“…Note that attacks that manipulate sensor or actuator values at storage or communication levels are out of our scope, and can be prevented using orthogonal ways, e.g. via physics-based modeling, machine learning or access control mechanisms [3,2].…”