Almost any proof-of-work algorithm could be used. However, if you add an algorithm which is useful to the outside, it decreases the cost of attack (since you earn something probabilistically on top of simply a block reward). Depending on what kind of algorithms you use, this could be dangerous for network security.