<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Development of Blockchain-Based Framework for Securing Communication in Wireless Robotic Platforms</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexander Alexandrov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Robotics - Bulgarian Academy of Sciences</institution>
          ,
          <addr-line>Acad. Georgi Bonchev Str., Bl. 2, Sofia, 1113</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Wireless robotic platforms are rapidly gaining traction across various industries due to their adaptability, mobility, and eficiency. However, their reliance on wireless communication makes them vulnerable to a variety of cybersecurity threats, including data breaches, denial-of-service attacks, and unauthorized access. To address these challenges, blockchain technology ofers a decentralized, secure, and immutable framework for safeguarding communications. This paper explores the development of a blockchain-based framework specifically designed to secure communication in wireless robotic platforms using the Byzantine Fault Tolerance (BFT) approach. It examines the potential of blockchain for decentralized authentication, data integrity, and security, and presents a proposed framework design along with future research directions.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Blockchain</kwd>
        <kwd>Wireless Robotic Platforms</kwd>
        <kwd>Byzantine Fault Tolerance (BFT)</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Wireless robotic platforms have emerged as a transformative technology in domains such as
manufacturing, healthcare, defense, and autonomous vehicles. These platforms rely on wireless communication
technologies like Wi-Fi, Bluetooth, ZigBee, and 5G to perform critical tasks autonomously or in
cooperation with other robots and centralized control systems. However, the open and dynamic nature
of wireless networks exposes robotic platforms to significant cybersecurity risks. Data interception,
unauthorized command injection, denial of service (DoS), and man-in-the-middle (MitM) attacks are
just a few examples of the risks faced by these systems.</p>
      <p>
        Blockchain technology [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ], initially developed for secure and decentralized financial transactions,
ofers an intriguing solution for these security challenges. Blockchain’s decentralized nature, combined
with its immutable ledger [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], strong cryptographic protocols, and consensus mechanisms, provides
an opportunity to enhance the security of wireless communication in robotic systems [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Wireless robotic platforms are composed of various components, including sensors, actuators,
controllers, and communication modules [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The wireless nature of these platforms allows them to operate
lfexibly in distributed environments [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. However, this flexibility comes with inherent security
vulnerabilities: Lack of Centralized Control: The decentralized nature of many wireless robotic systems (such
as robotic swarms) creates challenges in maintaining a centralized authority to enforce security policies
[
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8, 9, 10</xref>
        ].
      </p>
      <p>Dynamic Topologies: Robotic platforms often operate in dynamic and changing environments, such
as factories or battlefields, where network topology can change frequently. This makes traditional
security methods, like static encryption keys or centralized access control, impractical.</p>
      <p>
        High Exposure to Interference and Attacks: Wireless communication channels [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] are inherently
vulnerable to interception, jamming, and injection attacks, threatening both the integrity and availability
of communication between robots and control systems [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. These vulnerabilities make it essential
to develop robust, adaptive, and scalable security solutions.
