1. Alam, T., Taylor, J., Taylor, J., Badsha, S., Shahid, A.R.B., Kayes, A.: Leveraging blockchain for spoof-resilient robot networks. In: Proceedings of Internation Conference on Intelligent Robotics and Applications, pp. 207–216 (2020)
2. Christidis, K., Gupta, V.: Blockchain for iot security: a review. Blockchain Journal 2(1), 5–20 (2019)
3. Davidson, D., Wu, H., Jellinek, R., Singh, V., Ristenpart, T.: Controlling UAVs with sensor input spoofing attacks. In: Proceedings of the 10th USENIX Workshop on Offensive Technologies (2016)
4. Desai, A., Ostrowski, K., Gazi, V.: Leader–follower formation control of mobile robots: a comparative study. Int. J. Robot. Autom. 27(1) (2012)
5. Douceur, J.R.: The sybil attack. In: Proceedings of International Workshop on Peer-to-Peer Systems, pp. 251–260 (2002)