{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T16:14:13Z","timestamp":1769357653423,"version":"3.49.0"},"reference-count":228,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3597260","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T18:41:05Z","timestamp":1754678465000},"page":"143631-143667","source":"Crossref","is-referenced-by-count":2,"title":["Survey of Attacks and Defenses on Consensus Algorithms for Secure Data Replication in Distributed Systems"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7294-8466","authenticated-orcid":false,"given":"Luigi","family":"Mastromauro","sequence":"first","affiliation":[{"name":"STAM Center, Ira A. Fulton Schools of Engineering, Arizona State University, Tempe, AZ, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8555-1519","authenticated-orcid":false,"given":"Dhiego","family":"Souto Andrade","sequence":"additional","affiliation":[{"name":"STAM Center, Ira A. Fulton Schools of Engineering, Arizona State University, Tempe, AZ, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5696-8964","authenticated-orcid":false,"given":"Muslum","family":"Ozgur Ozmen","sequence":"additional","affiliation":[{"name":"STAM Center, Ira A. Fulton Schools of Engineering, Arizona State University, Tempe, AZ, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1432-6939","authenticated-orcid":false,"given":"Michel A.","family":"Kinsy","sequence":"additional","affiliation":[{"name":"STAM Center, Ira A. Fulton Schools of Engineering, Arizona State University, Tempe, AZ, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38677-1_5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.115"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3168747"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2010.5520830"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3197758"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CAIBDA53561.2021.00017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIICT1.2019.8741353"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87571-8"},{"key":"ref9","year":"2024","journal-title":"Challenges With Distributed Systems\u2014Aws.amazon.com"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1136\/BMJ.N71"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AIBT57480.2023.00008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SDPC55702.2022.9915826"},{"key":"ref13","first-page":"305","article-title":"In search of an understandable consensus algorithm","volume-title":"Proc. USENIX Conf. USENIX Annu. Tech. Conf.","author":"Ongaro"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SCM55405.2022.9794853"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT52962.2021.9658063"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895471"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA56854.2022.00096"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CACML55074.2022.00135"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2015.7410281"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00137"},{"key":"ref21","article-title":"A Byzantine fault tolerant raft","volume-title":"Stanford Univ.","author":"Clow","year":"2017"},{"key":"ref22","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume-title":"Proc. OsDI","author":"Castro"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329046"},{"key":"ref24","first-page":"51","article-title":"Paxos made simple","volume":"32","author":"Lamport","year":"2001","journal-title":"ACM SIGACT News"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.34727\/2021\/isbn.978-3-85448-046-4_20"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICBCTIS55569.2022.00050"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IoTaIS56727.2022.9975938"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311871"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00260"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICWAMTIP.2012.6413488"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SBESC.2015.10"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS53918.2021.00018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2926723"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICIBA50161.2020.9277011"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2016.7423294"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2011.73"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2018.00037"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.84"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2014.6933593"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.66"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2016.0063"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2012.48"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN48652.2020.1570611009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.47"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WISA.2013.63"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISPDC55340.2022.00025"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.32"},{"key":"ref49","author":"Du","year":"2025","journal-title":"Multi-Paxos: An Implementation and Evaluation"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0030679"},{"key":"ref51","article-title":"MultiPaxos made complete","author":"Liang","year":"2024","journal-title":"arXiv:2405.11183"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2673577"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12981-1_43"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48989-6_8"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.14778\/1938545.1938549"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-006-0005-x"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311900"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2017.94"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24100-0_22"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1582716.1582783"},{"key":"ref61","article-title":"Stoppable Paxos","volume-title":"Tech. Rep.","author":"Lamport","year":"2008"},{"key":"ref62","first-page":"1","article-title":"Egalitarian Paxos","volume-title":"Proc. ACM Symp. Operating Syst. Princ.","author":"Moraru"},{"key":"ref63","article-title":"A proof of correctness for egalitarian Paxos","volume-title":"Parallel Data Lab Intel Labs, Carnegie Mellon Univ.","author":"Moraru","year":"2013"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2019.105901"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-002-0070-8"},{"key":"ref66","first-page":"369","article-title":"Mencius: Building efficient replicated state machines for WANs","volume-title":"Proc. OSDI","author":"Mao"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958223"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2017.54"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355848"},{"key":"ref70","article-title":"Viewstamped replication revisited","volume-title":"MIT","author":"Liskov","year":"2012"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2788945"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11294-2_7"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/62546.62549"},{"key":"ref74","article-title":"Viewstamped replication","volume-title":"Stanford Univ.","author":"Mendoza","year":"2017"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2933057.2933111"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.1996.558282"},{"issue":"9","key":"ref77","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/0950-5849(95)01096-3","article-title":"Performance of a two-phase commit protocol","volume":"38","author":"Desai","year":"1996","journal-title":"Inf. Softw. Technol."