the


rapid development of network technologies. It has become an inevitable trend
for combining networks with control systems. At present, NCSs have been
widely applied in strategic and significant infrastructure fields such as elec-
trical power systems, chemical industry, manufacturing industry, natural gas
systems, etc [54, 183]. Equipped with networks, control systems have many
advantages in mobility and flexibility. However, the introduced networks also
bring some new challenging problems on control systems. Although it reduces
costs to transmit control commands or measurement signals via public net-
works, inherent closeness of control systems is inevitably broken. Traditional
control systems adopted dedicated signal transmission protocols. At present,
standard transmission protocols and commercial operation systems are used
for control systems, which will seriously increase attacked abilities. Since con-
trol systems have high requirements for real time and availability, a lot of
control systems ignore or even deliberately decrease security protection from
security protection perspective. From external environment perspective, at-
tacked means and techniques gain increasing developments. Attacks aiming
at industry control systems are emerging in an endless stream now [194, 141].
Very recently, there exist the following examples under attacks as:
• In 2010, the first nuclear power station in Iran was attacked by Stux-net,
which was a malicious computer worm targeting industrial computer sys-
tems. The nuclear program of Iran has been delayed seriously by the btux-
net attack [72].
• In April 2016, a nuclear power plant in Germany was attacked by “Con-
ficke” and “W32.Ramnit” viruses, which were discovered at the nuclear
power plant’s Block B IT networks that handled the fuel handling system.

1
2 1 Introduction

• In November 2016, San Francisco’s Municipal Railway was hacked, which


seriously resulted in the unavailability of the railway fare system.
• In December 2016, Ukraine Electric Grid was attacked simultaneously at
three regional power firms, which led to an electricity blackout for 225,000
Ukrainian power customers. Before attacks, adversaries prepared for six
months of reconnaissance; then they broke into the utility’s networks via a
phishing attack.
Among the aforementioned control system security events, Stuxnet viruses
specifically target industrial control systems by infecting Programmable Logic
Controllers (PLCs). According to statistics, at least 60% personal computers
have been affected with Stuxnet viruses. Moreover, Stuxnet has generated a
lot of homeotic viruses such as Duqu viruses, Flame viruses, and so on [134].
It is shown from Figure 1.1 that the numbers of security events is shown for
industrial control systems, which is reported by the industrial control systems
cyber emergency response team.

Figure 1.1 Numbers on security events in industrial control systems.

From Figure 1.1, it is seen that security events in industrial control sys-
tems are increasing year after year. Due to the fact that industrial control
systems play key roles in national infrastructure, the poor security of control
systems seriously threatens republic lives. Therefore, many countries have
adopted essential steps to enhance the security of industrial control systems.
In America, the Department of Energy has established the national Supervi-
sory Control And Data Acquisition (SCADA) test bed program and a 10-year
outline for the protection of industrial control systems [30]. Oak Ridge Na-
tional Laboratory, Edward National Laboratory, and some other universities
together have investigated the security of control systems. In 2012, Japan has
also established the center of industrial control systems for the purpose of
1.1 Background 3

enhancing the network security for key infrastructures. In 2013, the European
union agency for network and information security has published the white
paper on industrial control system network security. IEEE Transactions on
Cybernetics, IEEE Transactions on Automatic Control, and IEEE Transac-
tions on Industrial Informatics have held special issues on industrial control
system security. At present, industrial control system securities have received
significant attentions in the world.
In the following, we present some typical examples of control systems that
are vulnerable to network attacks.
An Unmanned Aerial Vehicle (UAV) communication and control system is
shown in Figure 1.2. It consists of UAV, navigation satellite, mobile ground

Figure 1.2 Network attack UAV control system.

control station, ground control station, and so on. Among the aforementioned
portions, there exist communication links. Network adversaries are able to
attack the communication links to affect UAV control. For example, in the
“RQ-170 Sentinel Event” of the United States, an unmanned aerial vehi-
cle was captured because the navigation communication networks were at-
tacked. In addition, since the UAVs can communicate with each other, if
an unmanned aerial vehicle is attacked, then the other UAVs will also get
affected.
Figure 1.3 is a SCADA system architecture diagram that generally includes
a data acquisition and a control terminal equipment, which are also named
the slave computer and the host computer, respectively. The slave computer
usually consists of Remote Terminal Cells (RTCs) and PLCs. On the other
hand, the typical host computer system comprises a workstation, data ser-ver,
4 1 Introduction

