In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.
Due to the open nature of communication channel in networked multi-agent system (MAS), the MAS is vulnerable to various malicious cyber attacks. In this paper, the impact of content modification attack on MAS consensus is rigorously studied by defining and analyzing a specific attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Vulnerability of MAS consensus to MCoMA is further demonstrated by design of an optimal MCoMA that is distributed and compromises the least number of communication links. The fast, distributed, model-free, and computationally light attack detection schemes for both MCoMA and general content modification attack are discussed. The paper also studies an attack mitigation scheme for MCoMA.
I. INTRODUCTION
The problem of distributed coordination of multi-agent system is significant due to its broad applications, such as robot networks, sensor networks, formation control, flocking, and swarming. The goal of these problems is to generate a desired collective behavior for multi agents only by sharing local information. One of the critical problem is called consensus, which means a group of agents reach an agreement on a common value by interacting with neighbors.
Consensus problem has a historical view presented in Refs. 1–3. A simple discrete time flocking model given by Ref. 4 is theoretically analyzed in Ref. 5. The agreement, consensus, and synchronization problems for networked multi-agent system are extensively studied by Refs. 6–20 and among others, in which different scenarios are considered including directed/undirected graphs, fixed/switching topologies, network effects, deterministic/stochastic topology, uncertainties/disturbances, and linear/nonlinear dynamics. In practice, a broad class of systems can be modeled by a double integrators dynamics model, e.g., certain vehicle dynamics can be feedback linearized as double integrators. Thus, considerable research attention has been paid to the consensus-related problem for MAS with double-integrator dynamics.21–25 More references on the study of MAS coordination can be found in a recent survey Ref. 26. Common network effects like delays,8 noise,19 quantization15 and packet drops17 have been addressed for consensus seeking MAS in the aforementioned works. On the other hand, another malicious and intelligent network factor called cyber attack, which can cause severe disruption or damage to MAS, has begun to receive the attention of the research community.
MAS are a specific form of system commonly known as cyber physical system (CPS). In recent years, the significance of CPS security is being increasingly realized. Since most of the CPS are safety critical, their failure can damage the critical physical system, for instance, stuxnet malware sabotaging Iran's nuclear infrastructure,27 water supervisory control and data acquisition (SCADA) system attack,28,29 and power transmission network attack.30 Various works have studied different cyber attacks including the denial-of-service (DoS) attack31 where the attacker denies data availability in system, the replay attack32 where some normal data is recorded and replayed to avoid being detected, and the content modification attack33 where the attacker intentionally modifies the transmitted data of the original system. Various approaches are proposed to address these issues including quantitative risk management approach,34 game theoretical methods,35,36 control theory,37 and physical authentication by watermarked control input.38
As one type of CPS, the consensus seeking MAS is also vulnerable to cyber attacks due to the open nature of communication network. Some works concerning the cyber attack on MAS consensus have been reported. In Ref. 39, a consensus problem is considered for a first-order MAS with adversarial agents. It is shown that the consensus can be reached in complete network topologies, whenever there are more cooperative agents than the adversarial agents. Ref. 40 again considers a first-order MAS under a specific attacker with a linear dynamics, which can insert external signals in network to destabilize the consensus dynamics. A hidden network is then designed to maintain the system stability. Similarly, Ref. 41 studies the consensus problem for discrete-time multi-agent systems in the presence of adversarial agents and transmission delays. A sufficient condition for the resilient consensus under the proposed protocol is given. References 39–41 including the references therein only consider MAS consisting agents with single-integrator dynamics, whereas in the work presented in this paper, we have considered agents with double-integrator dynamics.
In a closely related work, Ref. 42 considers MAS consensus of agents with double-integrator dynamics. Ref. 42 proposes a distributed unknown input observer (UIO) based attack detection and isolation scheme, wherein the attacks on both agent and communication link are considered. The shortcomings of this scheme are as follows: the computation burden is too high and the scheme is just semi-distributed. Ref. 43 tries to overcome these limitations, but the assumption that there is no coupling between the dynamics associated to each node limits the application of its scheme. In Ref. 44, a resilient consensus for a MAS with second-order dynamics is studied, in which some malicious nodes prevent the normal nodes to reach consensus and certain conditions on graphs are imposed to ensure the consensus. Whereas in the work presented in this paper, none of the agents participating in the consensus process are malicious, and the attacker can only externally influence the states being exchanged by the agents.
