Working on the network architecture is the first point. You can imagine being able to control who is allowed to operate a node, as well as how nodes are connected. There is surely something to do by creating " central" nodes and select only some nodes able to perform the verification