For example, network attacks that target applications such as power plants, medical devices, automobiles and retail may result in serious negative effects or losses for a firm.Moore pointed out that device identity authentication functionality is the most basic requirement for security in an intelligent system.