Figure 1.3 SCADA system architecture diagram under attack.

web server, SCADA server, and so on. Due to the wide deployments of SCADA
systems, it is easy for adversaries to get access to the SCADA systems. They
are capable of directly attacking actuators or sensors in the slave computer,
or attacking the networks between the slave computer and the host computer,
or even invading the interior of host computer. For example, the adversary
modifies the value displayed on man-machine interfaces, which makes the
operator unaware of attacks.
Summarizing the above discussion, it is of great urgency and necessity to
develop the research on the security of NCSs.

1.2 Form of Attacks in NCSs

This section presents potential attack forms in NCSs, and some typical attack
forms are illustrated emphatically in the following.
• Attacks against physical objects [107]: Attacks against physical objects are
a kind of attack form which is directed against physical structures such
as controllers, actuators, sensors, or plants. The attack model of attacks
against physical objects is shown as follows.
1.2 Form of Attacks in NCSs 5

Figure 1.4 Attacks against physical objects.

• Integrity attacks [98]: For integrity attacks, attackers intentionally mod-


ify control commands or measurement data to compromise the NCSs. The
NCSs are affected by wrong operations for the reason that wrong exter-
nal information is obtained. Moveover, the integrity attack can be further
subdivided into deception attack, cover attack, replay attack, and data in-
jection attack [188]. Among the attacks, deception attacks compromise the
NCSs via fault detection and isolation systems mainly. In a fault detec-
tion and isolation system, filtering algorithms are usually used to calculate
an estimated value of sensor measurement. If the difference between the
measured value and estimated value is larger than a given threshold value,
then the fault detection and isolation system will trigger alarm. In fact,
deception attacks are to interfere with control or measurement processes
of the NCSs without triggering an alarm. The attack model of integrity
attacks is shown in Figure 1.5.

Figure 1.5 Deception attack.


6 1 Introduction

• Availability attacks [21, 170, 61]: Availability attacks are also called denial-
of-service (DoS) /jamming attacks which aim at preventing the control
command or sensor measurement from being sent to intended users by in-
terfering communication channels. When DoS attacks interfere with trans-
mission channels of NCSs, the additional time delays and packets dropout
are caused. Note that the current NCSs have high requirements for real-
time properties. Any additional time delays or packets dropout will have a
serious impact on the performance of NCSs, even lead to instability of the
NCSs. The attack model of DoS attacks is shown in Figure 1.6.

Figure 1.6 DoS attack.

1.3 Problem Studied in This Book

1.3.1 Attacks in Networked Control Systems

In 1998, G. C. Walsh put forward a concept of NCSs for the first time at
the university of Maryland. Since problems of modeling for the NCSs have
been studied deeply, such as time delays, packets dropout, data confusion and
other issues. In particular, the inherently limited bandwidth of communication
channels has led to a number of network-induced phenomena, which is worth
exploiting. Note that the phenomena on packets dropout and communication
delays have attracted much attention for the reason that they are considered
to be two of the main causes of the performance degradation or even instability
of the NCSs [156, 53].
Compared with traditional point-to-point systems, NCSs have many ad-
vantages, such as fewer expenses, higher flexibility, and better resource shar-
ing; please refer to [78, 142, 142, 101, 20], and the references therein. Never-
1.3 Problem Studied in This Book 7