      </p>
      <p>
        Blockchain is a decentralized and distributed ledger technology [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ], best known for underpinning
cryptocurrencies such as Bitcoin. The core features of blockchain that make it relevant for securing
wireless robotic platforms include:
      </p>
      <p>Decentralization: Blockchain eliminates the need for a central authority by allowing each node in
the network to maintain a copy of the ledger [16]. This fits well with decentralized robotic platforms,
where multiple robots need to interact securely without relying on a central server [17].</p>
      <p>Immutability: Once data is recorded on the blockchain, it cannot be altered or tampered with,
providing a secure history of transactions [18] and communications. This immutability is valuable for
ensuring the integrity of data exchanged between robotic systems.</p>
      <p>Consensus Mechanisms: Blockchain uses consensus algorithms (such as Proof of Work or Proof of
Stake) to validate and confirm transactions across the network [ 19]. This ensures that only authorized
and verified communications are added to the ledger.</p>
      <p>Cryptographic Security: Blockchain relies on cryptographic techniques (e.g., hashing and digital
signatures) to secure data and ensure the authenticity of participants. These features of blockchain
provide a robust foundation for developing a secure communication framework for wireless robotic
platforms.</p>
      <p>Wireless robotic platforms are increasingly being deployed in numerous industries, ranging from
manufacturing and logistics to healthcare, and defense. These platforms rely heavily on eficient and
secure communication among robots to ensure coordinated operations.</p>
      <p>The decentralized nature of these platforms, coupled with the need for real-time communication,
makes them vulnerable to various cyber-attacks, including data breaches, denial of service (DoS) attacks,
and the possibility of compromised nodes [20].</p>
      <p>
        Blockchain technology has emerged as a powerful solution to these security challenges due to
its decentralized, tamper-resistant, and transparent nature. In particular, consensus algorithms like
Byzantine Fault Tolerance (BFT) have proven to be efective in securing communication in distributed
systems, even in the presence of malicious or faulty nodes . Blockchain technology is a decentralized
distributed ledger that allows multiple participants to agree on the state of a system without relying on
a central authority. It achieves security through cryptographic techniques, consensus algorithms, and
an immutable ledger of transactions [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Blockchain’s primary advantage in wireless robotic platforms
is its ability to establish trust between autonomous nodes (robots) in an untrusted environment.
      </p>
      <p>Wireless robotic platforms consist of multiple robots that communicate wirelessly to perform tasks
such as exploration, mapping, or surveillance. These platforms must be resilient to communication
failures and security threats, which makes blockchain an appealing solution. However, the consensus
mechanism employed in the blockchain is key to ensuring the system’s fault tolerance and security.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>The implementation of reliable secure communication between wireless robotic platforms as autonomous
Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) is crucial for the network
security of systems handling sensor data, as it can detect attempts by hackers and bots to hack the
network, steal sensitive data, or initiate DOS or DDOS attacks. The present study focuses on the
development of a new Blockchain-Based Framework for securing the communication between wireless
Robotic platforms connected in network. The authors in [16] propose method named
ExtendedBATMAN (E-BATMAN) incorporates the concept of blockchain into the BATMAN protocol using
MANET. As a secure, distributed, and reliable platform, Blockchain solves most BFT security issues,
with each node performing repeated security operations individually.</p>
      <p>The authors in [21] propose Byzantine fault-tolerant (BFT) as consensus mechanism aimed at
addressing possible hardware errors, network congestion or interruptions, and malicious attacks in distributed
systems. It ensures that nodes can reach consistent decisions in untrusted environments by solving
Byzantine fault problems.</p>
      <p>The authors in [22] propose blockchain-based technology called IoT-enabled Eficient Practical
Byzantine Consensus-based Reputation (EPBCR). This approach efectively monitors the post-production
business processes of electronic devices by using hybrid consensus and reputation optimization
algorithms. The authors in [23] demonstrate the use of a novel blockchain technology aided peer-to-peer
connection (P2P)-based access control protocol is proposed for the distributed ad hoc networks.</p>
      <p>The authors in [24] propose splitting the underlying blockchain into sidechains, thereby reducing
mining complexity and reducing the number of packets needed for communication while maintaining
true decentralization. The model is compared with standard blockchain &amp; sidechain implementations
in terms of access time, reading delay, and writing delay.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed design of Blockchain-Based Framework using Byzantine</title>
    </sec>
    <sec id="sec-4">
      <title>Fault Tolerance approach</title>