},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_63771"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_2"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2009.5353152"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.34048\/ADCOM.2019.Paper.3"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71703-4_23"},{"key":"ref83","first-page":"261","article-title":"Spanner: Google\u2019s globally-distributed database","volume-title":"Proc. 10th USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Corbett"},{"key":"ref84","first-page":"630","article-title":"A new presumed commit optimization for two phase commit","volume-title":"Proc. 19th Int. Conf. Very Large Data Bases","author":"Lampson"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_714"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICROIT.2014.6798309"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7033930"},{"key":"ref88","article-title":"The overhead of indulgent failure recovery","volume-title":"School Computer Communication Sci., Bell Labs Research","author":"Dutta","year":"2006"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/971701.50247"},{"key":"ref90","article-title":"Revisiting fast practical Byzantine fault tolerance","author":"Abraham","year":"2017","journal-title":"arXiv:1712.01367"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35170-9_22"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIC.2018.8529940"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN59985.2024.10572154"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00132"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1802\/3\/032022"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8311821"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICSP54964.2022.9778701"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps52748.2021.9682068"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498447"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3464298.3493395"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/564870.564908"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.neucom.2013.01.013","article-title":"Average consensus in sensor networks via broadcast multi-gossip algorithms","volume":"117","author":"Wang","year":"2013","journal-title":"Neurocomputing"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2008.4739315"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-007-9029-2"},{"issue":"5","key":"ref106","doi-asserted-by":"crossref","first-page":"134","DOI":"10.3390\/fi13050134","article-title":"Comparative study of distributed consensus gossip algorithms for network size estimation in multi-agent systems","volume":"13","author":"Kenyeres","year":"2021","journal-title":"Future Internet"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2007.4301350"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2160020"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161444"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMANTIC.2018.8549774"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2016247"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/1317379.1317382"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4960423"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/1863509.1863515"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2019.02.011"},{"key":"ref116","first-page":"575","article-title":"High throughput replication with integrated membership management","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Fouto"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35476-2_24"},{"key":"ref118","article-title":"Exploring the attack surface of blockchain: A systematic overview","author":"Saad","year":"2019","journal-title":"arXiv:1904.03487"},{"key":"ref119","first-page":"51","article-title":"An analysis of network-partitioning failures in cloud systems","volume-title":"Proc. 13th USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Alquraan"},{"key":"ref120","article-title":"Distributed systems","volume-title":"Univ. Cambridge","author":"Harris","year":"2021"},{"key":"ref121","article-title":"Blockchain for healthcare systems: Architecture, security challenges, trends and future directions","volume":"215","author":"Andrew","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03850-6_11"},{"key":"ref123","first-page":"1","article-title":"Beyond the whitepaper: Where BFT consensus protocols meet reality","volume-title":"Cryptol. ePrint Arch.","author":"Wong","year":"2024"},{"key":"ref124","article-title":"Client-side byzantine attacks on raft algorithm in blockchain","volume-title":"Korea Univ.","author":"Kim","year":"2023"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806688"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/MDM48529.2020.00026"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/SAFEPROCESS52771.2021.9693543"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988350"},{"key":"ref129","article-title":"Apache ZooKeeper\u2014Zookeeper.apache.org","year":"2024"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2024.2352740"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.3390\/a16010034"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2024.3462680"},{"key":"ref134","year":"2024","journal-title":"NEO4J Customer Service Portal\u2014Support.neo4j.com"},{"key":"ref135","article-title":"Ring Paxos: High-throughput atomic broadcast","author":"Marandi","year":"2014","journal-title":"arXiv:1401.6015"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2992106"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3611308"},{"key":"ref138","article-title":"Countering active attacks on RAFT-based IoT blockchain networks","author":"Buttar","year":"2022","journal-title":"arXiv:2204.00838"},{"issue":"7","key":"ref139","doi-asserted-by":"crossref","first-page":"914","DOI":"10.3390\/e23070914","article-title":"Leadership hijacking in Docker swarm and its consequences","volume":"23","author":"Farshteindiker","year":"2021","journal-title":"Entropy"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/IUCC-CIT-DSCI-SmartCNS57392.2022.00037"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/3561877.3561892"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00018"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.2971469"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3257402"},{"key":"ref145","first-page":"126927","article-title":"Performance evaluation of blockchain systems: A systematic survey","volume-title":"IEEE Access","volume":"8","author":"Fan","year":"2020"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"ref147","doi-asserted-by":"crossref","DOI":"10.1002\/9781119519621.ch2","volume-title":"Distributed consensus protocols and algorithms","author":"Xiao","year":"2019"},{"key":"ref148","article-title":"A survey on scalable consensus algorithms for blockchain technology","volume":"3","author":"Jain","year":"2025","journal-title":"Cyber Secur. Appl."