Bitcoin's decentralized and permissionless nature is its biggest advantage but also its biggest weakness: it's too easy to create fake nodes.
But I believe that a permissioned and decentralized network is also possible. For a node to enter the network, a 51% approval of validators already approved in the network is required.
Then we created a community on some social network or on this forum and created a kind of web of trust
https://en.wikipedia.org/wiki/Web_of_trust.
Thus it will be possible to establish a decentralized network without energy waste. Humans are very good at identifying bots.
At the same time that it will be possible to enter the network with 51% approval, it will also be possible to ban nodes.
If anyone is interested in creating this mechanism please let us know.
Proof of Work is the only true Consensus Mechanism for any truely Decentralized & Trustless Cryptocurrency. It currently has no better/proper alternative that I'm aware of. And it simply means to Prove Miners Works before they are rewarded and their works accepted.
Higher price tend to attracts more workers/miners (possibly with more powerful mining hardware to be able to keep up with mining difficulty) thus making the Network more secure against 51% attacks and increasing the energy usage.
By the way,
Bitcoin is a Freedom System/Cryptocurrency that isn't supposed to limit users like PoS does with stake limit, lock limit, consensus limit etc . It's dangerous to limit the freedom its features gurantee to people that may need them to escape or survive a tyrannical opposite system or invaders. The proper way to solve problems on the Network is to creatively build on the existing foundation/principles, like on the Permissionless feature you mentioned. If you are worried about 51attack or the so called fake nodes, then create a decentralized identity system anyone can easily have, then get anyone who wishes to be monitored less (or have a smooth stay on the network) probably against 51% attack to verify their identity. Miners identity information must be hidden/private and should only controlled by them. Once there is an attack from a miner or group of miners the Network can have their identities unmasked via consensus. You can also use ID scheme to build miners reputation... If you choose only reputation without ID , I think that could easily be cheated.