      <p>Byzantine Fault Tolerance (BFT) and its Role in Blockchain</p>
      <p>Byzantine Fault Tolerance (BFT) refers to a system’s ability to tolerate arbitrary failures, including
failures caused by malicious or misbehaving nodes, also known as Byzantine nodes. In a BFT system,
the honest nodes must reach consensus even if some nodes are acting arbitrarily or maliciously. BFT
algorithms ensure that the system continues to function correctly as long as the number of Byzantine
nodes does not exceed a certain threshold.</p>
      <p>In blockchain-based communication systems, BFT consensus algorithms provide a decentralized
method of ensuring that all participating robots agree on the validity of transactions (messages) even in
the presence of compromised robots. This makes BFT an ideal choice for securing communication in
wireless robotic platforms, where nodes may fail or be attacked.</p>
      <p>In a blockchain-based framework for wireless robotic platforms, robots must communicate securely
and reach consensus on the state of the network. This is achieved through the use of a blockchain
ledger, where each block contains transactions (messages exchanged between robots) and is secured
using cryptographic hash functions. The BFT algorithm ensures that all honest robots agree on the
order and validity of transactions, even if some robots are compromised.</p>
      <sec id="sec-4-1">
        <title>3.1. Cryptographic Hash Functions</title>
        <p>Cryptographic hash functions are essential for ensuring the integrity and authenticity of messages in a
blockchain-based communication system. A hash function is a mathematical function that maps an
input of arbitrary size to a fixed-size output (the hash value). In a blockchain, hash functions are used
to secure the contents of each block and to link blocks together in a chain.</p>
        <p>Mathematically, a cryptographic hash function  can be defined as:</p>
        <p>: {0, 1}* → {0, 1}
where {0, 1}* represents the set of all binary strings of arbitrary length, and {0, 1} is the set of binary
strings of fixed length .</p>
        <p>Key properties of cryptographic hash functions include:
• Preimage resistance: Given a hash value ℎ, it is computationally infeasible to find an input  such
that  () = ℎ.
• Second preimage resistance: Given an input  and its corresponding hash  () = ℎ, it is
infeasible to find a diferent input ′ such that
• Collision resistance: It is computationally infeasible to find two diferent inputs
that
 (︀ ′)︀ =  ()
 () =  (︀ ′)︀
(1)
(3)
(2)
 and ′ such
• Deterministic: The same input will always produce the same hash value.</p>
        <p>In a wireless robotic platform, each robot generates a cryptographic hash of the messages it sends.
Other robots can verify the integrity of the received messages by recalculating the hash and comparing it
with the transmitted hash. This ensures that messages have not been tampered with during transmission.</p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2. Digital Signatures</title>
        <p>Digital signatures provide a mechanism for verifying the authenticity and integrity of a message. In a
blockchain-based framework for wireless robotic platforms, each robot is assigned a public-private key
pair, where the private key is used to sign messages, and the public key is used to verify the signatures
of other robots. Mathematically, a digital signature scheme consists of three algorithms:
1. Key Generation: Generates a pair of keys (pk, sk), where pk is the public key and sk is the
private key.
2. Signing: The signing algorithm takes a message m and a private key sk, and produces a signature
 :</p>
        <p>=  (sk, m)
3. Verification: The verification algorithm takes a message m, a signature  , and a public key pk. It
returns ”True” if the signature is valid and ”False” otherwise:
   (pk, m,  ) ∈ { ,  }
(5)
Digital signatures in blockchain ensure that messages exchanged between robots are authentic and have
not been forged. When a robot sends a message, it signs the message with its private key. The recipient
robots verify the signature using the sender’s public key, ensuring that the message was indeed sent by
the correct robot and has not been altered.</p>
      </sec>
      <sec id="sec-4-3">
        <title>3.3. Public-Key Cryptography</title>
        <p>Public-key cryptography, also known as asymmetric cryptography, enables secure communication
between robots in a wireless robotic platform. Each robot generates a public-private key pair, where
the public key is shared with other robots, and the private key is kept secret.</p>
        <p>In public-key cryptography, encryption and decryption are performed as follows:
Encryption: The sender encrypts the message m using the recipient’s public key pk:
Decryption: The recipient decrypts the ciphertext c using their private key sk:
c =  (pk, m)
m =  (sk, c)</p>
        <p>This ensures that only the intended recipient can decrypt and read the message. Public-key
cryptography is essential for ensuring the confidentiality of messages exchanged between robots in a
blockchain-based communication system.</p>
      </sec>
      <sec id="sec-4-4">
        <title>3.4. Blockchain Data Structure</title>
        <p>In a blockchain-based communication system, data (messages exchanged between robots) is recorded
in blocks, and each block is linked to the previous block using cryptographic hashes, forming a chain of
blocks. Each block contains the following components:
• Transactions: The set of messages exchanged between robots.
