“…These algorithms do not follow a holistic approach to addressing security beyond interaction. Examples of these consensus algorithms are firefly [25], distributed containment control [26], forced bipartite [27], distributed flocking [28], constraint and projected [29], constant step-size gradient descent [30], proportional integral derivative and super twisting [31], uncertain linear [32], rate [33], and the ones based on swarm intelligence [34] among others. Each device senses things differently, for instance, a sensor might check for motion, some to measure temperature, while another humidity and they can exist in the same Wireless Sensor Network.…”