Do you know of any good resources talking about considerations for handling adversarial nodes in these networks? For example, what's to stop a rogue implementation from advertising that it has a low cost / short distance to every other node it's ever seen, reporting that data has been sent successfully that actually wasn't, etc? These links give some good background but I haven't seen anything on there about trust in a hostile environment.