• Timestamp: The time at which the block was created. Previous Block Hash: The cryptographic
hash of the previous block in the chain.
(4)
(6)
(7)
• Nonce: A random value used in the consensus process (e.g., Proof of Work).</p>
        <p>• Block Hash: The cryptographic hash of the current block, calculated based on the block’s contents.
Mathematically, the hash of a block B can be represented as:
 () =  ( || || || )
(8)
Where:  () represents the Hash of the current block, || denotes concatenation,   represents
the set of transactions,   represents the Time Stamp,   represents the Previous Block Hash,
 is Nonce (random value).</p>
        <p>The hash of each block depends on the hash of the previous block, which ensures that if any block is
modified, the hashes of all subsequent blocks will change, making it easy to detect tampering.</p>
      </sec>
      <sec id="sec-4-5">
        <title>3.5. Byzantine Fault Tolerance in Wireless Robotic Platforms</title>
        <p>In wireless robotic platforms, robots must coordinate and communicate securely, even if some robots
are faulty or malicious. The Byzantine Fault Tolerance (BFT) approach ensures that the system can
reach consensus on the state of the blockchain, even if up to f robots out of n total robots are faulty
or malicious. This section provides a mathematical overview of BFT consensus algorithms and their
application to blockchain-based communication in wireless robotic platforms.</p>
      </sec>
      <sec id="sec-4-6">
        <title>3.6. Byzantine Generals Problem</title>
        <p>The Byzantine Generals Problem is a classic problem in distributed systems that illustrates the challenge
of reaching consensus in the presence of faulty or malicious nodes. The problem can be described as
follows:</p>
        <p>There are  generals (robots) who must agree on a common plan of action. Some generals may be
traitors (faulty or malicious) and may send conflicting or false information to the other generals. The
goal is for all loyal generals to agree on the same plan, even if some generals are traitors.</p>
        <p>Mathematically, the system is said to be Byzantine Fault Tolerant if it can reach consensus as long as
the number of faulty or malicious robots  satisfies:
 &lt;

3
(9)
This means that the system can tolerate up to  Byzantine robots and still reach consensus.</p>
      </sec>
      <sec id="sec-4-7">
        <title>3.7. Practical Byzantine Fault Tolerance (PBFT)</title>
        <p>Practical Byzantine Fault Tolerance (PBFT) is one of the most widely used BFT consensus algorithms.
PBFT is designed for systems where the number of participants (robots) is relatively small, and it ensures
that the system can reach consensus even in the presence of faulty or malicious robots. The PBFT
algorithm operates in rounds, where each round consists of three phases:
1. Pre-Prepare: The leader robot proposes a block of transactions to the other robots.
2. Prepare: Each robot receives the proposed block and broadcasts a prepare message to all other
robots, indicating that it has received the block.
3. Commit: Each robot receives prepare messages from other robots and broadcasts a commit
message if it has received enough prepare messages. Once a robot receives enough commit
messages, it considers the block to be committed and adds it to its local copy of the blockchain.</p>
        <p>Mathematically, let  be the total number of robots, and let  be the number of faulty or malicious
robots. In PBFT, a robot considers a block to be committed if it receives commit messages from at least
 −  robots. This ensures that the block is committed by a majority of honest robots.</p>
        <p>The time required to reach consensus in PBFT depends on the network latency and the number of
message exchanges between robots. Let  represent the time for the pre-prepare phase,  represent
the time for the prepare phase, and  represent the time for the commit phase. The total consensus
time   is given by:
  =  +  + 
(10)
Each phase involves the exchange of messages between robots, and the number of messages exchanged
grows quadratically with the number of robots. Specifically, in each phase, each robot sends messages
to all other robots, resulting in  ︀( 2)︀ messages per phase. Therefore, the total number of messages
exchanged in PBFT is  ︀( 2)︀ .</p>
      </sec>
      <sec id="sec-4-8">
        <title>3.8. Security Analysis of BFT-Based Blockchain Communication in Wireless Robotic</title>
      </sec>
      <sec id="sec-4-9">
        <title>Platforms</title>
        <p>A BFT-based blockchain framework for wireless robotic platforms ofers several security guarantees,
including:
• Resilience to Byzantine Failures: The system can tolerate up to  &lt; /3 faulty or malicious
robots and still reach consensus.