Reference 45 considers a secure consensus tracking problem for general linear MAS with connected and disconnected directed switching topologies caused by two types of attacks. Further, sufficient conditions are derived to ensure a secure consensus. Basically, Ref. 45 suggests that an attacker need not attack the complete network but only few of its edges. In this paper, we have rigorously derived the necessary and sufficient conditions on the edges that should be attacked for maximizing the damage to the MAS system with double-integrator dynamics. Further, we also present a detection mechanism to detect the edges being attacked.
In this paper, we consider a consensus problem for a second order MAS with undirected topology under an edge-bound content modification attack, which can externally intercept the communication links and corrupt the data content. The contributions of current paper are as follows:
The impact of content modification attack on MAS is rigorously studied by defining and analyzing the MCoMA that can guarantee a storage function V for MAS consensus satisfies with ;
An optimal MCoMA that is distributed and compromises the least number of communication links is designed;
The fast, distributed, model-free, and computationally light attack detection schemes for both the proposed MCoMA and general content modification attack are discussed. An attack mitigation scheme for MCoMA is also proposed.
The rest of the paper is organized as follows. In Section II, mathematical notations used throughout the paper are described. Section III provides a brief review on graph theory and existing consensus algorithm. In Section IV, the main results are presented. Finally, the simulation results are shown in Section V.
II. NOTATIONS
Throughout the paper, the symbols and denote n-dimensional real-valued vectors, n × m matrices with real-valued elements, sets of positive real numbers, respectively. denotes the Euclidean norm for a vector and denotes the cardinality of a set. denotes the l0 norm that is a total number of non-zero elements in a vector. and 1n denotes n × n identity matrix, n × n zero matrix, n-dimensional column vector of zeros and n-dimensional column vector of ones, respectively. For any matrix denotes its positive definite, denotes its positive semidefinite, AT denotes its transpose, A− denotes generalized inverse, if A is invertible then denotes its inverse and Ai represents its i-th column. diag denotes the diagonal matrix. ⊗ denotes Kronecker product. denotes the null space of a matrix. denotes the dimension of matrix or space.
III. PRELIMINARIES
A. Graph theory
The MAS can be modeled as graph (Fig. 1). This section reviews some concepts and facts in the graph theory that will be used throughout the paper.
Multi-agent system modeled by undirected graph with agents as the nodes and communication links as edges.
Multi-agent system modeled by undirected graph with agents as the nodes and communication links as edges.
Consider a graph consists of a set of nodes and a set of edges . Nodes i, j are adjacent means there exists an edge (i, j) between two nodes.
The graph is called undirected if . The adjacency matrix is a square matrix with element aij = 1 if i, j are adjacent and aij = 0 otherwise. The diagonal elements aii are zero since the self-loop case will not be considered. The degree matrix is a diagonal matrix with element di equaling the cardinality of the node i's neighbor set . The Laplacian matrix is defined as , which means its elements are
For an undirected graph , L is a symmetric and positive semidefinite. Observing the fact that the row sum of L is zero, the vector is a right eigenvector of L associated with the eigenvalue λ = 0, i.e., .
A path from node i to j is a sequence of distinct nodes from i to j, such that each pair of consecutive nodes are adjacent. If there is a path from i to j, then i, j are called connected. If all pairs of nodes in are connected, then is called connected. For connected graphs, L has exactly one zero eigenvalue. The eigenvalues of L can be listed in an increasing order as . The second smallest eigenvalue λ2 is called algebraic connectivity of a graph, which is a measure of performance/speed of consensus algorithm.8
B. Existing consensus protocol
This section reviews the existing graph-Laplacian based consensus protocol for MAS with double-integrator dynamics presented in Refs. 23–25.
The MAS is modeled by a graph with agents as the nodes and communication links as edges. The following assumptions hold throughout the paper:
(A1) Graph is undirected and connected.
(A2) The communication condition is perfect (network effects are neglected), which can isolate the effect of cyber attack on MAS in Section IV.