},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/MetaCom57706.2023.00077"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT59356.2023.10419806"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2014.19"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/SIN56466.2022.9970533"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon51012.2023.10115126"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997509"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103275"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3069502"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461081"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2015.36"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846624"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.14"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/BigData55660.2022.10021130"},{"key":"ref162","first-page":"129","article-title":"Eclipse attacks on Bitcoin\u2019s peer-to-peer network","volume-title":"Proc. 24th USENIX Secur. Symp. (USENIX Secur.)","author":"Heilman"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ICMECT.2019.8932108"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS49255.2021.9468156"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2960301"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/CAC53003.2021.9728492"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/PandaFPE57779.2023.10141356"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3201513"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3051730"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3026083"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2019.2950183"},{"key":"ref172","first-page":"382","article-title":"Detection of distributed denial of service attack using random forest algorithm","volume-title":"Proc. Int. Conf. Autom., Comput. Renew. Syst. (ICACRS)","author":"Murukesh"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC54921.2022.9951944"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT52851.2021.9708012"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ETI4.051663.2021.9619414"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/AICT50176.2020.9368790"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT52359.2021.00035"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPEIC.2016.7557211"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2495213"},{"key":"ref180","first-page":"169","article-title":"Zeno: Eventually consistent Byzantine-fault tolerance","volume-title":"Proc. NSDI","author":"Singh"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844156"},{"key":"ref182","article-title":"Byzantine fault tolerance in long-lived systems","volume-title":"Massachusetts Inst. Technol. Lab. Comput. Sci. (MIT LCS)","author":"Rodrigues","year":"2004"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3586053"},{"key":"ref184","first-page":"1","article-title":"Chain replication for supporting high throughput and availability","volume-title":"Proc. OSDI","author":"Renesse"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465361"},{"key":"ref186","first-page":"687","article-title":"Fault-tolerant replication with pull-based consensus in MongoDB","volume-title":"Proc. 18th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Zhou"},{"issue":"8","key":"ref187","first-page":"1","article-title":"SQL and NoSQL databases","volume":"2","author":"Sharma","year":"2012","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011494323443"},{"key":"ref189","article-title":"Detecting and mitigating faults in Byzantine fault tolerant systems","author":"Tran","year":"2024"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3241963"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560638"},{"key":"ref192","article-title":"Gossip layer optimization for the iota network","volume-title":"M.S. thesis, Dept. Comput. Sci., Fac. Elect. Eng., Math. Comput. Sci. (EEMCS), Univ. Twente","author":"Mendler","year":"2023"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09676-2"},{"key":"ref194","first-page":"153","article-title":"Making Byzantine fault tolerant systems tolerate Byzantine faults","volume-title":"Proc. 6th USENIX Symp. Networked Syst. Design Implement.","author":"Clement"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/Redundancy59964.2023.10330193"},{"issue":"2B","key":"ref196","first-page":"211","article-title":"Enhancing Byzantine-fault-tolerant consensus in permissioned blockchain-empowered vehicle-to-everything (V2X) network via multitask learning: A review","volume":"8","author":"Zambuk","year":"2024","journal-title":"Bima J. Sci. Technol."},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45065-5_3"},{"key":"ref198","article-title":"Loading","year":"2024"},{"key":"ref199","article-title":"Understanding and mitigating the effects of denial-of-service attacks on secure gossip-based multicast","volume-title":"Tech. Rep. CCIT-477","author":"Sasson","year":"2004"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3027150"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.12"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/ICCECT57938.2023.10140278"},{"issue":"4","key":"ref204","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/j.comnet.2005.07.007","article-title":"Byzantine fault tolerant public key authentication in peer-to-peer systems","volume":"50","author":"Pathak","year":"2006","journal-title":"Comput. Netw."},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.0031"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops57953.2023.10283738"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1145\/3436728"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1145\/3528535.3531516"},{"key":"ref209","article-title":"Gossip-based broadcast protocols","volume-title":"Ph.D. dissertation, Dept. Comput. Sci., Univ. Lisbon","author":"Leitao","year":"2007"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346853"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162197"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.225"},{"key":"ref214","article-title":"Enhancement and robustness of large timely gossip networks","volume-title":"Ph.D. dissertation, Dept. Elect. Comput. Eng., Univ. Maryland","author":"Kaswan","year":"2024"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF56349.2022.10051981"},{"key":"ref216","year":"2024","journal-title":"Public API (Application Programming Interface) Principles\u2014MongoDB Cloud Manager\u2014Mongodb.com"},{"key":"ref217","first-page":"5","article-title":"A buffer overflow study","author":"Fayolle","year":"2002","journal-title":"Attacks Defenses"},{"key":"ref218","first-page":"159","article-title":"A practical dynamic buffer overflow detector","volume-title":"Proc. NDSS","author":"Ruwase"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008639314265"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00015"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.5120\/2596-3608"},{"key":"ref222","volume-title":"Principles of Transaction Processing","author":"Bernstein","year":"2009"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2371"},{"key":"ref224","year":"2024","journal-title":"DIV Class=\u2018CSL-entry\u2019>"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.9734\/BJMCS\/2015\/14987"},{"key":"ref226","first-page":"1","article-title":"Proactive recovery in a Byzantine-fault-tolerant system","volume-title":"Proc. 4th Symp. Operating Syst. Design Implement. (OSDI)","author":"Castro"},{"key":"ref227","volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein","year":"1987"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1561\/0100000115"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1134\/S1064226920120116"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11121165.pdf?arnumber=11121165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T17:31:31Z","timestamp":1757698291000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11121165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":228,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3597260","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}