• Integrity and Authenticity: Cryptographic hash functions and digital signatures ensure the
integrity and authenticity of messages exchanged between robots.
• Non-Repudiation: Once a robot signs and broadcasts a message, it cannot deny having sent the
message, as the digital signature provides undeniable proof of authorship.
• Confidentiality: Public-key cryptography ensures that only the intended recipient can decrypt
and access the message content.</p>
        <p>However, BFT-based systems also face some challenges:
• Scalability: The number of messages exchanged in PBFT grows quadratically with the number of
robots, which can limit the system’s scalability.
• Latency: PBFT requires multiple rounds of message exchanges, which can introduce latency,
especially in large networks or networks with high communication delays.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Mathematical Modeling of BFT-Based Communication in Wireless</title>
    </sec>
    <sec id="sec-6">
      <title>Robotic Platforms</title>
      <p>To optimize the performance of a BFT-based blockchain framework for wireless robotic platforms, we
need to model the system’s performance mathematically. In this section, we provide a mathematical
model for key performance metrics, including message propagation time, consensus time, and fault
tolerance.</p>
      <sec id="sec-6-1">
        <title>4.1. Network Model</title>
        <p>Consider a wireless robotic platform consisting of  robots 1, 2, ..., , where each robot
communicates wirelessly with others. The communication network can be represented as a graph  = (, ),
where  represents the set of robots and  represents the set of communication links between them.
Each edge (,  ) ∈  represents a communication link between wireless robot node  and wireless
robot node  , and may be associated with a communication delay  (,  ) and bandwidth  (,  ).</p>
      </sec>
      <sec id="sec-6-2">
        <title>4.2. Message Propagation Time</title>
        <p>When a robot node sends a message, the message must be propagated to all other robot nodes in the
network. Let  represent the time it takes to propagate a message m to all nodes. The propagation time
depends on the network topology, communication delays, and bandwidth constraints. Mathematically,
we can model the message propagation time as:
 = max
∈
︂( ∑︁
(,)∈
 (,  )
︂)
(11)
where  represents the set of communication paths from the sender node to the recipient node.</p>
      </sec>
      <sec id="sec-6-3">
        <title>4.3. Fault Tolerance</title>
        <p>The fault tolerance of the BFT-based blockchain framework is determined by the number of faulty or
malicious robots  that the system can tolerate. As mentioned earlier, the system can tolerate up to
 &lt; /3 faulty robots. This ensures that the majority of wireless nodes are reliable and can reach
consensus.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>5. Optimizing BFT-Based Blockchain Communication in Wireless</title>
    </sec>
    <sec id="sec-8">
      <title>Robotic Platforms</title>
      <p>To optimize the performance of a BFT-based blockchain framework for wireless robotic platforms,
several strategies can be employed:
• Sharding: Sharding divides the network into smaller groups (shards), each responsible for
processing a subset of transactions. This reduces the communication overhead and improves scalability.
• Lightweight Consensus Algorithms: In resource-constrained environments, lightweight
consensus algorithms such as Delegated BFT (DBFT) can be used to reduce the number of message
exchanges and improve consensus speed.
• Latency Reduction Techniques: Techniques such as message aggregation, where multiple
messages are combined into a single message, can reduce the number of message exchanges and
lower latency.</p>
      <sec id="sec-8-1">
        <title>Platforms</title>
      </sec>
      <sec id="sec-8-2">
        <title>5.1. Applications of BFT-Based Blockchain Communication in Wireless Robotic</title>
        <p>BFT-based blockchain communication systems can be applied to a wide range of applications in wireless
robotic platforms, including:
1. Swarm Robotics: Swarm robotics involves large groups of robots that coordinate to perform tasks.</p>
        <p>BFT-based blockchain ensures secure communication and coordination among robots, even if
some robots are faulty or compromised.
attacks that could compromise vehicle safety.</p>
        <p>between robots and healthcare providers.