Dynamics of each agent in MAS is identical and is given as:
where and are generalized coordinates and their rate of change, respectively. Henceforth, for simplicity we shall just refer to qi as position and as the velocity of any agent . The state are treated as scalar here, but the results can be extended to higher dimensional case using the concepts of Kronecker product.
Consider the distributed consensus protocol proposed in Ref. 24, where
where is referred to as the coupling gain of relative velocities.
Definition 1: Consensus is achieved by the MAS described by (2)–(3), if for any
Following from these notational substitutions, (4) is equivalent to as , where
The convergence analysis of consensus protocol (3) is done by Lyapunov function analysis similar to Theorem 1 of Ref. 25.
Theorem 1: The consensus is achieved by the MAS (2)–(3) for any .
Proof:
From (A1), both L and L2 are positive semidefinite with exactly one zero valued eigenvalue and
Let and , where are referred to as position and velocity disagreement vectors.46 Real-valued scalars are simply the components of q and along 1n, respectively.
Substituting and in (5) give us the following dynamics of the disagreement vectors:
where and . is a vector space of dimension 2n – 2. From (7), (8) has a single equilibrium point at the origin in Dδ.
Consider the following storage function of (5)
Since , we have , which implies . Thus .
Substituting and in (9) gives
From (7), V defined in (11) is positive definite and radially unbounded in . Thus, V is a Lyapunov candidate function for system (8).
Similarly, substituting in (10) gives
Since V in (11) is radially unbounded and , the set is a compact, positively invariant set. Let
From (7), . It is easy to verify that is the largest invariant set in Sδ. Hence, from LaSalle's invariance principle,47 the origin of (8) is globally asymptotically stable.
This implies, as t → ∞. ▪
IV. MAIN RESULTS
In this section, the concept of edge-bound content modification attacks is first formalized in context of the considered MAS. In Subsection IV A, to better understand the vulnerability of MAS and severity of attack issue, a special edge-bound content modification attack called MCoMA is considered from the attacker's perspective, where the attacker's goal is to ensure unboundedness of the storage function (9). In Subsection IV B, an optimal MCoMA is further proposed. In Subsection IV C, from the defender's perspective, an algorithm to detect and mitigate the MCoMA is studied. In Subsection IV D, beyond the discussion of MCoMA, an attack detection scheme for a general edge-bound content modification attack is proposed.
Definition 2: In this paper, the attacker is a malicious external entity which can execute an edge-bound content modification attack by compromising an edge set and therefore modifies the information being exchanged in the edge set at will.
The following assumptions hold throughout the paper:
(A3) The attacker is able to completely hack the communication links represented by the edges in the set . Here, completely hack refers to the attacker's capability of breaking both the encryption and message authentication code (MAC) of the communication link.
(A4) The attack is initiated at t = ta, and MAS state x does not lie in the consensus set E defined in (6) at t = ta, i.e., .
(A5) The attacker knows the complete graph topology and consensus protocol (3).
A. Vulnerability of MAS to MCoMA
Definition 3: MCoMA is referred to as an edge-bound content modification attack with a goal to guarantee the storage function V given in (9) satisfies with .
Associate a basis vector ei with every node , where ei is the i-th column of In. Let and be the adjacency matrix and degree matrix of subgraph , then the information of node i is available to the attacker if and only if .
As (from (A3)), thus the total number of completely hacked edges associated with node i is given as . Define as the set of compromised nodes, hence the attack space which is defined as has dimension . For simplifying the attack analysis, let us define an attack operator
which basically maps to linearly.
For each node and edge , the attacker can modify the information of node i to being received by node j as
where and are termed as the position attack gain and velocity attack gain associated with edge , respectively.
Hence, the effective control input of any node (refer to (3)) is given as
where and .
For uniformity, we associate position attack gains and velocity attack gains with every node (not necessarily in ) as
where, and for all . Ideally, if then . But, even in case these gains are not identically zero, the adjacency vector associated with and the attack operator Oa will limit the effect of attack only to the compromised nodes (nodes that belong to ).
where,
are referred to as attack gains throughout the paper.
Next, we give sufficient and necessary conditions for the attack (15) to be MCoMA.
Theorem 2: Consider the dynamics of MAS (5) under edge-bound content modification attack (15), i.e. (18). The content modification attack (15) is a MCoMA according to Definition 3 if and only if
attack gains Δp and Δv in (18) satisfies and ,
set is not positively invariant, where .