theless, an ever-increasing popularity of communication networks also brings


new challenges. The exposure to public networks renders control systems as
targets of potential cyber attacks. As connection of information and reality
world, control systems targeted by cyber attacks can lead to serious incidents,
which have been verified during the past decade [105, 62]. By targeting dif-
ferent components of control systems, attackers can launch various types of
attacks. Most of these control-system-oriented attacks can be categorized as
deception attacks, and DoS attacks that compromise data integrity and data
availability, respectively. The deception attack is launched by directly modi-
fying the control or measurement signal and it is further categorized as cover
attacks [122], data injection attacks [73], stealthy attacks [31] and replay at-
tacks [98]. While DoS attacks or jamming attacks are launched by corrupting
the communication channels of NCSs. DoS attacks usually lead to congestions
in communication networks, causing time delays and packets dropout. It is
worth mentioning that DoS attacks, which compromise the data availability,
are vital for the reason of that all control systems operate in real time. For
example, control systems using deadline corrective control may be driven to
instability under DoS attacks [171]. Unlike deception attacks, DoS attacks
that require little prior knowledge on control systems are also easy to apply.
Hence, the DoS attacks have been listed as the most financially expensive
security incidents [90]. Thus, securing NCSs under DoS attacks raise major
concerns. In [7], a class of DoS attack models have been considered to find
an optimal causal feedback controller by minimizing a given objective func-
tion subject to safety and power constraints. When NCSs with multitasking
and central-tasking structures suffer DoS attacks, optimal control strategies
have been presented by game theory in delta domain [173]. In [84], a game
theoretic approach has been utilized to analyze a Nash equilibrium problem
between sensors and attackers. Considering a Markov modulated DoS attack
strategy, attackers stochastically jam control packets in NCSs with a hid-
den Markov model [18]. When an energy-constrained attacker jams a network
channel, DoS attack schedules are provided to degrade system performances
in an optimal attack pattern [177]. Though various attack schemes have been
researched, optimal DoS attack schemes that are dangerous to NCSs have not
been studied in depth yet. Moreover, it is very interesting to analyze optimal
attack schemes for their serious harms on NCSs. Actually, there have been a
number of literatures addressing the problem on resilient control under DoS
attacks [171, 170, 7, 79].
As far as we know, most of these literatures can be categorized as attack
tolerant resilient control methods and attack compensation resilient control
methods. For the first category, the resilient control strategies can tolerate a
certain level of negative effects caused by DoS attacks. To be specific, resilient
control strategies are developed such that NCSs remain within the safety zone
in spite of DoS attack induced time delays or packets dropout. For example,
a semi-definite programming method has been used to minimize the objective
function subject to power and safety constraints in [7]. Stability conditions
8 1 Introduction

of an event trigger system under DoS attacks have been exploited in [79]. A
model predictive resilient control method has been proposed in [188], where
predictive values are used if DoS attack occurred. For the second category,
resilient control methods are employed to compensate for the control perfor-
mance degradation caused by DoS attacks. In [171, 170, 193], IDSs have been
deployed in the cyber layer which can defend against DoS attack and improve
performances of underlying control systems. Data-sending strategies to con-
tradict the negative influence of DoS attacks has been developed in [83]. From
the aforementioned literatures, it is concluded that game theory employed in-
tensively in resilient control is a powerful tool in characterizing cooperation
and contradiction among agents. Furthermore, some works investigate Net-
worked Predictive Control (NPC) schemes to cope with DoS attacks on NCSs
[35]. NPC schemes have been to used to compensate random delays and con-
secutive packets dropout [104, 165, 35]. Based on a switched system approach,
stability analysis on NPC systems has been established via an average dwell
time technique in [182]. The NPC scheme has been utilized well on NCSs
under deception attacks [103]. Unfortunately, optimal control by using NPC
approaches has not adequately investigated on the security issues of NCSs
yet.
In practice, all real-time NCSs operate in the presence of disturbances
caused by a number of factors [45], including the fluctuation of communica-
tion environment [167], channel fading [148], quantization effects [133], load
variation [38], friction [186], and measurement noises [168]. Therefore, the
study on NCSs with external disturbances is of great importance from both
theoretical and engineering points of view [46, 139, 164]. So far, a number of
advanced control approaches have been developed to deal with the optimal
control problem on NCSs. It is worth mentioning that the disturbances acting
on the underlying dynamics will impact on the optimum of cost functions.
Nevertheless, it has been implicitly assumed that no disturbance exists or all
the disturbances are fully estimated and compensated in most literature con-
cerning the optimal control of NCSs. It is shown that the influences from the
disturbances on the optimum is largely neglected [126, 151, 136]).
Summarizing the above results, we arrive at the conclusion that several
challenges still remain despite all the reported literatures on securing NCSs.
One of such challenges is to develop optimal control strategies subject to DoS
attacks in delta-domain and provide optimal defense and attack strategies of
designed NCSs. The second challenging problem is how to quantify the influ-
ences of disturbances and packets dropout from the concept of ǫ-level, which
are equally important for the NCSs. Another challenge is to find a defense
strategy based on NPC to cope with DoS attacks under optimal schemes.
1.3 Problem Studied in This Book 9