2. Autonomous Vehicles: Autonomous vehicles rely on secure communication to exchange
information about road conditions, trafic, and obstacles. BFT-based blockchain can prevent malicious
3. Healthcare Robotics: In healthcare, robots are used for tasks such as surgery, patient monitoring,
and drug delivery. BFT-based blockchain ensures that sensitive medical data is exchanged securely</p>
      </sec>
      <sec id="sec-8-3">
        <title>5.2. Key Features of the Framework</title>
        <p>The wireless robotic platform represents a network of multiple robots communicating with each other
over wireless communication channels. Each robot acts as a node in the blockchain network,
participating in the communication and consensus process. Robots are the nodes which serve as independent
entities in the wireless network, equipped with sensors, processing units, and RF- based communication
hardware. The new developed blockchain-based framework design for securing communication in
wireless robotic platforms, is shown on the block diagram on Fig. 1.</p>
        <p>Key Components of the Block Diagram
• Block 1. Public-Private Key Cryptography: Each robot has a public-private key pair used for
signing and verifying transactions (messages).
• Block 2. Transaction Creation &amp; Signing When a robot generates new data (e.g., sensor readings,
control signals), it signs the message using its private key, creating a transaction. The transaction
contains:
1. Message content: The data to be shared with other robots.
2. Digital signature: The signature generated by the robot’s private key, ensuring message
authenticity.</p>
        <p>3. Timestamp: Time information for synchronization.</p>
        <p>This step ensures that only authorized robots can send messages, and the recipient robots can
verify that the message has not been tampered with.
• Block 3. Broadcast to Peer Robots: Once the transaction is created, it is broadcasted to all peer
robots in the network. This broadcast is an important step in decentralized communication, where
robots do not rely on a central server but instead communicate with all nodes in the network.
• Block 4. Byzantine Fault Tolerance (BFT) Consensus Mechanism: The core component of the
system is the BFT consensus algorithm, specifically Practical Byzantine Fault Tolerance (PBFT) in
this case. PBFT works in several phases:
1. Pre-Prepare Phase: The leader robot proposes the block (containing transactions).
2. Prepare Phase: Each robot verifies the block’s contents, ensuring the transactions are valid
(digital signatures and hash validation).
3. Commit Phase: Once robots have received enough prepare messages, they broadcast commit
messages to confirm the block’s validity.</p>
        <p>The consensus mechanism ensures that even if up to  robots are faulty or malicious (Byzantine
nodes), the system can still achieve agreement on the state of the blockchain, provided that
 ⩾ 3 + 1 (where  is the total number of robots).
• Block 5. Transaction Validation &amp; Preparation: Once robots receive transactions, they perform
validation to ensure that the messages are legitimate. This involves verifying the digital signatures
of the transactions to confirm that the sender is authentic, and checking the data integrity using
hash functions to ensure the message has not been altered. If the transaction passes validation, it
proceeds to the preparation stage for consensus.
• Block 6. Transaction Commit (BFT-PBFT): After the preparation and commit phases, robots reach
consensus on the validity of the transactions. In the Commit Phase, wireless robots exchange
messages confirming that the proposed block (set of transactions) is valid. The consensus is only
ifnalized when enough robots agree on the validity of the transactions. This prevents Byzantine
nodes from altering or corrupting the blockchain.
• Block 7. Add Block to Local Blockchain Ledger: Once consensus is reached, each robot adds the
new block to its local copy of the blockchain. This block contains valid transactions (messages
between robots) and cryptographic hashes linking it to the previous block, ensuring immutability.