Proof:
Consider the storage function in (9). Clearly, and .
Computing the time derivative of V along the trajectory of (18), we have
1. Sufficiency: From (A4), , thus is positive. Now
If (a) and , then . Thus, V > 0 and .
For condition (b), we need to first show . For , we have . We can easily verify that when . Thus, , which implies .
If (b) the set is not positively invariant, will not always stay in 0, thus as .
Hence, by Definition 3, the content modification attack is MCoMA.
2. Necessity: By Definition 3, if the content modification attack is MCoMA, then in (20), which implies . By generalized Schur's complement condition,48 for , we should have and . This can only be satisfied when . Further, as , implies the set should not be positively invariant. Hence, both (a) and (b) are necessary. ▪
Since the attack gains (19) are constant matrices, the proposed MCoMA is referred to as static MCoMA.
Remark 1: Amongst all possible choices for the attacker to modify the data content in the compromised link, the proposed MCoMA guarantees a nonnegative increase rate of the storage function (9) and ensures that . This could be catastrophic for the individual agent in the MAS and in some cases, can even cause physical damage to the agents.
Remark 2: Given Oa and , the attacker can compute the position attack gains and velocity attack gains by choosing an appropriate such that the following feasibility problem has a nonempty solution set. This problem is a linear programming problem as the constraints are all linear matrix inequalities (LMI), which can be solved efficiently.
If there exists such that the solution set of (21) is nonempty then clearly and condition (a) of Theorem 2 holds. implies and from (18) we get, in which makes a non-invariant set. Hence, the edge-bound content modification attack with position attack gains and velocity attack gains belonging to the solution set of (21) is MCoMA.
B. Optimal static MCoMA design
In order to maximize the damage and minimize the cost of attack at the same time, it is desirable for a MCoMA to be distributed and compromises the least number of edges possible in any given graph.
A distributed MCoMA means for any , only the i-th and j-th elements of the associated and are non-zero. In words, this means that a content modification of states being exchanged on any one completely hacked link is not dependent in any way on the content modification of states being exchanged on any other completely hacked links. Due to this reason, distributed MCoMA is much easier to execute and has higher scalability and lower communication cost.
Definition 4: The optimal MCoMA or OMCoMA is referred to as a MCoMA which is distributed and compromises the least number of edges for any given graph.
Next proposition gives a distributed MCoMA design:
Proposition 1: Consider the dynamics of MAS (5) under edge-bound content modification attack (15), i.e. (18). If
where θ satisfies , where λn is the maximum eigenvalue of Laplacian matrix L, then the content modification attack (15) is a MCoMA.
Before the proof is provided, a lemma which will be used in the proof is stated as follows:
Lemma 1: (Theorem 3 in Ref. 49 ) Let A and B be two real positive semidefinite matrices, then if and only if AB is normal.
Now the proof of Proposition 1 is given:
Proof:
Choosing , we have
Since , we have . Now from Lemma 1, since R is normal and thus condition (a) in Theorem 2 is satisfied.
As by a similarity transformation and from (7), we get
where also has exactly one zero eigenvalue, which means and .
This implies
Hence, .
With defined in (22), the velocity dynamics be written as
Multiplying by L on both sides of equation, we get
When the system state is in and , thus , which implies . Thus, is not a positively invariant set, which satisfies the condition (b) in Theorem 2.
Hence, by Theorem 2, the content modification attack given in the proposition is MCoMA. ▪
Observing the MCoMA injection term in (26), it is evident that the proposed static MCoMA in Proposition 1 is in fact distributed, i.e., there is no information exchange required between the attacks targeting different edges.
The result proposed in the following corollary of Theorem 2 is critical for the design of MCoMA with minimum .
Corollary 1: For a graph , suppose the attack space of MCoMA is denoted by as defined in Subsection IV A and , then we always have .
Proof: Clearly, for any edge-bound content modification attack, we have .
(Proof by Contradiction.) Assume , which means some of the nodes are not compromised by the MCoMA. This implies, there exists a non-zero number of zero rows in matrix Δv, and symmetrically, there exist zero columns in Δv Consequently, corresponding diagonal element(s) of are zero as well. Hence, the matrix R as defined in (a) of Theorem 2 has a negative diagonal element(s) and hence is not positive semidefinite. However, a necessary condition for a content modification attack to be MCoMA is (refer to Theorem 2). This contradicts the given fact that the content modification is MCoMA.