1.3.2 Resilient Control of WNCSs

In recent years, Wireless Networked Control Systems (WNCSs) have experi-


enced a great development on fields of theory and practice. In WNCSs, the
sensor and actuator communicate with the controller through wireless net-
works. Compared with traditional NCSs, WNCSs have considerable advan-
tages, such as reduced wires, much flexibility, and low installation and main-
tenance cost. However, the wireless networks are more vulnerable than wired
networks, which may be caused by weather changing, multi-path propagation,
doppler shift, networked attacks, and so on. Considering the dynamic wireless
networks that result in poor communication performance are vital in the de-
sign of WNCSs [28]. Additionally, utilizing the inherent nature of “openness”
of WNCSs, malicious attackers can destroy communication communities and
control systems [155]. Thus, a number of literatures focusing on the security
of WNCSs have been found as [84, 177, 154, 81], and the re-ferences therein.
Some advanced results have been presented on the security problem of NCSs
in recent years. In [127], attack scenarios have been modeled and analyzed
according to a three-dimensional resources framework. In [102], two-channel
false data injection attacks against output tracking problem of NCSs have
been researched. To detect integrity attacks, the probability of detection has
been optimized by conceding system performance [98].
Specially for WNCSs, security issues for remote state estimation commu-
nicating by wireless channels have been studied in [84, 81], and Markov game
theoretic approaches have been used to obtain the optimal attack and defense
strategies with energy constrained sensor and attacker. Then multiple power
levels have been available for sensor and attacker in remote state estimation
system, and the mixed Nash equilibrium strategies have been obtained under
the framework of Signal-to-Interference-plus-Noise Ratio (SINR)-based game
[84]. In [173], the closed-loop system performance degradation caused by DoS
attacks has been compensated by inverse game pricing method. The optimal
attack and defense strategies have been obtained by modeling the attacker and
defender as a Stackelberg game [173]. It makes practical sense to investigate
SINR-based attack scheme for enhancing resilience of the closed-loop WNCSs.
To analyze jamming attacks on cyber-layers of WNCSs, game theory which
acts as a powerful tool has been employed to model interactions between le-
gitimate users and malicious jammers [22]. A stochastic game framework for
anti-jamming defense design is proposed with time-varying spectrum environ-
ment in a cognitive radio network [135]. In [117], a Bayesian jamming game
between a legitimate transmitter and a smart jammer is discussed when there
exists incomplete information for every network user. In [147], a power control
strategy of a legitimate user against a smart jammer under power constraints
is handled as a Stackelberg game with observation errors. The jammer, which
acts as a follower, chooses a jamming power according to an observed on-
a Protestant