Every robot maintains a synchronized copy of the blockchain, ensuring that all communication history
is consistent across the network</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>6. Conclusion</title>
      <p>The proposed blockchain-based framework for securing communication in wireless robotic platforms
using a Byzantine Fault Tolerance (BFT) approach provides a robust solution to the security challenges
faced by these platforms. BFT consensus algorithms ensure that robots can reach consensus on the
state of the system, even in the presence of faulty or malicious robots. Cryptographic techniques such
as hash functions, digital signatures, and public-key cryptography ensure the integrity, authenticity,
and confidentiality of messages exchanged between robots.</p>
      <p>While BFT-based systems ofer strong security guarantees, they also face challenges related to
scalability and latency. Future research should focus on optimizing BFT-based communication systems for
wireless robotic platforms by exploring techniques such as sharding, lightweight consensus algorithms,
and latency reduction strategies. As wireless robotic platforms continue to evolve, BFT-based blockchain
frameworks will play a critical role in ensuring secure and reliable communication in a wide range of
applications.</p>
    </sec>
    <sec id="sec-10">
      <title>Declaration on Generative AI</title>
      <p>The author has not employed any Generative AI tools.
[16] M. Xu, Y. Zou, X. Cheng, Byzantine fault-tolerant wireless consensus, in: Wireless Consensus:</p>
      <p>Theory and Applications, Springer, 2024, pp. 95–140.
[17] N. Zafar, A. Khanna, S. Jain, Z. Ali, J. Ahamed, Safeguarding iot: Harnessing practical byzantine
fault tolerance for robust security, in: International Conference on Data Analytics &amp; Management,
Springer, 2023, pp. 287–301.
[18] H. Wang, W. Tan, J. Wu, P. Liu, Opbft: Optimized practical byzantine fault tolerant consensus
mechanism model, in: AI and Analytics for Public Health: Proceedings of the 2020 INFORMS
International Conference on Service Science, Springer, 2022, pp. 123–135.
[19] C. Jatoth, R. Doriya, Iov block secure: blockchain based secure data collection and validation
framework for internet of vehicles network, Peer-to-Peer Networking and Applications 17 (2024)
3964–3990.
[20] U. Singh, S. K. Sharma, M. Shukla, P. Jha, Blockchain-based batman protocol using mobile ad hoc
network (manet) with an ensemble algorithm, International Journal of Information Security (2024)
1–11.
[21] N. Yang, X. Yang, R. Chai, C. Liang, Scalable blockchain-based access control algorithm for
largescale iot networks with byzantine nodes, in: International Conference on Communications and
Networking in China, Springer, 2023, pp. 126–141.
[22] L. Sharma, R. K. Gupta, C. S. Lamba, A. Kumar, P. Lathar, Eficient practical byzantine
consensusbased reputation method for iot based electronic waste tracking and tracing system using
blockchain, Multimedia Tools and Applications (2024) 1–34.
[23] M. Wu, Y. Gao, Y. Xiao, Blockchain-aided access control for secure communications in ad hoc
networks, in: Ad Hoc Networks: 11th EAI International Conference, ADHOCNETS 2019, Queenstown,
New Zealand, November 18–21, 2019, Proceedings 11, Springer, 2019, pp. 87–98.
[24] N. Balani, P. Chavan, M. Ghonghe, Design of high-speed blockchain-based sidechaining peer to
peer communication protocol over 5g networks, Multimedia Tools and Applications 81 (2022)
36699–36713.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>N.</given-names>
            <surname>Zdravković</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bogdanović</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Trajanović</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponnusamy</surname>
          </string-name>
          ,
          <article-title>Implementing blockchain technology for health-related early response service in emergency situations</article-title>
          ,
          <source>in: Proceedings of International Conference on Deep Learning, Computing and Intelligence: ICDCI</source>
          <year>2021</year>
          , Springer,
          <year>2022</year>
          , pp.
