“…Communication links between robots are shown in yellow. more avenues for verification of the data that cannot be easily manipulated by an adversary [20,21,22,23,24,25]. For example, previous work shows that physical information in the network can be used to detect trustworthiness in the presence of certain attacks such as a Sybil Attack [19,26,27] where an adversary "spoofs", or spawns, another robot into the system to gain a disproportionate influence on the group decision [28].…”