“…For example, in a successful attack on an authentication system, an attacker could take control and manage the computational or communication components of gas, water, and heating pipelines, causing damage to property or the environment and putting people's lives at risk. As a result, security is widely regarded as one of the most important challenges in the design of robust cyber-physical systems [6].…”