          <fpage>237</fpage>
          -
          <lpage>243</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Vijayakumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pavithraa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Harithaa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zdravković</surname>
          </string-name>
          ,
          <article-title>A web deployment of secured ecg signal medical record transactions using blockchain</article-title>
          ,
          <source>Annals of the Romanian Society for Cell Biology</source>
          <volume>25</volume>
          (
          <year>2021</year>
          )
          <fpage>19937</fpage>
          -
          <lpage>19951</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.</given-names>
            <surname>Zdravković</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jović</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>damnjanović, Secure credentialing in e-learning using blockchain</article-title>
          ,
          <source>in: Proc. of the 11th International Conference on e-Learning</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Saveetha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Maragatham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponnusamy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zdravković</surname>
          </string-name>
          ,
          <article-title>An integrated federated machine learning and blockchain framework with optimal miner selection for reliable ddos attack detection</article-title>
          , IEEE Access (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Mahalingam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <article-title>An intelligent blockchain technology for securing an iot-based agriculture monitoring system</article-title>
          ,
          <source>Multimedia tools and applications 83</source>
          (
          <year>2024</year>
          )
          <fpage>10297</fpage>
          -
          <lpage>10320</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Alsubai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alqahtani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Garg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gumaei</surname>
          </string-name>
          ,
          <article-title>A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records</article-title>
          ,
          <source>Complex &amp; Intelligent Systems</source>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Raj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Prakash</surname>
          </string-name>
          ,
          <article-title>An eficient blockchain-based access control framework for iot-healthcare system</article-title>
          ,
          <source>Wireless Personal Communications</source>
          <volume>136</volume>
          (
          <year>2024</year>
          )
          <fpage>1017</fpage>
          -
          <lpage>1045</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>An advance encryption and attack detection framework for securing smart cities data in blockchain using deep learning approach</article-title>
          ,
          <source>Wireless Personal Communications</source>
          <volume>135</volume>
          (
          <year>2024</year>
          )
          <fpage>1329</fpage>
          -
          <lpage>1362</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gao</surname>
          </string-name>
          , Y. Han,
          <string-name>
            <given-names>J</given-names>
            .
            <surname>Zhao</surname>
          </string-name>
          ,
          <article-title>B-tor: Anonymous communication system based on consortium blockchain, Peer-to-</article-title>
          <source>Peer Networking and Applications</source>
          <volume>16</volume>
          (
          <year>2023</year>
          )
          <fpage>2218</fpage>
          -
          <lpage>2241</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>W.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Fairness resource allocation based on blockchain for secure communication in integrated iot</article-title>
          ,
          <source>EURASIP Journal on Advances in Signal Processing</source>
          <year>2023</year>
          (
          <year>2023</year>
          )
          <fpage>115</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Xia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Tao</surname>
          </string-name>
          ,
          <article-title>Blockchain-based vehicular edge computing networks: the communication perspective</article-title>
          ,
          <source>Science China Information Sciences</source>
          <volume>66</volume>
          (
          <year>2023</year>
          )
          <fpage>172301</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ameri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Meybodi</surname>
          </string-name>
          ,
          <article-title>An improved cellular goore game-based consensus protocol for blockchain, Cluster Computing (</article-title>
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O. G.</given-names>
            <surname>Bautista</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Manshaei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hernandez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Akkaya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Homsi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Uluagac</surname>
          </string-name>
          , Mpc-abc:
          <article-title>Blockchain-based network communication for eficiently secure multiparty computation</article-title>
          ,
          <source>Journal of Network and Systems Management</source>
          <volume>31</volume>
          (
          <year>2023</year>
          )
          <fpage>68</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. R.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ji</surname>
          </string-name>
          , V. C.
          <article-title>Leung, Blockchain and machine learning for communications and networking systems</article-title>
          ,
          <source>IEEE communications surveys &amp; tutorials 22</source>
          (
          <year>2020</year>
          )
          <fpage>1392</fpage>
          -
          <lpage>1431</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Priya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Praveen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Nivitha</surname>
          </string-name>
          , T. Sudhakar,
          <article-title>Improved blockchain-based user authentication protocol with ring signature for internet of medical things, Peer-to-Peer Networking and Applications (</article-title>
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>