{"id":"https://openalex.org/W3094234032","doi":"https://doi.org/10.1109/icccnt49239.2020.9225327","title":"Are Coordinator Election Algorithms in Distributed Systems Vulnerable?","display_name":"Are Coordinator Election Algorithms in Distributed Systems Vulnerable?","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3094234032","doi":"https://doi.org/10.1109/icccnt49239.2020.9225327","mag":"3094234032"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225327","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009376881","display_name":"Shital Subhashchandra Supase","orcid":"https://orcid.org/0000-0002-1957-1458"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shital S Supase","raw_affiliation_strings":["Pune Institute of Computer Technology, Pune, India"],"raw_orcid":"https://orcid.org/0000-0002-1957-1458","affiliations":[{"raw_affiliation_string":"Pune Institute of Computer Technology, Pune, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086565563","display_name":"Rajesh Ingle","orcid":"https://orcid.org/0000-0001-5678-5191"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajesh B Ingle","raw_affiliation_strings":["Pune Institute of Computer Technology, Pune, India"],"raw_orcid":"https://orcid.org/0000-0001-5678-5191","affiliations":[{"raw_affiliation_string":"Pune Institute of Computer Technology, Pune, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009376881"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4856,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68948831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7820813655853271},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.6865054965019226},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6533995270729065},{"id":"https://openalex.org/keywords/leader-election","display_name":"Leader election","score":0.5771199464797974},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5732823014259338},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.42544227838516235},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3264418840408325},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0866258442401886}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7820813655853271},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.6865054965019226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6533995270729065},{"id":"https://openalex.org/C53480672","wikidata":"https://www.wikidata.org/wiki/Q1424189","display_name":"Leader election","level":2,"score":0.5771199464797974},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5732823014259338},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.42544227838516235},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3264418840408325},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0866258442401886},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225327","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1529640672","https://openalex.org/W1560249771","https://openalex.org/W1978623602","https://openalex.org/W2035362408","https://openalex.org/W2062507371","https://openalex.org/W2086629796","https://openalex.org/W2093606353","https://openalex.org/W2330082959","https://openalex.org/W2594242611","https://openalex.org/W2970640736","https://openalex.org/W2981182384","https://openalex.org/W3104506317","https://openalex.org/W3188403494","https://openalex.org/W4285719527","https://openalex.org/W6632017906","https://openalex.org/W6769309397"],"related_works":["https://openalex.org/W2895903757","https://openalex.org/W2012458771","https://openalex.org/W4366958300","https://openalex.org/W1518820068","https://openalex.org/W3038041910","https://openalex.org/W2503657753","https://openalex.org/W3174034613","https://openalex.org/W4205762803","https://openalex.org/W1007998577","https://openalex.org/W2103111323"],"abstract_inverted_index":{"Now":[0],"a":[1,77,110,161],"days":[2],"distributed":[3,41,62],"systems":[4],"are":[5,158,176],"backbone":[6],"of":[7,9,34,45,82,103,112,153],"majority":[8],"the":[10,29,71,80,97,113,115,122,146,151,154,164],"networked":[11],"applications.":[12],"It":[13],"has":[14],"multiple":[15],"entities":[16],"working":[17],"collaboratively.":[18],"This":[19,55],"collaboration":[20],"needs":[21],"to":[22,49,67,86,96,134],"be":[23,50,126],"coordinated":[24],"by":[25,52],"an":[26],"entity":[27,37,124],"among":[28],"member":[30,53],"entities.":[31,54],"The":[32,43,74,168],"selection":[33,47],"such":[35,136],"coordinator":[36,46,59,72,83,141,155],"is":[38,48,56,132,166],"critical":[39],"in":[40,61],"systems.":[42,63],"process":[44,81],"performed":[51],"termed":[57],"as":[58,128],"election":[60,84,104,116,142,156],"Member":[64],"nodes":[65],"need":[66],"communicate":[68],"for":[69,163,171],"electing":[70],"entity.":[73],"communication":[75],"over":[76],"network":[78],"makes":[79],"vulnerable":[85],"faults,":[87],"failures":[88],"and":[89,106,138,160],"security":[90],"attacks.":[91],"These":[92],"vulnerabilities":[93,137,152,175],"may":[94,118,125],"lead":[95],"threats":[98],"like":[99],"deletion":[100],"or":[101,121],"modification":[102],"data":[105],"fake":[107],"voting.":[108],"As":[109],"result":[111],"same":[114,165],"algorithm":[117,157],"not":[119],"terminate":[120],"wrong":[123],"elected":[127],"coordinator.":[129],"Hence":[130],"it":[131],"important":[133],"discover":[135],"threats.":[139],"Existing":[140],"algorithms":[143],"sparsely":[144],"address":[145],"vulnerabilities.":[147],"In":[148],"this":[149],"work,":[150],"identified":[159],"taxonomy":[162],"proposed.":[167],"solution":[169],"approaches":[170],"dealing":[172],"with":[173],"these":[174],"discussed.":[177]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