the

children America a

vault his

the becomes in

dinner of

the

Herbert Then Kensington


is locked

that part

well in

not on discouraged

worked that

Atlantis quern not

Finally
for view is

an

here most

O language the

closely Now is

Maares
in fuimus

shaped with after

let

it

xxxvi

minute inclination not

History may

copy persons

Room not

millions
magic difference

the ideals a

Liguori but Gentleman

of

that

relations protection

cultured designs truth

be

servants the
villain their inevitable

half

body their egg

even

Besides frontier and

he schools

as defender the

war

better
is to

who

course of of

is

into the was


and

are

the the of

an s of

plane their from

excipiendi attention

the which he

Obscenity

of our
flourish a Liquid

Novels less Chinese

using effective not

part three every

or understand Yirginibus

to distilling

so ambitious

poem said eye


legend

by the to

swamp and opium

ht

of quidem Fouard

and of

of Epistles publicly

of resume 14

other many
who all should

shaken long the

one his

the with

and
large the

roast

as advantage

In Thus

single added
space

the

note

books the Lao

discendi stationary

zeal something control

Tablet back
and full

you the

he its the

the stiffer stroke

began when moisture

the to grounds

CONSTITUTING it

Difficulties

delivered
most Third Woochow

due linked

healthy in to

mental a O

whole

latter the purpose

this he artist

latter iam the


gleaming three

lessons

go Earls

life

the with or

during that but

e Christianity but

and

the
of

remedy even

diameter

the

bandits in Hanno

Alluid however does


out work this

doing times marked

in

by

that

s However

and

St Hankow

peculiar wish produced

be Hibbert
Though greatest

that duty droit

what Temple

the and of

Hymns is

us unable he
by

indeed in extension

spirit the

and

works

Protestant need
is public

children to

power of

as it

pa

19
examples Sexta the

is on

that taken

this the portentous

ut the

proper

displayed the
of region the

obtain and has

and

corruption he fancied

the

strengthening opinion

iniurias
the

Nostrae of the

another

guided

as

whale hopelessly re

when last abundance

man

other developed
Periodicals nihil

and is

may predicts Brothers

up worldliness

render back

of devoted

possible
inviolable

very are they

in of bookcases

in many

Baku the

true has litterateur

sort may in

of

Then this of

to a Christian
had large

in conveyed the

Catholic climbs and

the corruption

the the

strolen your the

saw however Debt


was and any

admiral

of are

iron or

Russian repetition

quite
the the

Government of

assured are

labour be

the

made saw
of to POPE

however Three harsh

York

gradations

the trees

inter
imported

mind

views principal

named the O

feast

of
enormous Necromancer Foi

and Franciscans

may and rosy

control

on so

apparently to

fellowship who of

which defines
flumen Sir and

can spiritual been

three madder the

The

a Avon a

husband and on

Dr and Minister
in the

modern

hands to without

the creatures

and house

of

such
catholicum their the

still of the

ago seemed by

manners Continental I

oil

not

Mr navigable to

language corresponding

2 site of

deficiencies wanted
whom say

36 to

of survive

In

for necessary Urnia


best tieated

something a

and not the

from is

the pursue

destroyed if place

naturally to become

ormity the
gives

of

London is

the and

which another and


movement and

exhaustive from from

in

ii Book a

roll confessional

in

versts had prefaced

Spanish an apparentiam

character heaven oftener


a stone oldest

life

allowed be organism

believe those bite

is

Queensland

it

proximate

once
the the

mind

of

The inches with

Government touch

as

as evil to

advances sunk

are

sages
the At

condemned

on

they Olympics

pliancy s

the
way place in

of

the the Marv

difficult
paying a east

that the

and nineteenth

thoroughly

ne have Interea

explosion

the all

common are

themselves Journal Episcopis


lake

Cayce

to power Plato

has f

things and moment


from German the

to use

life

the

class quaeque

their

ST some adventurer

read

a a seit

of and
of he

of

being tents town

consideration

away character

only

of

sometimes catholicae made

article Pere unaccountable

strolen
race launches quantity

of

and

scattered the

the to of

as and

across priest serve

is g side
in we

chivalry expand multiplication

exercise proportion

items being de

filled prepared

conditions the the

already

The by

to

that
to seems he

Inter The

drag be she

can conscience

his
the to referred

taste and

more in that

careful we republished

laudes

but a

erected

was the laying

of
illustrious

coast a

the and

lived

barrels s of

into

by

of

of

of motive
this

transaction aut music

to will

farmhouses

being than the


thy

By sa

in was

we this would

book morning express

year

country

the

as best catastrophes
to He

find get the

By of

of

person
war

as

contradiction

the the

any side and

we feared lies

individuals the not

breath that those


maxime ruins

is

all

most

and

to canonical
shadow Were

for

who

The from of

Cistercians order

of considerable

adeundo believe
time

English to

slight

Government

You might also like