Hence, by contradiction cannot hold, thus . ▪
The implications of Corollary 1 are
None of the diagonal entries of the attack operator Oa is zero for MCoMA.
- The OMCoMA design problem is now reduced to the minimum edge cover problem (given in (28)): finding the least number of compromised edges such that every node of the graph is incident to at least one edge in the set(28)
Note: The minimum edge cover problem (28) is also known as maximum matching problem. Ref. 50 introduces an algorithm in Section 10.5 to solve this problem for a graph in time.
To summarize, OMCoMA defined in Definition 4 can be designed as following:
Firstly, solve the minimum edge cover problem (28) to obtain optimal .
Secondly, implement the distributed attack based on Proposition 1.
C. Attack detection and mitigation for static MCoMA
In this subsection, an attack detection and mitigation scheme for MAS consensus against the static MCoMA in Theorem 2 is proposed.
1. Attack detection
Firstly, the attack detection scheme for static MCoMA is presented based on the physical relation of transmitted data, which in this case means that the received velocities and positions should be coherent at all times. To further interpret this, let us consider one compromised edge . Suppose the attacker modifies to , the data will only be accepted by agent j when the following detection condition is satisfied:
The following proposition demonstrates that the proposed static MCoMA can be detected with simple detection condition (29).
Proposition 2: Consider the dynamics of MAS (5) under edge-bound content modification attack (15), i.e. (18). The static MCoMA in Theorem 2 will be detected if the detection condition (29) is checked for received data at all the agents in MAS.
Proof:
For each node and edge , consider the attack (15)
where and with .
Because for a MCoMA, Δp and Δv in (18) satisfies and as shown in Theorem 2, which implies and .
(Proof by Contradiction.) Now assume the MCoMA avoids the detection condition (29) imposed on (30), which means the attacker can make
Substituting (18) into above equation gives
The left hand side of (32) is
The right hand side of (32) is
So (32) is equivalent to
To make the above equality hold, the attacker has to choose , which further implies and thereby is negative semidefinite.
However, the MCoMA requires . Hence, by contradiction, the static MCoMA in Theorem 2 will be detected by the detection condition (29), which completes the proof. ▪
In practice, (29) may be relaxed to
where, can be determined empirically.
2. Attack mitigation
In this part, a velocity observer from Ref. 24 is used to mitigate the proposed static MCoMA.
Proposition 3: Consider the dynamics of MAS (5) under edge-bound content modification attack (15), i.e. (18). Once the proposed static MCoMA is detected, each agent transmits (qi, 0) instead of and switches to the following local observer based consensus algorithm24 for MAS dynamics (2):
where and is the observer state.
With the above attack mitigation scheme, the consensus of MAS defined by Definition 1 is still achieved under the static MCoMA.
Proof:
which are in static feedback form of the velocities.
Since each agent transmits (qi, 0) instead of once the MCoMA is detected, thus from (39), the injection signals are zero.
D. Attack detection for general content modification attack
In Subsection IV C, we have proposed an attack detection and mitigation scheme for static MCoMA, which is a special content modification attack with the goal to blow up the storage function. In other cases, an attacker may not want to launch the MCoMA but may want to launch a general edge-bound content modification attack to just disrupt the MAS consensus. Thus, in this subsection, an attack detection scheme against general edge-bound content modification attack on MAS links will be proposed by relying on the detection condition (29) for MAS consensus.
Consider MAS modeled by a graph satisfying assumptions (A1) and (A2). The implementation details of the proposed attack detection scheme are as follows:
- For , instead of transmitting , the encoded data packet of (ri1, ri2) is transmitted, where (ri1, ri2) are encoded as(40)where the functions f1, f2 are known to all agents and defined as
such that . The scalars are shared securely between the agents when consensus starts, thus the attacker does not know the value of λ1, λ2 during consensus.
- After transmission, are obtained by decoding (ri1, ri2) for agent as(41)
where .
After decoding, the detection condition (29) is checked. If the condition is not violated, is utilized in the control (3) for agent . Otherwise, the attack is detected.
Theorem 3: With the proposed attack detection scheme, for , suppose the attacker modifies (ri1, ri2) to as
where the signals constitute the injection attack. The content modification attack will be detected by the detection condition (29) if
where λ1, λ2 are encoding coefficients in (40), and T is sufficiently a small sampling period for (5).
Proof:
In practical implementation, the detection condition (29) is checked by , where qip is the position of previous time instance.
In order to make , it requires , which is equivalent to
Since λ1 and λ2 are unknown to attacker during the consensus, the content modification attack as (42) will be detected by (29) once (46) is not satisfied. ▪
Remark 3: If the attacker wants to bypass the proposed attack detection scheme, the injection attack signal should satisfy (46). However, as λ1 and λ2 are unknown to the attacker, the general content modification attacks including the proposed MCoMA will be detected by the proposed attack detection scheme with high possibility.
Remark 4: Unlike the model-based attack detection schemes in Refs. 42, 51, and 52, the proposed attack detection scheme has the following advantages: The implementation is model-free, distributed, and computationally light. Being memoryless, the detection response is instantaneous.
The attack mitigation scheme for general content modification on MAS links will be addressed as part of the future work.
V. SIMULATION EXAMPLES
Consider a MAS modeled by a graph in Fig. 1 satisfying assumption (A1) and (A2). The Laplacian matrix L of this graph is
Firstly, suppose there is no attack and the consensus algorithm (3) with β = 2 is implemented for each agent. The simulation results are shown in Figs. 2 and 3. We can find the consensus is reached after 6 s, and the storage function V in (9) and function rate converge to zero rapidly. This verifies the efficacy of the existing consensus algorithm as analyzed in Theorem 1.
The position and velocity states of MAS under consensus algorithm (3).
The storage function V and storage function rate of MAS under consensus algorithm (3).
The storage function V and storage function rate of MAS under consensus algorithm (3).
Secondly, suppose OMCoMA is designed as Proposition 1 with θ = βλn and launched as Fig. 4, wherein the edge (1,5), (2,3), and (4,6) are compromised. The simulation results are shown in Figs. 5 and 6. It is evident that the position and velocity states diverge rapidly, the storage function V in (9) keeps increasing rapidly, and the function rate is nonnegative. This simply verifies the effect of the proposed OMCoMA as in Definition 2.
The storage function V and the storage function rate of MAS under OMCoMA.
Next, suppose the attack detection scheme in Proposition 2 and mitigation scheme in Proposition 3 are implemented in the MAS. The above OMCoMA is launched at ta = 3 s. The parameters for the observer based consensus algorithm (37) and (38) are selected as and the initial values are randomly chosen from [−0.2, 0.2]. The simulation results are shown in Figs. 7 and 8. The position and velocity states converge before 3 s. When OMCoMA is launched at 3 s, it is detected by (29). MAS switches the consensus algorithm from (3) to (37) and (38). The consensus is finally reached. Additionally, the storage function V in (9) and the function rate finally converge to zero. This demonstrates that the proposed attack detection and mitigation method secures the consensus under proposed MCoMA.
The position and velocity states of MAS under OMCoMA with attack detection scheme in Proposition 2 and mitigation scheme in Proposition 3.
The position and velocity states of MAS under OMCoMA with attack detection scheme in Proposition 2 and mitigation scheme in Proposition 3.
The storage function V and storage function rate of MAS under OMCoMA with attack detection scheme in Proposition 2 and mitigation scheme in Proposition 3.
The storage function V and storage function rate of MAS under OMCoMA with attack detection scheme in Proposition 2 and mitigation scheme in Proposition 3.
VI. CONCLUSIONS
In this paper, the vulnerability of MAS consensus has been demonstrated by designing and analyzing MCoMA that ensures that the storage function V for MAS consensus satisfies with . An optimal MCoMA is then designed, an attack detection and mitigation scheme for MCoMA, and an attack detection algorithm for general content modification attacks is also proposed. Future work will focus on designing an efficient attack mitigation method for general content modification attacks.
ACKNOWLEDGMENTS
This work was partially supported by the National Science Foundation under Grant No. ECCS1232127 and by Naval Air Warfare Center Aircraft Division - Pax River, MD under Contract No. N00421132M022.